Root Transformer Prime (TF101 And TF201) On ICS 4.0.3 By Simply Installing An APK
As far as rooting an Android device goes, you’d be hard pushed to find an easier, and more passive method than simply installing an APK.
As usual, the method comes courtesy of XDA Developers, and we’ve provided a simple step-by-step tutorial on how you can root your Transformer and Transformer Prime devices quickly and effectively by using SparkyRoot.
The steps simple to follow, and even if you’re not a seasoned tinkerer, the process should be a doddle. The method is said to work on just about all Transformer Prime firmwares, and as per the developer:
This root app has been confirmed working on current OTAs for the ASUS Transformer (TF101) and Transformer Prime (TF201) Devices. This includes v126.96.36.199 for the TF201 and v188.8.131.52 for the TF101.
This method (as it is currently implemented) no longer works with the v184.108.40.206 ROM on TF201.
DISCLAIMER: Redmond Pie will not be held responsible if you lose data or your device gets damaged in the following of this guide. The chances of this occurring are extremely minimal, but just for sake of clarification, proceed at your own risk.
This guide, if followed correctly, should have your device rooted in no time.
Step 1: Download and Install SparkyRoot from this XDA thread.
Step 2: Once installed, run, and click step 1, -> Exploit.
Step 3: Click step 2 -> open the ASUS App Backup tool, and backup your apps.
Step 4: Return to this app , and then click step 3 -> Install SuperUser, which will install the SuperUser app.
Step 5: Click step 4 -> Cleanup, and that’s it; your Transformer or Transformer Prime will be rooted.
The release of such tools certainly helps to encourage those feeling a little out of their depth with some of these processes to take the plunge and get involved. Rooting a device unlocks endless possibilities – many of which are covered in great detail by my colleague Awais Imran, in his “Why Should I Root My Android Smartphone Or Tablet?” post located here.
Sure, there are the obvious drawbacks such as an increase in potential malware infiltration, but so long as you proceed with a relative amount of caution, these risks are fairly minimal.