This is yet another boring update about how Don and I are not dead, etc. My computer was broken for about a month, during which I was too preoccupied with some ridiculous and petty interpersonal bullshit (about which I’ll remain vague on public forums) to prioritize fixing my computer and/or doing comics.
But the good news is that I have a shit-ton of material from all the time I’ve spent not making new comics! Now I just need to find the time to do them.
Just wanna let you guys know that Don Depresso is still alive (I was about to say “alive and well” but realized that phrase doesn’t really apply to Don). I’m working hard on building the new website rather than doing new comics right now, but the comics will be back soon!
As for the new website, it’s still a mess, but it’s coming along. I expect to release the URL to the public by next week. Here’s another sneak preview (I totally changed the theme since the last screenshot I posted):
As you can see, some of the code is all wonky and needs to be fixed before I can officially start using the new site.
Oh, and I’m also gonna release an interactive Don Depresso crossword puzzle along with the new site! Stay tuned!
That’s why I haven’t published any new comics lately. I’m not gonna give you the URL of the new site just yet because it’s still under construction, but the picture shows what it looks like so far.
I’ll probably keep updating this Tumblr blog after the new site is up, but I will focus more on the new site. My main motivation is to gain more control over the site’s design and content than Tumblr currently gives me with this site, so I’m moving to Wordpress.
Intimate Relationships by Rowland S. Miller is actually a really interesting and thought-provoking psychology textbook. As the previous link will tell you, this book is prohibitively expensive for the average person who reads this blog, but I found a free scan of it here (file not hosted by me). Alternatively, you can download the PDF from here.
Hi, Don Depresso readers! As you may know, everyonce in a while I post a tech-y/Linux-y article or update that doesn’t have much to do with Don Depresso. (And, as you also may know, I’ve also written articles for “legit” tech magazines and blogs like LinuxJournal, Linux Magazine, and MakeTechEasier.) Well, this is gonna be one of those posts, so non-geeky readers beware!
Ruji C.’s Guide to Rooting Your Verizon Samsung Galaxy S4 (Build VRUAME7) for Linux Users
I decided to write this tutorial after struggling to root my own Verizon Samsung Galaxy S4. I read through numerous online articles and threads, never quite sure if the information was up to date or relevant to my specific phone model. Through my research and a lot of experimentation, I finally succeeded at rooting the device, and along the way I learned a few things that I hadn’t seen explained in enough depth in any of the articles I’d read.
This article will take you through the rooting process for the VRUAME7 build of the Samsung Galaxy S4, which is specific to Verizon customers in the USA. I will spend some time reiterating information that can be found elsewhere, and I will also attempt to fill in the gaps left by many of the other currently available information sources.
What Firmware is on Your Samsung Galaxy S4?
To find out if this article is relevant to your phone, go to Menu::Settings:: More:: About phone::Baseband version. If you see the sequence “VRUAME7” then you’ll know this article is for you.
Preparing Your SD Card for Rooting
For this exploit to work on the VRUAME7, your phone must have an external SD card formatted as exFAT. You basically have two choices here:
(A) Purchase an SD card that’s already in the exFAT format, such as this $49.07 64GB SanDisk microSDXC card. In general, manufacturers only offer exFAT formatting on SD cards with a capacity of 64GB or greater. If you aren’t prepared to shell out the money for a 64GB SD card, go for option B.
(B) Format your SD card to exFAT. This step must be done from a computer, not your phone; although the Galaxy S4 does come with a formatting utility, it won’t let you choose the exFAT filesystem.
Formatting Your SD Card to exFAT on Linux
NOTE: You can format your SD card in Mac OS X or Windows as well, but this guide is written for Linux users.
First, you must have a microSD card reader. Simply connecting the phone to your computer with a USB cord will not allow you to access the SD card for formatting. If your computer doesn’t have a built-in card reader that supports microSD, you can get one for under $10. I purchased the Transcend Information USB 3.0 Card Reader (TS-RDF5K) for $8.61 and can verify that it works on my Gentoo Linux system.
Got your card reader? Good.
You can safely unmount the SD card from your phone while it’s on by going to Menu::Settings::More::Storage::Unmount SD card. Now take the card out of your phone (be careful not to grab your SIM card instead), stick it in your card reader, and hope your computer reads it!
If your computer doesn’t recognize the card, all is not lost. You probably just have to install fuse-exfat and exfat-utils. If you happen to be using Gentoo Linux like I am, the commands are:
su emerge fuse-exfat exfat-utils
Once you get that taken care of, you should be able to identify your SD card’s mount point (/dev/sd**) with the fdisk command. Still as root, run:
Once you know which device your SD card is, go ahead and format it as root:
mkfs.exfat -n LABEL /dev/sd**
Replace LABEL with the name you wish to give your card and replace /dev/sd** with the actual device identifier revealed with fdisk -l (e.g., /dev/sdc1).
All right, now the hard part is over!
The Root Exploit
Although most of the current root guides for the VRUAME7 will tell you to connect your phone to your computer for this part, you really don’t need to. The only benefit of doing so is that it’s more straightforward to unzip a compressed archive on a computer than on a phone, but your phone can still do it. Here’s how:
Extract the files from RootforVZWS4.zip directly into the root of your SD card. If you need an unzipping utility, I recommend ES File Explorer.
Navigating to the extSdCard root directory in ES File Explorer.
View of root exploit files properly unpacked in root directory of extSdCard.
Running the Rooting Commands
Open Android Terminal Emulator (install it if you don’t have it already).
Enter the root directory of your SD card:
And run the root exploit scripts:
Congrats, you should be root now! But beware: If you’ve previously installed any root administration apps (such as Superuser), they will conflict with the SuperSU app invoked by these scripts, so uninstall any of those before proceeding.
Get Wireless Tether for Root Users to wirelessly tether your computer to your phone’s internet connection (useful on public transportation and in other situations where there is no WiFi network available).
Run a kazillion different servers on your phone (FTP, HTTP, VNC, NTP, NFS, MySQL, WebDAV, and over 50 more) with Servers Ultimate. Note that the previous link is a 14-day trial version; unfortunately, this app is not free, but I believe the paid version is worth the few bucks if you want a convenient way to run multiple servers on your phone.
WiFinspect provides you with several useful network auditing tools.