Adjust the time?! - Nook Touch General

Using Google Authenticator offline but it needs the right time and timezone.
Its possible to sync over a network but no wifi here... sure a way to adjust the time?

answering my own question:
- can use connectbot to connect to local or
-
Code:
adb shell date -s yyyymmdd.hhmmss
or
- use an ntp client
http://forum.xda-developers.com/showthread.php?t=1999970&highlight=time
edit: thanks renate for command correction

jago25_98 said:
- adb date -s yyyymmdd.hhmmss
Click to expand...
Click to collapse
Mmm, maybe adb shell date?
You can also use Settings on the Nook (if you replaced the B&N with the stock Android).

Related

[MISC] Activate and Adjust Wifi HotSpot Settings, No Root Necessary

Interestingly enough if you install Launcher Pro or similar you can pop right on over to the Froyo AP settings.
Its very straight-forward, all you need to do is long press your homescreen, create a shortcut/activity that goes directly to the Wifi AP settings, what you are looking for is:
com.android.settings.wifi.WifiApSettings
Its as exactly as you would find on the Nexus One, its just hidden from the standard menus to keep the noobs out I suppose. Hopefully they leave this in, since the cat is out of the bag!
Edit:
HamNCheese has figured out that the temp root is necessary to kick things off. Its not really complex, here is his instructions:
HamNCheese said:
Here's a workaround to get things working (for now)
Step 1: get root
Step 2: Add the wifi settings shortcut as posted in this thread and configure your AP
Step 3: Create dnsmasq.conf:
Code:
no-resolv
no-poll
server=208.67.222.222
server=208.67.220.220
dhcp-authoritative
Step 4: adb push dnsmasq.conf to /data/local/tmp
Step 5: create wifi.sh:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
./busybox ifconfig wl0.1 192.168.1.1
dnsmasq --strict-order --bind-interfaces --pid-file=/data/local/tmp/dnsmasq.pid --conf-file=/data/local/tmp/dnsmasq.conf --listen-address 192.168.1.1 --dhcp-range 192.168.1.2,192.168.1.254 --dhcp-lease-max=253
iptables -t nat --append POSTROUTING --out-interface rmnet0 -j MASQUERADE
iptables --append FORWARD --in-interface wl0.1 -j ACCEPT
Step 6: adb push wifi.sh to /data/local/tmp
Step 7: su, change to /data/local/tmp and run wifi.sh
Step 8: (important) Connect to your AP only after dnsmasq is started, otherwise you will get weird DNS failures.
Credit to teferi for his original USB tether script.
Click to expand...
Click to collapse
Ha! Nice find...
You beat me to it! I was just noticing that switchpro has an option to enable hotspot access. I still couldn't get to it, but the ssid popped up on my laptop.
This feature would make waiting for root soooo much easier. lol
Stupid dhcp...
Holy crap dude there it is! That's awesome. Thanks a lot for finding that out. Hopefully it does stay in.
Were you actually able to connect. My devices keep waiting to obtain an ip address
Sent from my T-Mobile G2 using XDA App
Rather than install an entirely new launcher, you could probably access this by installing AnyCut and creating a shortcut from there. Good luck to all you folks in G2 land!
Sent from my Nexus One using XDA App
yeah, its not working. good find still though.
I can get to it, but it's not working for me. Gets enabled, shows up on my laptop, but I never get an IP to use.
sherifone said:
Interestingly enough if you install Launcher Pro or similar you can pop right on over to the Froyo AP settings.
Its very straight-forward, all you need to do is long press your homescreen, create a shortcut/activity that goes directly to the Wifi AP settings, what you are looking for is:
com.android.settings.wifi.WifiApSettings
Its as exactly as you would find on the Nexus One, its just hidden from the standard menus to keep the noobs out I suppose. Hopefully they leave this in, since the cat is out of the bag!
Click to expand...
Click to collapse
I can't get anything to connect with it though so that's kind of a bust. Nice work on the hunt though!
Sent from my HTC Vision
To all of you trying to make it work, it doesn't. Something is disabled in the IP tables or something to that effect. The hotspot menu was removed from the settings.apk from the g2 shipped rom as another way to try and disable hotspot access. Looks like we're getting close!
I'm unable to get it up and running either. I see the SSID, but no valid connection.
Hopefully there's a simple workaround
InGeNeTiCs said:
Something is disabled in the IP tables or something to that effect.
Click to expand...
Click to collapse
Actually, everything is present - modules, iptables, etc. People are using the other wifi tether package successfully.
I think I found a solution.
We need to have an application to direct 3G data through post-added firewall and DHCP server, and direct to "hidden" hotspot.
When the application starts, it'll enable hotspot, and it'll get data from the network like other internet-based application, and direct to firewall/DHCP, and finally goes to the hotspot.
It's much like easytether or PDAnet, but the destination is hotspot instead of USB.
In addition, this application should have more options than native mobile hotspot like SSID hiding, site filtering, MAC address filtering.
Which wifi tether package is currently working?
Sent from my T-Mobile G2 using XDA App
YOUR CAN TETHER YOUR PHONE TO YOUR PC WITH "EASY TETHER"
Edit: IT WORKS You can Tether your phone using it
Has Anyone Tried "Easy Tether"
Here's a workaround to get things working (for now)
Step 1: get root
Step 2: Add the wifi settings shortcut as posted in this thread and configure your AP
Step 3: Create dnsmasq.conf:
Code:
no-resolv
no-poll
server=208.67.222.222
server=208.67.220.220
dhcp-authoritative
Step 4: adb push dnsmasq.conf to /data/local/tmp
Step 5: create wifi.sh:
Code:
echo 1 > /proc/sys/net/ipv4/ip_forward
./busybox ifconfig wl0.1 192.168.1.1
dnsmasq --strict-order --bind-interfaces --pid-file=/data/local/tmp/dnsmasq.pid --conf-file=/data/local/tmp/dnsmasq.conf --listen-address 192.168.1.1 --dhcp-range 192.168.1.2,192.168.1.254 --dhcp-lease-max=253
iptables -t nat --append POSTROUTING --out-interface rmnet0 -j MASQUERADE
iptables --append FORWARD --in-interface wl0.1 -j ACCEPT
Step 6: adb push wifi.sh to /data/local/tmp
Step 7: su, change to /data/local/tmp and run wifi.sh
Step 8: (important) Connect to your AP only after dnsmasq is started, otherwise you will get weird DNS failures.
Credit to teferi for his original USB tether script.
Can't wait for this feature to be ready.
Sent from my T-Mobile G2 using XDA App
RaffieKol said:
YOUR CAN TETHER YOUR PHONE TO YOUR PC WITH "EASY TETHER"
Edit: IT WORKS You can Tether your phone using it
Has Anyone Tried "Easy Tether"
Click to expand...
Click to collapse
Can easytether do it over wifi????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
Gotta wait till next month to get this phone. But.
Why can't you give yourself a static IP in the same subnet as the phone and use the phone as your DNS server? Or is it not routing either?
Anomaly said:
Gotta wait till next month to get this phone. But.
Why can't you give yourself a static IP in the same subnet as the phone and use the phone as your DNS server? Or is it not routing either?
Click to expand...
Click to collapse
Haven't tried that, but there might be an issue with trying to steal an IP from the T-Mobile dhcp pool.

Shell command for checkin

Is there a shell command for *#*#2432546#*#* (*#*#checkin#*#*)?
instead of going to the phone menu all the time, i want to have my phone connected to the computer and to be able to just type the command in the terminal and have it check for updates...
Hasn't it been pretty firmly established at this point that checking in doesn't give you update access any quicker than you would get it anyway?
i understand that. i was just curious if there was an actual command for that or wether that was just built into the dialer app.
all check in does is re-associate your phone with the network and let the mothership know you are alive and well

HELP: Linux ansi terminal capabilities on WinXP through adb

I'm a Linux/UNIX hack, so I play around a lot with shell scripts on my Epic, as well as just doing many things from ConnectBot and adb.
Everything's great from ConnectBot -- the emulator supports ANSI escape sequences, so it works perfectly with vi, command-line editing, etc. Great on the go!
However, I'd like to do the same thing when connect via 'adb shell' from my PC, and that's where it all goes to crap. The DOS command prompt window doesn't seem to support ANSI, window size is not passed through adb, so vi is unusable. Oddly, command-line editing seems to work. Also, I seem to be getting every command echoed, creating a spurious line.
Bottom line: I want to adb a local shell on my Epic from my PC and be able to use it the same way as I do on the phone itself via connectbot, yet with the obvious advantage of a big screen and normal keyboard. Anyone have any solution to this?
Thanks!!
QuickSSHd with PuTTy would probably get you what you're looking for, with the added benefit of being wireless.
I'm not sure where the limitation lies, but cygwin + adb might work.
Setup adb to use telnet and forward a local port, then you can use PuTTY to telnet into the local port. Details in this thread:
http://forum.xda-developers.com/showthread.php?t=535014
curvatura99 said:
Setup adb to use telnet and forward a local port, then you can use PuTTY to telnet into the local port. Details in this thread:
http://forum.xda-developers.com/showthread.php?t=535014
Click to expand...
Click to collapse
Oh, so close!! The thread above has the answer. In short, have adb listen to a local port on the Windows machine and forward it to the device, start the telnet server, and then use PuTTY to telnet into the device (from a Windows cmd prompt):
> adb forward tcp:9999 tcp:23
> adb shell telnetd
adb must be running as root.
Then, use PuTTY to telnet to localhost:9999 (the Windows machine @ 127.0.0.1, port 9999).
Almost works, except the telnet daemon on my Epic is refusing to connect! Looks like a security thing or something. Basically, I get the age-old UNIX telnet daemon message,
Entering character mode
Escape character is '^]'​but instead of a "login:" prompt, the connection is immediately closed with the message,
Connection closed by foreign host​This happens if I try to telnet locally to 127.0.0.1:23 on the Epic itself!!
Without telnetd running, there's no response (as expected). So clearly telnetd is running, listening to the port, responding to it, but just refusing to allow a login.
Any suggestions as to what's wrong? Is interactive login disabled or something?
BTW, this works wirelessly too -- don't need adb at all. Just get a shell prompt on the Epic and start telnetd. Then, you can use PuTTY (or any telnet client) to connect via wifi to <EpicIP>:23.
I tried this too, connected, but have the same instant disconnect problem.
I know this thread is old, but the solution might help someone. You need to start telnetd like this so it will invoke the shell when you telnet in:
I had to adb shell into the phone then run:
# busybox telnetd -l /system/bin/ash
As I'm new here I cannot post links, but if you google for 'Better cmd.exe terminal and ANSI color codes support' you will find another option then port forwarding etc.
Essentially using an alternative cmd.exe (Console) together with an ANSI helper program (ANSICON).
Did the trick for me at least.
Cheers,
Remco
http://forum.xda-developers.com/showthread.php?t=803223

Getting Xperia arc to work with Exchange Server (Microsoft BPOS)

I use Exchange Server (Microsoft BPOS) for my work email and was annoyed to find that it is not working with stock email app with my new xperia arc. So i decided to get rid of stock email app and install Default android email client
What is needed
* Xperia Arc rooted and busybox installed
* adb on the system
* USB Debug enabled on device ( for adb )
once you have busy box install
Lets Start
#push attached Email.apk
Code:
adb push Email.apk /sdcard/
# run adb shell
Code:
adb shell
#become root
Code:
su
# mount /system
Code:
mount -o remount,rw -t yaffs2 `mount | /system/xbin/busybox grep /system | /system/xbin/busybox awk '{print $1}'` /system
#remove Stock Email App
Code:
/system/xbin/busybox rm /system/app/SemcEmail.apk
# or
rm /system/app/SemcEmail.apk
#copy new Email.apk
Code:
cp /sdcard/Email.apk /system/app/Email.ap
k
#reboot the device and you would be able to configure email client
Hi,
The Xperia Arc stock email client works just fine with Microsoft BPOS. The trick is to use the BPOS account SAM instead of email address as the logon name. I've been using it three weeks now (RED002) without any problems. I hope this information helps those who wouldn't like to replace the Arc mail client.
//FF2k10
ff2k10 said:
Hi,
The Xperia Arc stock email client works just fine with Microsoft BPOS. The trick is to use the BPOS account SAM instead of email address as the logon name. I've been using it three weeks now (RED002) without any problems. I hope this information helps those who wouldn't like to replace the Arc mail client.
//FF2k10
Click to expand...
Click to collapse
Hi there, I was hoping that perhaps you could elaborate on this post you made?
I have the problem with my Arc (having tried the built-in-app and TouchDown) being unable to connect.
The logfile in TouchDown tells me Authentication-problems.
But I am able to synch with "K9-mail", using the exact same settings.
I have tried connecting using red002/**USER** & red002\**USER**
I even tried **USER**@red002 & **USER**@red002.local
Even when posting the companies Domain in and combining every conceivable combination to make this weird error dissapear... simply cannot connect.
My last phone, HTC Desire actually connected right away with:
username: Firt.Last
Domain: (left blank)
server: red002.mail.emea.microsoftonline.com
SSL:YES
Suggestions ?
ff2k10 said:
Hi,
The Xperia Arc stock email client works just fine with Microsoft BPOS. The trick is to use the BPOS account SAM instead of email address as the logon name. I've been using it three weeks now (RED002) without any problems. I hope this information helps those who wouldn't like to replace the Arc mail client.
//FF2k10
Click to expand...
Click to collapse
[only made this extrapost if the user recieved notifications only when being replied]
Hi there, I was hoping that perhaps you could elaborate on this post you made?
I have the problem with my Arc (having tried the built-in-app and TouchDown) being unable to connect.
The logfile in TouchDown tells me Authentication-problems.
But I am able to synch with "K9-mail", using the exact same settings.
I have tried connecting using red002/**USER** & red002\**USER**
I even tried **USER**@red002 & **USER**@red002.local
Even when posting the companies Domain in and combining every conceivable combination to make this weird error dissapear... simply cannot connect.
My last phone, HTC Desire actually connected right away with:
username: Firt.Last
Domain: (left blank)
server: red002.mail.emea.microsoftonline.com
SSL:YES
Suggestions ?
Sollution to problem
Found the problem to be (according to the online community) to be from a DLL-bug now fixed by Google (the problem exists in 2.3) but not pushed out by for instance Sony Ericsson to our phones yet.
Workaround (for mainly hosted Exchange like MS Online Services)
Logg on to Office Live Meeting, at the very top your SAM Account name is located.
(they change @ for _ ----and there is a max 20 chars)
This makes the SETTINGS:
Domain: red002 (or whatever your on)
Username: first.lastname_DOMAI (remember MAX 20 chars)
Password: *************
Server: red002.mail.emea.microsoftonline.com
I just un-installed the SE email client with Titanium Backup and installed this email client using my SD card. Works perfect!! Thanks!!
I'm so glad to finally be able to use active sync with my hotmail accounts (Though I still hope this will be fixed with the next update)
just wondering.. does this sync like exchange activesync with calendars and contacts?
my activesync issues with the native email client were fixed by the 2.3.3 update.
Sogat said:
just wondering.. does this sync like exchange activesync with calendars and contacts?
Click to expand...
Click to collapse
Yes, it does sync the whole deal - calendar and contacts included. I've been having a weird problem lately. Automatic sync gets stuck and it won't resync either manually or automatically until the mail process has been killed and restarted. Hopefully 2.3.3 update also fixes this...

MAC Address Spoofing

Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
*** This requires root ***
I have it working in Marshmallow 6.0.1 (not tried it in Nougat)
Only attempt this if you understand MAC Addresses and be sure to note down your original/official MAC Address. Open /persist/wlan_mac.bin and take a copy of the contents before attempting the below.
Some background reading if you're not familiar with MAC Addresses.
Code:
ifconfig wlan0
will tell you all you need to know about the current state of your wireless adapter
The first command generates a MAC Address. I've hardcoded the first 6 characters of mine and randomly generate the remaining 6. It should generate a perfectly valid address but please post if it doesn't (or you have a better bash line).
The second sed command is to replace the MAC Address in the persisted wlan file. It's this command that needs to run as root.
You should be able to run these in something like Termux (make sure you're running as root by running "su" first). I actually run them using Tasker as "Code/Run Shell" commands.
Finally you need to enable then disable Airplane Mode for the change to take affect.
Here are the commands:
Code:
MAC=C0EEFB$(od -txC -An -N3 /dev/random| tr -d ' ')
Code:
sed -i "/Intf0MacAddress=/c\Intf0MacAddress=${MAC}" /persist/wlan_mac.bin
Code:
settings put global airplane_mode_on 1; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state true
Code:
settings put global airplane_mode_on 0; am broadcast -a android.intent.action.AIRPLANE_MODE --ez state false
Code:
ifconfig wlan0 | grep HWaddr
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
BTW, thanks for the share!
bealer said:
Being overly paranoid I'm always trying to make it harder for companies to track my device. Anyway, my most recent discovery is spoofing the MAC Address on my 3T so that wifi companies can't track it.
Click to expand...
Click to collapse
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
I dont think that it will work since our devices are F2FS i saw this on reddit the other day.
using a custom mac address
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Thanks in advance.
m0d hipp¥ said:
Why don't you write a shell script that saves the old mac address to a text file and then create the new one. And each time the user executes the shell script to spoof the mac address it appends to the existing log file in a new line the old mac address before changed again. That was if you ever need to revert it, you can look at the log file.
Click to expand...
Click to collapse
Yeah definitely things to improve,automating storing the original being one of them. I'll maybe follow up with that.
I didn't want to mask the main two commands too much with others around them. There are a few (older) ways to do this but this was the only way I could get it to work. And it's not a complete app/solution, more teaching a man to fish sort of thing.
knpk13 said:
Can't we just use this?
https://play.google.com/store/apps/details?id=eu.chainfire.pryfi
Click to expand...
Click to collapse
You can although
a) OP3T isn't listed as a supported device, I didn't try it
b) You can't automate it with that app very easily. Mine changes via Tasker state/events every day so I don't need to bother doing it myself.
gxyf106 said:
Newbie here. Just wondering how I could use a specific mac address instead of a random generated number.
Click to expand...
Click to collapse
Easiest way is just to change the first command and hardcode the MAC you want, ie
Code:
MAC=C0EEFB998877
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
gxyf106 said:
Termux says
Sh: MAC: Not Found after running second command. Any idea what went wrong?
Click to expand...
Click to collapse
Ah oops, that's an error in me typing it out. The 2nd command should contain:
Code:
${MAC}
The brackets were causing it to try and evaluate MAC as a command (rather than a variable). I'll update the OP.
I can confirm this works. many thanks!!
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Michalko5896 said:
Android is using randomized MAC adress when searching for wifi networks, this is not needed.
Click to expand...
Click to collapse
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
bealer said:
As of 6.0 it was my understanding that Android uses a generated MAC for scanning/probing networks. But when actually making a connection, the real MAC is used (so as not to cause network issues). So this post is still relevant. I'm generating a new MAC every day or two as I use a number of public open wifi connections.
Also working on my hostname being random, and trying to stop all traffic on an open wifi network until my vpn is up.
Some might argue it's OTT, but I'd say it's just good practise (certainly the last point).
Click to expand...
Click to collapse
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Michalko5896 said:
Well, if you are concerned about your safety, don't connect to any Wi-Fi / BT devices that you don't trust.
Click to expand...
Click to collapse
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
bealer said:
The MAC address spoofing is more about privacy in terms of trying to be anonymous, making it *harder* to track where I connect etc...
Trust is a slightly more complex, non-binary issue.
Click to expand...
Click to collapse
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
It stops wifi services tracking my phone. For example I use the wifi on the London Underground. Every time I connect to their wifi they'd know exactly where, when, how long, possibly my DNS requests just based on my MAC. It's all information that can be used for profiling or sold on (if that was part of the terms). They still may not known who I am exactly, but I'd rather they weren't able to identify/target me if it meant simply randomising my MAC. As mentioned Android already does this when scanning for networks.
Device Id isn't given, unless you mean hostname (which can be randomised too). If you're using HTTPS based websites then all browser traffic is encrypted via SSL. If you're not, then yeah it's possible to packet sniff your traffic (which is illegal), see what you're browsing, what your browser is, even part (but not all I believe) of your MAC etc...
Try Pry-Fi
Chainfire already has Pry-Fi for that. It has worked flawlessly for me.
first of all thank you for the commands but somehow this does not work with my Oneplus 3 (without T) on Sultans CM13. The address does not change after entering the commands, the commands do not show any error message.
Any advice?
Furthermore Pry-Fi seems to be able to change the MAC but it crashes sometimes and it seems to loose my saved WiFis. Furthermore i am not able to connect to my home AP after changing the MAC with Pry Fi. :-/
Someguyfromhell said:
MAC aadress is only used in local network, it does not go further than the very network you are connected to. What kind of advantage does MAC spoofing give you?
There's still your device ID, browser information and other stuff, that can actually reach the service you are connecting to.
Click to expand...
Click to collapse
Many public, free hotspots that require accepting terms on "walled garden" page today are tracking MAC address, DHCP-assigned IP address, and DHCP lease and active session time stamps. Example hotspots include Starbucks, hotels, etc. These hotspot network operator have logs to trace IPs back to MACs at a specific point in time until the logs are disposed.

Categories

Resources