All language subtitles for 0007 Android Debug Bridge.en--- [ FreeCourseWeb.com ] ---

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French Download
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,190 --> 00:00:17,080 So we are now on the Android Bridge tutorial, so of course, it is a highly versatile command line 2 00:00:17,080 --> 00:00:18,910 to the LSU communicative device. 3 00:00:18,910 --> 00:00:22,360 So it could be any Android device running on different kind of manufacturers. 4 00:00:23,110 --> 00:00:27,340 And of course, there's a lot of actions and options for you to do and commands and features. 5 00:00:27,720 --> 00:00:33,130 You can run directly from your computer terminal all the way, injecting instructions into the mobile 6 00:00:33,130 --> 00:00:33,700 device. 7 00:00:34,090 --> 00:00:37,770 So, of course, there are three key components a client, a demon and a server. 8 00:00:37,780 --> 00:00:40,700 So we will go through the tutorial of all three of this. 9 00:00:41,260 --> 00:00:47,260 So make sure that your Android device is already connected into your computer using a USB line. 10 00:00:47,740 --> 00:00:52,900 So once you're in, we can actually go into terminal and all you got to do is enter EDB to make sure 11 00:00:52,900 --> 00:00:54,160 that you have 80 be installed. 12 00:00:54,730 --> 00:01:00,520 So in this case, once I hit EDB, I'll be able to see that I actually have all the commands, all the 13 00:01:01,090 --> 00:01:02,170 molecules installed. 14 00:01:02,200 --> 00:01:06,930 So when you hit EDB, it will show up to help each so you can see all the commands of it. 15 00:01:06,970 --> 00:01:09,790 So we will go through extensively on quite a number of them. 16 00:01:10,210 --> 00:01:14,250 That's really useful and helpful in terms of managing Android devices at the same time. 17 00:01:14,260 --> 00:01:18,880 Also, if you are a programmer or a developer and you want to look at what are some of the libraries 18 00:01:18,880 --> 00:01:23,750 already available on Android by default, you want to use some of the features inside the phone. 19 00:01:24,130 --> 00:01:28,720 This could really help you in accelerating the pace of understanding what's going on in the Android 20 00:01:28,720 --> 00:01:32,560 device and what you can do to actually manage those Android devices. 21 00:01:33,220 --> 00:01:38,990 So moving forward, of course, the couple of really interesting things that we will look at is on EDB. 22 00:01:39,100 --> 00:01:45,830 So once you hit EDB, enter 80 devices and this would actually show all the devices attach to your computer. 23 00:01:45,850 --> 00:01:48,280 So in this case, I got one device attached. 24 00:01:48,700 --> 00:01:54,070 And of course, once you have the device attached, you can actually go ahead and issue commands into 25 00:01:54,070 --> 00:01:56,470 the Android device once it is connected. 26 00:01:57,010 --> 00:02:04,150 So one of the commands that we can actually use is to actually look at what are some of the information 27 00:02:04,150 --> 00:02:06,690 on a shell that we want to put into the system. 28 00:02:06,700 --> 00:02:11,320 So when we enter ATV Shell, this would actually bring us into the Android device. 29 00:02:11,650 --> 00:02:17,650 And when we enter, say, Shell, we can see that we can see all the directories subdirectories inside 30 00:02:18,070 --> 00:02:19,480 the existing working directory. 31 00:02:19,480 --> 00:02:20,770 So we enter PWI. 32 00:02:21,280 --> 00:02:27,090 So as I have mentioned in many tutorials, Android device is like a Linux Fabián, all the distribution. 33 00:02:27,400 --> 00:02:29,560 A lot of the commands actually come out of box swivet. 34 00:02:29,860 --> 00:02:36,700 So let's say we enter into CDG Corot, we can enter SSL so we can see all the information here, all 35 00:02:36,700 --> 00:02:37,650 the subdirectories. 36 00:02:38,050 --> 00:02:44,110 So even on the left side, you could see that this is an indication of directory, the right access 37 00:02:44,110 --> 00:02:51,010 and the ability for you to look at owner, group and others in terms of the permissions to execute, 38 00:02:51,010 --> 00:02:53,960 to read and to write into those subdirectories and false. 39 00:02:54,280 --> 00:02:55,510 So this is really helpful. 40 00:02:55,510 --> 00:02:59,580 And if you want to see all the lists of commands said, you can actually use it. 41 00:02:59,590 --> 00:03:05,010 You can enter EDB, followed by Shell else on system again. 42 00:03:05,890 --> 00:03:10,730 So this will list out all the comments that you can actually issue inside your Android device. 43 00:03:10,750 --> 00:03:12,040 So this is really helpful. 44 00:03:12,310 --> 00:03:16,510 And in future, Tutorial will actually look at how we could start up services so we could actually kind 45 00:03:16,510 --> 00:03:21,040 of convert your Android device into a server and a server could run multiple services. 46 00:03:21,400 --> 00:03:26,810 And if you see some of the commands that we can see here directly, we will be able to see a lot of 47 00:03:26,980 --> 00:03:28,120 key capabilities. 48 00:03:28,120 --> 00:03:33,690 And one really important window would be using a lot in future tutorials would actually be on that cat. 49 00:03:34,060 --> 00:03:36,800 So on that cat is available over here, as you can see. 50 00:03:36,910 --> 00:03:42,220 So in that cat is going to be one of those commands they'll be using to build up services to interact 51 00:03:42,220 --> 00:03:46,940 separately from the Android device debugger or Android debug breach. 52 00:03:47,320 --> 00:03:51,580 And over here, it is a lot of other capabilities that you can look at in terms of managing the Android 53 00:03:51,580 --> 00:03:52,060 device. 54 00:03:52,900 --> 00:03:53,870 So moving forward. 55 00:03:53,890 --> 00:03:57,610 We also want to think about how else we can actually manage the Android device. 56 00:03:57,620 --> 00:04:04,000 So there is a activity manager to so activity manager can actually help us see what are some of the 57 00:04:04,000 --> 00:04:07,750 information running inside the system and we can monitor and so on. 58 00:04:07,780 --> 00:04:14,770 So all you've got to do is actually enter EDB, Shell Ádám and follow by all the other commands that 59 00:04:14,770 --> 00:04:15,700 you can see from here. 60 00:04:16,060 --> 00:04:20,520 So here we can actually see what are the items that you can key in Siyam. 61 00:04:20,530 --> 00:04:27,040 So it is a activity monitor so we can look at Profile Dume Hip and so on, profile start and all these 62 00:04:27,040 --> 00:04:32,890 other capabilities to actually help us manage some of these services or activities inside the Android 63 00:04:32,890 --> 00:04:33,400 device. 64 00:04:33,820 --> 00:04:39,160 So of course, moving forward, we will also be looking at RPM, which is a package manager. 65 00:04:39,160 --> 00:04:46,360 So I go do enter EDB, Shell p.m. and of course you can enter Lisse packages and when you enter these 66 00:04:46,370 --> 00:04:50,140 packages, it will list all the packages currently inside the Android device. 67 00:04:50,590 --> 00:04:57,210 So of course we got some song, we got the Google, we got a lot of other information, we got captive 68 00:04:57,220 --> 00:04:58,800 portal login and so on. 69 00:04:59,260 --> 00:05:00,460 So all these are the packages. 70 00:05:00,460 --> 00:05:01,540 They're already available. 71 00:05:01,540 --> 00:05:03,880 Incyte, your Android mobile device. 72 00:05:04,120 --> 00:05:06,340 And of course, we can also look at permissions. 73 00:05:06,340 --> 00:05:07,420 We can list features. 74 00:05:07,420 --> 00:05:11,530 So instead of listing packages, we can enter list features to see what are some of. 75 00:05:11,630 --> 00:05:17,150 Features is available inside your Android device, and when you're coding a mobile application, you 76 00:05:17,150 --> 00:05:23,690 can actually see or use like fingerprint motion recognition and so on as part of your mobile application 77 00:05:23,690 --> 00:05:24,300 development. 78 00:05:24,590 --> 00:05:29,390 So, you know, the majority of Android devices would have such features available and you can call 79 00:05:29,400 --> 00:05:33,180 them out in your mobile application, like likewise for libraries. 80 00:05:33,200 --> 00:05:37,760 So when the list libraries, we can actually see what are the libraries available that we can actually 81 00:05:37,760 --> 00:05:40,590 leverage on as you build your mobile application. 82 00:05:40,610 --> 00:05:45,910 So over here we can see like keast or camera and so on and rotation. 83 00:05:46,160 --> 00:05:51,350 So all these are actually really important, helping you find out more about how you can manage many 84 00:05:51,350 --> 00:05:55,020 of this libraries and, of course, moving forward. 85 00:05:55,070 --> 00:05:57,610 We can also look at the device policy manager. 86 00:05:57,980 --> 00:06:00,980 So when we enter EDB Shell, followed by BPM. 87 00:06:00,990 --> 00:06:03,100 So this is the device policy manager. 88 00:06:03,530 --> 00:06:05,370 And of course there are specific policies. 89 00:06:05,370 --> 00:06:09,660 So I'm not going to change any of the policies inside my current current mobile device. 90 00:06:09,680 --> 00:06:14,700 So here we can see we can set the active Etman device owner, profile owner and so on. 91 00:06:15,020 --> 00:06:19,520 So again, do try them out or if you want to look at security locks for security locks and you'll be 92 00:06:19,520 --> 00:06:23,150 able to retrieve all the security locks directly inside a mobile device. 93 00:06:23,840 --> 00:06:29,150 And of course, that's also a key capability in terms of thinking a screen cap. 94 00:06:29,150 --> 00:06:34,910 So all you gotta do is after Shell EDB shell screen cap and we can say we want to put the screen cap 95 00:06:35,690 --> 00:06:41,480 inside SD card so we can put SD card and we can call a screen cap. 96 00:06:43,220 --> 00:06:47,870 So I want you to do this deal with take a screenshot of the screen currently and we can actually do 97 00:06:47,870 --> 00:06:56,540 a pull off the fall so we can enter pull SD card, screen cap PMG. 98 00:06:56,660 --> 00:07:01,070 So once you hit that Adibi pool, this would actually download a file directly into your desktop or 99 00:07:01,070 --> 00:07:02,180 your current working directory. 100 00:07:02,660 --> 00:07:04,630 So here we can see that the file is empty. 101 00:07:05,000 --> 00:07:08,280 So which means that it is actually a blang, it's a lock screen. 102 00:07:08,300 --> 00:07:10,100 So what I can do is that can I do it again? 103 00:07:10,370 --> 00:07:11,840 But this time I'll lock the phone. 104 00:07:12,200 --> 00:07:15,290 And once I unlock the phone, all I got to do is issue to come down again. 105 00:07:15,680 --> 00:07:18,650 And once I got a command, I can actually do a pool game. 106 00:07:18,920 --> 00:07:21,890 And of course, here we can actually do a pool. 107 00:07:22,160 --> 00:07:25,400 And of course, this time round I can do a pool and we can update a file again. 108 00:07:25,410 --> 00:07:29,510 And in this case, once I open it up, I can see that we got a screen capture directly. 109 00:07:30,230 --> 00:07:33,260 So this is some of the ways that you can actually manage the Android device. 110 00:07:33,620 --> 00:07:37,340 And this is it for a basic tutorial on Android Duboc Breech. 111 00:07:37,340 --> 00:07:39,500 So I'll do like Surance. 112 00:07:39,500 --> 00:07:43,880 Subscribe to the channel so that you can be kept abreast of all the upcoming exciting videos that we 113 00:07:43,880 --> 00:07:44,960 have running for you. 12541

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.