Featured

𝕯𝖆𝖗𝖐𝕷𝖎𝖓𝖚𝖝.𝖊𝖝𝖊

Jedna od bitnih razlika između robota i čovjeka je poseban odnos prema čovječanstvu. Razvijena umjetna inteligencija ne može biti obdarena čovječanstvom, jer ne može biti čovjek, jer ima drugačiju prirodu od ljudske. Umjetna inteligencija je poput onog fantastičnog duha puštenog iz boce ili izvanzemaljaca koji su doletjeli na zemlju. Snaga inteligencije strojnog učenja i veliki broj prikupljenih privatnih podataka mogu se koristiti ne samo za dobrobit (prikazivanje relevantnih informacija), već i na štetu čovječanstva.Što će se dogoditi s čovječanstvom u budućnosti kada dođe tehnološka singularnost?U današnjem svijetu informacijska tehnologija i informacijska sigurnost postaju sve važniji. Informacijske tehnologije pojavljuju se u svim većim područjima suvremenog života. Ako su prethodne generacije ljudi koristile e-mail poruke napisane na papiru ili izravno govorile za komunikaciju, sada se elektroničke poruke koriste za prenošenje misli. Pametni telefoni, računala i drugi pametni uređaji postali su stalni životni zadovoljstvo. Funkciju knjižnica zamijenile su tražilice. Sada, da biste pronašli informacije, ne morate pregledavati stotine stranica knjiga, samo unesite upit u tražilicu i dobit ćete milijune odgovora.Usporedo s razvojem sustava automatizacije, koji su u svojoj biti obični složeni mehanizmi, razvijaju se i sustavi strojnog učenja čija je svrha imitirati ljudski mozak ili njegove pojedinačne funkcije. Jeste li primijetili da čim samo pomislite na nešto, pojavi se neočekivana promotivna ponuda ili video na ovu temu? Dakle, već ste vidjeli rezultate njihovog uspješnog rada. Ovi sustavi prikupljaju privatne informacije i na temelju njih predviđaju ponašanje, pa čak i manipuliraju nesvjesnim radnjama ljudi koji se izoliraju u unaprijed pripremljene informacijske balone. Da, moguće je da je isti prijatelj koji je neočekivano glasao za stranku X pao pod njihov utjecaj

Što će se dogoditi s čovječanstvom u budućnosti kada dođe tehnološka singularnost?

U današnjem svijetu informacijska tehnologija i informacijska sigurnost postaju sve važniji. Informacijske tehnologije pojavljuju se u svim većim područjima suvremenog života. Ako su prethodne generacije ljudi koristile e-mail poruke napisane na papiru ili izravno govorile za komunikaciju, sada se elektroničke poruke koriste za prenošenje misli. Pametni telefoni, računala i drugi pametni uređaji postali su stalni životni zadovoljstvo. Funkciju knjižnica zamijenile su tražilice. Sada, da biste pronašli informacije, ne morate pregledavati stotine stranica knjiga, samo unesite upit u tražilicu i dobit ćete milijune odgovora.

Usporedo s razvojem sustava automatizacije, koji su u svojoj biti obični složeni mehanizmi, razvijaju se i sustavi strojnog učenja čija je svrha imitirati ljudski mozak ili njegove pojedinačne funkcije. Jeste li primijetili da čim samo pomislite na nešto, pojavi se neočekivana promotivna ponuda ili video na ovu temu? Dakle, već ste vidjeli rezultate njihovog uspješnog rada. Ovi sustavi prikupljaju privatne informacije i na temelju njih predviđaju ponašanje, pa čak i manipuliraju nesvjesnim radnjama ljudi koji se izoliraju u unaprijed pripremljene informacijske balone. Da, moguće je da je isti prijatelj koji je neočekivano glasao za stranku X pao pod njihov utjecaj

@𝕏.com ꓓⲁⲅⲕⳐⳕⲛⳙⲭ.ⲉⲭⲉ™ ®️

METAS DOESNT LIKE THEIR PACKAGE NOT USING

FB now started force,
i mean if u want to use FB/INSTA/THREADS ,
now u must enable or defrost mettas packages,
“`
package:com.facebook.katana
package:com.facebook.system
package:com.facebook.appmanager
package:com.facebook.services
“`
when u click FB link inside INSTA app,
pop-up msg say that u need to enable “Meet Installer”
when i didnt neeed them before but now FB app no thx…

when u click that Go to settings that link forwards u to;

Meet Install, now.lets take a look permissions:

FB relation pckages are these:

and these mettas apps are huge analytics, monitors,
spy silenty/logging sending app which learn ur device behavir…
and u dont even feel sumthin wrong…

but what SAMSUNG do with their preinstalled app its so shameless…
evry samsung app got backdoor allwayw available no matter how much they try.to patch all …

CVE’S penetrater in evry single samsung app…
which now.look like swiss chesse …
i allready frozzen 130+ samsung app n blootwares…
far far away from samsung app…
it better to use google service on samsung deviced…

my SCUMSUNG BLOOTWARES LIST:

xDD

SCUMSUNG.vulnerability.cve

vulnerability 

11-2023/2024

SVE-2023-0774(CVE-2024-20825, CVE-2024-20824, CVE-2024-20823, CVE-2024-20822): Implicit intent hijacking vulnerability in Galaxy Store

Resolved version: 4.5.63.6
Reported on: May 4, 2023
Description: Implicit intent hijacking vulnerability in Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.

Samsung Gallery

SVE-2023-1781(CVE-2024-20827): Improper access control vulnerability in Samsung Gallery

Description: Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen.
The patch prevents menu access by physical keyboard in locked device

Samsung Internet

SVE-2023-2275(CVE-2024-20828): Improper authorization verification vulnerability in Samsung Internet

Description: Improper authorization verification vulnerability in Samsung Internet prior to version 24.0 allows physical attackers to access files downloaded in SecretMode without proper authentication.
The patch adds proper authorization verification logic to prevent unauthorized access.

Samsung Email

SVE-2023-0956(CVE-2024-20807): Implicit intent hijacking vulnerability in Samsung Email

Description: Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows attacker to get sensitive information.
The patch change the implicit intent to explicit intent.

SVE-2023-1990(CVE-2024-20808): Improper access control vulnerability in Nearby device scanning

SVE-2023-2339(CVE-2024-20841): Improper Handling of Insufficient Privileges in Samsung Account

SVE-2023-2250(CVE-2024-20840): Improper Access Control in Samsung Voice Recorder

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-2372(CVE-2024-20851): Improper access control vulnerability in Samsung Data Store

SVE-2023-2086(CVE-2024-20850): Use of Implicit Intent for Sensitive Communication in Samsung Pay

SVE-2023-2191(CVE-2024-20854): Improper handling of insufficient privileges vulnerability in Samsung Camera

SVE-2024-0405(CVE-2024-20853): Improper verification of intent by broadcast receiver vulnerability in ThemeStore

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-1416(CVE-2023-42544): Improper access control vulnerability in Quick Share

SVE-2023-1414(CVE-2023-42543): Improper verification of intent by broadcast receiver vulnerability in Bixby Voice

SVE-2023-1287(CVE-2023-42541): Improper authorization in Samsung Push Service

SVE-2023-0668(CVE-2023-42539): PendingIntent hijacking vulnerability in Samsung Health

SVE-2023-1503(CVE-2023-42552): Implicit intent hijacking vulnerability in Firewall application

SVE-2023-1454(CVE-2023-42545): Use of implicit intent for sensitive communication vulnerability in Phone

source:
https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02

Windows 7 Services List that can be Disabled Safely

Windows 7 Services List that can be Disabled Safely

We have posted service configuration guides for Windows XP and Windows Vista in past and now its turn of Windows 7. In this tutorial we’ll learn about the Windows services which are not essential and can be safely disabled or set to MANUAL to speed up your Windows 7 computer system:

STEP 1. Right-click on Computer icon on desktop and select Manage, it’ll open a new window. Now go to Services & Applications -> Services. You can also open the same from Administrative Tools -> Computer Management. Or you can directly open “Services” list by providing services.msc command in RUN or Start Menu search box.

STEP 2. Now you can set the unnecessary services to DISABLED or MANUAL. Just double-click on any service and select the desired option in Startup type list box.

NOTE 1: Always set the service to MANUAL, never disable it, so that whenever Windows needs to start a service, it can easily start and use it. If you set any service to DISABLED, Windows will not be able to start it and will give some error messages.

NOTE 2: You can set Remote Registry service to DISABLED for Security purposes.

Here is a list of services that can be safely set to MANUAL/DISABLED:

• Computer Browser (If your computer is not connected to any network)
• Desktop Window Manager Session Manager (If you don’t use Aero glass theme)
• Diagnostic Policy Service
• Distributed Link Tracking Client (If your computer is not connected to any network)
• IP Helper (If you don’t use IPv6 connection)
• Offline Files
• Portable Device Enumerator Service
• Print Spooler (If you don’t have a Printer)
• Protected Storage
• Remote Registry
• Secondary Logon
• Security Center
• Server (If your computer is not connected to any network)
• Tablet PC Input Service
• TCP/IP NetBIOS Helper (If you are not in a workgroup network)
• Themes ( If you use Windows Classic theme)
• Windows Error Reporting Service
• Windows Media Center Service Launcher
• Windows Search (If you don’t use Windows Search feature frequently)

PS: You can see the details of each service to determine whether you should disable it or not.

ADB (Android Debug Bridge)

NAME
adb CLI Client for ADB (Android Debug Bridge) Server.

SYNOPSIS
adb [GLOBAL_OPTIONS] command [COMMAND_OPTIONS]

DESCRIPTION
Connects to the ADB Server via its smart socket interface. Allows sending requests, receives responses and manages lifecycle of the adb server.

Tasks are performed via commands. Some commands are fulfilled directly by the server while others are “forwarded over to the adbd(ADB daemon) running on the device.
(more…)

Android SDK Platform Tools 34.0.4 (Windows)

Android SDK Platform Tools refer to a collection of tools that are required to develop and test Android apps. The two most commonly used tools in this package are Android Debug Bridge (ADB) and Fastboot.

  • ADB is a command-line tool that enables communication between an Android device and a computer, allowing developers to perform various tasks, such as transferring files, debugging apps, and installing or uninstalling apps.
  • Fastboot is a protocol for flashing new firmware onto Android devices. It allows developers to flash custom recoveries, bootloaders, and kernels onto Android devices.
    Both ADB and Fastboot are important tools for Android developers, as they provide access to the low-level functionality of Android devices and enable them to perform various tasks and debug their apps.
  • This package only supports the Windows platform.

    MANIFESTO.dll

     

     

     

    Obezbjeđenje za zdrav Internet

    Otvoreni, globalni internet najmoćniji je resurs za komunikaciju i suradnju koji smo ikada vidjeli. Utjelovljuje neke od naših najdubljih nada u ljudski napredak. Omogućuje nove mogućnosti učenja, izgradnju osjećaja zajedničke ljudskosti i rješavanje gorućih problema s kojima se ljudi svugdje suočavaju.

    Tijekom posljednjeg desetljeća vidjeli smo da se ovo obećanje ispunjava na više načina. Vidjeli smo i snagu interneta koja se koristi za povećanje podjele, poticanje na nasilje, promicanje mržnje i namjerno manipuliranje činjenicama i stvarnošću. Saznali smo da bismo trebali eksplicitnije iznijeti svoje težnje za ljudskim iskustvom na internetu. To radimo sada.

    Zalažemo se za internet koji uključuje sve narode zemlje — gdje demografske karakteristike osobe ne određuju njihov mrežni pristup, mogućnosti ili kvalitetu iskustva.

    Zalažemo se za internet koji promiče građanski diskurs, ljudsko dostojanstvo i individualni izraz.

    Zalažemo se za internet koji uzdiže kritičko razmišljanje, argumentirane argumente, zajedničko znanje i provjerljive činjenice.

    Zalažemo se za internet koji katalizira suradnju različitih zajednica koje rade zajedno za opće dobro.

    #1
    Internet je sastavni dio modernog života — ključna komponenta u obrazovanju, komunikaciji, suradnji, poslu, zabavi i društvu u cjelini.

    #2
    Internet je globalni javni resurs koji mora ostati otvoren i dostupan.

    #3
    Internet mora obogatiti živote pojedinih ljudskih bića.

    #4
    Pojedinci ’ sigurnost i privatnost na Internetu temeljni su i ne smiju se tretirati kao neobavezni.

    #5
    Pojedinci moraju imati sposobnost oblikovanja interneta i vlastitog iskustva s njim.

    #5
    Učinkovitost interneta kao javnog resursa ovisi o interoperabilnosti (protokoli, formati podataka, sadržaju), inovacijama i decentraliziranom sudjelovanju širom svijeta.

    #6
    Besplatan i open source softver potiče razvoj interneta kao javnog resursa.

    #7
    Transparentni procesi utemeljeni u zajednici promiču sudjelovanje, odgovornost i povjerenje.

    #8
    Povećavanje aspekata javne koristi Interneta važan je cilj, dostojan vremena, pažnje i predanosti.

    Elon Musk planira naplatiti nove 𝕏 korisnike kako bi omogućio slanje poruka

    𝕏 (ranije Twitter)

    Elon Musk planira novim X korisnicima naplatiti malu naknadu kako bi omogućio postavljanje na društvenu mrežu i suzbio bot problem.

    Kao odgovor na X račun koji je objavio promjene na X-ovoj web stranici, Musk je rekao da je naplaćivanje male naknade na nove račune “ samo način ” da se zaustavi “ unos botova. ”

    Trenutni AI (i farme trolova) mogu s lakoćom proći ‘ jesi li bot ’, rekao je Musk, pozivajući se na alate poput CAPTCHA.

    SAMSUNG DEBLOADERS PART 1

    Samsung android devices comes with so many pre-installed system app…
    It can be over 400+ these system apss… lol thats pretty too much for one devices.. oO
    so u can safely remove sum… i preffere all which associated with samsung can be removed..
    u can use google acc n store without any probs…

    using ADB shell command:

    pm uninstall -k --user 0 "packagename"

    example:
    pm uninstall -k --user 0 com.sec.android.app.dexonpc


    com.sec.android.app.dexonpc \
    com.samsung.android.lool \
    com.google.android.apps.turbo \
    com.google.android.apps.tachyon \
    com.google.android.tts \
    com.samsung.android.bixby.wakeup \
    com.samsung.android.app.spage \
    com.samsung.android.app.routines \
    com.samsung.android.bixby.service \
    com.samsung.android.visionintelligence \
    com.samsung.android.bixby.agent \
    com.samsung.android.bixby.agent.dummy \
    com.samsung.android.bixbyvision.framework \
    com.dsi.ant.sample.acquirechannels \
    com.dsi.ant.service.socket \
    com.dsi.ant.server \
    com.dsi.ant.plugins.antplus \
    com.android.egg \
    com.sec.android.easyonehand \
    com.sec.android.widgetapp.samsungapps \
    com.samsung.android.mateagent \
    com.sec.android.easyMover.Agent \
    com.samsung.android.app.watchmanagerstub \
    com.sec.android.daemonapp \
    com.samsung.android.app.social \
    com.samsung.android.samsungpassautofill \
    com.samsung.android.authfw \
    com.samsung.android.samsungpass \
    com.samsung.android.spay \
    com.samsung.android.spayfw \
    com.samsung.android.aremoji \
    com.google.ar.core \
    flipboard.boxer.app \
    com.samsung.android.wellbeing \
    com.samsung.android.da.daagent \
    com.samsung.android.service.livedrawing \
    com.sec.android.mimage.avatarstickers \
    com.facebook.katana \
    com.facebook.system \
    com.facebook.appmanager \
    com.facebook.services \
    com.samsung.android.drivelink.stub \
    com.android.bips \
    com.google.android.printservice.recommendation \
    com.android.printspooler \
    com.samsung.android.email.provider \
    com.wsomacp \
    com.samsung.android.game.gamehome \
    com.enhance.gameservice \
    com.samsung.android.game.gametools \
    com.samsung.android.game.gos \
    com.samsung.android.gametuner.thin \
    com.sec.android.app.sbrowser \
    com.samsung.android.app.sbrowseredge \
    com.samsung.android.hmt.vrsvc \
    com.samsung.android.app.vrsetupwizardstub \
    com.samsung.android.hmt.vrshell \
    com.google.vr.vrcore \
    com.samsung.android.kidsinstaller \
    com.samsung.android.app.camera.sticker.facearavatar.preload \
    com.samsung.android.service.peoplestripe \
    com.sec.android.desktopmode.uiservice \
    com.samsung.desktopsystemui \
    com.sec.android.app.desktoplauncher \

    Doesnt mean u diseable all of them but read evry one…
    list just shows which one safe to remove..

    SAMSUNG DEBLOADS ANDROID

    Did u kno that Samsung android phones got like cca 160+ system preload apps?
    And with others like google, n others,
    Samsung phones got 400+ system preload app??
    What these chineze doing ?

    lets see…

    pm list package | grep 'samsung'

    package:com.samsung.android.svcagent
    package:com.samsung.android.visionintelligence
    package:com.samsung.oda.service
    package:com.samsung.android.widget.pictureframe
    package:com.samsung.android.app.camera.sticker.facearavatar.preload
    package:com.samsung.android.calendar
    package:com.samsung.android.inputshare
    package:com.samsung.android.app.telephonyui.esimclient
    package:com.samsung.android.providers.factory
    package:com.samsung.android.vtcamerasettings
    package:com.samsung.android.app.aodservice
    package:com.samsung.android.dsms
    package:com.samsung.android.mcfds
    package:com.samsung.android.app.appsedge
    package:com.samsung.android.smartface.overlay
    package:com.samsung.android.knox.kpecore
    package:com.samsung.android.app.spage
    package:com.samsung.android.lool
    package:com.samsung.android.app.settings.bixby
    package:com.samsung.android.app.galaxyfinder
    package:com.samsung.android.net.wifi.wifiguider
    package:com.samsung.android.app.sharelive
    package:com.samsung.ipservice
    package:com.samsung.android.localeoverlaymanager
    package:com.samsung.android.spayfw
    package:com.samsung.android.accessibility.talkback
    package:com.samsung.android.incallui
    package:com.samsung.android.allshare.service.mediashare
    package:com.samsung.android.wifi.softapwpathree.resources
    package:com.samsung.android.samsungpass
    package:com.samsung.android.sdk.handwriting
    package:com.samsung.android.bixby.agent
    package:com.samsung.android.knox.attestation
    package:com.samsung.android.smartcallprovider
    package:com.samsung.android.networkdiagnostic
    package:com.samsung.app.newtrim
    package:com.samsung.android.bixby.wakeup
    package:com.samsung.advp.imssettings
    package:com.samsung.android.peripheral.framework
    package:com.samsung.android.biometrics.app.setting
    package:com.samsung.crane
    package:com.samsung.android.mdx
    package:com.samsung.android.mdm
    package:com.samsung.android.ConnectivityUxOverlay
    package:com.samsung.knox.securefolder
    package:com.samsung.android.smartface
    package:com.samsung.android.providers.contacts
    package:com.samsung.ucs.agent.ese
    package:com.samsung.android.cidmanager
    package:com.samsung.android.bbc.bbcagent
    package:com.samsung.android.shortcutbackupservice
    package:com.samsung.android.mcfserver
    package:com.samsung.android.scloud
    package:com.samsung.accessibility
    package:com.samsung.android.game.gametools
    package:com.samsung.android.mtp
    package:com.samsung.android.beaconmanager
    package:com.samsung.android.appseparation
    package:com.samsung.android.app.cocktailbarservice
    package:com.samsung.android.sdk.ocr
    package:com.samsung.android.privateshare
    package:com.samsung.android.video
    package:com.samsung.android.audiomirroring
    package:com.samsung.gpuwatchapp
    package:com.samsung.android.incall.contentprovider
    package:com.samsung.android.knox.pushmanager
    package:com.samsung.android.app.watchmanagerstub
    package:com.samsung.android.brightnessbackupservice
    package:com.samsung.android.app.soundpicker
    package:com.samsung.clipboardsaveservice
    package:com.samsung.android.app.omcagent
    package:com.samsung.android.wifi.softap.resources
    package:com.samsung.SMT
    package:com.samsung.android.aircommandmanager
    package:com.samsung.cmh
    package:com.samsung.android.networkstack
    package:com.samsung.android.singletake.service
    package:com.samsung.android.app.clipboardedge
    package:com.samsung.android.callbgprovider
    package:com.samsung.android.aware.service
    package:com.samsung.android.container
    package:com.samsung.android.bluelightfilter
    package:com.samsung.android.smartsuggestions
    package:com.samsung.android.wcmurlsnetworkstack
    package:com.samsung.android.app.reminder
    package:com.samsung.android.mdx.quickboard
    package:com.samsung.android.service.tagservice
    package:com.samsung.android.videolist
    package:com.samsung.android.app.telephonyui
    package:com.samsung.android.keycustomizationinfobackupservice
    package:com.samsung.android.scs
    package:com.samsung.android.setting.multisound
    package:com.samsung.android.networkstack.tethering.overlay
    package:com.samsung.android.sm.devicesecurity
    package:com.samsung.android.app.taskedge
    package:com.samsung.android.provider.filterprovider
    package:com.samsung.android.dck.timesync
    package:com.samsung.android.app.dressroom
    package:com.samsung.android.samsungpositioning
    package:com.samsung.android.honeyboard
    package:com.samsung.android.server.wifi.mobilewips
    package:com.samsung.safetyinformation
    package:com.samsung.android.emergency
    package:com.samsung.android.smartswitchassistant
    package:com.samsung.android.knox.analytics.uploader
    package:com.samsung.android.wallpaper.res
    package:com.samsung.android.dqagent
    package:com.samsung.android.arzone
    package:com.samsung.android.fmm
    package:com.samsung.android.allshare.service.fileshare
    package:com.samsung.sec.android.application.csc
    package:com.samsung.aasaservice
    package:com.samsung.android.secsoundpicker
    package:com.samsung.cmfa.AuthTouch
    package:com.samsung.android.easysetup
    package:com.samsung.android.dynamiclock
    package:com.samsung.android.stickercenter
    package:com.samsung.android.privacydashboard
    package:com.samsung.faceservice
    package:com.samsung.android.location
    package:com.samsung.android.app.routines
    package:com.samsung.android.dialer
    package:com.samsung.rcs
    package:com.samsung.android.samsungpassautofill
    package:com.samsung.ims.smk
    package:com.samsung.android.visualars
    package:com.samsung.android.app.updatecenter
    package:com.samsung.android.bixbyvision.framework
    package:com.samsung.android.knox.containercore
    package:com.samsung.android.sdm.config
    package:com.samsung.android.themecenter
    package:com.samsung.android.aremoji
    package:com.samsung.android.forest
    package:com.samsung.android.messaging
    package:com.samsung.android.mapsagent
    package:com.samsung.android.mobileservice
    package:com.samsung.android.service.stplatform
    package:com.samsung.android.smartmirroring
    package:com.samsung.android.authfw
    package:com.samsung.storyservice
    package:com.samsung.android.sume.nn.service
    package:com.samsung.android.ipsgeofence
    package:com.samsung.android.mateagent
    package:com.samsung.android.photoremasterservice
    package:com.samsung.android.game.gos
    package:com.samsung.android.app.smartcapture
    package:com.samsung.android.ConnectivityOverlay
    package:com.samsung.android.service.peoplestripe
    package:com.samsung.adaptivebrightnessgo
    package:com.samsung.klmsagent
    package:com.samsung.android.fast
    package:com.samsung.android.kidsinstaller
    package:com.samsung.android.mdecservice
    package:com.samsung.android.hdmapp
    package:com.samsung.android.game.gamehome
    package:com.samsung.android.ardrawing
    package:com.samsung.android.providers.media
    package:com.samsung.android.mdx.kit
    package:com.samsung.android.app.dofviewer
    package:com.samsung.android.da.daagent
    package:com.samsung.android.rubin.app
    package:com.samsung.android.kgclient
    package:com.samsung.android.gru
    package:com.samsung.android.cmfa.framework
    package:com.samsung.android.scpm

    = 165 lines

    pm kill –samungs debloads

    ANDROID BINS & VARS

    art_boot
    /apex/com.android.art/bin/art_boot

    art_exec
    /apex/com.android.art/bin/art_exec

    artd
    /apex/com.android.art/bin/artd

    awk
    /system/bin/awk

    cat
    /system/bin/cat

    chcon
    /system/bin/chcon

    chgrp
    /system/bin/chgrp

    chmod
    /system/bin/chmod

    chown
    /system/bin/chown

    chroot
    /system/bin/chroot

    chrt
    /system/bin/chrt

    cksum
    /system/bin/cksum

    clear
    /system/bin/clear

    cmd
    /system/bin/cmd

    cmp
    /system/bin/cmp

    cp
    /system/bin/cp

    crash_dump32
    /apex/com.android.runtime/bin/crash_dump32

    crash_dump64
    /apex/com.android.runtime/bin/crash_dump64

    curl
    /system/bin/curl

    cut
    /system/bin/cut

    dalvikvm
    /apex/com.android.art/bin/dalvikvm

    dalvikvm32
    /apex/com.android.art/bin/dalvikvm32

    dalvikvm64
    /apex/com.android.art/bin/dalvikvm64

    date
    /system/bin/date

    dd
    /system/bin/dd

    devmem
    /system/bin/devmem

    dex2oat
    /apex/com.android.art/bin/dex2oat

    dex2oat32
    /apex/com.android.art/bin/dex2oat32

    dex2oat64
    /apex/com.android.art/bin/dex2oat64

    dexdump
    /apex/com.android.art/bin/dexdump

    dexlist
    /apex/com.android.art/bin/dexlist

    dexoptanalyzer
    /apex/com.android.art/bin/dexoptanalyzer

    df
    /system/bin/df

    diff
    /system/bin/diff

    dirname
    /system/bin/dirname

    dumpsys
    /system/bin/dumpsys

    echo
    /system/bin/echo

    file
    /system/bin/file

    find
    /system/bin/find

    fmt
    /system/bin/fmt

    getconf
    /system/bin/getconf

    getprop
    /system/bin/getprop

    grep
    /system/bin/grep

    groups
    /system/bin/groups

    gzip
    /system/bin/gzip

    head
    /system/bin/head

    hostname
    /system/bin/hostname

    id
    /system/bin/id

    ifconfig
    /system/bin/ifconfig

    ime
    /system/bin/ime

    install
    /system/bin/install

    ip
    /system/bin/ip

    ip6tables
    /system/bin/ip6tables

    iptables
    /system/bin/iptables

    kill
    /system/bin/kill

    linker
    /apex/com.android.runtime/bin/linker

    linker64
    /apex/com.android.runtime/bin/linker64

    linker_asan
    /apex/com.android.runtime/bin/linker_asan

    linker_asan64
    /apex/com.android.runtime/bin/linker_asan64

    linkerconfig
    /apex/com.android.runtime/bin/linkerconfig

    ln
    /system/bin/ln

    log
    /system/bin/log logcat /system/bin/logcat

    ls
    /system/bin/ls

    lsof
    /system/bin/lsof

    md5sum
    /system/bin/md5sum

    mkdir
    /system/bin/mkdir

    monkey /system/bin/monkey

    more
    /system/bin/more

    mount
    /system/bin/mount

    mv
    /system/bin/mv

    nc
    /system/bin/nc

    ndc
    /system/bin/ndc

    netstat
    /system/bin/netstat

    nice
    /system/bin/nice

    oatdump
    /apex/com.android.art/bin/oatdump

    odrefresh
    /apex/com.android.art/bin/odrefresh

    ping
    /system/bin/ping

    ping6
    /system/bin/ping6

    profman
    /apex/com.android.art/bin/profman

    ps
    /system/bin/ps

    pwd
    /system/bin/pwd

    reboot
    /system/bin/reboot

    rm
    /system/bin/rm

    rmdir
    /system/bin/rmdir

    rmmod
    /system/bin/rmmod

    setprop
    /system/bin/setprop

    settings
    /system/bin/settings

    sh
    /system/bin/sh

    sleep
    /system/bin/sleep

    start
    /system/bin/start

    stat
    /system/bin/stat

    stop
    /system/bin/stop

    swapoff
    /system/bin/swapoff

    swapon
    /system/bin/swapon

    tail
    /system/bin/tail

    time
    /system/bin/time

    top
    /system/bin/top

    touch
    /system/bin/touch

    unlink
    /system/bin/unlink

    unzip
    /system/bin/unzip

    uptime
    /system/bin/uptime

    vmstat
    /system/bin/vmstat

    watch
    /system/bin/watch

    WC
    /system/bin/wc

    which
    /system/bin/which

    whoami
    /system/bin/whoami

    xargs
    /system/bin/xargs

    ANDROID_ART_ROOT
    /apex/com.android.art

    ANDROID_ASSETS
    /system/app

    ANDROID_BOOTLOGO
    1

    ANDROID_DATA
    /data

    ANDROID_118N_ROOT
    /apex/com.android.i18n

    ANDROID_ROOT
    /system

    ANDROID_SOCKET_usap_pool_primary
    23

    ANDROID_SOCKET_zygote
    22

    ANDROID_STORAGE
    /storage

    ANDROID_TZDATA_ROOT
    /apex/com.android.tzdata

    ASEC_MOUNTPOINT
    /mnt/asec

    BOOTCLASSPATH
    /apex/com.android.art/javalib/core-oj.jar:/apex/
    com.android.art/javalib/core-libart.jar:/apex/
    com.android.art/javalib/okhttp.jar:/apex/com.android.art/

    DEX20ATBOOTCLASSPATH
    /apex/com.android.art/javalib/core-oj.jar:/apex/
    com.android.art/javalib/core-libart.jar:/apex/
    com.android.art/javalib/okhttp.jar:/apex/com.android.art/

    DOWNLOAD_CACHE
    /data/cache

    ENC_EMULATED_STORAGE_TARGET
    /storage/enc_emulated

    EXTERNAL_STORAGE
    /sdcard

    KNOX_STORAGE
    /data/knox/ext_sdcard

    PATH
    /product/bin:/apex/com.android.runtime/bin:/apex/
    com.android.art/bin:/system_ext/bin:/system/bin:/system/
    xbin:/odm/bin:/vendor/bin:/vendor/xbin

    STANDALONE_SYSTEMSERVER_JARS
    /apex/com.android.btservices/javalib/
    service-bluetooth.jar:/apex/com.android.os.statsd/javalib/
    service-statsd.jar:/apex/com.android.scheduling/javalib/

    SYSTEMSERVERCLASSPATH
    /system/framework/com.android.location.provider.jar:/ system/framework/knoxanalyticssdk.jar:/system/
    framework/services.jar:/system/framework/ssrm.jar:/

    TMPDIR
    /data/user/0/com.ddm.qute/cache

    How to set up Shizuku with the wireless debugging feature

    Starting with Android 11, Google added the wireless debugging feature to the developer options, which allows you to execute ADB commands over Wi-Fi. Before this, the only other option was connecting your Android device to a computer via a USB cable.

    The learning curve with the ADB interface is steep enough to prevent the average user from trying it out for themselves. However, the on-device wireless debugging feature makes it easy for anyone to use ADB commands. No computer or complicated steps are required. Shizuku relies on this feature to keep the setup process as simple as possible.

    Pair your device with Shizuku
    The next part involves getting a unique pairing code and linking your device with the Shizuku app. The process is simple. When you complete this step, you won’t have to do it again unless something changes.

    You can use Shizuku with the wireless debugging feature by doing the following:

    Open the Shizuku app.
    Scroll down to the Start via Wireless debugging section.
    Tap the Pairing button.
    Tap Developer options at the bottom.
    Scroll down until you find the Wireless debugging option.
    Tap the Use wireless debugging button.
    Check the Always allow on this network checkbox.
    Tap Allow to turn on the feature.
    Tap Pair device with pairing code to bring up the Pair with device popup.
    Enter the pairing code and activate the Shizuku service
    Now that you have the pairing code for linking Shizuku with your device, type or paste that code into the appropriate text field.

    To pair your device with Shizuku and finish the setup, check out the following:

    Enter the unique six-digit Wi-Fi pairing code exactly as it appears into the Shizuku Pairing code notification textbox. If needed, swipe down on your status bar to the Shizuku notification, then tap Enter pairing code.
    Enter your Wi-Fi pairing code and tap the Send button on the right to confirm. You’ll see a Pairing successful message if the pairing code is correct.
    Your device is now synced with the Shizuku app.
    Start the Shizuku service
    Now that your device has been synched with the Shizuku app, it’s time to start the Shizuku background service.

    To start the Shizuku service, do the following:

    Tap the back arrow or gesture a few times until you return to the Shizuku app main screen. You might have to swipe away the Pairing successful notification before you can do that.
    Under the Start via Wireless debugging section, tap the Start button.
    The Shizuku service automatically starts on a new screen. It closes once the process is complete.
    Scroll back to the top, and you’ll see the Shizuku is running status with a version number followed by adb.
    If you’re stuck at the Searching for wireless debugging service message when activating Shizuku, follow these steps:

    Tap Developer options in the message popup.
    Turn off the Wireless debugging toggle switch.
    Turn on the Wireless debugging toggle switch.
    Tap the back arrow to return to the Shizuku app, and it starts the service immediately after that.
    Now that the Shizuku service is ready and waiting on your device, you can use it for any app or mod that supports it. You must start the service again after every reboot, so keep that in mind.

    How to set up Shizuku with ADB commands on a computer
    The wireless debugging feature is the best non-root method for most Shizuku users. However, some might prefer to use the ADB interface through a computer. The setup process involves more than the on-device wireless debugging feature introduced with Android 11. Once you get past the initial setup phase, it becomes easier to use.

    Download the platform-tools folder and start the setup process
    In this part, you’ll download the platform-tools folder, which has everything you need to run ADB commands from your computer.

    To start Shizuku with ADB commands on a computer, do the following:

    Download the latest Android SDK platform-tools and extract the folder to your desktop for easy access.

    Install the Google USB drivers if needed (for Windows users).
    Turn on USB debugging on your Android device.
    Open the Settings app, then go to System > Developer options.
    Scroll down and tap the USB debugging option.
    Tap OK to activate it.
    Finish the ADB setup process and activate Shizuku
    Now that the platform-tools folder is ready to go and USB debugging has been activated, you’ll link your computer with your phone. From there, you’ll run a specific ADB command to start the Shizuku service on your phone.

    To finish the setup process and activate Shizuku, do the following:

    Connect your phone to your computer via a USB cable.
    On your Android device, confirm the fingerprint key for the computer by pressing Allow when required. Check the Always allow from this computer box to avoid potential connection issues.

    Open a command window or terminal in the platform-tools folder. If you use Windows, click the address bar in the platform-tools folder, type cmd, and press Enter. This opens a new command window in the platform-tools folder

    To double-check that your device is connected through ADB properly, type adb devices in the command window or terminal, then press Enter. Initiating the ADB command asks you to confirm your computer’s fingerprint key if it didn’t appear earlier.
    You’ll see a unique device identifier number under List of devices attached, letting you know it’s connected and recognized by the ADB interface.
    Copy and paste adb shell sh /sdcard/Android/data/moe.shizuku.privileged.api/start.sh into the command window or terminal, then press Enter. On some platforms (especially Mac and Linux), enter ADB commands with “./” minus the quotes at the beginning for them to work correctly.
    The command starts the Shizuku service on your Android device, showing an exit with 0 status within a few seconds. If you see this at the end, you’re good to go. The service was successfully started

    Check your Shizuku app at the top, and you’ll see the Shizuku is running status with a version number followed by adb.
    As with the wireless debugging feature, you must reactivate the Shizuku service each time you reboot your device. These two methods rely on the ADB interface, which only makes temporary changes to your device without root access. Since you don’t need to reboot that often these days, it shouldn’t be an issue for most.

    How to use Shizuku in a terminal (optional)
    If you want to use Shizuku in a terminal environment on Android, follow the in-app instructions by tapping Use Shizuku in terminal apps. It asks you to export and edit two files with the package name of your terminal app. Move them to a place where the terminal can find them. This is an advanced feature for people who like working with a command-line interface

    How to set up Shizuku with full root access
    You don’t need root access to use Shizuku on your Android device. However, it’s the fastest route you can take to activate the service. The setup is as simple as pressing a button, and you can keep the Shizuku service activated after a reboot.

    If you want to use Shizuku with full root access, do the following:

    Open the Shizuku app, then go to the Start (for rooted devices) section.
    Tap the Start button to begin the process.
    Tap Grant to give the proper root permissions when requested.
    The Shizuku service starts within a few seconds on a new screen and then automatically closes when it’s finished.
    Scroll to the top and check that the Shizuku is running status with a version number followed by root.
    If you don’t want to reactivate the Shizuku service after every reboot, follow these steps:

    Tap the Settings cogwheel icon in the upper-right corner.
    Turn on the Start on boot (root) option.
    Once you do that, the Shizuku service stays activated after you reboot your device, making it easier for you to manage.

    Shizuku makes on-device rootless mods a reality
    Now that you know how to set up Shizuku, you can test different mods for yourself. Root access isn’t needed to benefit from its features. Soon, we should see more unique apps and mods with built-in support for the Shizuku service.

    You might want to check out how to restore your device after a factory reset using Shizuku to make your life easier. We walk you through the steps and explain how using Shizuku to back up and restore your device is beneficial.

    Comprehensive List of Windows Command Prompts

    **Comprehensive List of Windows Command Prompts**

    *Note that, for most commands, you can write them in lowercase or uppercase, and the prompt will accept them regardless. However, some command parameters or arguments only accept specific cases and might have different functions if you use a lowercase or uppercase letter for a parameter.*

    Additionally, most of the following commands will accept “`/?`” as an argument (for example: “`ipconfig /?`”) to provide a more detailed overview of what the command does and what it will accept as arguments.

    cd – Change Directory:

    dir – Directory Listing:

    nkdir -Make Directory:

    rmdir-Remove Directory:

    copy -Copy Files:

    move – Move Files;

    del – Delete Files:

    ren – Rename Files:

    type-Display File Content:

    ping- Ping a Host:

    ipconfig – IP Configuration:

    netstat- Network Statistics:

    tasklist-List Running Processes:

    taskkill- Terminate Processes:

    systeminfo- System Information:

    shutdown- System Shutdown:

    echo – Display Message:

    cls – Clear Screen:

    help – Help Command:

    exit -Exit Command Prompt: