[{"data":1,"prerenderedAt":523},["ShallowReactive",2],{"\u002Fid\u002Ffeatures\u002Froot-file-manager":3},{"id":4,"title":5,"body":6,"description":515,"extension":516,"meta":517,"navigation":518,"path":519,"seo":520,"stem":521,"__hash__":522},"features\u002Fid\u002Ffeatures\u002Froot-file-manager.md","Root File Manager untuk Android — Akses File Sistem Penuh",{"type":7,"value":8,"toc":491},"minimark",[9,33,38,158,162,169,172,197,201,208,217,222,225,229,236,240,247,251,262,266,273,277,284,288,295,311,320,324,327,350,354,376,380,457,461],[10,11,12,13,17,18,22,23,22,26,22,29,32],"p",{},"AnExplorer memberikan ",[14,15,16],"strong",{},"akses root penuh"," kepada pengguna Android tingkat lanjut. Jelajahi, salin, pindahkan, ganti nama, dan edit file di setiap partisi perangkat Anda yang dilindungi — ",[19,20,21],"code",{},"\u002Fsystem",", ",[19,24,25],{},"\u002Fdata",[19,27,28],{},"\u002Fcache",[19,30,31],{},"\u002Fvendor",", dan banyak lagi.",[34,35,37],"h2",{"id":36},"apa-yang-membuka-akses-root","Apa yang Membuka Akses Root",[39,40,41,57],"table",{},[42,43,44],"thead",{},[45,46,47,51,54],"tr",{},[48,49,50],"th",{},"Kemampuan",[48,52,53],{},"Tanpa Akar",[48,55,56],{},"Dengan Akar",[58,59,60,74,88,100,112,125,137,146],"tbody",{},[45,61,62,69,72],{},[63,64,65,66],"td",{},"Jelajahi ",[19,67,68],{},"\u002Fsdcard\u002F",[63,70,71],{},"✅",[63,73,71],{},[45,75,76,83,86],{},[63,77,78,79,82],{},"Telusuri ",[19,80,81],{},"\u002Fdata\u002Fapp\u002F"," (APK terinstal)",[63,84,85],{},"❌",[63,87,71],{},[45,89,90,96,98],{},[63,91,78,92,95],{},[19,93,94],{},"\u002Fandroid\u002Fdata\u002F"," (file pribadi aplikasi)",[63,97,85],{},[63,99,71],{},[45,101,102,108,110],{},[63,103,104,105],{},"Sunting ",[19,106,107],{},"\u002Fsystem\u002Fbuild.prop",[63,109,85],{},[63,111,71],{},[45,113,114,121,123],{},[63,115,116,117,120],{},"Edit ",[19,118,119],{},"\u002Fetc\u002Fhosts"," (blok domain)",[63,122,85],{},[63,124,71],{},[45,126,127,133,135],{},[63,128,129,130],{},"Salin file ke ",[19,131,132],{},"\u002Fsystem\u002F",[63,134,85],{},[63,136,71],{},[45,138,139,142,144],{},[63,140,141],{},"Copot pemasangan aplikasi sistem\u002Fbloatware",[63,143,85],{},[63,145,71],{},[45,147,148,154,156],{},[63,149,150,151],{},"Edit file konfigurasi apa pun di ",[19,152,153],{},"\u002Fdata\u002F",[63,155,85],{},[63,157,71],{},[34,159,161],{"id":160},"bagaimana-anexplorer-menangani-root","Bagaimana AnExplorer Menangani Root",[10,163,164,165,168],{},"AnExplorer mendeteksi akses root secara otomatis. Saat Anda menavigasi ke jalur terbatas, ia meminta izin ",[19,166,167],{},"su"," dari manajer root Anda (Magisk, SuperSU, KingRoot). Anda memberikannya satu kali per sesi.",[10,170,171],{},"Modifikasi dilakukan dengan aman:",[173,174,175,187,194],"ul",{},[176,177,178,179,182,183,186],"li",{},"Partisi sistem dipasang ulang ",[14,180,181],{},"baca-tulis"," sebelum menulis, kemudian ",[14,184,185],{},"baca-saja"," segera setelahnya",[176,188,189,190,193],{},"Operasi berbahaya (hapus ",[19,191,192],{},"\u002Fsystem\u002Fframework\u002F...",") meminta konfirmasi",[176,195,196],{},"Operasi root dicatat dalam sesi untuk ditinjau",[34,198,200],{"id":199},"kasus-penggunaan-root-umum","Kasus Penggunaan Root Umum",[202,203,116,205,207],"h3",{"id":204},"edit-etchosts-pemblokiran-iklan-tingkat-sistem",[19,206,119],{}," — Pemblokiran Iklan Tingkat Sistem",[10,209,210,211,216],{},"Ganti\u002Ftambahkan entri di file host untuk memblokir domain analitik dan jaringan iklan di lapisan jaringan. ",[212,213,215],"a",{"href":214},"\u002Fid\u002Ffeatures\u002Ftext-editor","Editor Teks"," AnExplorer membuka file dengan akses tulis root.",[202,218,116,220],{"id":219},"edit-systembuildprop",[19,221,107],{},[10,223,224],{},"Ubah sidik jari perangkat, DPI, kepadatan layar, atau aktifkan opsi pengembang tersembunyi. AnExplorer membuat salinan cadangan sebelum disimpan.",[202,226,228],{"id":227},"telusuri-data-pribadi-aplikasi","Telusuri Data Pribadi Aplikasi",[10,230,231,232,235],{},"Buka ",[19,233,234],{},"\u002Fandroid\u002Fdata\u002Fcom.example.app\u002F"," untuk memeriksa database, preferensi bersama, dan file cache. Berguna bagi pengembang untuk men-debug aplikasi yang diinstal.",[202,237,239],{"id":238},"instalcopot-apk-senyap","Instal\u002FCopot APK Senyap",[10,241,242,246],{},[212,243,245],{"href":244},"\u002Fid\u002Ffeatures\u002Fapk-installer","APK Installer"," dapat menginstal APK secara diam-diam dan menghapus bloatware sistem tanpa layar konfirmasi Android ketika root tersedia.",[202,248,250],{"id":249},"salin-font-atau-nada-dering-sistem","Salin Font atau Nada Dering Sistem",[10,252,253,254,257,258,261],{},"Tambahkan font khusus ke ",[19,255,256],{},"\u002Fsystem\u002Ffonts\u002F"," atau nada dering khusus ke ",[19,259,260],{},"\u002Fsystem\u002Fmedia\u002Faudio\u002Fringtones\u002F"," — perubahan akan bertahan setelah aplikasi dimulai ulang.",[202,263,265],{"id":264},"cadangkan-data-aplikasi","Cadangkan Data Aplikasi",[10,267,268,269,272],{},"Salin seluruh folder ",[19,270,271],{},"\u002Fandroid\u002Fdata\u002F[package]\u002F"," sebelum reset pabrik untuk menyimpan data aplikasi (login, penyimpanan game, konfigurasi).",[34,274,276],{"id":275},"akses-root-adb-tidak-perlu-root-fisik","Akses Root ADB (Tidak Perlu Root Fisik)",[10,278,279,280,283],{},"AnExplorer mendukung ",[14,281,282],{},"root berbasis ADB"," untuk perangkat yang mengaktifkan proses debug ADB tetapi tidak di-root Magisk. Ini memberikan akses file yang lebih tinggi tanpa mengubah partisi sistem perangkat.",[202,285,287],{"id":286},"cara-kerja-adb-root","Cara Kerja ADB Root",[10,289,290,291,294],{},"Root ADB (",[19,292,293],{},"adb root",") memulai ulang daemon ADB dengan izin root. AnExplorer kemudian dapat:",[173,296,297,305,308],{},[176,298,299,300,22,302,304],{},"Jelajahi jalur yang biasanya dibatasi (mis. ",[19,301,94],{},[19,303,81],{},")",[176,306,307],{},"Membaca dan menyalin file yang dilindungi",[176,309,310],{},"Jalankan perintah dengan hak istimewa yang lebih tinggi",[10,312,313,316,317,319],{},[14,314,315],{},"Persyaratan",": Opsi Pengembang diaktifkan, Debugging USB atau Debugging Nirkabel aktif, dan perangkat harus mengizinkan ",[19,318,293],{}," (sebagian besar versi produksi stok menonaktifkan ini; emulator AOSP dan versi pengembang\u002Frekayasa mengizinkannya).",[202,321,323],{"id":322},"akar-wifi-adb","Akar WiFi ADB",[10,325,326],{},"Android 11+ mendukung pemasangan ADB nirkabel:",[328,329,330,337,344,347],"ol",{},[176,331,332,333,336],{},"Aktifkan ",[14,334,335],{},"Opsi Pengembang → Debugging Nirkabel"," pada perangkat",[176,338,339,340,343],{},"Buka AnExplorer → ",[14,341,342],{},"Tools → ADB Connect"," → pasangkan melalui IP:port dan kode pemasangan",[176,345,346],{},"AnExplorer menegosiasikan sesi root ADB secara otomatis ketika perangkat mengizinkannya",[176,348,349],{},"Navigasi ke jalur terbatas — AnExplorer meminta akses yang lebih tinggi secara transparan",[202,351,353],{"id":352},"akar-usb-adb","Akar USB ADB",[328,355,356,359,366,369],{},[176,357,358],{},"Hubungkan perangkat melalui USB dan percayai PC host",[176,360,361,362,365],{},"Pastikan ",[14,363,364],{},"USB Debugging"," diaktifkan",[176,367,368],{},"AnExplorer mendeteksi koneksi dan meneruskan ke root ADB jika perangkat mengizinkannya",[176,370,78,371,22,373,375],{},[19,372,94],{},[19,374,132],{},", atau jalur terlarang lainnya",[202,377,379],{"id":378},"adb-adb-vs-akar-magisk","ADB ADB vs Akar Magisk",[39,381,382,394],{},[42,383,384],{},[45,385,386,388,391],{},[48,387,50],{},[48,389,390],{},"Akar ADB",[48,392,393],{},"Akar Magisk",[58,395,396,406,416,429,438,447],{},[45,397,398,401,403],{},[63,399,400],{},"Tidak ada modifikasi sistem",[63,402,71],{},[63,404,405],{},"❌ (tanpa sistem tetapi wajib)",[45,407,408,412,414],{},[63,409,78,410],{},[19,411,94],{},[63,413,71],{},[63,415,71],{},[45,417,418,424,427],{},[63,419,420,421,423],{},"Lengkap ",[19,422,132],{}," tulis",[63,425,426],{},"⚠️ Hanya baca di produksi",[63,428,71],{},[45,430,431,434,436],{},[63,432,433],{},"Pemasangan APK senyap",[63,435,71],{},[63,437,71],{},[45,439,440,443,445],{},[63,441,442],{},"Persisten (bertahan dari reboot)",[63,444,71],{},[63,446,71],{},[45,448,449,452,454],{},[63,450,451],{},"Semua perangkat produksi",[63,453,71],{},[63,455,456],{},"✅ (jika bootloader tidak dapat dibuka)",[34,458,460],{"id":459},"manajer-root-yang-didukung","Manajer Root yang Didukung",[173,462,463,469,474,479,485],{},[176,464,465,468],{},[14,466,467],{},"Magisk"," (disarankan — root tanpa sistem)",[176,470,471],{},[14,472,473],{},"SuperSU",[176,475,476],{},[14,477,478],{},"KingRoot",[176,480,481,484],{},[14,482,483],{},"Biner SU apa pun"," di jalur standar",[176,486,487,490],{},[14,488,489],{},"ADB root"," — melalui USB atau WiFi ADB (developer\u002Fengineering build; tidak memerlukan Magisk)",{"title":492,"searchDepth":493,"depth":493,"links":494},"",2,[495,496,497,508,514],{"id":36,"depth":493,"text":37},{"id":160,"depth":493,"text":161},{"id":199,"depth":493,"text":200,"children":498},[499,502,504,505,506,507],{"id":204,"depth":500,"text":501},3,"Edit \u002Fetc\u002Fhosts — Pemblokiran Iklan Tingkat Sistem",{"id":219,"depth":500,"text":503},"Edit \u002Fsystem\u002Fbuild.prop",{"id":227,"depth":500,"text":228},{"id":238,"depth":500,"text":239},{"id":249,"depth":500,"text":250},{"id":264,"depth":500,"text":265},{"id":275,"depth":493,"text":276,"children":509},[510,511,512,513],{"id":286,"depth":500,"text":287},{"id":322,"depth":500,"text":323},{"id":352,"depth":500,"text":353},{"id":378,"depth":500,"text":379},{"id":459,"depth":493,"text":460},"Akses, edit, dan kelola semua file sistem di Android yang di-root. Akses baca\u002Ftulis penuh ke partisi\u002Fsistem,\u002Fdata,\u002Fcache. Edit build.prop, file host, skrip, dan direktori yang dilindungi di AnExplorer.","md",{},true,"\u002Fid\u002Ffeatures\u002Froot-file-manager",{"title":5,"description":515},"id\u002Ffeatures\u002Froot-file-manager","dH9l0HtpNAyserA1ZU3poTOsikOcGATWCsoUe1N-KGU",1778415555798]