sshd_config

Default etc/ssh/sshd_config file for ssh:
(more…)

Kako ukljuฤiti JavaScript u web pregledniku?

Danas gotovo sve web stranice u sebi sadrลพe JavaScript. To je programski jezik, koji se izvrลกava u web pregledniku. On web stranicama osigurava odreฤ‘ene funkcionalnosti i ako je on iz nekog razloga onemoguฤ‡en, moลพe se dogoditi da odreฤ‘eni sadrลพaj ili njihova funkcionalnost bude ograniฤena ili nedostupna. Na ovoj stranici nalaze se upute kako ukljuฤiti (omoguฤ‡iti) JavaScript u pet najฤeลกฤ‡e koriลกtenih web preglednika.

(more…)

Android Permissions – Protection Levels

Android Permissions – Protection Levels

Android applications declare the permissions they are likely to require in their manifest (a short file that describes the contents of the ‘package’). This allows the system to sandbox them from critical resources and gives the user some indication of what havoc they might reap. That’s the theory at least, but the first time I installed an application and read the permissions page I had no idea what they were on about! Clearly this system needs to be changed, but that is not what I want to talk about today.

As an application writer I need to know the protection level of these permissions, i.e. which of these permissions are normal (can cause the user no real harm), dangerous (might require a greater level of trust, such as the ability to read SMS messages), signature (only granted to applications that are signed by the people who built the OS), signatureOrSystem (like signature, but also allowed if they have been pre-installed in a system folder). I was surprised to find no easy reference for this in the documentation, but I did find the relevant information in the source.

You can of course probe the android package itself for this information, which is useful if you don’t have access to the particular version of Android you are running. Here is some code that does just that:

// Get the permissions for the core android package
PackageInfo packageInfo = getPackageManager().getPackageInfo("android", PackageManager.GET_PERMISSIONS);
if (packageInfo.permissions != null) {
// For each defined permission
for (PermissionInfo permission : packageInfo.permissions) {
// Dump permission info
String protectionLevel;
switch(permission.protectionLevel) {
case PermissionInfo.PROTECTION_NORMAL : protectionLevel = "normal"; break;
case PermissionInfo.PROTECTION_DANGEROUS : protectionLevel = "dangerous"; break;
case PermissionInfo.PROTECTION_SIGNATURE : protectionLevel = "signature"; break;
case PermissionInfo.PROTECTION_SIGNATURE_OR_SYSTEM : protectionLevel = "signatureOrSystem"; break;
default : protectionLevel = ""; break;
}
Log.i("PermissionCheck", permission.name + " " + protectionLevel);
}
}

…and here are the results in case you need to know them at a glance…
(more…)

ADB(1) MAN PAGE

ADB(1) MAN PAGE

ADB(1) MAN PAGE

VERSION

1.0.41

NAME

adb CLI Client for ADB (Android Debug Bridge) Server.

SYNOPSIS

adb [GLOBAL_OPTIONS] command [COMMAND_OPTIONS]

DESCRIPTION

Connects to the ADB Server via its smart socket interface. Allows sending requests, receives responses and manages lifecycle of the adb server.

Tasks are performed via commands. Some commands are fulfilled directly by the server while others are “forwarded over to the adbd(ADB daemon) running on the device.

GLOBAL OPTIONS:

-a Listen on all network interfaces, not just localhost.

-d Use USB device (error if multiple devices connected).

-e Use TCP/IP device (error if multiple TCP/IP devices available).

-s SERIAL Use device with given SERIAL (overrides $ANDROID_SERIAL).

-t ID Use device with given transport ID.

-H Name of adb server host [default=localhost].

-P *PORT Smart socket PORT of adb server [default=5037].

-L SOCKET Listen on given socket for adb server [default=tcp:localhost:5037].

–one-device SERIAL|USB Server will only connect to one USB device, specified by a SERIAL number or USB device address (only with โ€˜start-serverโ€™ or โ€˜server nodaemonโ€™).

–exit-on-write-error Exit if stdout is closed.

GENERAL COMMANDS:

devices [-l] List connected devices.

-l Use long output.

help Show this help message.

version Show version number.

NETWORKING

connect HOST[:PORT] Connect to a device via TCP/IP [default PORT=5555].

disconnect [HOST[:PORT]] Disconnect from given TCP/IP device [default PORT=5555], or all.

pair HOST[:PORT] [PAIRING_CODE] Pair with a device for secure TCP/IP communication.

forward –list | [–no-rebind] LOCAL_REMOTE | –remove LOCAL | –remove-all

–list List all forward socket connections.

[–no-rebind] LOCAL_REMOTE Forward socket connection using one of the followings.

tcp:PORT (local may be โ€œtcp:0โ€ to pick any open port. localreserved:UNIX_DOMAIN_SOCKET_NAME. localfilesystem:UNIX_DOMAIN_SOCKET_NAME. jdwp:PROCESS PID (remote only). vsock:CID:PORT (remote only). acceptfd:FD (listen only). dev:DEVICE_NAME. dev-raw:DEVICE_NAME. (open device in raw mode)**.

–remove LOCAL Remove specific forward socket connection.

–remove-all Remove all forward socket connections.

reverse –list | [–no-rebind] REMOTE LOCAL | –remove REMOTE | –remove-all

–list List all reverse socket connections from device.

[–no-rebind] REMOTE LOCAL Reverse socket connection using one of the following.

tcp:PORT (REMOTE may be โ€œtcp:0โ€ to pick any open port). localabstract:UNIX_DOMAIN_SOCKET_NAME. localreserved:UNIX_DOMAIN_SOCKET_NAME. localfilesystem:UNIX_DOMAIN_SOCKET_NAME.

–remove REMOTE Remove specific reverse socket connection.

–remove-all Remove all reverse socket connections from device.

mdns check | services Perform mDNS subcommands.

check Check if mdns discovery is available.

services List all discovered services.

FILE TRANSFER:

push [–sync] [-z ALGORITHM] [-Z] LOCALREMOTE Copy local files/directories to device.

–sync Only push files that are newer on the host than the device.

-n Dry run, push files to device without storing to the filesystem.

-z enable compression with a specified algorithm (any/none/brotli/lz4/zstd).

-Z Disable compression.

pull [-a] [-z ALGORITHM] [-Z] REMOTELOCAL Copy files/dirs from device

-a preserve file timestamp and mode.

-z enable compression with a specified algorithm (any/none/brotli/lz4/zstd)

-Z disable compression

sync [-l] [-z ALGORITHM] [-Z] [all|data|odm|oem|product|system|system_ext|vendor] Sync a local build from $ANDROID_PRODUCT_OUT to the device (default all)

-n Dry run. Push files to device without storing to the filesystem.

-l List files that would be copied, but don’t copy them.

-z Enable compression with a specified algorithm (any/none/brotli/lz4/zstd)

-Z Disable compression.

SHELL:

shell [-e ESCAPE] [-n] [-Tt] [-x] [COMMAND…] Run remote shell command (interactive shell if no command given).

-e Choose escape character, or โ€œnoneโ€; default โ€˜~โ€™.

-n Don’t read from stdin.

-T: Disable pty allocation.

-t: Allocate a pty if on a tty (-tt: force pty allocation).

-x Disable remote exit codes and stdout/stderr separation.

emu COMMAND Run emulator console COMMAND

APP INSTALLATION

(see also adb shell cmd package help):

install [-lrtsdg] [–instant] PACKAGE Push a single package to the device and install it

install-multiple [-lrtsdpg] [–instant] PACKAGE… Push multiple APKs to the device for a single package and install them

install-multi-package [-lrtsdpg] [–instant] PACKAGE… Push one or more packages to the device and install them atomically

-r: Replace existing application.

-t Allow test packages.

-d Allow version code downgrade (debuggable packages only).

-p Partial application install (install-multiple only).

-g Grant all runtime permissions.

–abi ABI Override platform’s default ABI.

–instant Cause the app to be installed as an ephemeral install app.

–no-streaming Always push APK to device and invoke Package Manager as separate steps.

–streaming Force streaming APK directly into Package Manager.

–fastdeploy Use fast deploy.

-no-fastdeploy Prevent use of fast deploy.

-force-agent Force update of deployment agent when using fast deploy.

-date-check-agent Update deployment agent when local version is newer and using fast deploy.

–version-check-agent Update deployment agent when local version has different version code and using fast deploy.

–local-agent Locate agent files from local source build (instead of SDK location). See also adb shell pm help for more options.

uninstall [-k] APPLICATION_ID Remove this APPLICATION_ID from the device.

-k Keep the data and cache directories.

DEBUGGING:

bugreport [PATH] Write bugreport to given PATH [default=bugreport.zip]; if PATH is a directory, the bug report is saved in that directory. devices that don’t support zipped bug reports output to stdout.

jdwp List pids of processes hosting a JDWP transport.

logcat Show device log (logcat –help for more).

SECURITY:

disable-verity Disable dm-verity checking on userdebug builds.

enable-verity Re-enable dm-verity checking on userdebug builds.

keygen FILE Generate adb public/private key; private key stored in FILE.

SCRIPTING:

wait-for [-TRANSPORT] –STATE… Wait for device to be in a given state.

STATE: device, recovery, rescue, sideload, bootloader, or disconnect. TRANSPORT: usb, local, or any [default=any].

get-state Print offline | bootloader | device.

get-serialno Print SERIAL_NUMBER.

get-devpath Print DEVICE_PATH.

remount [-R] Remount partitions read-write.

-R Automatically reboot the device.

reboot [bootloader|recovery|sideload|sideload-auto-reboot] Reboot the device; defaults to booting system image but supports bootloader and recovery too.

sideload Reboots into recovery and automatically starts sideload mode.

sideload-auto-reboot Same as sideload but reboots after sideloading.

sideload OTAPACKAGE Sideload the given full OTA package OTAPACKAGE.

root Restart adbd with root permissions.

unroot Restart adbd without root permissions.

usb Restart adbd listening on USB.

tcpip PORT Restart adbd listening on TCP on PORT.

INTERNAL DEBUGGING:

start-server Ensure that there is a server running.

kill-server Kill the server if it is running.

reconnect Close connection from host side to force reconnect.

reconnect device Close connection from device side to force reconnect.

reconnect offline Reset offline/unauthorized devices to force reconnect.

USB:

Only valid when running with libusb backend.

attach SERIAL Attach a detached USB device identified by its SERIAL number.

detach SERIAL Detach from a USB device identified by its SERIAL to allow use by other processes.

Features:

host-features
list features supported by adb server.

features
list features supported by both adb server and device.

ENVIRONMENT VARIABLES

$ADB_TRACE Comma (or space) separated list of debug info to log: all,adb,sockets,packets,rwx,usb,sync,sysdeps,transport,jdwp,services,auth,fdevent,shell,incremental.

$ADB_VENDOR_KEYS Colon-separated list of keys (files or directories).

$ANDROID_SERIAL Serial number to connect to (see -s).

$ANDROID_LOG_TAGS Tags to be used by logcat (see logcat –help).

$ADB_LOCAL_TRANSPORT_MAX_PORT Max emulator scan port (default 5585, 16 emulators).

$ADB_MDNS_AUTO_CONNECT Comma-separated list of mdns services to allow auto-connect (default adb-tls-connect).

$ADB_MDNS_OPENSCREEN The default mDNS-SD backend is Bonjour (mdnsResponder). For machines where Bonjour is not installed, adb can spawn its own, embedded, mDNS-SD back end, openscreen. If set to โ€œ1โ€, this env variable forces mDNS backend to openscreen.

$ADB_LIBUSB ADB has its own USB backend implementation but can also employ libusb. use adb devices -l (usb: prefix is omitted for libusb) or adb host-features (look for libusb in the output list) to identify which is in use. To override the default for your OS, set ADB_LIBUSB to โ€œ1โ€ to enable libusb, or โ€œ0โ€ to enable the ADB backend implementation.

SAMSUNG BROWSER

Some browser hidden options:
internet://debug/

List of Internet URLs

internet://attribution-internals
internet://autofill-internals
internet://bluetooth-internals
internet://credits
internet://dns
internet://flags
internet://gpu
internet://interstitials
internet://media-internals
internet://net-export
internet://net-internals
internet://newtab
internet://newtabcontent
internet://parental-control
internet://password-manager-internals
internet://serviceworker-internals
internet://tracking
internet://version
internet://webapks

(more…)

TAKE OWNERSHIP IN WINDOWS

Take ownership of file or folder on Windows 7

Take ownership of file or folder

In windows, some of the system files are protected by OS and canโ€™t be accessed by users with even administrator privileges. CSC cache stored in C:\Windows\CSC is one such folder. If you try to open the folder in windows explorer, you would be greeted with the window โ€˜You donโ€™t currently have permission to access this folder. Click Continue to permanently get access to this folder.โ€

Take ownership of a file/folder from windows command line?
Open elevated administrator command prompt and run the below command on the file.

takeown /F fileName

Running from a non elevated command prompt would generated the error โ€˜Access is deniedโ€™

Take ownership of a folder and all its contents:

c:>takeown  /R /F c:\windows\csc\

SUCCESS: The file (or folder): “c:\windows\csc\” now owned by user “domain\user”.
These commands work on Windows 8 and Windows 7.

MetaMask

MetaMask

0xa8461472cEB637C1103D5cC74caaf5EC05c0d66f

Zanimaju li vas novi NFT-ovi ili nezamjenjivi tokeni, ali ne znate odakle poฤeti? Zanimaju vas kriptovalute, ali novฤanici su za vas previลกe komplicirani ili djeluju zastraลกujuฤ‡e? MetaMask je kripto i NFT novฤanik koji radi kao mobilna aplikacija ili proลกirenje preglednika, kada MetaMask moลพe posluลพiti kao jednostavan i pristupaฤan ulazak u svijet blockchain aplikacija i imovine.

ล to je to MetaMask?
MetaMask sebe naziva โ€œvaลกom vezom s novim internetomโ€ i dizajniran je da sluลพi kao novฤanik i identifikacija ili ID za online aplikacije temeljene na blockchainu, izgraฤ‘ene na Ethereumu. Osim ลกto korisnicima daje pristup kripto i NFT-ovima, obeฤ‡ava sigurnije i privatnije iskustvo preglednika. Jedina zaฤkoljica je u tome ลกto kada korisnici drลพe sve svoje podatke, ne mogu si priuลกtiti da ih izgube ili daju sami.

MetaMask radi kao besplatna mobilna aplikacija za iOS i Android, ali moลพe raditi i kao proลกirenje za preglednike Google Chromea, Firefoxa, Bravea i Edgea za raฤunala. Ako koristite Firefox, Brave ili Edge, posjetite stranicu za preuzimanje MetaMask, pomaknite se prema dolje do Podrลพani preglednici i odaberite ikonu za ลพeljeni preglednik. Odatle je instalirajte kao bilo koju drugu aplikaciju ili proลกirenje.

Snimke zaslona razlikuju se ovisno o tome koji internetski preglednik koristite, pa ako slijedite zajedno s aplikacijom ili alternativnim proลกirenjem preglednika, stvari mogu izgledati malo drugaฤije na vaลกem zaslonu.

Zapoฤinjanje s MetaMask korisniฤkim raฤunom?
U svojoj srลพi, MetaMask je kripto novฤanik. Ako ลพelite prednosti interakcije s blockchain aplikacijama putem MetaMask raฤuna, moลพda se pitate moลพete li povezati svoje postojeฤ‡e novฤanike. Odgovor je โ€œmoลพda moลพeteโ€.

Kada se prvi put prijavljujete, postoji stranica za povezivanje postojeฤ‡eg novฤanika s novim MetaMask raฤunom unosom fraze za oporavak. Tijekom pisanja ovog ฤlanka unesena je fraza za oporavak postojeฤ‡eg novฤanika blockchain.com, ali MetaMask je nije prepoznao. Uobiฤajene recenzije aplikacija kaลพu da MetaMask ne radi sa svim tvrdim novฤanicima, tako da bi ovo mogao biti samo problem s MetaMaskom.

Izrada novog MetaMask raฤuna kao proลกirenja preglednika je brza i jednostavna. Najteลพi dio je s vaลกom poฤetnom frazom, koja postaje vaลกa fraza oporavka. Ako ste upoznati s kripto novฤanicima, upoznati ste s ovim konceptom. Ako je MetaMask vaลก prvi kripto novฤanik, sve ลกto trebate znati objaลกnjeno je u kratkom videu.

Kako osigurati MetaMask novฤanik?
U biti, vaลกa fraza za oporavak od dvanaest rijeฤi sluลพi kao rezerva u sluฤaju da se ne moลพete prijaviti na svoj raฤun. Buduฤ‡i da MetaMask sebe vidi kao temelj vaลกeg identiteta na novom internetu, ako netko drugi ulazi u vaลก raฤun to znaฤi da se taj netko drugi ลพeli doฤepati vaลกeg broja socijalnog osiguranja, ne samo vaลกeg novca i kartica. Stranice za postavljanje preporuฤuju da zapiลกete svoj izraz ili lozinku za oporavak i ฤuvate je na sigurnom mjestu ili koristite pouzdanog upravitelja lozinkama.

Nakon ลกto dobijete frazu za oporavak, morate redom odabrati rijeฤi iz banke rijeฤi kako biste bili sigurni da ste je ispravno kopirali. Nakon ลกto je ovaj mali test obavljen, stranica za potvrdu vam govori da ste spremni za poฤetak koriลกtenja MetaMaska.

Ostvarivanje pristupa MetaMask korisniฤkom raฤunu?
Nakon ลกto je vaลกe MetaMask proลกirenje preglednika postavljeno, moลพete mu pristupiti tako da se vratite na MetaMask web mjesto i prijavite se. Naravno, buduฤ‡i da je to proลกirenje preglednika, moลพete takoฤ‘er odabrati MetaMask logotip na alatnoj traci proลกirenja pored trake za pretraลพivanje na vrhu prozora preglednika.

Pristup MetaMasku s vaลกe alatne trake proลกirenja pokazuje vam na kojoj mreลพi MetaMask radi i brzi pregled vaลกih sredstava. Takoฤ‘er vam pokazuje je li vaลก MetaMask raฤun povezan sa web mjestom na kojem se nalazite. Naลพalost, u trenutku pisanja ovog teksta, nema puno stranica koje rade s MetaMaskom. Ako ga pronaฤ‘ete, gumb na stranici omoguฤ‡it ฤ‡e vam povezivanje raฤuna.

Iz suฤelja web stranice ili suฤelja proลกirenja takoฤ‘er moลพete kupiti, prodati ili zamijeniti imovinu u svom novฤaniku. Moลพete kupovati putem bankovnog prijenosa ili kreditnog ili debitnog raฤuna. Takoฤ‘er moลพete prenijeti ETH iz drugog novฤanika ili zamijeniti ETH na svom raฤunu za druge podrลพane tokene. U bilo kojem trenutku moลพete kopirati svoju javnu adresu novฤanika u meฤ‘uspremnik klikom na naziv svog raฤuna. Buduฤ‡i da je MetaMask jako velik po pitanju sigurnosti, morat ฤ‡ete se ponovno prijaviti na svoj raฤun kada ponovno pokrenete preglednik.

Kako personalizirati MetaMask korisniฤki raฤun?
Svojem raฤunu moลพete pristupiti iz proลกirenja ili suฤelja web stranice klikom na ikonu naslaganih toฤaka u gornjem desnom kutu i odabirom Pojedinosti o raฤunu iz izbornika koji se pojavi. Time se prikazuje QR kod i tekstualna verzija vaลกe javne adrese. Takoฤ‘er moลพete kliknuti ikonu olovke desno od naziva raฤuna da biste ga promijenili u bilo kojem trenutku.

Iz bilo kojeg suฤelja takoฤ‘er moลพete promijeniti mreลพu koju MetaMask koristi tako da moลพe podrลพavati dodatne lance blokova. Pritisnite polje Ethereum Mainnet (zadana MetaMask mreลพa) da biste otvorili padajuฤ‡i izbornik ostalih podrลพanih mreลพa. Donja stavka, Custom RPC, omoguฤ‡uje vam dodavanje mreลพa koje nisu dio standardnog popisa podrลกke.

Koriลกtenje MetaMask-a
MetaMask nije takozvana โ€putovnicaโ€ za internet kakvom ลพeli biti. Barem ne joลก. Ovdje postoji jako puno posla koji se mora obaviti, kako bi MetaMask postao u potpunosti jednoga dana ono ลกto ลพeli postati. MetaMask je rano doลกao u novo polje internetskog dizajna. Jednog dana bi doista mogao rijeลกiti naลกe probleme identiteta, sigurnosti i financija na internetu.

To ลกto MetaMask joลก ne radi sve te stvari ne znaฤi da ga se joลก ne isplati imati. ฤŒak i dok ฤekamo sljedeฤ‡u generaciju interneta, MetaMask je veฤ‡ pristupaฤan novฤanik jednostavan za koriลกtenje, koji vam daje sve ลกto vam je potrebno da uronite u buduฤ‡nost blockchaina i decentraliziranih aplikacija. Sve je stvar u tome ลกto korisnici ลพele i kakve su im preference. Sukladno tomu, MetaMask bi se mogao razvijati sukladno onome ลกto korisnici od ove platforme ลพele.

METAS DOESNT LIKE THEIR PACKAGE NOT USING

FB now started force,
i mean if u want to use FB/INSTA/THREADS ,
now u must enable or defrost mettas packages,
“`
package:com.facebook.katana
package:com.facebook.system
package:com.facebook.appmanager
package:com.facebook.services
“`
when u click FB link inside INSTA app,
pop-up msg say that u need to enable “Meet Installer”
when i didnt neeed them before but now FB app no thx…

when u click that Go to settings that link forwards u to;

Meet Install, now.lets take a look permissions:

FB relation pckages are these:

and these mettas apps are huge analytics, monitors,
spy silenty/logging sending app which learn ur device behavir…
and u dont even feel sumthin wrong…

but what SAMSUNG do with their preinstalled app its so shameless…
evry samsung app got backdoor allwayw available no matter how much they try.to patch all …

CVE’S penetrater in evry single samsung app…
which now.look like swiss chesse …
i allready frozzen 130+ samsung app n blootwares…
far far away from samsung app…
it better to use google service on samsung deviced…

my SCUMSUNG BLOOTWARES LIST:

xDD

SCUMSUNG.vulnerability.cve

vulnerabilityย 

11-2023/2024

SVE-2023-0774(CVE-2024-20825, CVE-2024-20824, CVE-2024-20823, CVE-2024-20822): Implicit intent hijacking vulnerability in Galaxy Store

Resolved version: 4.5.63.6
Reported on: May 4, 2023
Description: Implicit intent hijacking vulnerability in Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.

Samsung Gallery

SVE-2023-1781(CVE-2024-20827): Improper access control vulnerability in Samsung Gallery

Description: Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen.
The patch prevents menu access by physical keyboard in locked device

Samsung Internet

SVE-2023-2275(CVE-2024-20828): Improper authorization verification vulnerability in Samsung Internet

Description: Improper authorization verification vulnerability in Samsung Internet prior to version 24.0 allows physical attackers to access files downloaded in SecretMode without proper authentication.
The patch adds proper authorization verification logic to prevent unauthorized access.

Samsung Email

SVE-2023-0956(CVE-2024-20807): Implicit intent hijacking vulnerability in Samsung Email

Description: Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows attacker to get sensitive information.
The patch change the implicit intent to explicit intent.

SVE-2023-1990(CVE-2024-20808): Improper access control vulnerability in Nearby device scanning

SVE-2023-2339(CVE-2024-20841): Improper Handling of Insufficient Privileges in Samsung Account

SVE-2023-2250(CVE-2024-20840): Improper Access Control in Samsung Voice Recorder

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-2372(CVE-2024-20851): Improper access control vulnerability in Samsung Data Store

SVE-2023-2086(CVE-2024-20850): Use of Implicit Intent for Sensitive Communication in Samsung Pay

SVE-2023-2191(CVE-2024-20854): Improper handling of insufficient privileges vulnerability in Samsung Camera

SVE-2024-0405(CVE-2024-20853): Improper verification of intent by broadcast receiver vulnerability in ThemeStore

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-1416(CVE-2023-42544): Improper access control vulnerability in Quick Share

SVE-2023-1414(CVE-2023-42543): Improper verification of intent by broadcast receiver vulnerability in Bixby Voice

SVE-2023-1287(CVE-2023-42541): Improper authorization in Samsung Push Service

SVE-2023-0668(CVE-2023-42539): PendingIntent hijacking vulnerability in Samsung Health

SVE-2023-1503(CVE-2023-42552): Implicit intent hijacking vulnerability in Firewall application

SVE-2023-1454(CVE-2023-42545): Use of implicit intent for sensitive communication vulnerability in Phone

source:
https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02

Windows 7 Services List that can be Disabled Safely

Windows 7 Services List that can be Disabled Safely

We have posted service configuration guides forย Windows XPย andย Windows Vistaย in past and now its turn of Windows 7. In this tutorial weโ€™ll learn about the Windows services which are not essential and can be safely disabled or set to MANUAL to speed up your Windows 7 computer system:

STEP 1.ย Right-click onย Computerย icon on desktop and selectย Manage, itโ€™ll open a new window. Now go toย Services & Applications -> Services. You can also open the same fromย Administrative Toolsย ->ย Computer Management. Or you can directly open โ€œServicesโ€ list by providingย services.mscย command in RUN or Start Menu search box.

STEP 2.ย Now you can set the unnecessary services to DISABLED or MANUAL. Just double-click on any service and select the desired option inย Startup typeย list box.

NOTE 1:ย Always set the service to MANUAL, never disable it, so that whenever Windows needs to start a service, it can easily start and use it. If you set any service to DISABLED, Windows will not be able to start it and will give some error messages.

NOTE 2:ย You can setย Remote Registryย service to DISABLED for Security purposes.

Here is a list of services that can be safely set to MANUAL/DISABLED:

โ€ข Computer Browserย (If your computer is not connected to any network)
โ€ข Desktop Window Manager Session Managerย (If you donโ€™t use Aero glass theme)
โ€ข Diagnostic Policy Service
โ€ข Distributed Link Tracking Clientย (If your computer is not connected to any network)
โ€ข IP Helperย (If you donโ€™t use IPv6 connection)
โ€ข Offline Files
โ€ข Portable Device Enumerator Service
โ€ข Print Spoolerย (If you donโ€™t have a Printer)
โ€ข Protected Storage
โ€ข Remote Registry
โ€ข Secondary Logon
โ€ข Security Center
โ€ข Serverย (If your computer is not connected to any network)
โ€ข Tablet PC Input Service
โ€ข TCP/IP NetBIOS Helperย (If you are not in a workgroup network)
โ€ข Themesย ( If you use Windows Classic theme)
โ€ข Windows Error Reporting Service
โ€ข Windows Media Center Service Launcher
โ€ข Windows Searchย (If you donโ€™t use Windows Search feature frequently)

PS:ย You can see the details of each service to determine whether you should disable it or not.