Just came around the “See all apps with this permission” link while tuning app permissions
Just came around the “See all apps with this permission” link while tuning app permissions
Maybe the easiest way is sign into Google and search android location.
I was lazy to check the phone’s battery level so I checked via https://www.google.sk/android/find 😀
Thumbs up for Mi Cloud (Xiaomi) because the ability to read synced SMS messages.
Don’t know if it’s a new Android feature or Xiaomi improvement, but I definitely like network connection speed in the status bar.
If you don’t have it in the Notifications settings menu
than you could use an app for that, e.g. https://play.google.com/store/apps/details?id=com.internet.speed.meter.lite
My older Nexus tablet is slow when toggling WiFi so I disabled accounts auto-sync, but needed a solution to auto enable when charging.
So I found an automation app Automate and made a flow for it.
Finally figured out Android file access via MTP using autofs and jmptfs
# /etc/autofs/auto.misc android -fstype=fuse,allow_other,umask=000 :jmtpfs
To test:
$ sudo systemctl stop autofs.service $ sudo automount -vf Starting automounter version 5.1.1, master map auto.master using kernel protocol version 5.02 lookup(file): failed to read included master map auto.master mounted indirect on /misc with timeout 300, freq 75 seconds ghosting enabled
After listing
$ ls /misc/android 'Internal storage'
the following output should appear
attempting to mount entry /misc/android >> Device 0 (VID=18d1 and PID=4e41) is a Google Inc (for Asus) Nexus 7 (MTP). mounted /misc/android
To download Anroid SDK go to https://developer.android.com/sdk/index.html
The backup command
mike@mikembp:~/Downloads/android/sdk/platform-tools$ ./adb backup -all Now unlock your device and confirm the backup operation.
Default backup file name is backup.ab
mike@mikembp:~/Downloads/android/sdk/platform-tools$ ls -la backup.ab -rw-r----- 1 mike wheel 60M Feb 9 07:39 backup.ab
Get some log stuff to examine phone stat data
mike@mikembp:~/Downloads/android/sdk/platform-tools$ ./adb logcat -b radio -d > radio.logcat mike@mikembp:~/Downloads/android/sdk/platform-tools$ ./adb logcat -d > adb.logcat
Today I googled my Androids firmware build code I9070XXLQG and read http://www.ibtimes.co.uk/galaxy-s-advance-root-i9070xxlqg-android412-jellybean-485079.
I have Android 4.1.2 Jelly Bean official update on my smartphone, which I updated with Samsung’s Kies over USB cable.
From curiosity I downloaded the rooting package http://d-h.st/ook and looked at root/META-INF/com/google/android/updater-script
In a nutshell, rooting is adding su (SuperUser) binary into /system/bin.
ui_print("***************************");
ui_print("Rooting with SuperSU 0.95 & Busybox 1.20.2");
ui_print("***************************");
show_progress(1.000000, 0);
ui_print("Installing temporary busybox");
package_extract_file("system/xbin/busybox", "/tmp/busybox");
set_perm(0, 0, 0777, "/tmp/busybox");
set_progress(0.200000);
ui_print("Mounting system...");
run_program("/tmp/busybox", "mount", "/system");
set_progress(0.300000);
ui_print("Removing old superuser");
delete("/system/bin/su");
delete("/system/xbin/su");
delete("/system/app/superuser.apk");
delete("/system/app/superUser.apk");
delete("/system/app/Superuser.apk");
delete("/system/app/SuperUser.apk");
set_progress(0.400000);
ui_print("Installing Superuser & Busybox...");
package_extract_dir("system", "/system");
set_progress(0.600000);
ui_print("Setting Permission...");
set_perm(0, 0, 06755, "/system/xbin/su");
set_perm(0, 0, 0644, "/system/app/superuser.apk");
set_perm(0, 0, 04755, "/system/xbin/busybox");
set_progress(0.700000);
ui_print("Installing Busybox...");
run_program("/system/xbin/busybox", "--install", "-s", "/system/xbin");
set_progress(0.900000);
ui_print("Symlinking...");
symlink("/system/xbin/su", "/system/bin/su");
ui_print("Unmounting system...");
run_program("/tmp/busybox", "umount", "/system");
ui_print("Deleting temporary busybox");
delete("/tmp/busybox");
set_progress(1.000000);
show_progress(1.000000, 0);
ui_print("Root complete!");
ui_print("SuperSU 0.95 & Busybox 1.20.2");
After reading and playing around with adb I decided that I go for it
For strengthening my decision a checked if the MD5 matches and it matched
mike@mikembp:~/Downloads/android$ md5 root.zip
MD5 (root.zip) = 3d5cc207f625a032e7ff4fe92e3e6efa
Trying su after restart
shell@android:/ $ ll data/
opendir failed, Permission denied
1|shell@android:/ $ su
shell@android:/ # ll data/
-rw------- system system 4096 2014-02-09 09:45 NVM0
-rw------- system system 16384 2014-02-08 23:08 NVM1
-rw------- system system 2832 2014-02-09 09:45 NVM13
-rw------- system system 0 2013-11-14 06:33 NVM2
-rw------- system system 83724 2014-02-08 22:46 NVM3
-rw------- system system 112 2014-02-08 23:10 NVM5
-rw------- system system 0 2013-11-14 06:33 NVM6
-rw-rw-rw- root system 15032320 2014-02-08 20:35 adm.sqlite
-rw-rw-rw- root system 0 2013-11-14 06:31 adm.sqlite-copy-datestamp-JB
drwxrwxr-x system system 2014-02-03 13:53 anr
drwxrwx--x system system 2014-02-09 07:43 app
drwx------ root root 2014-02-07 12:27 app-asec
drwxrwx--x system system 2014-02-07 12:26 app-private
drwx------ system system 2014-02-09 09:45 backup
-rw------- system system 2777 2014-02-09 09:55 cal.bin
drwxrwxr-x system system 2014-02-09 07:37 clipboard
-rw-rw-rw- nobody nobody 95613 2014-02-09 09:45 cops.log
drwxrwx--x system system 2014-02-09 09:45 dalvik-cache
drwxrwx--x system system 2014-02-09 09:44 data
drwxr-x--- root log 2013-11-14 06:31 dontpanic
drwxrwx--- drm drm 2013-11-14 06:31 drm
-rwxr--r-- system system 8 2014-02-09 09:55 hidden_volume.txt
drwxr-x--x root root 2013-11-14 06:31 local
drwxrwxr-x system log 2014-02-09 09:55 log
drwxrwx--- root root 1970-01-01 01:00 lost+found
drwxrwxr-x media_rw media_rw 2013-11-14 06:31 media
drwxrwx--t system misc 2013-12-27 09:46 misc
drwxrwxrwx media system 2013-11-20 14:27 mmdsp-SIA_2013-11-20_14-27-31_1384954051
drwx------ root root 2014-02-09 09:45 property
drwxrwx--x system system 2013-11-14 06:31 resource-cache
drwxr-x--- root shell 2013-11-14 06:31 ssh
drwxrwxr-x system system 2014-01-30 19:31 ste-debug
drwxrwxr-x system system 2014-02-09 09:55 system
drwxr-xr-x system system 2013-12-24 16:12 tombstones
drwx--x--x system system 2013-11-14 06:31 user