[Q] Application Security Policy Settings "Defined" - Non-Touchscreen Windows Mobile Other
Windows Mobile powered devices are shipped with default security settings.
The security model enables Mobile Operators to make post-production changes to security settings.
This can place significant restrictions on software which has not been signed and approved.
However you can change the default settings.
Take control of applications on your phone.
"All listed settings are decimal"
1. Connect the phone through ActiveSync.
2. Run your favorite remote registry editor "CeRegEditor (Download)" "Mobile Registry Editor (Download)" on your PC.
3. Navigate to HKEY_LOCAL_MACHINE\Security\Policies\Policies
RAPI Policy:
This setting restricts the access of remote applications that are using Remote API (RAPI) to implement ActiveSync operations
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001001 Data = Use the following-->
0 = Indicates that the ActiveSync service is shut down. RAPI calls are rejected.
1 = Indicates full access to ActiveSync is provided. RAPI calls are allowed to process without restrictions.
2 = Indicates that access to ActiveSync is restricted to the SECROLE_USER_AUTH (User Authenticated) role. RAPI calls are checked against this role mask before they are granted.
Unsigned cabs role:
If this policy is set to 0, then unsigned CABs won't install. The typical role is UserAuth which means the CABs will install but they have a similar set of privileges as code running at the Normal level. If this policy is set to Manager, then the unsigned CABs have all privileges.
None: Is equivalent to having none of the role mask bits set, and means that no unsigned .cab files can be installed.
OEM: Equipment manufacturer role.
Operator: Settings can be changed by the mobile operator.
Operator-TPS: Settings can be changed by a Wireless Application Protocol (WAP) Trusted Provisioning Server (TPS).
Manager: Provides permissions to change all of the settings on the device.
UserAuth: Settings can be changed by an authenticated user.
UserUnAuth: Settings can be changed by anyone.
A specified role mask indicates accepted unsigned .cab files are installed with the role mask specified.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001005 Data = Use the following-->
0 = None
2 = OEM
4 = Operator
6 = OEM, Operator
8 = Manager
10 = OEM, Manager
12 = Operator, Manager
14 = OEM, Operator, Manager
16 = UserAuth
18 = OEM, UserAuth
20 = Operator, UserAuth
22 = OEM, Operator, UserAuth
24 = Manager, UserAuth
26 = OEM, Manager, UserAuth
28 = Operator, Manager, UserAuth
30 = OEM, Operator, Manager, UserAuth
64 = UserUnAuth
66 = OEM, UserUnAuth
68 = Operator, UserUnAuth
70 = OEM, Operator, UserUnAuth
72 = Manager, UserUnAuth
74 = OEM, Manager, UserUnAuth
76 = Operator, Manager, UserUnAuth
78 = OEM, Operator, Manager, UserUnAuth
80 = UserAuth, UserUnAuth
82 = OEM, UserAuth, UserUnAuth
84 = Operator, UserAuth, UserUnAuth
86 = OEM, Operator, UserAuth, UserUnAuth
88 = Manager, UserAuth, UserUnAuth
90 = OEM, Manager, UserAuth, UserUnAuth
92 = Operator, Manager, UserAuth, UserUnAuth
94 = OEM, Operator, Manager, UserAuth, UserUnAuth
128 = Operator-TPS
130 = OEM, Operator-TPS
132 = Operator, Operator-TPS
134 = OEM, Operator, Operator-TPS
136 = Manager, Operator-TPS
138 = OEM, Manager, Operator-TPS
140 = Operator, Manager, Operator-TPS
142 = OEM, Operator, Manager, Operator-TPS
144 = UserAuth, Operator-TPS
146 = OEM, UserAuth, Operator-TPS
148 = Operator, UserAuth, Operator-TPS
150 = OEM, Operator, UserAuth, Operator-TPS
152 = Manager, UserAuth, Operator-TPS
154 = OEM, Manager, UserAuth, Operator-TPS
156 = Operator, Manager, UserAuth, Operator-TPS
158 = OEM, Operator, Manager, UserAuth, Operator-TPS
192 = UserUnAuth, Operator-TPS
194 = OEM, UserUnAuth, Operator-TPS
196 = Operator, UserUnAuth, Operator-TPS
198 = OEM, Operator, UserUnAuth, Operator-TPS
200 = Manager, UserUnAuth, Operator-TPS
202 = OEM, Manager, UserUnAuth, Operator-TPS
204 = Operator, Manager, UserUnAuth, Operator-TPS
206 = OEM, Operator, Manager, UserUnAuth, Operator-TPS
208 = UserAuth, UserUnAuth, Operator-TPS
210 = OEM, UserAuth, UserUnAuth, Operator-TPS
212 = Operator, UserAuth, UserUnAuth, Operator-TPS
214 = OEM, Operator, UserAuth, UserUnAuth, Operator-TPS
216 = Manager, UserAuth, UserUnAuth, Operator-TPS
218 = OEM, Manager, UserAuth, UserUnAuth, Operator-TPS
220 = Operator, Manager, UserAuth, UserUnAuth, Operator-TPS
222 = OEM, Operator, Manager, UserAuth, UserUnAuth, Operator-TPS
Unsigned Applications Policy:
This setting indicates whether unsigned applications are allowed to run on the device. Any value other than 1 is treated as 0.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001006 Data = Use the following-->
0 = Indicates that unsigned applications are not allowed to run on the device.
1 = Indicates that unsigned applications are allowed to run on the device.
Grant Manager Policy:
This policy contains a list of roles that are elevated to manager. If this role contains "UserAuth" then every action taken by the user has full administative access.
None: Indicates that only the manager is granted the Manager role.
OEM: Equipment manufacturer role.
Operator: Setting can be changed by the mobile operator.
Operator-TPS: Settings can be changed by a Wireless Application Protocol (WAP) Trusted Provisioning Server (TPS).
Manager: Settings can be changed by the manager or administrator.
UserAuth: Settings can be changed by an authenticated user.
UserUnAuth: Settings can be changed by anyone.
A specified role mask indicates system administrative privileges are given to the role mask specified.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001017 Data = Use the following-->
0 = None
2 = OEM
4 = Operator
6 = OEM, Operator
8 = Manager
10 = OEM, Manager
12 = Operator, Manager
14 = OEM, Operator, Manager
16 = UserAuth
18 = OEM, UserAuth
20 = Operator, UserAuth
22 = OEM, Operator, UserAuth
24 = Manager, UserAuth
26 = OEM, Manager, UserAuth
28 = Operator, Manager, UserAuth
30 = OEM, Operator, Manager, UserAuth
64 = UserUnAuth
66 = OEM, UserUnAuth
68 = Operator, UserUnAuth
70 = OEM, Operator, UserUnAuth
72 = Manager, UserUnAuth
74 = OEM, Manager, UserUnAuth
76 = Operator, Manager, UserUnAuth
78 = OEM, Operator, Manager, UserUnAuth
80 = UserAuth, UserUnAuth
82 = OEM, UserAuth, UserUnAuth
84 = Operator, UserAuth, UserUnAuth
86 = OEM, Operator, UserAuth, UserUnAuth
88 = Manager, UserAuth, UserUnAuth
90 = OEM, Manager, UserAuth, UserUnAuth
92 = Operator, Manager, UserAuth, UserUnAuth
94 = OEM, Operator, Manager, UserAuth, UserUnAuth
128 = Operator-TPS
130 = OEM, Operator-TPS
132 = Operator, Operator-TPS
134 = OEM, Operator, Operator-TPS
136 = Manager, Operator-TPS
138 = OEM, Manager, Operator-TPS
140 = Operator, Manager, Operator-TPS
142 = OEM, Operator, Manager, Operator-TPS
144 = UserAuth, Operator-TPS
146 = OEM, UserAuth, Operator-TPS
148 = Operator, UserAuth, Operator-TPS
150 = OEM, Operator, UserAuth, Operator-TPS
152 = Manager, UserAuth, Operator-TPS
154 = OEM, Manager, UserAuth, Operator-TPS
156 = Operator, Manager, UserAuth, Operator-TPS
158 = OEM, Operator, Manager, UserAuth, Operator-TPS
192 = UserUnAuth, Operator-TPS
194 = OEM, UserUnAuth, Operator-TPS
196 = Operator, UserUnAuth, Operator-TPS
198 = OEM, Operator, UserUnAuth, Operator-TPS
200 = Manager, UserUnAuth, Operator-TPS
202 = OEM, Manager, UserUnAuth, Operator-TPS
204 = Operator, Manager, UserUnAuth, Operator-TPS
206 = OEM, Operator, Manager, UserUnAuth, Operator-TPS
208 = UserAuth, UserUnAuth, Operator-TPS
210 = OEM, UserAuth, UserUnAuth, Operator-TPS
212 = Operator, UserAuth, UserUnAuth, Operator-TPS
214 = OEM, Operator, UserAuth, UserUnAuth, Operator-TPS
216 = Manager, UserAuth, UserUnAuth, Operator-TPS
218 = OEM, Manager, UserAuth, UserUnAuth, Operator-TPS
220 = Operator, Manager, UserAuth, UserUnAuth, Operator-TPS
222 = OEM, Operator, Manager, UserAuth, UserUnAuth, Operator-TPS
Unsigned Prompt Policy:
This policy indicates whether the user is prompted to accept or reject unsigned .cab, theme, .dll and .exe files.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 0000101a Data = Use the following-->
0 = Indicates user will be prompted.
1 = Indicates user will not be prompted.
Privileged Apps Policy:
The Privileged Apps policy setting specifies which security model is implemented on the device. Any value other than 1 is treated as 0.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 0000101b Data = Use the following-->
0 = Two Tier: Applications run normal and cannot access the protected registry keys or protected system APIs.
1 = One Tier: Applications run privileged and can access all registry keys and all system APIs.
Password Required Policy:
This policy indicates whether a password must be configured on the device.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001023 Data = Use the following-->
0 = Indicates that a password is required.
1 = Indicates that a password is not required. "Any value other than 0 will indicate no password required".
Desktop Unlock Policy:
This policy indicates how the desktop must handle authentication when the device is locked.
HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001025 Data = Use the following-->
0 = Indicates that the user must authenticate on the device if it is locked upon connect.
1 = Indicates the user can authenticate by using a PIN on the desktop.
If you find any errors please let me know.
I will update the list as more policies are discovered
-----------(Undefined)----------
"I dont know all possible settings for the following Policies yet"
UNAUTHENTICATED role is used for processing Homescreens
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001007"=dword:40
TPS Policy
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001008"=dword:1
Message Authentication Retry Number Policy
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001009"=dword:3
WAP Signed Message Policy
(default: SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED | SECROLE_OPERATOR_TPS)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"0000100b"=dword:c80
SL Message Policy
(default: SECROLE_PPG_TRUSTED)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"0000100c"=dword:800
SI Message Policy
(default: SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"0000100d"=dword:c00
Unauthenticated Message Policy
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"0000100e"=dword:40
OTA Provisioning Policy
(default: OPERATOR_TPS | SECROLE_PPG_TRUSTED | SECROLE_PPG_AUTH | SECROLE_TRUSTED_PPG | USER_AUTH)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"0000100f"=dword:e90
WSP Push Policy
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001011"=dword:1
Grant User Auth Policy
(default: USER_AUTH)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001018"=dword:10
Trust WAP Proxy Policy
(default: OPERATOR | OPERATOR_TPS | MANAGER)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001019"=dword:8c
DRM Security Policy
(default SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED)
[HKEY_LOCAL_MACHINE\Security\Policies\Policies]
"00001021"=dword:c00
it's a wonderful post. Very thanks
or you can use Security Configuration Manager
jsp_m said:
or you can use Security Configuration Manager
Click to expand...
Click to collapse
Where is this app?
http://forum.xda-developers.com/showpost.php?p=1488298&postcount=2
great app
Woops
I accidentally changed 00001001 to the value "2"
so am i just screwed now?
Can't change it back, access denied of course.
woops
yeah i don't know what happened but i disconnected ran EnableRAPI and reconnected it was changed back to 1. whew!
jsp_m said:
http://forum.xda-developers.com/showpost.php?p=1488298&postcount=2
great app
Click to expand...
Click to collapse
The page is no more. Got another link?
onestoploser said:
The page is no more. Got another link?
Click to expand...
Click to collapse
http://download.microsoft.com/download/e/e/0/ee050170-bb0e-492a-aa9e-8f82bc2e1c5e/Setup.msi
I'm having trouble with this. Whenever I try and change any of the entries I get "access denied" Am I doing something wrong?
only on these polocies. I can edit other registry entries. All I'm trying to do is set IE as my default browser as it was shipped full of Opera reg entries.
HELP PLEASE!
DWord = 00001005
Exellent information, but can't find the value for "40" on HKEY_LOCAL_MACHINE\Security\Policies\Policies
DWord = 00001005
Which is the value or definition for "40" on DWord = 00001005?
Thanks
joebi said:
I'm having trouble with this. Whenever I try and change any of the entries I get "access denied" Am I doing something wrong?
only on these polocies. I can edit other registry entries. All I'm trying to do is set IE as my default browser as it was shipped full of Opera reg entries.
HELP PLEASE!
Click to expand...
Click to collapse
I know the post is old but I get a new smartphone and I the same pb on some registries...
Any ideas?
While I was proceeding the syncronise between my PC and my device recently, I got very frequently about "access deny" problem. I know that when I did:
# Open the following key in the tree HKEY_LOCAL_MACHINE\Security\Policies\Policies\
# Click the value 00001001 and change it to 1
and can solve the problem, but then the value of 00001001 in the following code
HKEY_LOCAL_MACHINE\Security\Policies\Policies\
automatically changed back to "2" and every time I had to change it back manually. (seems to be every startup the value will be changed)
Do you have any opinions about what have happened? Thank you for your kind instruction.
Lee
ijlee said:
While I was proceeding the syncronise between my PC and my device recently, I got very frequently about "access deny" problem. I know that when I did:
# Open the following key in the tree HKEY_LOCAL_MACHINE\Security\Policies\Policies\
# Click the value 00001001 and change it to 1
and can solve the problem, but then the value of 00001001 in the following code
HKEY_LOCAL_MACHINE\Security\Policies\Policies\
automatically changed back to "2" and every time I had to change it back manually. (seems to be every startup the value will be changed)
Do you have any opinions about what have happened? Thank you for your kind instruction.
Lee
Click to expand...
Click to collapse
It could be that the setting for this key has been setup in a persistent way by another provxml file. I suggest you load a reg file everytime the ppc boots.
Have a similar problem
Hi all,
So I tried to install android the manual way earlier today (and also the Gen.Y dual Boot) and it just hung at some point (I went to lunch and it was stuck on same screen when I come back). So I done a soft reset intending to delete/uninstall and start again.
Now I cant install any cabs what so ever so have spent the last 3 hours trying to be able to install cabs again! Even my unsigned .exe's arnt working either. So I first tried remotely editing the registry, but I'm getting access denied each time I try to change HKEY_LOCAL_MACHINE\Security\Policies\Policies DWord = 00001001 to "1" instead, and in fact I cannot edit any keys in that subentry of Policies.
So I downloaded security configuration manager in a hope to do it that way, but it tries to load a cab file over when you try and make the change so that doesn't work either. So then i thought about signing a cab using the same program, but you need visual studio and a program called signtool.exe which i cant find anywhere on the internet.
I really reallllyyy don't want to hard reset my htc touch pro, I've never had to and don't intend on doing it now! Can anyone suggest where I can find that program or another way to unlock the security settings? Really need some more experienced advice on this and would be greatly appreciative of it
Related
Will this make G.729 work on WM6?
Hi i currently have the WM6.1 in built client working with my SIP server the G711u codec works fine over HSPA but im curious to know if given G.729 would calls over GPRS be possible? Which bring me onto the main point If added to the registry and the codec placed in the approperate directory would this enable G.729 as a codec for the WM6.1 VoIP client: ; Configure ACM_G729 FormatTag ; Note that G729 frame_duration = 20ms in this example [HKEY_LOCAL_MACHINE\Comm\RTC\ACM\G729] "PayloadType" = dword:12 "FrameDuration" = dword:A "CodecRank" = dword:1 "Driver" = "g729.acm" [HKEY_LOCAL_MACHINE\Comm\RTC\ACM\G729\WaveFormat] "FormatTag" = dword:44 "Channels" = dword:1 "SamplesPerSec" = dword:1F40 "AvgBytesPerSec" = dword:3E8 "BlockAlign" = dword:A "BitsPerSample" = dword:0 "bSize" = dword:2 ; Configure ACM_G729 Prefix [HKEY_LOCAL_MACHINE\Drivers\BuiltIn\CODEC_G729] "Prefix"="ACM" "Dll"="g729.acm" ; Cofigure Codec Preference and for path: [HKEY_LOCAL_MACHINE\Comm\RTC\Codec] "PreferredAudioCodec"=dword:12 ; 0=pcmu, 12=729 "UsePreferredCodec"=dword:1 came from: http://msdn.microsoft.com/en-us/library/aa924754.aspx Thanks Dphi
dphiance said: Hi i currently have the WM6.1 in built client working with my SIP server the G711u codec works fine over HSPA but im curious to know if given G.729 would calls over GPRS be possible? Which bring me onto the main point If added to the registry and the codec placed in the approperate directory would this enable G.729 as a codec for the WM6.1 VoIP client: ; Configure ACM_G729 FormatTag ; Note that G729 frame_duration = 20ms in this example [HKEY_LOCAL_MACHINE\Comm\RTC\ACM\G729] "PayloadType" = dword:12 "FrameDuration" = dword:A "CodecRank" = dword:1 "Driver" = "g729.acm" [HKEY_LOCAL_MACHINE\Comm\RTC\ACM\G729\WaveFormat] "FormatTag" = dword:44 "Channels" = dword:1 "SamplesPerSec" = dword:1F40 "AvgBytesPerSec" = dword:3E8 "BlockAlign" = dword:A "BitsPerSample" = dword:0 "bSize" = dword:2 ; Configure ACM_G729 Prefix [HKEY_LOCAL_MACHINE\Drivers\BuiltIn\CODEC_G729] "Prefix"="ACM" "Dll"="g729.acm" ; Cofigure Codec Preference and for path: [HKEY_LOCAL_MACHINE\Comm\RTC\Codec] "PreferredAudioCodec"=dword:12 ; 0=pcmu, 12=729 "UsePreferredCodec"=dword:1 came from: http://msdn.microsoft.com/en-us/library/aa924754.aspx Thanks Dphi Click to expand... Click to collapse Maybe, if you have a g729.acm build for ARM/PocketPC. Do you?
HTC Serial Numbers decoded
Everybody knows those nice serials you can use to download ROMs from HTC. After some research about the serial numbers, here is how they are built : 2008 Serial Numbers : Code: HTUWWYYZZZZZ HT = Vendor HTC U = Year (8 = 2008) WW = Week in a year YY = Part Code ZZZZZ : Identification Number (decimal) 2009 Serial Numbers : Code: HTYMDAABBBBB HT = Vendor HTC Y = Year (9 = 2009) M = Month (hex 1...C = 1 - 12 months) D = Day (hex 1...9A..Z = 1 - 31 days) YY = Part Code ZZZZZ : Identification Number (decimal) Part Codes : Code: G3 = Sedna G6 = Elfin GH = Elf K0 = Raphael KW = Raphael C K7 = Victor EZ = Breeze GN = Diamond KT = Diamond MDA BE = Prophet EW = Prophet/PM300 F2 = Hermes D6 = Blue Angel GZ = Dream FM = Athena 6G = Kaiser G8 = Kaiser/Tytn II DB = Typhoon F2 = Melbourne/Census BD = Charmer N1 = Snap L1 = Topaz NW = Leo LL = Rhodium KD = Blackstone GE = Polaris KH = Jade FS = Herald FK = Trinity EE = Wizard GC = Nike KN = Quartz KF = Sapphire HL = Supersonic If you find further part codes not listed above, feel free to add them Cya, Viper BJK
My Touch Pro's part is "KW" (RAPH101)
Thanks .... is it a branded one ?
Nope, HTC Touch Pro T7274, with American 3G.
Update : Supersonic added
PL is the Code for Desire HT041 means first april 2010?
Very interesting...
Don't mean to bring that back up but were having some trouble decoding the numbers on our Thunderbolts.. 1-9 a-z = 35 days ... were trying to make a database of the dates phones were made for bricking... if you have any insight on this please help.
Interesting Very interesting indeed
viperbjk said: Everybody knows those nice serials you can use to download ROMs from HTC. After some research about the serial numbers, here is how they are built : 2008 Serial Numbers : Code: HTUWWYYZZZZZ HT = Vendor HTC U = Year (8 = 2008) WW = Week in a year YY = Part Code ZZZZZ : Identification Number (decimal) 2009 Serial Numbers : Code: HTYMDAABBBBB HT = Vendor HTC Y = Year (9 = 2009) M = Month (hex 1...C = 1 - 12 months) D = Day (hex 1...9A..Z = 1 - 31 days) YY = Part Code ZZZZZ : Identification Number (decimal) Part Codes : Code: G3 = Sedna G6 = Elfin GH = Elf K0 = Raphael KW = Raphael C K7 = Victor EZ = Breeze GN = Diamond KT = Diamond MDA BE = Prophet EW = Prophet/PM300 F2 = Hermes D6 = Blue Angel GZ = Dream FM = Athena 6G = Kaiser G8 = Kaiser/Tytn II DB = Typhoon F2 = Melbourne/Census BD = Charmer N1 = Snap L1 = Topaz NW = Leo LL = Rhodium KD = Blackstone GE = Polaris KH = Jade FS = Herald FK = Trinity EE = Wizard GC = Nike KN = Quartz KF = Sapphire HL = Supersonic If you find further part codes not listed above, feel free to add them Cya, Viper BJK Click to expand... Click to collapse for ZZZZZ it it was found that actually it is "CC-ZZZ" CC is for country code i only know that 46 = Germany 37 = Dubai Please add more country codes...
The first two characters actually mean the place of manufacture. SZ = Shenzhen, China SH = Shanghai, China HT = Hsinchu, Taiwan CH = Wuhan, China A pic of a HTC Desire made in Shanghai can be found here: http://www.rei3.com/archives/8416.html
The Shooter's (CDMA Evo 3D's) part code is HX
That's cool info. Thanks for the insight guys. Sent from my Transformer TF101 using Tapatalk
good info))) would have to look over and add it)))
MB139PK41124???
my Serial starts with FA does anyone know where this might be? while one i bought for my partner is HT
WindowsLiveMessenger.apk - MSN
Hi all. I search for an MSN Messenger full HTTP (for WAP connexion) on my smartphone. No thanks for HiMSN or other, I don't and never enter my account on his website. I find an WindowsLiveMessenger.apk, and when I docompact it I found, it's probably work only on Bytel network. I'm on SFR. See the file : /WindowsLiveMessenger.apk/res/raw/app_param.txt Code: #Application Parameter URL #---URL--- GATE DEMO http://85.31.202.156:80/appparam/sanity_all #protocol = http #URL = 85.31.202.156 #port = 80 #path = /appparam/sanity_all #Emulo /wifi #protocol = http #URL = 10.20.20.7 #port = 31000 #path = /pub/nocir #Tel #protocol = http #URL = 85.31.202.155 #port = 80 #path = /pub #PPE bytel #protocol = http #URL = sb01.qnitabxn.mpit.ppe.miyowa.net #port = 80 #path = / #Special QA #protocol = http #URL = 85.31.202.155 #port = 80 #path = /qandroid #Prod Bytel protocol = http URL = sb01.qnitabxn.mpit.prd.miyowa.net port = 80 path = / # 3UK chez eux phase 2 #protocol = http #URL = mobile.three.co.uk #port = 80 #path = /966_accs/android/cir/ #Prod 3 phase 1 #protocol = http #URL = sb01.iwgttjcx.mpit.prd.miyowa.net #port = 80 #path = / #PPE 3 phase 1 #protocol = http #URL = sb01.iwgttjcx.mpit.ppe.miyowa.net #port = 80 #path = / #PPE NRJ #protocol = http #URL = msnnrjppe.miyowa.net #port = 80 #path = /it5/pub #Prod NRJ #protocol = http #URL = msnnrjpr.miyowa.net #port = 80 #path = /pub/ #TEST CHAMPI #protocol = http #URL = sb01.qpzgxtbx.mpit.ppe.miyowa.net #port = 80 #path = / #TEST SMS CIR 3UK #protocol = http #URL = 85.31.202.155 #port = 80 #path = /pub #Application Parameter parameters #---PARAMETERS--- #PhoneID = brand_model #PhoneID = Samsung_I7500 #PhoneID = Bravo # Phone ID = Version OS, Nom du mobile (I7500) ApplicationID = IT5_Miyowa_3.01 Version = 0.2 Language = FRA DeviceID = Android #Application Parameter header HTML #---HEADERS--- OsVersion = 1.5 Content-Type = application/x-www-form-urlencoded connection = close ### Emulateur ### #MSISDN_KEY = msisdn,X-Up-Calling-Line-Id ### Bytel ### #MSISDN_KEY = msisdn,X-Msid ### 3UK not use in phase 2 ### #MSISDN_KEY = X-NMCA-IDENTITY #TEST CHAMPI #MSISDN_KEY = X_MIYO_IMSI #MSISDN_VALUE = QOS7777 #MSISDN_VALUE = 00447853082623 #MSISDN_VALUE = zte Roaming-Test = true #Roaming-Test = false test-is-using-3G = true #test-is-using-3G = false #show-stay-alerted = true show-stay-alerted = false RessourcesLanguage = FR typeofoffer = A X-Nokia-BEARER = UMTS roamingoutflag = 0 #Informations MaxPDU = 16384 FileEncondingType = 0 ApplicationVersion = 0.2.33.0 IS_BIG_SCREEN = true #IS_BIG_SCREEN = false #SHOW_POPUP_FIRST_SIGN_IN = true SHOW_POPUP_FIRST_SIGN_IN = false #SHOW_TABS_IN_LANDSCAPE_MODE = true SHOW_TABS_IN_LANDSCAPE_MODE = false #TestMCCMNC = true TestMCCMNC = false #3UK MCC - MNC MCCMNC = 23420,23410,23433,27205,24002,24004,23806,22299,23210,50506,45403,23594 Do you meen hack this APK to connect to MSN with any phone operators ? Or do you know and MSN client full HTTP, and I don't must to register my account on a stupid website ? Thanks.
Why on earth, would you rather use the web version than the HiMSN? As far as I have experienced, HIMsn/MSNTalk works just fine. Is there some reason, why you would not like to use an app from the market?
May you share wth us..i mean im searchin a WindowsLiveMessenger .apk non-javabased version..n cud not find yet...cuz dunno why java based one doesnt work ..cannot connect da server..i need a regular apk as windows live...
[DEV][TUTORIAL] How to poll GPIO values from Haret
In case you need to know how to poll GPIO values from photon, here is a small how-to: First of all, read THIS: http://htc-linux.org/wiki/index.php?title=HaRET_Documentation#Polling_GPIOs To disable automatic launch of Android when you execute HarET, you must rename your file "startup.txt" to "default.txt" The issue is, when you poll for GPIOs with Haret, you got a numeric value that does not match with GPIOs in Linux (board-photon.h) To translate "HarET GPIO" to "Linux GPIO", here is a trick: Haret gives you this line: 009.179 GPIOS 92f00808(117)=300100 Click to expand... Click to collapse Take the number between parenthesis: 117 Divide it by 32: 117/32 = 3, rest = 21 3 is the GPIO bank: bank0 = 0 to 15 bank1 = 16 to 42 bank2 = 43 to 67 bank3 = 68 to 94 bank4 = 95 to 106 bank5 = 107 to 121 in our example, bank3 starts at value 68, so the Linux GPIO is: 68 + 21(rest of division) = 89 note: if the bank number is higher than 5, it means it is the following bank, or the one after. in this case, remove 6 or 12 to the bank number so you have a value between 0 and 5, and do the normal computation.
I must to say THANK YOU!
hmm I not understand (rest) I got 3,65625 (bank 3, rest 65626) r0bin said: 117/32 = 3, rest = 21 Click to expand... Click to collapse Also next situation: 057.215 GPIOS 92f0083c(313)=61c8102 9,78125 (bank 9, rest 78125)
munjeni said: hmm I not understand (rest) I got 3,65625 (bank 3, rest 65626) Also next situation: 057.215 GPIOS 92f0083c(313)=61c8102 9,78125 (bank 9, rest 78125) Click to expand... Click to collapse lol on my sample, another way to say it: 117/32 = (3 * 32) + 21 or: 117/32 = 3.65625, you take the 3, rest 0.65625 * 32 = 21 in your case: 303/32 = 9.78125, you take the 9, rest 0.78125 * 32 = 25 9 is too big, remove 6 => it's bank3 bank3 = 68+25 = 93 in board-photon.h, it is defined like: LIBERTY_GPIO_LS_EN 93 in the code (board-photon.c) it seems it's the GPIO for power
thanks, understand now \o/
Hi, I got slightly different format for GPIOS. Please refer to here http://pastebin.com/xr4p3cd8 How to I convert them? Thanks in advance
Automates patcher tool
Hi, I've been looking for a tool or script to replace hex sequence in binary file in Windows. Indeed, i found this script : Code: Imports System.Runtime.CompilerServices Imports System.IO Public Class FinduReplaceHex Private Shared ReadOnly FindHex As Byte() = {&H75, &HF6, &HF3} Private Shared ReadOnly ReplaceHex As Byte() = {&HA2, &HE3, &H4B} <MethodImpl(MethodImplOptions.NoInlining)> Private Shared Function DP(sequence As Byte(), position As Integer) As Boolean If position + FindHex.Length > sequence.Length Then Return False End If For i As Integer = 0 To FindHex.Length - 1 If FindHex(i) <> sequence(position + i) Then Return False End If Next Return True End Function Private Sub Patch_Click(sender As Object, e As EventArgs) Handles Patch.Click Dim DT As String = Environment.GetFolderPath(Environment.SpecialFolder.Desktop) Dim FD As Byte() = File.ReadAllBytes(DT & "\App.dll") For F As Integer = 0 To FD.Length - 1 If Not DP(FD, F) Then Continue For End If For R As Integer = 0 To FindHex.Length - 1 FD(F + R) = ReplaceHex® Next Next If System.IO.File.Exists(DT & "\App.dll") Then System.IO.File.Move(DT & "\App.dll", DT & "\App.dll.backup") File.WriteAllBytes(DT & "\App Method 3.dll", FD) Else 'Write Other Codes End If End Sub End Class The only problem is that I want to be able to use wildcards like this : Search for F4 B3 ?? 12 and replace F4 BE 65 EA Thanks in advance