<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mustafa El-Helbawy</title>
    <description>The latest articles on DEV Community by Mustafa El-Helbawy (@mustafaelhelbawy).</description>
    <link>https://dev.to/mustafaelhelbawy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F424421%2Ff2d70067-63b1-4c4b-a5fb-c6e1fd2b5643.jpeg</url>
      <title>DEV Community: Mustafa El-Helbawy</title>
      <link>https://dev.to/mustafaelhelbawy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mustafaelhelbawy"/>
    <language>en</language>
    <item>
      <title>How I Removed Persistent Adware Pop-Ups from Android Phone Without a Factory Reset</title>
      <dc:creator>Mustafa El-Helbawy</dc:creator>
      <pubDate>Tue, 21 Oct 2025 16:28:53 +0000</pubDate>
      <link>https://dev.to/mustafaelhelbawy/how-i-removed-persistent-adware-pop-ups-from-my-samsung-phone-without-a-factory-reset-1g5p</link>
      <guid>https://dev.to/mustafaelhelbawy/how-i-removed-persistent-adware-pop-ups-from-my-samsung-phone-without-a-factory-reset-1g5p</guid>
      <description>&lt;h2&gt;
  
  
  🔧 How I Removed Persistent Adware Pop-Ups from Android Phone Without a Factory Reset
&lt;/h2&gt;

&lt;p&gt;If your Android phone (especially Samsung Galaxy devices) suddenly starts showing &lt;strong&gt;random app download ads&lt;/strong&gt; or &lt;strong&gt;popup banners&lt;/strong&gt; even when idle, you might be dealing with &lt;strong&gt;hidden adware&lt;/strong&gt;.  &lt;/p&gt;

&lt;p&gt;This guide walks you through how I diagnosed and removed a hidden malicious app — &lt;strong&gt;without performing a factory reset or losing any data&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛠️ Step 0: Validate the Issue in Safe Mode
&lt;/h2&gt;

&lt;p&gt;Before suspecting system corruption or malware, first confirm if the problem is caused by a third-party app.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hold the &lt;strong&gt;Power button&lt;/strong&gt; on your Samsung phone.
&lt;/li&gt;
&lt;li&gt;Tap and hold &lt;strong&gt;Power off&lt;/strong&gt; until &lt;strong&gt;Safe mode&lt;/strong&gt; appears.
&lt;/li&gt;
&lt;li&gt;Tap &lt;strong&gt;Safe mode&lt;/strong&gt; to reboot.
&lt;/li&gt;
&lt;li&gt;Observe for 15–30 minutes:

&lt;ul&gt;
&lt;li&gt;✅ &lt;strong&gt;If ads disappear&lt;/strong&gt;, the issue comes from an installed app.
&lt;/li&gt;
&lt;li&gt;⚠️ &lt;strong&gt;If they persist&lt;/strong&gt;, it could be a deeper system issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If the ads stop in Safe Mode, you can safely continue to the ADB-based cleanup.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧭 Step 1: Preparation
&lt;/h2&gt;

&lt;h4&gt;
  
  
  1. Enable Developer Options
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Settings → About phone → Software information&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Tap &lt;strong&gt;Build number&lt;/strong&gt; 7 times until you see “You are now a developer!”&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  2. Enable USB Debugging
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Settings → Developer options → USB debugging → Enable&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  3. Install the Required Tools on Your Computer
&lt;/h4&gt;

&lt;p&gt;You’ll need two tools to connect ADB:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Android SDK Platform Tools (ADB &amp;amp; Fastboot)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
👉 &lt;a href="https://developer.android.com/tools/releases/platform-tools" rel="noopener noreferrer"&gt;https://developer.android.com/tools/releases/platform-tools&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Samsung USB Driver (for Windows users)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
👉 &lt;a href="https://developer.samsung.com/android-usb-driver" rel="noopener noreferrer"&gt;https://developer.samsung.com/android-usb-driver&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Extract the Platform Tools ZIP (e.g., &lt;code&gt;C:\platform-tools&lt;/code&gt;) and install the Samsung driver.&lt;/p&gt;

&lt;h4&gt;
  
  
  4. Connect the phone via USB
&lt;/h4&gt;

&lt;p&gt;When prompted on your phone, &lt;strong&gt;allow USB debugging&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧩 Step 2: Verify the Connection
&lt;/h2&gt;

&lt;p&gt;Run the following command in the Platform Tools directory:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb devices
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If you see a serial number, the device is connected successfully.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 Step 3: List Installed Apps
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm list packages -3
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This lists all user-installed apps.&lt;/p&gt;

&lt;p&gt;Search for suspicious packages (e.g., containing “ad”, “service”, “update”, etc.):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm list packages | findstr /i ad
adb shell pm list packages | findstr /i service
adb shell pm list packages | findstr /i update
adb shell pm list packages | findstr /i folder
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  🕵️ Step 4: Identify the Pop-Up Source
&lt;/h2&gt;

&lt;p&gt;When an ad appears, run:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell dumpsys window | findstr mCurrentFocus
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command reveals which app’s window is currently displayed.&lt;br&gt;
Example output that identifies the offender:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mCurrentFocus=Window{... u0 my.tasks.mtt/com.mbridge.msdk.reward.player.MBRewardVideoActivity}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The above output indicates the pop-ups were coming from the app my.tasks.mtt.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧹 Step 5: Disable and Uninstall the App
&lt;/h2&gt;

&lt;p&gt;Temporarily disable the app for your current user:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm disable-user --user 0 my.tasks.mtt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Uninstall it for your user:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm uninstall -k --user 0 my.tasks.mtt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Optional: clear the launcher’s cache (helps remove leftover shortcuts or intents):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm clear com.sec.android.app.launcher
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Reboot the device:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb reboot
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  ✅ Step 6: Verify the Removal
&lt;/h2&gt;

&lt;p&gt;After reboot, confirm the adware is gone with these checks:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;adb shell pm list packages | findstr my.tasks.mtt
adb shell ps | findstr my.tasks.mtt
adb shell dumpsys window | findstr my.tasks.mtt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If all commands return no output, the package and any running services are removed.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ Step 7: Prevent Future Infections
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Install apps only from Google Play or trusted developers.&lt;/li&gt;
&lt;li&gt;Avoid “free reward”, “utility booster”, or suspicious AI/assistant clone apps.&lt;/li&gt;
&lt;li&gt;Regularly audit overlay permissions:&lt;/li&gt;
&lt;li&gt;Settings → Apps → Special access → Appear on top — disable unknown entries.&lt;/li&gt;
&lt;li&gt;Keep Play Protect enabled.&lt;/li&gt;
&lt;li&gt;Optionally use a reputable mobile security app (e.g., ESET Mobile, Bitdefender, Malwarebytes).&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🏁 Result
&lt;/h2&gt;

&lt;p&gt;After identifying and uninstalling the offending package, the random ads stopped completely — with no factory reset and no data loss. These ADB-based steps provide a safe, targeted way to diagnose and remove hidden adware on Android devices.&lt;/p&gt;

</description>
      <category>android</category>
      <category>adb</category>
      <category>malware</category>
      <category>howto</category>
    </item>
    <item>
      <title>Frontend Career Build - Ep. #1</title>
      <dc:creator>Mustafa El-Helbawy</dc:creator>
      <pubDate>Sun, 21 Mar 2021 14:51:11 +0000</pubDate>
      <link>https://dev.to/mustafaelhelbawy/frontend-career-build-ep-1-3gcb</link>
      <guid>https://dev.to/mustafaelhelbawy/frontend-career-build-ep-1-3gcb</guid>
      <description>&lt;p&gt;Building career in software engineering industry as much as it looks like very easy but you will find it shortly overwhelming,&lt;/p&gt;

&lt;p&gt;A lot of courses, tutorials, instructors, articles, tools and etc...&lt;/p&gt;

&lt;p&gt;What should I do?, Where should I go?, How should start?, When I can apply for a job?, Am I qualified or Not?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;- It is all about your plan, &lt;/li&gt;
&lt;li&gt;= but I do not have a plan and do not know how to make it.&lt;/li&gt;
&lt;li&gt;- Do not worry, let's start building the path step by step until go through the real world of interviews and get a job.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;We are going to build a career regardless what is your study background.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;First of all while you are working in software industry you should know about some general concepts before start your specialization.&lt;/p&gt;

&lt;h3&gt;
  
  
  How the internet works
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;If you like reading:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://developer.mozilla.org/en-US/docs/Learn/Common_questions/How_does_the_Internet_work" rel="noopener noreferrer"&gt;How Internet Works?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you like videos:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=7_LPdttKXPc" rel="noopener noreferrer"&gt;How the Internet Works in 5 Minutes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=e4S8zfLdLgQ" rel="noopener noreferrer"&gt;How the Internet Works for Developers - Pt 1 - Overview &amp;amp; Frontend&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=FTAPjr7vgxE" rel="noopener noreferrer"&gt;How the Internet Works for Developers - Pt 2 - Servers &amp;amp; Scaling&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How the web works
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;If you like reading:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://developer.mozilla.org/en-US/docs/Learn/Getting_started_with_the_web/How_the_Web_works" rel="noopener noreferrer"&gt;How web works?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you like videos:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/watch?v=hJHvdBlSxug" rel="noopener noreferrer"&gt;How The Web Works - The Big Picture&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stay tuned for the upcoming episodes and keep learning&lt;/p&gt;

</description>
      <category>career</category>
      <category>javascript</category>
      <category>html</category>
      <category>css</category>
    </item>
  </channel>
</rss>
