| Deutsch English Français Italiano |
|
<vgm951$3dr8g$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Java Jive <java@evij.com.invalid> Newsgroups: alt.comp.os.windows-10,comp.mobile.android Subject: Re: Thumbnails, and what creates them. Date: Sat, 9 Nov 2024 00:08:00 +0000 Organization: A noiseless patient Spider Lines: 165 Message-ID: <vgm951$3dr8g$1@dont-email.me> References: <1ktfijp2bp4fisefbf95ptanhve79ab2od@4ax.com> <vg8ufv$hoo4$1@dont-email.me> <8b3gij5v1lhafk4bqa3f3iquuns3gnbskt@4ax.com> <vg9cpt$oua4$1@dont-email.me> <lor6jbFd6ktU1@mid.individual.net> <vgamqi$ujq$1@nnrp.usenet.blueworldhosting.com> <vgaqga$10q2u$1@dont-email.me> <vgb223$746$1@nnrp.usenet.blueworldhosting.com> <vgb7lh$1idh$1@nnrp.usenet.blueworldhosting.com> <vgctte$1g9ct$1@dont-email.me> <vgdq8h$17dm$1@nnrp.usenet.blueworldhosting.com> <vgg82t$2732h$1@dont-email.me> <vggekq$1ksn$1@nnrp.usenet.blueworldhosting.com> <vggkqn$295tf$1@dont-email.me> <vgglhr$2utg$1@nnrp.usenet.blueworldhosting.com> <vgirqm$2o2ft$1@dont-email.me> <vgitog$1ch3$1@nnrp.usenet.blueworldhosting.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sat, 09 Nov 2024 01:08:03 +0100 (CET) Injection-Info: dont-email.me; posting-host="12f963d0f169405037c76b01b337574f"; logging-data="3599632"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18d8jGpqtB25yuOxywlwcjOzLakBfdKsQ8=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:Ba0p45CMLJy2VczwmONd3qcBHtE= Content-Language: en-GB In-Reply-To: <vgitog$1ch3$1@nnrp.usenet.blueworldhosting.com> Bytes: 6834 On 2024-11-07 17:35, Andrews wrote: > Java Jive wrote on Thu, 7 Nov 2024 17:02:06 +0000 : > >>> I assume you tried copying it already when I gave the commands necessary. >> >> 16:44:31 D:\Temp>C:\Programs\Samsung\platform-tools\adb.exe root > > Thanks for running the suggested test! > > I'm surprised that command didn't give an error as mine did on my unrooted > Android 13 Galaxy - but I do not know what "adb root" even does. > > Running a search for what does adb root do this comes up > <https://duckduckgo.com/?va=d&t=hf&q=what+does+adb+root+do> > > *Understanding adb shell su and adb root Commands* > <https://www.repeato.app/understanding-adb-shell-su-and-adb-root-commands/> > "the command adb root restarts the adb daemon with root permissions, > allowing you to execute ADB commands as root without entering the shell." > > Since your "adb root" works, my suggestion is that you may be able to... > 1. adb pull the WifiConfigStore.xml file from Android to Windows > 2. Edit it on Windows any way you like > 3. adb push that now-edited WifiConfigStore.xml back to Android > >> 16:45:56 D:\Temp>C:\Programs\Samsung\platform-tools\adb.exe pull >> /data/misc/apexdata/com.android.wifi/WifiConfigStore.xml >> adb: error: remote object >> '/data/misc/apexdata/com.android.wifi/WifiConfigStore.xml' does not exist >> >> 16:46:09 D:\Temp> >> >> There is a data directory visible in explorer under ... >> >> /Internal storage/Android >> >> ... but adding that to the beginning of the path makes no odds, and in >> fact trying to pull a file that I know exists, because I can see it in >> Explorer, also fails: >> >> 16:54:31 D:\Temp>C:\Programs\Samsung\platform-tools\adb.exe pull >> "/Internal >> storage/Android/data/com.android.systemui/cache/lockscreen_capture_land.png" >> adb: error: remote object '/Internal >> storage/Android/data/com.android.systemui/cache/lockscreen_capture_land.png' >> does not exist >> >> Make of that what you will, remembering that I don't believe this device >> is rooted, although the adb root command seemed to work. > [snip] > > My advice is that since you can use the "adb root" command, that you can > almost certainly "adb pull" and "adb push" the WifiConfigStore.xml file. > > You just have to find it first. :) As far as I have been able to establish, it's just not there. There is a command ... <path>\adb backup .... which creates a backup of the phone or tablet on your computer. However, the backup so created, called backup.ab, is a unique tar file format that almost nothing else can read as is, though there are neat workarounds as long as it is not encrypted; however, because my tablet is encrypted, so is the backup, which means that the simple workarounds don't work. A whole Perl upgrade later, where the biggest problem was actually uninstalling the previous version, to run a Perl script to extract the contents resulted only in a message that it couldn't do anything with this version 4, a version later than that for which it was written. A whole Java upgrade later, where again the biggest problem was uninstalling the previous JDK and JRE, finally extracted it, but it seems to contain nothing useful that was not available already simply by connecting the phone to the PC in the normal way. There is a command ... <path>\adb shell ls .... which lists the root, I presume, directory as ... acct bugreports cache carrier config d data default.prop dev dsp efs etc file_contexts.bin firmware firmware-modem fstab.qcom init init.carrier.rc init.class_main.sh init.container.rc init.environ.rc init.mdm.sh init.qcom.bms.sh init.qcom.class_core.sh init.qcom.early_boot.sh init.qcom.factory.rc init.qcom.rc init.qcom.sh init.qcom.syspart_fixup.sh init.qcom.usb.rc init.qcom.usb.sh init.rc init.recovery.qcom.rc init.rilchip.rc init.target.rc init.usb.configfs.rc init.usb.rc init.wifi.rc init.zygote32.rc init.zygote64_32.rc knox_data mnt oem persdata persist postrecovery.do preload proc property_contexts publiccert.pem root sbin sdcard seapp_contexts sepolicy sepolicy_version service_contexts storage sys system tombstones ueventd.qcom.rc ueventd.rc vendor verity_key .... which allows the following batch command to be run ... for /f "usebackq tokens=*" %A in (`<path>\adb shell ls`) do @if not %A==proc <path>\adb pull /%A .... and I'm currently waiting for the /sys directory to complete, but a search of those completed so far has found nothing of interest in the others. I think the truth is the same as with all the other attempts, because the tablet is not rooted, the information I want is not available to me. Scandalous, really. -- Fake news kills! I may be contacted via the contact address given on my website: www.macfh.co.uk