Android Secret Security Codes You Need to Know
Android users can access hidden settings using secret security codes for tasks like wiping the device, running diagnostics, checking hardware info, and more. Caution is advised to prevent performance issues.
Read original articleAndroid users can access hidden settings and perform various actions using secret security codes. These codes can help with tasks like wiping the device, running diagnostics, checking hardware information, and more. For instance, *2767*3855# wipes the device and reinstalls firmware, while *#*#7780#*#* resets the device to factory settings. Users can also check the device's IMEI with *#06# and run a GPS test with *#*#1472365#*#*. Additionally, codes like *#*#4636#*#* provide battery and Wi-Fi information, and *#*#34971539#*#* offers details about the camera. These codes can be useful for troubleshooting, ensuring security, and protecting data on Android devices. It's recommended to use them cautiously and avoid making changes that could worsen device performance.
Related
Spending 3 months investigating a 7-year old bug and fixing it in 1 line of code
A developer fixed a seven-year-old bug in an iPad accessory causing missed MIDI messages by optimizing a modulo operation. The bug's resolution improved the audio processor's efficiency significantly.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
Before Smartphones, an Army of Real People Helped You Find Stuff on Google
Before smartphones, human-powered services like GOOG-411, 118 118, and AQA provided information. They declined with cheaper data plans, giving way to automated search engines, missing the personal touch and unique responses.
Porting Python to a $3 smartwatch [video]
A YouTube video reviews the M4 wristband smartwatch, noting limited features and performance issues. The creator disassembles a fitness tracker, demonstrating circuit board construction, soldering challenges, and project outcomes.
XZ backdoor: Hook analysis
Kaspersky experts analyzed the XZ backdoor in OpenSSH 9.7p1, revealing hidden connections, SSH authentication bypass, and remote code execution capabilities. The backdoor manipulates RSA keys, uses steganography, and executes commands.
Every vendor has its own set, and to discover yours the easiest method is to check their engineering app manifests (there is literally an entry called "secret code" or similar).
Having said that, the only one you might really need IMHO is ##4636## (this is an Android one, it's not vendor specific). This code is very useful in csse you want to select a specific RAT that isn't available in the device settings (e.g: NR only, LTE only, NR/LTE, ...)
I know there's other paths to doing this, but they involve wires and more time than I'm willing to spend soldering and downloading weird software from people with non-Roman characters in their discord handles.
Related
Spending 3 months investigating a 7-year old bug and fixing it in 1 line of code
A developer fixed a seven-year-old bug in an iPad accessory causing missed MIDI messages by optimizing a modulo operation. The bug's resolution improved the audio processor's efficiency significantly.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
Before Smartphones, an Army of Real People Helped You Find Stuff on Google
Before smartphones, human-powered services like GOOG-411, 118 118, and AQA provided information. They declined with cheaper data plans, giving way to automated search engines, missing the personal touch and unique responses.
Porting Python to a $3 smartwatch [video]
A YouTube video reviews the M4 wristband smartwatch, noting limited features and performance issues. The creator disassembles a fitness tracker, demonstrating circuit board construction, soldering challenges, and project outcomes.
XZ backdoor: Hook analysis
Kaspersky experts analyzed the XZ backdoor in OpenSSH 9.7p1, revealing hidden connections, SSH authentication bypass, and remote code execution capabilities. The backdoor manipulates RSA keys, uses steganography, and executes commands.