Help
RSS
API
Feed
Maltego
Contact
Domain > zarroboogs.org
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-04-01
65.98.90.4
(
ClassC
)
2025-02-07
39.105.196.57
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Mon, 18 Dec 2023 16:45:06 GMTServer: Apache/2.4.37 (Alibaba Cloud Linux) OpenSSL/1.1.1k mod_perl/2.0.12 Perl/v5.26.3Last-Modified: Fri, 06 Oct 2023 11:26:28 GMTETag: 60ee-6070a82e !DOCTYPE html>html>head>meta charsetutf-8>meta http-equivX-UA-Compatible contentIEedge>meta nameviewport contentwidthdevice-width, initial-scale1>link relalternative href/atom.xml titleandforce typeapplication/atom+xml>link relicon href/favicon.png>title>andforce/title>link relstylesheet href/css/main.css typetext/css>!--if lt IE 9>script>(function(a,b){aabbr article aside audio bdi canvas data datalist details dialog figcaption figure footer header hgroup main mark meter nav output progress section summary template time video.split( );for(ba.length-1;b>0;b--)document.createElement(ab)})()/script>!endif-->/head>body>header classhead>h1 classhead-title u-fl>a href/>andforce/a>/h1> nav classhead-nav u-fr> ul classhead-nav__list> li classhead-nav__item>a href/archives classhead-nav__link>文章/a>/li>/ul>/nav>/header>main classmain>article classpost>header classpost__head>time datetime2015-10-21T10:45:52.000Z classpost__time>October 21, 2015/time>h1 classpost__title>a href/2015/10/21/android-usb-devices/>android_usb_devices/a>/h1>hr/>/header>div classpost__main echo>p>有时候android设备链接到电脑的时候会显示code>error:insufficient permissions for device/code>,解决方法就是在code>/etc/udev/rules.d/51-android.rules/code> 加入设备的code>idVender/code>和code>idProduct/code>,于是就有了下面这个自动添加的脚本.br>figure classhighlight>table>tr>td classcode>pre>span classline>#!/bin/bash RULES/etc/udev/rules.d/51-android.rules TMP_USB_1tmp_usb_1 TMP_USB_2tmp_usb_2 TMP_USBdiff_usb echo -n "请把手机链接电脑后,按回车:" read user_input lsusb > $TMP_USB_1 cat -n $TMP_USB_1 echo -n "请把手机拔掉后,按回车:" read user_input lsusb > $TMP_USB_2 cat -n $TMP_USB_2 diff $TMP_USB_1 $TMP_USB_2 > $TMP_USB diff_usb_str`sed -n '2p' $TMP_USB` #echo
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]