Default etc/ssh/sshd_config file for ssh:
(more…)
Kako ukljuฤiti JavaScript u web pregledniku?
Danas gotovo sve web stranice u sebi sadrลพe JavaScript. To je programski jezik, koji se izvrลกava u web pregledniku. On web stranicama osigurava odreฤene funkcionalnosti i ako je on iz nekog razloga onemoguฤen, moลพe se dogoditi da odreฤeni sadrลพaj ili njihova funkcionalnost bude ograniฤena ili nedostupna. Na ovoj stranici nalaze se upute kako ukljuฤiti (omoguฤiti) JavaScript u pet najฤeลกฤe koriลกtenih web preglednika.
Android Permissions – Protection Levels
Android Permissions – Protection Levels
Android applications declare the permissions they are likely to require in their manifest (a short file that describes the contents of the ‘package’). This allows the system to sandbox them from critical resources and gives the user some indication of what havoc they might reap. That’s the theory at least, but the first time I installed an application and read the permissions page I had no idea what they were on about! Clearly this system needs to be changed, but that is not what I want to talk about today.
As an application writer I need to know the protection level of these permissions, i.e. which of these permissions are normal (can cause the user no real harm), dangerous (might require a greater level of trust, such as the ability to read SMS messages), signature (only granted to applications that are signed by the people who built the OS), signatureOrSystem (like signature, but also allowed if they have been pre-installed in a system folder). I was surprised to find no easy reference for this in the documentation, but I did find the relevant information in the source.
You can of course probe the android package itself for this information, which is useful if you don’t have access to the particular version of Android you are running. Here is some code that does just that:
// Get the permissions for the core android package
PackageInfo packageInfo = getPackageManager().getPackageInfo("android", PackageManager.GET_PERMISSIONS);
if (packageInfo.permissions != null) {
// For each defined permission
for (PermissionInfo permission : packageInfo.permissions) {
// Dump permission info
String protectionLevel;
switch(permission.protectionLevel) {
case PermissionInfo.PROTECTION_NORMAL : protectionLevel = "normal"; break;
case PermissionInfo.PROTECTION_DANGEROUS : protectionLevel = "dangerous"; break;
case PermissionInfo.PROTECTION_SIGNATURE : protectionLevel = "signature"; break;
case PermissionInfo.PROTECTION_SIGNATURE_OR_SYSTEM : protectionLevel = "signatureOrSystem"; break;
default : protectionLevel = ""; break;
}
Log.i("PermissionCheck", permission.name + " " + protectionLevel);
}
}
…and here are the results in case you need to know them at a glance…
(more…)
ADB(1) MAN PAGE
ADB(1) MAN PAGE
VERSION
1.0.41
NAME
adb CLI Client for ADB (Android Debug Bridge) Server.
SYNOPSIS
adb [GLOBAL_OPTIONS] command [COMMAND_OPTIONS]
DESCRIPTION
Connects to the ADB Server via its smart socket interface. Allows sending requests, receives responses and manages lifecycle of the adb server.
Tasks are performed via commands. Some commands are fulfilled directly by the server while others are “forwarded over to the adbd(ADB daemon) running on the device.
GLOBAL OPTIONS:
-a Listen on all network interfaces, not just localhost.
-d Use USB device (error if multiple devices connected).
-e Use TCP/IP device (error if multiple TCP/IP devices available).
-s SERIAL Use device with given SERIAL (overrides $ANDROID_SERIAL).
-t ID Use device with given transport ID.
-H Name of adb server host [default=localhost].
-P *PORT Smart socket PORT of adb server [default=5037].
-L SOCKET Listen on given socket for adb server [default=tcp:localhost:5037].
–one-device SERIAL|USB Server will only connect to one USB device, specified by a SERIAL number or USB device address (only with โstart-serverโ or โserver nodaemonโ).
–exit-on-write-error Exit if stdout is closed.
GENERAL COMMANDS:
devices [-l] List connected devices.
-l Use long output.
help Show this help message.
version Show version number.
NETWORKING
connect HOST[:PORT] Connect to a device via TCP/IP [default PORT=5555].
disconnect [HOST[:PORT]] Disconnect from given TCP/IP device [default PORT=5555], or all.
pair HOST[:PORT] [PAIRING_CODE] Pair with a device for secure TCP/IP communication.
forward –list | [–no-rebind] LOCAL_REMOTE | –remove LOCAL | –remove-all
–list List all forward socket connections.
[–no-rebind] LOCAL_REMOTE Forward socket connection using one of the followings.
tcp:PORT (local may be โtcp:0โ to pick any open port. localreserved:UNIX_DOMAIN_SOCKET_NAME. localfilesystem:UNIX_DOMAIN_SOCKET_NAME. jdwp:PROCESS PID (remote only). vsock:CID:PORT (remote only). acceptfd:FD (listen only). dev:DEVICE_NAME. dev-raw:DEVICE_NAME. (open device in raw mode)**.
–remove LOCAL Remove specific forward socket connection.
–remove-all Remove all forward socket connections.
reverse –list | [–no-rebind] REMOTE LOCAL | –remove REMOTE | –remove-all
–list List all reverse socket connections from device.
[–no-rebind] REMOTE LOCAL Reverse socket connection using one of the following.
tcp:PORT (REMOTE may be โtcp:0โ to pick any open port). localabstract:UNIX_DOMAIN_SOCKET_NAME. localreserved:UNIX_DOMAIN_SOCKET_NAME. localfilesystem:UNIX_DOMAIN_SOCKET_NAME.
–remove REMOTE Remove specific reverse socket connection.
–remove-all Remove all reverse socket connections from device.
mdns check | services Perform mDNS subcommands.
check Check if mdns discovery is available.
services List all discovered services.
FILE TRANSFER:
push [–sync] [-z ALGORITHM] [-Z] LOCAL… REMOTE Copy local files/directories to device.
–sync Only push files that are newer on the host than the device.
-n Dry run, push files to device without storing to the filesystem.
-z enable compression with a specified algorithm (any/none/brotli/lz4/zstd).
-Z Disable compression.
pull [-a] [-z ALGORITHM] [-Z] REMOTE… LOCAL Copy files/dirs from device
-a preserve file timestamp and mode.
-z enable compression with a specified algorithm (any/none/brotli/lz4/zstd)
-Z disable compression
sync [-l] [-z ALGORITHM] [-Z] [all|data|odm|oem|product|system|system_ext|vendor] Sync a local build from $ANDROID_PRODUCT_OUT to the device (default all)
-n Dry run. Push files to device without storing to the filesystem.
-l List files that would be copied, but don’t copy them.
-z Enable compression with a specified algorithm (any/none/brotli/lz4/zstd)
-Z Disable compression.
SHELL:
shell [-e ESCAPE] [-n] [-Tt] [-x] [COMMAND…] Run remote shell command (interactive shell if no command given).
-e Choose escape character, or โnoneโ; default โ~โ.
-n Don’t read from stdin.
-T: Disable pty allocation.
-t: Allocate a pty if on a tty (-tt: force pty allocation).
-x Disable remote exit codes and stdout/stderr separation.
emu COMMAND Run emulator console COMMAND
APP INSTALLATION
(see also adb shell cmd package help
):
install [-lrtsdg] [–instant] PACKAGE Push a single package to the device and install it
install-multiple [-lrtsdpg] [–instant] PACKAGE… Push multiple APKs to the device for a single package and install them
install-multi-package [-lrtsdpg] [–instant] PACKAGE… Push one or more packages to the device and install them atomically
-r: Replace existing application.
-t Allow test packages.
-d Allow version code downgrade (debuggable packages only).
-p Partial application install (install-multiple only).
-g Grant all runtime permissions.
–abi ABI Override platform’s default ABI.
–instant Cause the app to be installed as an ephemeral install app.
–no-streaming Always push APK to device and invoke Package Manager as separate steps.
–streaming Force streaming APK directly into Package Manager.
–fastdeploy Use fast deploy.
-no-fastdeploy Prevent use of fast deploy.
-force-agent Force update of deployment agent when using fast deploy.
-date-check-agent Update deployment agent when local version is newer and using fast deploy.
–version-check-agent Update deployment agent when local version has different version code and using fast deploy.
–local-agent Locate agent files from local source build (instead of SDK location). See also adb shell pm help
for more options.
uninstall [-k] APPLICATION_ID Remove this APPLICATION_ID from the device.
-k Keep the data and cache directories.
DEBUGGING:
bugreport [PATH] Write bugreport to given PATH [default=bugreport.zip]; if PATH is a directory, the bug report is saved in that directory. devices that don’t support zipped bug reports output to stdout.
jdwp List pids of processes hosting a JDWP transport.
logcat Show device log (logcat –help for more).
SECURITY:
disable-verity Disable dm-verity checking on userdebug builds.
enable-verity Re-enable dm-verity checking on userdebug builds.
keygen FILE Generate adb public/private key; private key stored in FILE.
SCRIPTING:
wait-for [-TRANSPORT] –STATE… Wait for device to be in a given state.
STATE: device, recovery, rescue, sideload, bootloader, or disconnect. TRANSPORT: usb, local, or any [default=any].
get-state Print offline | bootloader | device.
get-serialno Print SERIAL_NUMBER.
get-devpath Print DEVICE_PATH.
remount [-R] Remount partitions read-write.
-R Automatically reboot the device.
reboot [bootloader|recovery|sideload|sideload-auto-reboot] Reboot the device; defaults to booting system image but supports bootloader and recovery too.
sideload Reboots into recovery and automatically starts sideload mode.
sideload-auto-reboot Same as sideload but reboots after sideloading.
sideload OTAPACKAGE Sideload the given full OTA package OTAPACKAGE.
root Restart adbd with root permissions.
unroot Restart adbd without root permissions.
usb Restart adbd listening on USB.
tcpip PORT Restart adbd listening on TCP on PORT.
INTERNAL DEBUGGING:
start-server Ensure that there is a server running.
kill-server Kill the server if it is running.
reconnect Close connection from host side to force reconnect.
reconnect device Close connection from device side to force reconnect.
reconnect offline Reset offline/unauthorized devices to force reconnect.
USB:
Only valid when running with libusb backend.
attach SERIAL Attach a detached USB device identified by its SERIAL number.
detach SERIAL Detach from a USB device identified by its SERIAL to allow use by other processes.
Features:
host-features
list features supported by adb server.
features
list features supported by both adb server and device.
ENVIRONMENT VARIABLES
$ADB_TRACE Comma (or space) separated list of debug info to log: all,adb,sockets,packets,rwx,usb,sync,sysdeps,transport,jdwp,services,auth,fdevent,shell,incremental.
$ADB_VENDOR_KEYS Colon-separated list of keys (files or directories).
$ANDROID_SERIAL Serial number to connect to (see -s).
$ANDROID_LOG_TAGS Tags to be used by logcat (see logcat –help).
$ADB_LOCAL_TRANSPORT_MAX_PORT Max emulator scan port (default 5585, 16 emulators).
$ADB_MDNS_AUTO_CONNECT Comma-separated list of mdns services to allow auto-connect (default adb-tls-connect).
$ADB_MDNS_OPENSCREEN The default mDNS-SD backend is Bonjour (mdnsResponder). For machines where Bonjour is not installed, adb can spawn its own, embedded, mDNS-SD back end, openscreen. If set to โ1โ, this env variable forces mDNS backend to openscreen.
$ADB_LIBUSB ADB has its own USB backend implementation but can also employ libusb. use adb devices -l
(usb:
prefix is omitted for libusb) or adb host-features
(look for libusb
in the output list) to identify which is in use. To override the default for your OS, set ADB_LIBUSB to โ1โ to enable libusb, or โ0โ to enable the ADB backend implementation.
AIK FOR WINDOWS 7
Automated Installation Kit (AIK) for Windows 7 32bit
! NOTE To install the Windows AIK, you must first download the ISO, Write the ISO file to a DVD using a third party tool, and then install the Windows AIK from the DVD.
ALL ANDROIDยนโด PERMISSIONS
All Permissions on Android 14
Here are all the 880 Android permissions that exist in Android 14. The permissions marked with asterisks (*) are only granted to system apps.
(more…)
SAMSUNG BROWSER
Some browser hidden options:
internet://debug/
List of Internet URLs
internet://attribution-internals
internet://autofill-internals
internet://bluetooth-internals
internet://credits
internet://dns
internet://flags
internet://gpu
internet://interstitials
internet://media-internals
internet://net-export
internet://net-internals
internet://newtab
internet://newtabcontent
internet://parental-control
internet://password-manager-internals
internet://serviceworker-internals
internet://tracking
internet://version
internet://webapks
(more…)
TAKE OWNERSHIP IN WINDOWS
Take ownership of file or folder
In windows, some of the system files are protected by OS and canโt be accessed by users with even administrator privileges. CSC cache stored in C:\Windows\CSC is one such folder. If you try to open the folder in windows explorer, you would be greeted with the window โYou donโt currently have permission to access this folder. Click Continue to permanently get access to this folder.โ
Take ownership of a file/folder from windows command line?
Open elevated administrator command prompt and run the below command on the file.
takeown /F fileName
Running from a non elevated command prompt would generated the error โAccess is deniedโ
Take ownership of a folder and all its contents:
c:>takeown /R /F c:\windows\csc\
SUCCESS: The file (or folder): “c:\windows\csc\” now owned by user “domain\user”.
These commands work on Windows 8 and Windows 7.
SHADY RPC LIK3 SAMSUNG
So evry Sumsuser got this tiny little app who do a LOOOT…
To whom goes all this data from app…!??
Package Name: com.sec.imsservice
—
adb shell pm kill --user 0 com.sec.imsservice
Services
(more…)
MetaMask
MetaMask
0xa8461472cEB637C1103D5cC74caaf5EC05c0d66f
Zanimaju li vas novi NFT-ovi ili nezamjenjivi tokeni, ali ne znate odakle poฤeti? Zanimaju vas kriptovalute, ali novฤanici su za vas previลกe komplicirani ili djeluju zastraลกujuฤe? MetaMask je kripto i NFT novฤanik koji radi kao mobilna aplikacija ili proลกirenje preglednika, kada MetaMask moลพe posluลพiti kao jednostavan i pristupaฤan ulazak u svijet blockchain aplikacija i imovine.
ล to je to MetaMask?
MetaMask sebe naziva โvaลกom vezom s novim internetomโ i dizajniran je da sluลพi kao novฤanik i identifikacija ili ID za online aplikacije temeljene na blockchainu, izgraฤene na Ethereumu. Osim ลกto korisnicima daje pristup kripto i NFT-ovima, obeฤava sigurnije i privatnije iskustvo preglednika. Jedina zaฤkoljica je u tome ลกto kada korisnici drลพe sve svoje podatke, ne mogu si priuลกtiti da ih izgube ili daju sami.
MetaMask radi kao besplatna mobilna aplikacija za iOS i Android, ali moลพe raditi i kao proลกirenje za preglednike Google Chromea, Firefoxa, Bravea i Edgea za raฤunala. Ako koristite Firefox, Brave ili Edge, posjetite stranicu za preuzimanje MetaMask, pomaknite se prema dolje do Podrลพani preglednici i odaberite ikonu za ลพeljeni preglednik. Odatle je instalirajte kao bilo koju drugu aplikaciju ili proลกirenje.
Snimke zaslona razlikuju se ovisno o tome koji internetski preglednik koristite, pa ako slijedite zajedno s aplikacijom ili alternativnim proลกirenjem preglednika, stvari mogu izgledati malo drugaฤije na vaลกem zaslonu.
Zapoฤinjanje s MetaMask korisniฤkim raฤunom?
U svojoj srลพi, MetaMask je kripto novฤanik. Ako ลพelite prednosti interakcije s blockchain aplikacijama putem MetaMask raฤuna, moลพda se pitate moลพete li povezati svoje postojeฤe novฤanike. Odgovor je โmoลพda moลพeteโ.
Kada se prvi put prijavljujete, postoji stranica za povezivanje postojeฤeg novฤanika s novim MetaMask raฤunom unosom fraze za oporavak. Tijekom pisanja ovog ฤlanka unesena je fraza za oporavak postojeฤeg novฤanika blockchain.com, ali MetaMask je nije prepoznao. Uobiฤajene recenzije aplikacija kaลพu da MetaMask ne radi sa svim tvrdim novฤanicima, tako da bi ovo mogao biti samo problem s MetaMaskom.
Izrada novog MetaMask raฤuna kao proลกirenja preglednika je brza i jednostavna. Najteลพi dio je s vaลกom poฤetnom frazom, koja postaje vaลกa fraza oporavka. Ako ste upoznati s kripto novฤanicima, upoznati ste s ovim konceptom. Ako je MetaMask vaลก prvi kripto novฤanik, sve ลกto trebate znati objaลกnjeno je u kratkom videu.
Kako osigurati MetaMask novฤanik?
U biti, vaลกa fraza za oporavak od dvanaest rijeฤi sluลพi kao rezerva u sluฤaju da se ne moลพete prijaviti na svoj raฤun. Buduฤi da MetaMask sebe vidi kao temelj vaลกeg identiteta na novom internetu, ako netko drugi ulazi u vaลก raฤun to znaฤi da se taj netko drugi ลพeli doฤepati vaลกeg broja socijalnog osiguranja, ne samo vaลกeg novca i kartica. Stranice za postavljanje preporuฤuju da zapiลกete svoj izraz ili lozinku za oporavak i ฤuvate je na sigurnom mjestu ili koristite pouzdanog upravitelja lozinkama.
Nakon ลกto dobijete frazu za oporavak, morate redom odabrati rijeฤi iz banke rijeฤi kako biste bili sigurni da ste je ispravno kopirali. Nakon ลกto je ovaj mali test obavljen, stranica za potvrdu vam govori da ste spremni za poฤetak koriลกtenja MetaMaska.
Ostvarivanje pristupa MetaMask korisniฤkom raฤunu?
Nakon ลกto je vaลกe MetaMask proลกirenje preglednika postavljeno, moลพete mu pristupiti tako da se vratite na MetaMask web mjesto i prijavite se. Naravno, buduฤi da je to proลกirenje preglednika, moลพete takoฤer odabrati MetaMask logotip na alatnoj traci proลกirenja pored trake za pretraลพivanje na vrhu prozora preglednika.
Pristup MetaMasku s vaลกe alatne trake proลกirenja pokazuje vam na kojoj mreลพi MetaMask radi i brzi pregled vaลกih sredstava. Takoฤer vam pokazuje je li vaลก MetaMask raฤun povezan sa web mjestom na kojem se nalazite. Naลพalost, u trenutku pisanja ovog teksta, nema puno stranica koje rade s MetaMaskom. Ako ga pronaฤete, gumb na stranici omoguฤit ฤe vam povezivanje raฤuna.
Iz suฤelja web stranice ili suฤelja proลกirenja takoฤer moลพete kupiti, prodati ili zamijeniti imovinu u svom novฤaniku. Moลพete kupovati putem bankovnog prijenosa ili kreditnog ili debitnog raฤuna. Takoฤer moลพete prenijeti ETH iz drugog novฤanika ili zamijeniti ETH na svom raฤunu za druge podrลพane tokene. U bilo kojem trenutku moลพete kopirati svoju javnu adresu novฤanika u meฤuspremnik klikom na naziv svog raฤuna. Buduฤi da je MetaMask jako velik po pitanju sigurnosti, morat ฤete se ponovno prijaviti na svoj raฤun kada ponovno pokrenete preglednik.
Kako personalizirati MetaMask korisniฤki raฤun?
Svojem raฤunu moลพete pristupiti iz proลกirenja ili suฤelja web stranice klikom na ikonu naslaganih toฤaka u gornjem desnom kutu i odabirom Pojedinosti o raฤunu iz izbornika koji se pojavi. Time se prikazuje QR kod i tekstualna verzija vaลกe javne adrese. Takoฤer moลพete kliknuti ikonu olovke desno od naziva raฤuna da biste ga promijenili u bilo kojem trenutku.
Iz bilo kojeg suฤelja takoฤer moลพete promijeniti mreลพu koju MetaMask koristi tako da moลพe podrลพavati dodatne lance blokova. Pritisnite polje Ethereum Mainnet (zadana MetaMask mreลพa) da biste otvorili padajuฤi izbornik ostalih podrลพanih mreลพa. Donja stavka, Custom RPC, omoguฤuje vam dodavanje mreลพa koje nisu dio standardnog popisa podrลกke.
Koriลกtenje MetaMask-a
MetaMask nije takozvana โputovnicaโ za internet kakvom ลพeli biti. Barem ne joลก. Ovdje postoji jako puno posla koji se mora obaviti, kako bi MetaMask postao u potpunosti jednoga dana ono ลกto ลพeli postati. MetaMask je rano doลกao u novo polje internetskog dizajna. Jednog dana bi doista mogao rijeลกiti naลกe probleme identiteta, sigurnosti i financija na internetu.
To ลกto MetaMask joลก ne radi sve te stvari ne znaฤi da ga se joลก ne isplati imati. ฤak i dok ฤekamo sljedeฤu generaciju interneta, MetaMask je veฤ pristupaฤan novฤanik jednostavan za koriลกtenje, koji vam daje sve ลกto vam je potrebno da uronite u buduฤnost blockchaina i decentraliziranih aplikacija. Sve je stvar u tome ลกto korisnici ลพele i kakve su im preference. Sukladno tomu, MetaMask bi se mogao razvijati sukladno onome ลกto korisnici od ove platforme ลพele.
METAS DOESNT LIKE THEIR PACKAGE NOT USING
FB now started force,
i mean if u want to use FB/INSTA/THREADS ,
now u must enable or defrost mettas packages,
“`
package:com.facebook.katana
package:com.facebook.system
package:com.facebook.appmanager
package:com.facebook.services
“`
when u click FB link inside INSTA app,
pop-up msg say that u need to enable “Meet Installer”
when i didnt neeed them before but now FB app no thx…
when u click that Go to settings that link forwards u to;
Meet Install, now.lets take a look permissions:
FB relation pckages are these:
and these mettas apps are huge analytics, monitors,
spy silenty/logging sending app which learn ur device behavir…
and u dont even feel sumthin wrong…
but what SAMSUNG do with their preinstalled app its so shameless…
evry samsung app got backdoor allwayw available no matter how much they try.to patch all …
CVE’S penetrater in evry single samsung app…
which now.look like swiss chesse …
i allready frozzen 130+ samsung app n blootwares…
far far away from samsung app…
it better to use google service on samsung deviced…
my SCUMSUNG BLOOTWARES LIST:
xDD
SCUMSUNG.vulnerability.cve
#GALAXY vulnerabilityย
11-2023/2024
SVE-2023-0774(CVE-2024-20825, CVE-2024-20824, CVE-2024-20823, CVE-2024-20822): Implicit intent hijacking vulnerability in Galaxy Store
Resolved version: 4.5.63.6
Reported on: May 4, 2023
Description: Implicit intent hijacking vulnerability in Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.
—
Samsung Gallery
SVE-2023-1781(CVE-2024-20827): Improper access control vulnerability in Samsung Gallery
Description: Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen.
The patch prevents menu access by physical keyboard in locked device
—
Samsung Internet
SVE-2023-2275(CVE-2024-20828): Improper authorization verification vulnerability in Samsung Internet
Description: Improper authorization verification vulnerability in Samsung Internet prior to version 24.0 allows physical attackers to access files downloaded in SecretMode without proper authentication.
The patch adds proper authorization verification logic to prevent unauthorized access.
—
Samsung Email
SVE-2023-0956(CVE-2024-20807): Implicit intent hijacking vulnerability in Samsung Email
Description: Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows attacker to get sensitive information.
The patch change the implicit intent to explicit intent.
—
SVE-2023-1990(CVE-2024-20808): Improper access control vulnerability in Nearby device scanning
SVE-2023-2339(CVE-2024-20841): Improper Handling of Insufficient Privileges in Samsung Account
SVE-2023-2250(CVE-2024-20840): Improper Access Control in Samsung Voice Recorder
SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings
SVE-2023-2372(CVE-2024-20851): Improper access control vulnerability in Samsung Data Store
SVE-2023-2086(CVE-2024-20850): Use of Implicit Intent for Sensitive Communication in Samsung Pay
SVE-2023-2191(CVE-2024-20854): Improper handling of insufficient privileges vulnerability in Samsung Camera
SVE-2024-0405(CVE-2024-20853): Improper verification of intent by broadcast receiver vulnerability in ThemeStore
SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings
SVE-2023-1416(CVE-2023-42544): Improper access control vulnerability in Quick Share
SVE-2023-1414(CVE-2023-42543): Improper verification of intent by broadcast receiver vulnerability in Bixby Voice
SVE-2023-1287(CVE-2023-42541): Improper authorization in Samsung Push Service
SVE-2023-0668(CVE-2023-42539): PendingIntent hijacking vulnerability in Samsung Health
SVE-2023-1503(CVE-2023-42552): Implicit intent hijacking vulnerability in Firewall application
SVE-2023-1454(CVE-2023-42545): Use of implicit intent for sensitive communication vulnerability in Phone
source:
https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02
Windows 7 Services List that can be Disabled Safely
Windows 7 Services List that can be Disabled Safely
We have posted service configuration guides forย Windows XPย andย Windows Vistaย in past and now its turn of Windows 7. In this tutorial weโll learn about the Windows services which are not essential and can be safely disabled or set to MANUAL to speed up your Windows 7 computer system:
STEP 1.ย Right-click onย Computerย icon on desktop and selectย Manage, itโll open a new window. Now go toย Services & Applications -> Services. You can also open the same fromย Administrative Toolsย ->ย Computer Management. Or you can directly open โServicesโ list by providingย services.mscย command in RUN or Start Menu search box.
STEP 2.ย Now you can set the unnecessary services to DISABLED or MANUAL. Just double-click on any service and select the desired option inย Startup typeย list box.
NOTE 1:ย Always set the service to MANUAL, never disable it, so that whenever Windows needs to start a service, it can easily start and use it. If you set any service to DISABLED, Windows will not be able to start it and will give some error messages.
NOTE 2:ย You can setย Remote Registryย service to DISABLED for Security purposes.
Here is a list of services that can be safely set to MANUAL/DISABLED:
โข Computer Browserย (If your computer is not connected to any network)
โข Desktop Window Manager Session Managerย (If you donโt use Aero glass theme)
โข Diagnostic Policy Service
โข Distributed Link Tracking Clientย (If your computer is not connected to any network)
โข IP Helperย (If you donโt use IPv6 connection)
โข Offline Files
โข Portable Device Enumerator Service
โข Print Spoolerย (If you donโt have a Printer)
โข Protected Storage
โข Remote Registry
โข Secondary Logon
โข Security Center
โข Serverย (If your computer is not connected to any network)
โข Tablet PC Input Service
โข TCP/IP NetBIOS Helperย (If you are not in a workgroup network)
โข Themesย ( If you use Windows Classic theme)
โข Windows Error Reporting Service
โข Windows Media Center Service Launcher
โข Windows Searchย (If you donโt use Windows Search feature frequently)
PS:ย You can see the details of each service to determine whether you should disable it or not.