Language Selection

English French German Italian Portuguese Spanish

Web Upd8

Syndicate content Web Upd8
Daily Ubuntu / Linux news and application reviews
Updated: 40 sec ago

How To Flash Android (Flyme) On Meizu MX4 Ubuntu Edition

Friday 25th of August 2017 09:52:00 AM

This is a quick guide for how to reflash Fyme OS on Meizu MX4 Ubuntu Edition. Flyme is based on Android with some redesign along with extras. It doesn't ship with Google apps, but those are easily installable.
You can flash Flyme 5.1.12G or 6.1.0G (released recently), both based on Android 5.1. To see what's new in Flyme 6, check out THIS page. Using the steps below, you should receive future Flyme OS updates automatically, so there's no need to reflash anything manually for any OS updates.


Flash Android (Flyme) On Meizu MX4 Ubuntu Edition)
Before proceeding, make sure your phone is charged. Also, like with any flashing procedure, this may brick your device, so use these instructions at your own risk! And finally, I should mention that I didn't yet try to perform a reverse procedure (install Ubuntu Touch back) so if you plan on doing this in the future, you'll have to figure out how to do it yourself.
1. What you'll need

1.A. adb and fastboot.

In Ubuntu, adb and fastboot are available in the official repositories. To install them, use the following commands:
sudo apt install adb fastboot
These can also be downloaded from HERE (for Linux, Mac and Windows).

1.B. Flyme firmware (global version).

The Meizu MX4 global firmware is available to download from HERE.

1.C. recovery.img from Flyme OS.

This can be downloaded from HERE or HERE.

Place the firmware along with the recovery image in your home folder.


2. Enable Developer mode on your Meizu MX4 Ubuntu Edition (About phone > Developer mode).

3. You may encounter an error with adb / fastboot not detecting the Meizu MX4 Ubuntu Edition device. To fix this, open the ~/.android/adb_usb.ini file with a text editor (if it doesn't exist, create the ".android" folder in your home directory, and a file called adb_usb.ini inside this folder) and paste the following in this file:
0x2a45
... and save the file.

On Windows, this file is available under C:\Users\<user name>\.android

4. Flash the recovery and Flyme OS

4.A. Connect the Meizu MX4 Ubuntu Edition device to your computer via USB (USB 2.0 is recommended because it looks like there might be issues with USB 3.0), then reboot in bootloader mode and flash the recovery:adb reboot-bootloader
fastboot flash recovery recovery.img(or enter the exact path to where you downloaded "recovery.img")


Note that the phone must be unlocked when doing this. Also, the first time you use adb, the phone will ask if you want to allow the connection - make sure you click "Accept"!
In theory, you should be able to reboot to bootloader by holding volume down + power buttons, and into recovery by holding volume up + power, but these didn't work for some reason on my device (I don't remember if only one of them or both), that's why I used commands instead in this article.
4.B. Next, power up the phone and after Ubuntu Touch boots, run the following command to reboot into recovery:adb reboot recovery
From the recovery screen (which is in Chinese), you need to get to a screen which displays the "adb sideload" command at the bottom. You get to this by selecting the various options in the recovery screen, but unfortunately I forgot which one (and I didn't took a picture). So unfortunately I can't tell you exactly how to get there, but remember that "adb sideload" should be displayed at the bottom when you get to the right option.
Once you get to the screen I mentioned above, run the following command
adb sideload update.zip(or enter the exact path to where you downloaded "update.zip")

On the next reboot, your Meizu MX4 should run Flyme instead of Ubuntu Touch. Note that the first boot might take a long time!


Quick Flyme OS tips for new users

And finally, a couple of tips if you're new to Flyme OS.
Meizu MX4 has only 1 button, so to perform a "back" function, instead of using a dedicated button, you'll need to touch the Meizu MX4 button once.
To go to the home screen you'll have to swipe up on the Meizu MX4 button.
To install Google Play Store and other Google apps, you'll need the Meizu Google Apps Installer. This is available in the Meizu store, or you can grab an APK from HERE.

Rooting the device is very easy. You'll need to create a Meizu account and log in to it on the Meizu MX4. Next, go to Settings > Security > Root Permission and agree to the terms. That's it.

References:

More in Tux Machines

Development: RTOS, LipidFinder, Github Threat, and Stack Overflow Survey

  • RTOS Primer, Part Two: Real Time Applications
    Employing Linux as an embedded RTOS has several advantages that make it highly attractive on a number of levels, specifically the most important concern these days, which seems to be cost. The second concern is security; Linux proves to be pretty secure in comparison to several common alternatives like Windows.
  • LipidFinder: An Open-Source Python Workflow for Novel Lipid Discovery
    Obtaining precise, high-quality lipidomic (or metabolomic) datasets comes with its challenges. One factor that I am sure comes to mind is the ability to minimize, or even better, eliminate those large numbers of artefacts that could otherwise hinder your mass spectrometry data analysis, to ensure accurate interpretation.
  • The Github threat
    The Github application belongs to a single entity, Github Inc, a US company which manage it alone. So, a unique company under US legislation manages the access to most of Free Software application code sources, which may be a problem with groups using it when a code source is no longer available, for political or technical reason.
  • Stack Overflow gives an even closer look at developer salaries
    Today, Stack Overflow announced a slightly more useful application for that same data, with the Stack Overflow Salary Calculator. Tell it where you live, how much experience and education you have, and what kind of developer you are, and it will tell you the salary range you should expect to make in five national markets (US, Canada, UK, France, Germany) and a handful of cities (New York, San Francisco, Seattle, Toronto, London, Paris, Berlin).

Security: Equifax, Kodi, Infrared, and Windows XP in 2017

  • Safer but not immune: Cloud lessons from the Equifax breach
  • Warning: If you are using this Kodi repository, you could be in danger
    Kodi is quite possibly the best media center software of all time. If you are looking to watch videos or listen to music, the open source solution provides an excellent overall experience. Thanks to its support for "addons," it has the potential to become better all the time. You see, developers can easily add new functionality by writing an addon for the platform. And yes, some addons can be used for piracy, but not all of them are. These addons, such as Exodus and Covenant, are normally added using a repository, which hosts them. [...] We do not know 100 percent if the person that re-registered the metalkettle name on GitHub is planning anything evil, but it is better to be safe than sorry.
  • Infrared signals in surveillance cameras let malware jump network air gaps
    The malware prototype could be a crucial ingredient for attacks that target some of the world's most sensitive networks. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution. In the event malware is installed, there is no way for it to make contact with attacker-controlled servers that receive stolen data or issue new commands. Such airgaps are one of the most basic measures for securing highly sensitive information and networks. The proof-of-concept malware uses connected surveillance cameras to bridge such airgaps. Instead of trying to use the Internet to reach attacker-controlled servers, the malware weaves passwords, cryptographic keys, and other types of data into infrared signals and uses a camera's built-in infrared lights to transmit them. A nearby attacker then records the signals with a video camera and later decodes embedded secrets. The same nearby attackers can embed data into infrared signals and beam them to an infected camera, where they're intercepted and decoded by the network malware. The covert channel works best when attackers have a direct line of sight to the video camera, but non-line-of-sight communication is also possible in some cases.
  • Manchester police still relies on Windows XP
    England's second biggest police force has revealed that more than one in five of its computers were still running Windows XP as of July. Greater Manchester Police told the BBC that 1,518 of its PCs ran the ageing operating system, representing 20.3% of all the office computers it used. Microsoft ended nearly all support for the operating system in 2014. Experts say its use could pose a hacking risk. The figure was disclosed as part of a wider Freedom of Information request. "Even if security vulnerabilities are identified in XP, Microsoft won't distribute patches in the same way it does for later releases of Windows," said Dr Steven Murdoch, a cyber-security expert at University College London.

Flock 2017, Fedora 27, and New Fedora 26 (F26) ISO

  • Flock 2017: How to make your application into a Flatpak?
  • Flock to Fedora 2017
  • Flock 2017 – A Marketing talk about a new era to come.
    I had two session at Flock this year, one done by me and another in support of Robert Mayr in the Mindshare one, if there were been any need for discussing. Here I’m talking about my session: Marketing – tasks and visions (I will push the report about the second one after Robert’s one, for completion). In order to fit the real target of a Flock conference (that is a contributor conference, not a show where people must demonstrate how much cool they are; we know it!) is to bring and show something new, whether ideas, software, changes and so on, and discuss with other contributors if they’re really innovative, useful and achievable.
  • F26-20170918 Updated Live isos released
  • GSoC2017 Final — Migrate Plinth to Fedora Server
  • Building Modules for Fedora 27
    Let me start with a wrong presumption that you have everything set up – you are a packager who knows what they want to achieve, you have a dist-git repository created, you have all the tooling installed. And of course, you know what Modularity is, and how and why do we use modulemd to define modular content. You know what Host, Platform, and Bootstrap modules are and how to use them.

Red Hat Financial Results Expectations High