03/15/2013, 08:43 AM
devicetool.jar is a verify powerful back door...
Downloading from HP/Palm it only has a few uimages (for Pixi and for Pre).
But, if one wants to use it to unlock any webOS here is the way to do it...
Download the devicetool.jar from here:
Now to get the other uimage files into the jar, a Jar is a fancy ZIP... one can unzip it and create a file structure then zip that whole directory structure or one can just add the uimage to the jar...
The uimages can be extracted from the webOSDoctor of your choice (Veer, Pre3, Pre2, Touchpad, and TouchpadGo) when you include all of them the file size is now about ~100M, but it will unlock any webOS device.
So place your uImage under the following directory in the ZIP:
FYI If one wants they could also update the pre/pixi uImage to the latest versions of each...
Now with this updated devicetool.jar, one can always gain access to a device...
PS The main reason for this is someone had a Veer that it's touchpanel was not working but they wanted the information off of the device, if devmode was not invoked it is hard to get access to the device to get things off of it. This allows one to do so.