Running Kernel 3.0.15-N7000XXLQ2-CL605927; Build TMT1.4 Final IML74K.ZSLPF;
VNC and VPN apps fail to open to network.
Any Thoughts?
I got my Kindle fire rooted and everything got all the Google apps needed to run Google playstore the play store works but when I try to download an app it says: error retrieving information from the server. [RPC:S-7:AEC-0].
Does any one know if it is possible to install a certificate on a Android device as type "VPN and App" certificate, and sign your app with this certificate via de keytool/jarsigner process. And then let it by pass the untrusted app restriction when deploying the app via a website?
Hi
I've installed the last nightly build of CM11 (11-20160612) on my Samsung Captivate, then TeamViewer Host. Everything works fine and I can connect my cell with TV.
If I try to get remote access, a message on the cell invite me to install Quick support add-on. After few seconds : error : app not installed (without any details). I install "QS add-on : Samsung" from Google Play Store but no change.
Some messages in forum propose to get the apk from download directory and manually move to \sys . The "downloaded apk" doesn't exist in my case.
My cell is rooted and SU installed.
Any idea ?
Hello, I have search in this forum and google, but not found related answer.
sorry for bad english.
A month ago I found Unknown process sending UDP to random IP server (some time academi server, sometime goverment server, sometime random). But all IP hosted/served by one ISP in my country (Bi*net). OK its not problem with server or ISP.
I am just courious about sender (app who sent data). I use Packet Capture to intercept connection. When Packet Capture listing Unknown process, I think sender is System Module Android or System App or kernel, i dont know. For example, Hospot/tethering modul shown as Unknown process in Packet Capture, I know that because IP address shown as 192.*
Then i have other suspect that may be making UDP connection,
1. CM13 Google Seed, this is modified by developer in my country
2. Google Apps, installed with cusrom
3. ABS Tweak, I downloaded from official XDA thread
4. Busybox No Root, I downloaded from blac**art
5. SuperSu Binary v2.82 SR2 from chainfire site
To known who make UDP connection, I installing another cusrom, MIUI 8 stable, ported by same developer. But this time I only install SuperSU binary.
The result is Packet Capture still intercept UDP from Unknown process.
Then I install other cusrom, CM13 Temasek, still modified by same developer and no google apps included, but this time I am not installing SuperSU binary.
I try to intercept connection, and not found other UDP connection.
Next I am installing SuperSU binary new v2.82 SR3 and I found UDP connection again.
This us happened to me or you also experience this?
Is SuperSU sending data via UDP? I have contacted Chainfire but no reply.
Is 2.77 or 2.76 compatible with your device? Try those and see if still makes UDP connections.
Could be that the Chinese company is doing some sketchy **** lol.