Author: FlexiSPY

  • How To Install The Android L Preview On To A Nexus 5

    This article will show you how to install the Android L preview on to a Nexus 5.

    Bear in mind that the latest version of Android, Android L, is still under development.

    The version we are installing in this article is subject to change and you perform the steps in this guide at your own risk.

    While everything has been done to make sure the steps are accurate, FlexiSPY is not responsible for the contents of this guide or any damage that may be incurred from following this guide.

    What is Android L?

    Android L is the newest version of the popular Android OS. It will be Android OS version 5.0.

    As is the tradition with Android OS versions being named after desserts (Android OS 4.x (K) was named Kitkat for example with Jelly Bean and Ice Cream preceding them) many people believe that the ‘L’ will stand for lollipop but this is not confirmed (nor denied) by Google at this time so we just have to wait and see what Google decide to do.

    With the new Android OS not being scheduled for release until at least the end of 2014 it comes as no surprise that only a few select phones are eligible to be running this version currently.

    Luckily, here at FlexiSPY, we like to keep on top of all things tech which is why we have just installed the Android L developer preview on our Nexus 5 and we are going to show you how you can do the same in just a few quick and simple steps.

    What you need to install Android L

    In order to install the Android L developer preview on to a Nexus 5 you will need the following:

    • A Nexus 5 phone
    • The Android L developer preview image
    • A PC

    Step 1 – Backup the Nexus 5

    Because this is still development software we highly recommend that you back up the phone first completely before proceeding.

    To do that you, first of all, install the Nexus root toolkit which you can find here.

    Once you have downloaded the Nexus toolkit connect the Nexus 5 to your PC using the USB cable it came with. After that, you need to put the Nexus 5 in USB debugging mode before it will be seen while connected to the PC using the Nexus root toolkit program.

    To enable USB debugging on the Nexus 5 simply do the following:

    • Tap Apps
    • Tap Settings
    • Tap About Phone
    • Scroll down to Build Number and keep tapping that until you read you are now a developer. The Developer options menu has now been unlocked.
    • Tap the new Developer Options Menu.
    • Make sure Stay Awake is checked
    • Make sure USB debugging is checked.

    You also need to make sure you have installed the Nexus 5 USB driver otherwise even with USB debugging enabled the PC will still not recognize the phone. To learn how to do that click here.

    If, after enabling USB debugging and installing the USB driver and the Nexus 5 is still not recognized then try a different USB port on your computer because sometimes that can make the difference.

    Also make sure that, with the Nexus 5 connected to your PC, no on-screen notification on the Nexus 5 is visible asking you to accept USB debugging on the PC (you have to accept otherwise the PC will not find the phone).

    With all this done the Nexus 5 should now be recognized when you run the Nexus toolkit and it will look similar to this.

    The NExus Root Toolkit v1.8.6

    As you can see the Nexus root toolkit has identified the Nexus 5 and Android OS version so the next thing that we need to do is start the backup.

    The root toolkit takes care of the entire backup process, so click the Backup button to start.

    We want to create a complete backup of the Nexus 5 before we install anything on to it so simply click Create Android Backup File.

    There is quite a lot of text to read but essentially you just need to tap OK and then you can proceed to the next step.

    The next step will ask you where you wish to save the backup file to on your computer. Simply pick a convenient location and then the next window will explain more about the backup process and what will happen.

    While the backup is in progress make sure the Nexus 5 is not interrupted.

    Once the backup is complete the Nexus root toolkit will inform you.

    Downloading the Android L developer preview

    Google makes downloading the developer preview as simple as possible however there are some prerequisites first. You must make sure you have installed the Android SDK on your PC first.

    You must also make sure that, within Windows, you have set the path variable for Fastboot to match the location where you save the downloaded Android developer preview too.

    For more information how to install the Android SDK please see the details here.

    When you have successfully installed the Android SDK to a folder of your choice on your PC, it should look like this (we have installed the Android SDK to C:\Android for easy reference).

    sdk manager
    Here you can see the SDK (the SDK folder) has been installed and we have put all of this in a folder located at C:\Android for easy access as mentioned.

    You can download the Google L developer preview from the link here.

    Make sure you download the correct one for the Nexus 5 and then save the downloaded folder in the same folder as the SDK as shown below. We named our folder android for easy reference also.

    androidl

    Inside the android folder, you must extract the contents of the developer preview so it looks like this:

    bootloader-hammerhead-hhz11k
    Next, connect the Nexus 5 to the PC using the USB cable.

    Make sure it is powered off and the hold down the volume down button and the power button to turn it on and it will boot up in Fastboot mode which looks like this.

    The final thing that needs to be done is within Windows which is to set the Path of Fastboot so that it points to the Android SDK Fastboot files which we have located in C:\Android\SDK\Platform-Tools on our PC (for you it will be different).

    To set this do the following:

    On the Windows desktop (in this case Windows 8) open up file explorer. Right click your computer and then click Properties.

    With the system properties menu open click Advanced System Settings and the System Properties window will appear.

    With the System Properties window, open click Environment Variables and the menu that appears will look similar to what is shown below.
    In the Environment Variables window select Path and then click Edit.

    Add a semicolon, as shown in the example, and then type the full path to the Android SDK (in this example we use C:\Android as mentioned).

    Now that we have everything set we need to make sure the Nexus 5 is ready.

    • The Nexus 5 should be connected to your PC.
    • The Nexus 5 should be running in Fastboot mode.
    • You should have installed the Android SDK on to your PC in an easy to access location.
    • You should download the Android L developer preview image and saved it in a folder where you saved the Android SDK for easy reference.

    Now that you have done all these four things you simply run the flash-all.bat file inside the Android L developer preview folder.

    If all you see inside your Android L developer preview folder is a zip file you must extract it first to view all the files.

    view-all-the-files-sdk
    The Android L preview image will be flashed to the Nexus 5. This may take some time.

    DO NOT DISCONNECT THE NEXUS 5 FROM YOUR PC OR TURN IT OFF OR DO ANYTHING THAT WILL INTERRUPT THE FLASHING PROCESS IN Anyway.

    Once you have flashed the Android L developer preview the Nexus 5 will boot up for the first time. This may take some time also so please be patient. Once it boots up Android L will be fully ready for use.

  • How To Root The Google Nexus 5

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the Google Nexus 5

    This guide will show you how to root the Google Nexus 5 Android phone which is the latest flagship model in Google’s popular Nexus range of Android phones.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the Google Nexus 5?

    In order to root the Google Nexus 5 you will need the following.

    • The Google Nexus 5 you want to root in your hand.
    • A PC.

    Step 1 – Download the Google Nexus 5 root file to your PC

    In order to root the Google Nexus 5 you first need to download the root file to your PC. This is the file that is installed on to the Google Nexus 5 to give you root access.

    You can download the root file from here. Once you have done that save it to an easy location on your PC such as your desktop.

    Step 2 – Download and install the Android SDK on to your computer

    In order to use Fastboot to root the Google Nexus 5 you must have the Android SDK downloaded and installed on to your computer.

    You can download the SDK from here.

    Step 3 – Boot the Google Nexus 5 into Fastboot mode

    So that your PC can communicate with the Google Nexus 5 when you connect it via a USB cable you must first put the phone in to Fastboot mode which is done using the following steps.

    1. Make sure the Google Nexus 5 is powered off completely.
    2. Hold down the volume down button and the power button together.
    3. Wait for the Google Nexus 5 to boot up in to Fastboot mode.
    4. Once it has booted in to Fastboot mode connect it to your PC.

    Step 4 – Connect the Google Nexus 5 to your PC and root the phone

    With the Google Nexus 5 in Fastboot mode connect the phone to your PC. We can now root the phone using the following steps.

    1. On your PC browse to the folder you created when you extracted the root file from step 1.
    2. Run the file called ‘root-windows.bat’ (you may need Windows Administrator rights for this).
    3. Wait for the rooting process to complete.
    4. Once the rooting process is complete the Google Nexus 5 will reboot and complete the rooting process (a red Android logo will appear on the phone screen).
    5. It will reboot once more when done and the Google Nexus 5 will be ready for use.

    You can then verify the Google Nexus 5 has been rooted successfully by looking for the SuperSU application which is installed once a device has been rooted properly. If you can see that then you have successfully rooted the Google Nexus 5.

    Enjoyed The Article? Stay Up To Date

  • How To Root The Samsung Galaxy S4

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the Samsung Galaxy S4

    This guide will show you how to root the popular Samsung Galaxy S4 phone from Samsung.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the Samsung Galaxy S4?

    In order to root the Samsung Galaxy S4 you will need the following.

    • The Motorola Moto X you want to root in your hand
    • A PC.

    Step 1 – Download the USB drivers for the Samsung Galaxy S4 for your PC

    In order for your PC to recognise the Samsung Galaxy S4 as part of the rooting process you first must download and install the USB drivers on to your PC.

    You can download the USB drivers for the Samsung Galaxy S4 from here.

    Once you have downloaded them run the main program file to make sure the drivers are installed.

    Step 2 – Download the Odin rooting program

    In order to root the Samsung Galaxy S4 using the root file given in the next step you must first download Odin which is what will be used to install the root file on to the Samsung Galaxy S4 and perform the rooting process.

    You can download Odin from here.

    Once downloaded extract the file to a convenient location such as the desktop.

    Step 3 – Download the Samsung Galaxy S4 root package

    Now that we have installed the Samsung Galaxy S4 USB drivers and downloaded Odin we now need to download the root package to be used for the rooting process.

    You can download the Samsung Galaxy S4 root package from here.

    Make sure you download the correct one for whichever version of the Samsung Galaxy S4 you have (check the model number that appears when the phone turns on for more information – e.g. GT-I9500).

    Step 4 – Enable USB debugging on the Samsung Galaxy S4

    In order for your PC to recognise the Samsung Galaxy S4 when you plug it in to perform rooting you must first enable USB debugging on the phone itself. This is done by doing the following.

    1. Tap the Settings option.
    2. Tap the About Phone option.
    3. Keep tapping the Build Number option (seven times) until it says you are a developer
    4. Tap the new Developer Options menu that appears
    5. Make sure that the USB Debugging option is checked.

    Step 5 – Root the Samsung Galaxy S4

    Now that we have all we need it is time to root the Samsung Galaxy S4. Before we can do that you must first put the Samsung Galaxy S4 in to Download mode which can be done using the following steps.

    1. Make sure the Samsung Galaxy S4 is powered off completely.
    2. Hold down the Volume down key and the Home key and the power button and keep all three buttons pressed until the Samsung Galaxy S4 powers up.
    3. Providing you have done it correctly it should boot in to Download mode and you press the Volume up key to start Download mode.
    4. Connect the Samsung Galaxy S4 now to your PC.
    5. Run the Odin software you downloaded in step 2.
    6. Inside Odin click the PDA option (this is called AP in the latest version of Odin) and browse on your computer to the .tar root file you extracted in step 3.
    7. Inside Odin click Start to begin the root process.

    The process will take a few moments after which the Samsung Galaxy S4 will restart itself and complete the rooting process – Do not remove the Samsung Galaxy S4 from your PC during this time.

    Once the Samsung Galaxy S4 starts up properly simply go to Apps and look for the SuperSU icon that should now be present. If you can see this icon it means that the Samsung Galaxy S4 has been successfully rooted.

     

    Stay Up To Date Through One Of Our Social Media Channels!

  • How To Root The Motorola Moto X

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the Motorola Moto X

    This guide will show you how to root the Motorola Moto X Android phone.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the Motorola Moto X?

    To root the Motorola Moto X you will need the following

    • The Motorola Moto X you want to root in your hand
    • A PC.

    Step 1 – Download the PC USB drivers for the Motorola Moto X

    Before we begin you need to download the USB drivers for the phone to your PC so that when you connect the Motorola Moto X to your PC to perform later steps the PC will recognize the phone.

    You can download the USB drivers from here

    Save it to your computer in a safe place such as your desktop and extract the contents to a new folder which you will need later

    Step 2 – Enable USB debugging mode on the Motorola Moto X

    Now that you have installed the USB drivers for the Motorola Moto X on to your PC you need to enable USB debugging mode on the phone itself so that it is recognised by your PC when you plug the Motorola Moto X to perform later steps.

    You can enable USB debugging mode on the Motorola Moto X using the steps below.

    1. On the Motorola Moto X tap the Settings option.
    2. Tap the About option.
    3. On this menu tap ‘Build Number’ seven times continuously.
    4. Once you have done that go back to the Settings option.
    5. Tap the new Developer Option menu that has appeared.
    6. Make sure the USB Debugging option is checked.
    7. Tap OK to confirm.

    Now that you have enabled USB debugging on the Motorola Moto X it is time to move on to the next step.

    Step 3 – Unlock the Motorola Moto X bootloader

    In order to be able to root the Motorola Moto X you need to unlock the bootloader. Once the bootloader is unlocked it allows you to then connect the Motorola Moto X to your PC and perform the rooting process.

    You can start the bootloader unlock process here.

    How it works is that you have to connect the Motorola Moto X to your PC, run a command to get a unique token and then you put that in to the Motorola bootloader website and get a response back which you enter on the PC and then the Motorola Moto X will do its magic and unlock the bootloader ready for the next step.

    Step 4 – Download the Motorola Moto X root file and save it your PC

    With the USB drivers installed, the Motorola Moto X with USB debugging enabled and the bootloader unlocked it is time to download the root file that will be used to root the phone.

    You can download the root file from here.

    Save it in an easy location such as the desktop and then extract it to its own folder.

    Connect the Motorola Moto X to your PC and transfer the root zip file to the phone in an easy location such as the Downloads folder.

    Step 5 – Download the Clockwork Mod recovery file.

    In order to use the root file from the previous step you must flash the clockwork mod recovery image to the phone.

    You can download the clockworkmod image file from here.

    Save it in an easy location such as the desktop and then extract it to its own folder.

    Step 6 – Flash the Clockword Mod recovery file

    You need to flash the clockwork mod recovery file to the Motorola Moto X and this can be done using the following steps.

    1. Make sure the Motorola Moto X is powered on.
    2. Make sure USB debugging is enabled (see step 2).
    3. Connect the Motorola Moto X to your PC.
    4. Open up command prompt.
    5. Type ‘adb reboot bootloader’ (without quotes) and press Enter. If done properly the Motorola Moto X will reboot and be in FASTBOOT mode.
    6. Type ‘fastboot.exe flash recovery recovery-razri-tryAtouch.img’ (without the quotes) and press Enter. If done properly the recovery file will be flashed to the phone.

    Step 7 – Use Clockwork mod to install SuperSU and root the Motorola Moto X

    Please make sure you have followed all previous directions in the last step.

    With ClockworkMod having been flashed to the phone successfully perform the following steps.

    1. Type ‘fastboot.exe reboot-bootloader’ (without quotes) and press Enter. If done properly the Motorola Moto X will boot in to the Bootloader menu.
    2. Using the Volume up and down buttons to choose and the Power button to select make sure the RECOVERY option is selected. If done properly the phone will reboot in to recovery mode and ClockWork mod that was flashed in the previous step will load.
    3. Choose the ‘Install zip from SDcard’ option.
    4. Browse to the folder on the phone you saved the root file to from step 4 earlier.
    5. Select the root zip file and confirm you wish to flash it.
    6. Once the file has been flashed reboot the Motorola Moto X.

    Once the phone reboots you can verify the phone has been successfully rooted by looking for the SuperSU application which appears after having successfully rooted the Motorola Moto X.

  • How To Root The LG G3

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the LG G3

    The LG G3 has just been released and already it is looking like one of the top Android phones to beat, with the Samsung Galaxy S5 and Google Nexus 5 also being heavy contenders. It should be an interesting battle. But if you do have a G3, you’ll want to get the most out of it. This guide will show you how to do so by rooting it.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the LG G3?

    To root the LG G3 you will need the following.

    • An LG G3 you want to root in your hand
    • A PC.

    Step 1 – Download the LG G3 root file to your PC

    In order to root the LG G3 you must first download a root file to your computer which you will then copy to the LG G3 and run from your PC in later steps

    You can download the LG G3 rooting file here

    Save it to your computer in a safe place such as your desktop and extract the contents to a new folder which you will need later

    Step 2 – Download the LG G3 USB drivers for your PC and install them

    Before you can connect the LG G3 to your PC you first need to download and install the LG USB drivers for this phone which are available here.

    Once you have downloaded and install the USB drivers you can proceed to the next step

    Step 3 – Enable USB debugging on the LG G3

    Now that you have installed the USB PC drivers successfully you need to enable USB debugging on the LG G3 itself.

    The first thing you need to do is enable the USB debugging menu

    You can do this using the following steps.

    1. Go to the Settings menu.
    2. Keep tapping the About Phone option.
    3. It will say ‘You are now a developer’ once you have tapped enough times and the USB debugging menu will now be accessible.
    4. Go to the Settings menu.
    5. Go to the Application menu.
    6. Go to the Development menu.
    7. Go to the USB Debugging menu.
    8. Make sure that the USB Debugging menu is enabled.

    Now that you have installed the LG PC USB drivers and enabled USB Debugging on the LG G3 itself it is time to root the phone.

    Step 4 – Root the LG G3

    We now need to root the LG G3 which can be done using these steps.

    1. Make sure USB debugging is enabled on the LG G3 itself (see step 3).
    2. Connect the LG G3 to your PC using a USB cable.
    3. On your PC navigate to the folder you downloaded and extracted in step 1.
    4. Double-click the run.bat file to start the rooting process.
    5. Press any key when the window appears to start the rooting process.
    6. The LG G3 will reboot in to recovery mode automatically after some time.
    7. With the LG G3 in recovery mode go to the Apply update from ADB option and select it.
    8. Let this process complete. The LG G3 will restart itself automatically when finished.
    9. When the LG G3 reboots go to the Play Store.
    10. Search for the app titled SuperSU and install it

    You can then use SuperSU to verify that the LG G3 has been successfully rooted.

     

     

     

  • How To Root The Google Nexus 4

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the Google Nexus 4

    The Google Nexus series has always been a popular range amongst Android phones and whilst the Nexus 4 has been superseded by its younger brother, the Nexus 5, it does not take anything away from the Nexus 4 being a very impressive Android device.

    This guide will show you how you can root the Google Nexus 4 to get the most out of it and to be able to install FlexiSPY and use all its features.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the Google Nexus 4?

    To root the Google Nexus 4 you will need the following.

    • The Google Nexus 4 you want to root in your hand.
    • A PC.

    Step 1 – Download the rooting package to your computer

    In order to root the Google Nexus 4 you must install the root package on to the phone to perform the root process. This is done by using Fastboot to push the root file to the Google Nexus 4. To use Fastboot you need to have the Android SDK development environment installed which you can download in the next step.

    You can download the root package here.

    Once you have downloaded the root package extract it to a safe place (such as the desktop) as you will need it later.

    Step 2 – Download and install the Android SDK on to your computer

    In order to use Fastboot to root the Google Nexus 4 you must have the Android SDK downloaded and installed on to your computer

    You can download the SDK from here

    Step 3 – Enable USB debugging mode on the Google Nexus 4

    For your PC to be able to communicate with the Google Nexus 4 once you have connected it you must first enable USB debugging

    To do this, on the Google Nexus 4, go to Settings > About Device and then tap ‘Build Number’ seven times. The USB debugging menu will appear. Simple make sure ‘Enable USB debugging’ is checked and you are all set.

    Step 4 – Put the Google Nexus 4 in Fastboot mode

    Before you can root the Google Nexus 4 you need to put it in to Fastboot mode

    This is done by the following

    1. Turn off the Google Nexus 4 completely
    2. Hold down the volume down button and the power button at the same time
    3. The Google Nexus 4 should turn on and look like this picture
    4. Connect the Google Nexus 4 to your PC using the USB cable it came with

    Step 5 – Start the rooting process

    Back in step 1 you downloaded the root package and extracted the contents of the file to a safe place. You now need to go to the same location and run the file called Root Windows.exe. Providing you have installed the Android SDK properly and you have the Google Nexus 4 in Fastboot mode a window should appear looking as shown in this picture

    Simply follow the steps to root the Google Nexus 4. Once the phone restarts you can verify the phone is rooted by looking for the SuperSU application icon which means that the Google Nexus 4 has been rooted successfully

  • How To Root The HTC One

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    How To Root the HTC One

    The HTC One is one of HTC’s most popular flagship Android models, in the following guide you’ll learn how to Root it.

    Disclaimer: FlexiSPY is not responsible for rooting the Android device in any way, before performing any of these steps make sure you back up your Android device completely. Rooting is done entirely by you at your own risk.

    What is needed to root the HTC One?

    To root the HTC One you will need the following.

    • The HTC One you want to root in your hand.
    • A PC.

    Step 1 – Unlock the HTC One bootloader

    To root the HTC One you first need to go to the HTC website and unlock the bootloader of the phone. Until you do that rooting cannot take place.

    You can start the bootloader unlock process here.

    Essentially what happens is that you have to connect the HTC One to your PC and use Fastboot to execute a command to get a unique ID that you then type in to the HTC website above to generate a bootloader unlock code that, on the PC (with the HTC One still connected) you enter to then unlock the bootloader.

    Full details of the entire process are given on the HTC website above.

    Step 2 – Install TWRP recovery on to the HTC One

    In order to install SuperSU and root the HTC One you must install TWRP recovery on to the device first. This can only be done if you have successfully unlocked the HTC One bootloader in the previous step.

    You can download TWRP from here. Make sure to choose the correct HTC One variant from the list.

    You need to save the TWRP file on to the HTC One in the same place that you saved the Fastboot and ADB files from step 1 when you unlocked the bootloader.

    After you have downloaded the TWRP recovery file rename it so it is called TWRP.img – you will need this file later.

    Step 3 – Use Fastboot to flash TWRP to the HTC One

    You need to first put the HTC One in Fastboot mode.

    To do this follow these steps.

    1. Power off the HTC One completely.
    2. Hold down the volume down and power button at the same time.
    3. If you have done it correctly the phone will turn on looking like this 
    4. Make sure ‘Fastboot’ is selected and then press the power button to confirm. If done properly HBOOT will turn in to FASTBOOT.
    5. Connect the HTC One to your PC using the USB cable.
    6. Open up a command prompt in Windows and access the folder on your PC where you saved TWRP and the ADB and Fastboot files from the previous steps.
    7. Type ‘fastboot flash recovery twrp.img’ (no quotes) and press Enter. The TWRP file will be flashed to the HTC One
    8. Once it has finished restart the HTC One.

    Step 4 – Root the HTC One

    Now that you have successfully unlocked the HTC One bootloader and flashed the TWRP image file to the phone it is time to root the phone.

    To do this you first need to download the SuperSU zip file which is located here.

    Save this to your computer in a safe place.

    Connect the HTC One to your PC and copy the SuperSU zip file you just downloaded to the HTC One (for example, to the Downloads folder).

    Once you have done that turn off the HTC One completely. It is time to flash SuperSU and root the phone which is done using the following steps.

    1. Power off the HTC One completely.
    2. Put the HTC One in Fastboot mode as given in the previous step.
    3. When the HTC One boots up select RECOVERY from the list. The HTC One will restart and the TWRP recovery menu will appear. If done correctly it will look like this 
    4. Tap Install.
    5. Browse to wherever you saved the SuperSU zip file you downloaded and copied to the HTC One.
    6. Confirm that you want to flash the selected zip file.
    7. Once done choose the Reboot option in TWRP to reboot the HTC One.

    Once the HTC One reboots, to verify the phone has been rooted properly, simply look for the SuperSU application icon. Once you see this you have successfully rooted the HTC One.

     

     

     

  • How to Downgrade a Samsung Galaxy S4 from 4.4.2 to 4.2.2

    How to Downgrade a Samsung Galaxy S4 from 4.4.2 to 4.2.2

    This article will show you how how to successfully downgrade a Samsung Galaxy S4 from OS 4.4.2 to 4.3

    Disclaimer: Please understand that this guide is provided ‘as is’. FlexiSPY is not responsible for it or its contents and you perform the downgrade procedure entirely by yourself and at your own risk. FlexiSPY is not responsible in any way for any damages that may incur through following this guide and by reading past this notice you agree to the notice given above:

    Our Samsung Galaxy S4 is model number GT-I9500.

    These steps may not work on the GT-I9505 version of the Samsung Galaxy S4 and you perform them at your own risk.

    Why Downgrade?

    FlexiSPY is not yet fully compatible with OS 4.4.2 and so if your target device is running OS version 4.4.2 and you want FlexiSPY Extreme features such as spy call and call interception to function then you need to downgrade.

    Not only that but downgrading may actually cause a performance increase due to the S4, which is getting on in years, not being able to fully run the latest Android OS version as well as something such as the Samsung Galaxy S5

    Please note also that in certain geographical regions the S4 may not yet be able to run OS 4.4.2 and that depends entirely on the network providers and Samsung themselves.

    What is needed to downgrade?

    To downgrade the Samsung Galaxy S4 you will need the following

    • The Samsung Galaxy S4 you wish to downgrade which is running OS 4.4.2
    • A PC.
    • The USB cable that cmae with the Samsung Galaxy S4
    • The OS 4.2.2 firmware file for your S4 according to your country (see later)
    • A backup of the EFS partition of the S$ (see later)
    • The modem binary file of the S4 (see later)
    • The rooting software for PC called Odin (see later)

    Now that we have all the necessary equipment it’s time to get started!

     Step 1 Check the Android OS version is 4.4.2 on the Samsung Galaxy S4

    On the phone itself go to Apps > Settings > More > About Device and the OS version will be listed. You can see our S4 is running Android version 4.4.2 in the screenshot below.

    oncellphone

     Step 2 Backup the EFS partition of the S4

    Basically, without getting too technical (we will discuss more about the EFS partition later) it is always safe to make sure you backup the phone first before you downgrade.The EFS partition is responsible for allowing the phone to have carrier functionality and make calls such as getting the network identified and IMEI number

    Without this data the phone cannot function as a phone

    To backup the EFS partition we will use a program called EFS Professional which is a PC program that allows us to backup the EFS partition to a computer to keep it safe

    You can download EFS Professional from here.

    On the Samsung Galaxy S4 go to the Play Store and download and install BusyBox as this is required for EFS Professional to work. You must have rooted the Samsung Galaxy first to install BusyBox and you can head on over to Spy Phone Review here for assistance with that.

    Simply grant root access when asked and then tap Install to start the installation process.

    Simply grant root access when asked and then tap Install to start the installation process.

    With BusyBox installed and the Samsung Galaxy S4 rooted simply plug the S4 in to your PC using the USB cable it came with and run EFS Professional.

    When you run EFS Professional it will perform checks on the S4 itself first to make sure USB debugging is enabled (to enable USB debugging, on the S4 itself go to Settings > More > About Device and continue to tap Build Number until the Developer Options option is shown. Once inside Settings > More > Developer Options make sure that USB debugging is checked.)

    Simply tap OK on the S4 when asked.

    Back on the PC if you run EFS Professional it will make sure the S4 is rooted and BusyBox is installed and it should look similar to this.

    should_look_something_like_this

    Tap the Backup tab.

    Make sure EFS Professional looks like This Picture  . You can see that All Partitions is selected but only the four partitions related to EFS are selected to be backed up, then Click Backup to start.

    Once the backup process is complete disconnect the S4 from the PC and reconnect it again.

    Using Windows Explorer browse to the SD card of the S4 and you will find the backup folder titled EFSProBackup.

    Simply copy this folder to your PC and keep it in a safe place.

    copy-the-folder

     Step 3 – Download the Android 4.2.2 OS for your country and S4 version

    The next thing that is required is to download the Android 4.2.1 ROM that we will flash to the S4 to downgrade it.

    To do this we use the website here.

    Click Firmware Database to be taken to the page below.

    click_firmware_database

    Under TYPE, OS, MODEL and COUNTRY select the values that match your S4

    Click the 4.2.2 ROM you want to download

    Make sure the details are correct for the S4 you are wanting to downgrade and then click the Download button

    confirmthedetails

    Once it has been downloaded extract it to your computer as shown in This Picture    

    Please note that the ROM files can be several gigabytes in size and downloading them may take some time.

     Step 4 – Flash the 4.2.1 firmware on to the S4

    You now need to flash the firmware that was downloaded on to the S4.

    To do this you will need a program called Odin which you can download from here

    You need to put the Samsung Galaxy S4 in to download mode which you do so by doing the following:

    • Turn off the S4 completely
    • Hold down the volume down, home and power buttons together
    • Wait for the S4 to turn on and it should boot in to download mode
    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode

    downloadmode

    Now you have downloaded Odin connect the Samsung Galaxy S4 to your PC and Windows should download the drivers automatically.

    Once you launch Odin, if all is successful and the S4 is in download mode, it should say Added! as shown in This Picture    

    You now click the AP button and browse to the firmware file you downloaded and extracted from the previous step.

    Click the firmware file and click Open.

    The firmware file will be checked and then added to Odin so it looks like the screen below. Due to the filesize of the ROM this can take some time.

    When Odin looks like the screenshot below you are ready to flash the ROM file because the ROM file has been checked successfully by Odin.

    whenitlookslikethis

    All you need to do is click Start to flash the ROM.

    Flashing the ROM can take up to 15 minutes and will take some time

    DO NOT DISCONNECT THE S4 FROM THE PC OR TURN IT OFF IN ANY WAY

    When the process is finished Odin will say PASS and the S4 will restart and boot in to the newly flashed ROM

     Step 5 – Resolving any issues – unable to boot up

    If the S4, after you flash the ROM, is stuck on the Samsung logo then do the following

    • Turn off the S4 completely.
    • Hold down the Volume up, home and power buttons together.
    • Wait for the S4 to display the S4 logo and then let go

    It will now be in recovery mode which looks similar to this.

    recoverymode

    Using the Volume up and down keys scroll to Wipe data/factory reset and press the Power button to confirm

    Scroll down to Yes and press the Power button on that to confirm.

    The Samsung Galaxy S4 will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the S4 will restart and boot up – this may take some time when booting for the first time so please be patient

     Step 6 – Resolving any issues – Loss of IMEI

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect – e.g. 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from here, save it to your PC and extract it.

    modemfile

    Put the Samsung Galaxy S4 in to download mode again and connect it to your PC and run Odin (see step 4 for more information).

    It will look like This Picture   once connected as we have seen before

    Click the CP button and then point to the Modem binary file shown in the last screenshot

    pointtothelastscreenshot

    Odin should now look like This Picture  . You can see the S4 has been added and the modem file is selected.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE S4 FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the S4 to reboot and you should now have your working IMEI back and successfully downgraded the S4 from 4.4.2 to 4.2.2.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • FlexiSPY For Android Update 2.3.5

    FlexiSPY For Android Update 2.3.5

    We’re happy to announce that the latest version of FlexiSPY for Android is here! In this release, we really tried to act on the feedback that you guys put forward to us, and we’re very excited about the new offerings! So, what’s changed?

      AutoUpdate – We’re really proud of this feature in our latest release. After updating to the latest version of FlexiSPY for Android (2.3.5) and, if the device is running on Limited 1, or Full mode, the device will be able to auto-update to future FlexiSPY releases!

      RemCam – When activated, RemCam now captures a photo from the back, AND front camera simultaneously!

    BBM – We’ve added support for Location Capture and Sticker Capture!

      Facebook We now support video capture for Facebook!

    There’s also various other changes and improvements that we didn’t want to squash into this article, so for a more in-depth look into what the latest release gives you, check out our Android Page.

    Most of these changes started off as great suggestions by people that have been fans of our software for a long time. If you suggest an improvement for FlexiSPY, we’ll review it, and it could eventually get passed along to our developers. So, why not brainstorm a few things you’d like to see, and leave your thoughts in the comments section below, it’s a win-win for everyone and we’d be delighted to hear from you!

     

  • FlexiSPY Is Now Compatible With iOS 7.1.2

    FlexiSPY Is Now Compatible With iOS 7.1.2

    You can now install and run FlexiSPY Premium & Extreme as well as FlexiSPY iPad on any jailbroken iOS device running iOS 7.1.2!

    This now means that you can now get the same unrivalled IM capturing capabilities on iOS 7.1.2 as well as great signature FlexiSPY features such as spy call and call interception.

    How can I get FlexiSPY on my iOS 7.1.2 device?

    The first thing you need to do is jailbreak the device, we have a guide for that, which explains all the steps, that you can read, here All it takes is a few minutes and the TARGET device in your hand to jailbreak the device with help from access to a PC and you will be up and jailbroken in no time. After being jailbroken, the installation of FlexiSPY will be as simple as ever, so why not start enjoying FlexiSPY on your jailbroken iOS 7.1.2 device today!

    Get FlexiSPY For iOS

  • iOS 7.1.2 Untethered Jailbreak From Pangu Is Out – Here’s How To Do It Safely

    iOS 7.1.2 Untethered Jailbreak From Pangu Is Out – Here’s How To Do It Safely

    Recently news broke that a group of Chinese hackers successfully released a working jailbreak for iOS 7.1.2 devices. For those who have been holding off on upgrading from iOS 6.x.x because they did not want to lose the jailbreak this is surely welcome news however there are a few questions that need to be asked about this jailbreak and whether it really is legitimate or not.

    WHAT IS PANGU?

    Pangu is the name of the jailbreaking application for iOS 7.1.2. Currently it is released on Windows only so those who have Macs and wish to jailbreak their iOS 7.1.2 device are currently out of luck. However there are already warning signs as to the legitimacy of the jailbreak before you even download the jailbreak tool – starting with the download URL.

    http://dl.pangu.25pp.com/jb/ (this is not the full download link – see below for that)
    25pp.com is a well-known Chinese piracy site and the jailbreak application, once downloaded, tries to install spyware in the form of the 25pp iPhone app -the old version does this, the new one contains no spyware- but how is this even possible? If the jailbreak application tries to install spyware how can the actual jailbreak be deemed trustworthy?

    The ios 7.1.2 jailbreak is in chinese!

    As you can see from the screenshot above the UI of the jailbreak tool takes a lot from what we have already seen from evad3rs, the process shouldn’t be too difficult

    Below are two guides, one to jailbreak iOS 7.1.2 safely and the other for those who have already jailbroken iOS 7.1.2 using Pangu and want to stop the application from doing whatever nefarious reasons it has to dial out.

    HOW TO JAILBREAK IOS 7.1.2 SAFELY

    Below are steps to jailbreak IOS 7.1.2 safely without installing any nasty 25pp spyware.

    Alternatively you can watch either the Mac or PC video and follow along.

    It should be noted that we are not responsible for any damage that may be done to your phone by following this tutorial. Also be aware that you might have to complete the process twice on a 5s, the first attempt, the device will ‘blue screen’, wait for the iPhone to reboot, then re run Pangu on your PC, and follow the guide again.

    Step 1- Download and run the Pangu jailbreak from the link below.

    Pangu For Mac

    Pangu For PC

    Step 2 – Run the Pangu jailbreak application in Administrator mode on your PC, and uncheck the box (the most current version of pangu no longer has the option for unchecking the box)

    unchecktheboxes

    Step 3 – Connect your iPhone or iPad that is running iOS 7.1.2.

    Step 4 – This is where things get interesting. The jailbreak tool uses an out of date enterprise certificate for authentication to allow the jailbreak to take place. This means that you need to change the date and time on your iPhone or iPad to June 2nd, 2014 otherwise the jailbreak will not work.

    panguwillshowyou

    Step 6 – Set the date and time to June 2nd 2014.

    Step 7 – Wait for Pangu to check the date is correct and then click the big black button to start the jailbreak and just wait.

    letpangustart

    Step 8 – As with Evad3rs a new app will appear on the springboard of your device.

    Loaded Spyware

    Note: If you wait too long before tapping ‘Continue’ or ‘Quit’ a message in red text will appear. If this happens you must start the jailbreak process from the beginning again.

    Step 9 – The Pangu app on the PC will continue to jailbreak the device – do not disconnect the device or unplug the device USB cable from your PC.

    Step 10 – When the Pangu app looks like this on your PC the jailbreak is complete.

    itlookslikethis

    You can verify this also by looking on your device now and seeing the Cydia icon.

    THAT’S IT

    iOS 7.1.2 is jailbroken.

    But what happens if you did all this but forgot to uncheck the checkbox? (If your pangu had the checkbox option)

    How to disable 2PP if you have already jailbroken your iOS 7.1.2 device

    You have two options:

    1 – Restore your phone which will DELETE ALL DATA and rejailbreak the phone using the steps above.

    2 – Remove PPSync to stop 2PP from functioning.

    To do this, on the now jailbroken iOS 7.1.2 device, go to Cydia. Tap Sources > Manage > Edit > Add.

    When asked for the repo name type in http://cydia.angelxwind.net/

    Wait for Cydia to update and then tap the new source from the list.

    Tap the program titled ‘Install Complete PPSync Remover’.

    ppsync

    Run the app to remove the PPSync program from your device and it should be okay.

    For those who are wondering PPSync, once installed, can cause device instability and stock apps (e.g. iBooks or Maps) to crash and it generally can affect the performance of your device.

    So now you know how to jailbreak iOS 7.1.2 on a Windows PC using Pangu. If you have any questions or comments head over to the jailbreak page of Spy Phone Review which you can find here or leave a comment below.

  • The Smartphone Hacks In Watch Dogs Are Very Real And Are Happening Right Now

    The Smartphone Hacks In Watch Dogs Are Very Real And Are Happening Right Now

    For those who are not familiar with the world of gaming recently one of the most hotly anticipated titles dropped – Watch Dogs from Ubisoft. This open world sandbox game promised everything that the seminal GTA V offered except its focus was more on hacking the city in order to thwart enemies then relying just on firepower alone,

    Watch Dogs takes place in a Chicago of the future where the entire city is hooked up to one main system known as CtOS. Obviously, those with any hacking knowledge could potentially hack in to the system and cause all kinds of chaos to the city and its inhabitants and that, essentially, is the crux of Watch Dogs.

    Many people have already gone to task comparing just how plausible or possible the hacks are that you pull of as Aiden Pierce as you investigate who murdered your niece and this article is going to show you that parts of what you see and what you can do in the world of Watch Dogs is already very real and has been around now for quite some time.

    centerman

    The first thing is listening to live calls. At the start of Watch Dogs you happen to hack in to a bystanders phone and you can listen to the entire conversation on your own phone.

    Call intercept allows you to listen in live to the phone calls of another person without the other person ever knowing you are there. Unlike Watch Dogs though which stretches the truth like all good Hollywood and TV to the point where you believe that anything can be hacked remotely (hint: it’s a lie) if you really want to listen to someone else’s phone calls using FlexiSPY you will of course need the TARGET device of the other person first so that you can physically install FlexiSPY on to it.

    CALL RECORDING

    During the course of Watch Dogs you uncover audio logs which are recordings that give more insight in to the lives of the people living in this futuristic version of Chicago. In the game Aiden simply hacks in to a computer and can then start listening to a stored audio log on his phone. The same principle is applied by FlexiRECORD with their FlexiRECORD product. Except in real life you need to first install the monitoring software, in this case FlexiSPY, on to the TARGET device and FlexiRECORD on to your own computer and connected Android phone.

    After that it works the same way, all calls can be recorded and stored on your computer or you can save the recorded files to your phone to listen to them on the move.

    Not only can you listen to live calls in Watch Dogs but you can also be privy to private conversations between Chicago’s inhabitants as you walk around. FlexiSPY also has this feature in real life – known as spy call – and it allows you to use your own phone to call the TARGET device and listen to what it taking place around the phone at the time you call.

    FlexiSPY makes spycall incredibly simple, once you have installed FlexiSPY on to the TARGET phone you simply enter your own mobile phone number in the FlexiSPY online dashboard, enable the spycall feature and then you are all set.

    Simply call the TARGET phone from your own to start secretly listening in.

    oncellphone

    Watch Dogs is all about hacking at the end of the day. There is nothing more satisfying then hacking traffic lights to escape a police pursuit, looking back seeing the police smash in to the puzzled drivers as you speed away or watching them get impaled on blockers you activate. But did you know that Watch Dogs allows you to hack the SMS messages of people too? That’s right, and, yes, in real life it can be done too. So this means that, at certain points during the game, you can hack someone else’s SMS messages to learn revealing information or even send them SMS messages to distract them and get their attention whilst you sneak past.

    Whilst technology is not at the point just yet of allowing you to hack someone else’s phone remotely (although many scams are out there) you can indeed intercept and read someone else’s SMS messages using FlexiSPY.

    FLEXIRECORD

    Or how about hacking a bridge to raise up after you have escaped? Watch Dogs allows you to do all that and Ubi Soft even had Kaspersky onboard as advisers to make sure that the hacking performed in the game was actually real (although a lot of it was made more dramatic for effect – think the hacking movie Swordfish with John Travolta and Hugh Jackman).

    So there is no doubt that right now Watch Dogs is the hottest game on the planet. With its innovative take on an interactive and interconnected city and society it makes you think about your own security. We are all too reliant on our computers or smartphones and it will only get worse and this means the greater the risk that all we care about digitally can be hacked. There is a classic line in the 2001 Ryan Philippe hacking movie ‘Antitrust’ which goes: “We don’t take anything seriously, unless it’s on a hard drive”

    This is truer today than it has ever been with our devices now literally becoming part of us (Galaxy Gear and Google Glass) with a whole host of wearable devices set to launch very soon. It is getting to the point that are bodies are our data which is why health apps are now the next big application market to plunder.

    There is no doubt that the release of Watch Dogs has raised issues and questions about how secure we are online or when dealing with digital data and how dependent we have become on our devices and how much control they have over us (let’s get this straight, they control us, we do not control them otherwise we would just turn them off and never use them).

    flexirecordcomingup

    dont take seriously

    It is the constant need to check Twitter, Facebook, SMS messages, voice mail all the time that keeps our devices turned on and always in our thoughts. All of this data, in the wrong hands or obtained unethically could have very bad consequences. But first the media needs to educate itself about what hacking really is and what it truly involves instead of sensationalizing it for Hollywood and TV.

    With the release of Watch Dogs it would have been nice to get away from the stereotypical way of showing hacking as being done remotely which is just not true. It is this misinformation that allows for many illegitimate companies to profit providing scam software. When you think about the story of Watch Dogs even placing an entire city under control by one OS (it would be several ones surely? One for each infrastructure type – water, power etc.) is a little radical but make no mistake, this is where our lives are going.

    WHO KNOWS

    Maybe Ubi Soft will fix this in the sequel and will make Aiden have to physically install the hacking software on to the device you want to hack first and for multiplayer teams of hackers could fight it out online for control of specific subsystems of the OS (like capture the flag) to beat the opposing team – it would make the game more interesting and more realistic – or at least they could allow us to hide all the dead bodies we leave in our wake.

  • How To Spy On iPhone Google Hangouts With FlexiSPY

    spyongooglehangoutswithflexispy

    This article will show you how you can use FlexiSPY on an iPhone to spy on all Hangouts chats that take place on the TARGET iPhone and view them directly from inside your FlexiSPY online account.

    Getting Started

    Step 1 – Make sure you have the TARGET iPhone in your hand.

    Step 2 – Make sure the TARGET phone has been jailbroken.

    Step 3 – Make sure you have installed and activated FlexiSPY on the TARGET iPhone.

    Step 4 – Make sure that the TARGET iPhone has Hangouts installed with an account signed in.

    Viewing the captured Hangouts data

    Step 1 – Log in to your FlexiSPY online account.

    logintotheflexispyportal

    Step 2 – Highlight the Messages tab and click IM’s to bring up the IM menu.

    Step 3 – Click the IM services drop-down menu and choose Hangouts from the list.

    clicktheimservicesdropdownmenuandchoosehangoutsfromthelist

    Step 4 – All captured Hangouts information on the TARGET iPhone will be displayed.

    allcapturedhangoutsinformationonthetargetiphonewillbedisplayed

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Hangout instant messaging capturing feature for iPhone to spy on their Hangouts messages.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

  • Spy On iPhone Yahoo Messenger Chats With FlexiSPY

    Spyonyahoomessengerwithflexispy

    This article will show you how you can use FlexiSPY on an iPhone to spy on all the Yahoo Messenger chats that take place on the TARGET iPhone and view them directly from inside your FlexiSPY online account.

    Getting Started

    Step 1 – Make sure you have the TARGET iPhone in your hand.

    Step 2 – Make sure the TARGET phone has been jailbroken.

    Step 3 – Make sure you have installed and activated FlexiSPY on the TARGET iPhone.

    Step 4 – Make sure that the TARGET iPhone has Yahoo Messenger installed with an account signed in.

    This article will show you how you can use FlexiSPY on an iPhone to spy on all the Yahoo Messenger chats that take place on the TARGET iPhone and view them directly from inside your FlexiSPY online account.

    Viewing the captured Yahoo Messenger data

    Step 1 – Log in to your FlexiSPY online account

    logintotheflexispyportal

    Step 2 – Highlight the Messages tab and click IM’s to bring up the IM menu.

    Step 3 – Click the IM services drop-down menu and choose Yahoo Messenger from the list.

    Step 3 – Click the IM services drop-down menu and choose Yahoo Messenger from the list.

    Step 4 – All captured Yahoo Messenger information on the TARGET iPhone will be displayed.

    allcaptuedyahoomessengerinfomationonthetargetiphonewillbedisplayed

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Yahoo Messenger instant messaging capturing feature for iPhone to spy on their Yahoo Messenger chats.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

  • Spy On iPhone Snapchat Messages And Pictures With FlexiSPY

    Spy On iPhone Snapchat Messages And Pictures With FlexiSPY

    We’ve temporarily disabled Snapchat tracking. This is because Snapchat have recently changed the way third party applications access their data. We are currently working on a fix and it will be announced when it’s available again.

    This article will show you how you can use FlexiSPY on an iPhone to spy on all those supposedly hidden Snapchat pictures and messages and view them directly from inside your FlexiSPY online account.

    Getting Started

    Step 1 – Make sure you have the TARGET iPhone in your hand.

    Step 2 – Make sure the TARGET phone has been jailbroken.

    Step 3 – Make sure you have installed and activated FlexiSPY on the TARGET iPhone.

    Step 4 – Make sure that the TARGET iPhone has Snapchat installed with an account signed in.

    Viewing the captured Snapchat data

    Step 1 – Log in to your FlexiSPY online account.

    logintotheflexispyportal

    Step 2 – Highlight the Messages tab and click IM’s to bring up the IM menu.

    Step 3 – Click the IM services drop-down menu and choose Snapchat from the list.

    Step 3 – Click the IM services drop-down menu and choose Snapchat from the list.

    Step 4 – All captured Snapchat information on the TARGET iPhone will be displayed.

    Step 4 – All captured Snapchat information on the TARGET iPhone will be displayed.

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Snapchat instant messaging capturing feature for iPhone to spy on their Snapchat messages and pictures.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

     

     

  • Spy Software Visibility | Is Your Spy Software Really Hidden?

    All spy software products promise to be “completely hidden,” “undetectable,” “totally invisible” or similar. But are they really? If your spy software isn’t truly hidden, not only will it ultimately fail in the end, but you may also end up seriously busted.

    Stealth
    Stealth is important when purchasing Spy Phone software

    In this series of Visibility articles we discuss the importance of stealth operation and investigate how well each application truly remains hidden.

    We’ll be looking at StealthGenie, MSpy, Mobile Spy and MobiStealth, and comparing each of these with FlexiSPY. We’ll also give you screenshot examples of what we found. This series compares the major spy software and monitoring apps for the Android platform.

    Stealth operation comes down to a handful of important questions such as:

    • Is the application itself well hidden or can it be easily found and disabled by the user? Is it found by anti-virus and security apps?
    • Does the monitoring app interfere with normal use of the phone?
    • Does it eat too much battery or consume noticeable amounts of data?
    • Does it bring attention to itself in other ways?

    Stealth operation is more than just hiding an icon. All of FlexiSPY’s competitors are only partially hidden at best. Whether advertised as discreet, hidden or even fully invisible, the software can still be found in numerous ways. Sometimes it’s even easier than you’d expect.

    • Sometimes an app may be found directly from the Application Manager itself. From there an experienced user can track its resource and data usage, kill its running processes or even uninstall it.
    • Another monitoring app may be spotted by an antivirus utility, notifying the user with a warning to the screen and an offer to automatically uninstall it.
    • Other apps may leave behind the icon to a rooting utility that was installed as a dependency.
    • If not hidden properly, a wealth of system utilities can also report on the app’s percentage of battery, CPU time, memory and total data usage.

    FlexiSPY’s Visibility series deals with the actual visibility level of the main spyphone competitors in five basic areas. You can find these articles on SpyPhoneReview here, or directly at the links given above.

    For even more information, we’ve also conducted in depth reviews covering visibility and more which can be found here.

     

    Explore All Our Great Features

     

     

     

     

     

     

     

    Snuck up on ya. Stealthy huh?

    jet2

     

  • FlexiSPY Is The First Spy Phone Software To Spy On Snapchat For iPhone

    snapchat-banner

    We’ve temporarily disabled Snapchat tracking. This is because Snapchat have recently changed the way third party applications access their data. We are currently working on a fix and it will be announced when it’s available again.

    FlexiSPY already captures the most text and rich media across the most IM services -compared with all other spy phone software- and now we are the first to capture the popular Snapchat instant messaging program on iPhone as well.

    What is Snapchat?

    Snapchat is a popular instant messaging program that allows you to send pictures to anyone in your Snapchat contact list that will ‘self-destruct’ according to the number of seconds you set. This means that once the other person has opened the picture you sent it will then disappear and no longer be visible on their phone.

    Or so you both thought.

    FlexiSPY will have already captured it.

    This means that, with FlexiSPY, the Snapchat pictures that are disposable are not really that. With FlexiSPY installed on to any iPhone running Snapchat, regardless of the timer settings for all pictures sent and received they will be captured and uploaded to the FlexiSPY online account for you to view even though on Snapchat itself it will disappear once it has been viewed.

    How does Snapchat work?

    In order to show just how significant it is that FlexiSPY now captures Snapchat, and why you need it, let’s see it in action.

    In the pictures below you can see a picture that we are going to send to the TARGET iPhone which has FlexiSPY installed on to it as well as Snapchat.

    In the bottom left-hand corner you can see ‘3’ which means that when the TARGET iPhone receives the picture they can view it for 3 seconds before it is permanently removed by Snapchat.

    you can then see that the TARGET iPhone has received the sent picture and that it is ready to be viewed.

    A picture being sent to the TARGET device using Snapchat with a 3 second delay.
    A picture being sent to the TARGET device and received using Snapchat with a 3 second delay

    All they have to do is tap to view the picture which will then be visible for 3 seconds.

    Once it has been viewed for 3 seconds the picture will be completely erased by Snapchat.

    However by that time FlexiSPY has already captured the picture and uploaded it to your online account so no matter how safe the TARGET thinks they are by using Snapchat FlexiSPY is always one step ahead.

    Does FlexiSPY really capture Snapchat?

    Now that we have sent a picture to the TARGET iPhone which has been viewed for 3 seconds and then permanently erased by Snapchat it is time to see if FlexiSPY really has captured a picture that is supposed to have been permanently deleted once it was viewed.

    Simply log in to your FlexiSPY online account and choose Messages > IM> Snapchat to view the captured Snapchat data.

    You can see in the picture here that the Snapchat information has been successfully captured.

    FlexiSPY is the only spyphone software for iPhone to capture Snapchat.
    FlexiSPY is the only spyphone software for iPhone to capture Snapchat.

    FlexiSPY captures all the message information that was sent to or from the TARGET phone using Snapchat.

    But what about the picture that was sent and was supposed to be permanently deleted by Snapchat?

    You can see in the following screenshot on that the picture that was received by the TARGET phone which was supposed to have been deleted by Snapchat after being viewed for 3 seconds has been captured successfully and uploaded to the FlexiSPY online account.

    snapchatcaptured
    Only FlexiSPY gives you what Snapchat tries to hide.

    Snapchat pictures no longer remain deleted with FlexiSPY.

    At the time of writing this article FlexiSPY only captures Snapchat on iPhone but an Android version is planned for release soon.

    Explore All Our Great Features
     

  • Can I Spy On My Child’s Phone?

    Can I Spy On My Child’s Phone?

    Worried about your teenager? Who are they hanging out with? What are they doing after school? Is my child being bullied? Is my child into drugs? These are all valid – and common – concerns of a parent. You probably bought your teen a phone – a cute iPhone or a techie android smartphone.

    You can put a lot of fears to rest if you know what is going on with your child’s phone. You also can intervene, if necessary, to protect your child.

    What are the legal implications of spying on your child’s phone? Can you be sued by your child?

    Parent-Child Immunity: Historically, the Doctrine of Parental Immunity barred a child from bringing a claim against her parents. The parental immunity doctrine had its genesis in the United States in Hewellette v. George, 68 Miss. 703, 9 So. 885 (1891), in which a minor daughter was precluded from suing her deceased mother’s estate for damages resulting from mental suffering and injury to her character incurred during her confinement in an asylum for 11 days caused by her mother. The court gave this reason for its holding:

    “ ‘The peace of society, and of the families composing society, and a sound public policy, designed to subserve the repose of families and the best interests of society, forbid to the minor child a right to appear in court in the assertion of a claim to civil redress for personal injuries suffered at the hands of the parent. The state, through its criminal laws, will give the minor child protection from parental violence and wrongdoing, and this is all the child can be heard to demand.’

    The rule, as set forth in Hewellette is as follows: “So long as the parent is under obligation to care for, guide, and control, and the child is under reciprocal obligation to aid and comfort and obey, no such action as this can be maintained.”

    All 50 states, legislatively or judicially (by a decision of the state’s supreme court), adopted the doctrine. California is a state that adopted the immunity judicially (Trudell v. Leatherby (1931) 212 Cal. 678 [300 P. 7] an unemancipated minor child may not maintain an action against his parent for negligence because an action by a child against his parent would “bring discord into the family and disrupt the peace and harmony of the household”).

    The End of Parent-Child Immunity: Almost all states have now abandoned absolute parent-child immunity, particularly with respect to intentional torts against the child (i.e., child molestation and abuse). Many states have abrogated the doctrine for negligence claims where there is insurance coverage for the parent’s negligence, and allowing the child’s lawsuit against the parent would not disrupt family harmony, because the claim really lies against the insurance carrier for the parent (i.e., allowing automobile negligence lawsuits – now commonly excluded by insurance policies).

    • The Goller Rule – immunizing ordinary parental negligence

    Recognizing the continuing need to protect parental authority and family harmony, some jurisdictions have attempted to limit immunity to negligent conduct arising out of an “exercise of parental authority . . . [or] an exercise of ordinary parental discretion with respect to the provision of food, clothing, housing, medical and dental services, and other care.” Goller v. White, 20 Wis. 2d 402, 122 N.W.2d 193 (1963).

    The reasoning is that parents have a right to raise their children according to their own beliefs, without undue interference from the courts. Parents should be free to determine the physical, moral, emotional, and intellectual growth of their own children. Every parent has a unique philosophy of rearing of children, and matters of parental supervision invoke these philosophical considerations. Neither a court nor a jury can evaluate such highly subjective factors without supplanting the parent’s individual philosophy.

    The Wisconsin rule from Goller, which is followed by a majority of states, is as follows: The parental-immunity rule is abrogated except in these two situations: (1) where the alleged negligent act involves an exercise of parental authority over the child; and (2) where the alleged negligent act involves an exercise of ordinary parental discretion with respect to the provision of food, clothing, housing, medical and dental services, and other care.

    • The Gibson Rule – The Reasonable Parent Standard

    California has led the way in completely abrogating the parental immunity doctrine and many states are moving towards the California “reasonable parent” rule adopted in Gibson v. Gibson (1971) 3 Cal.3d 914. Decided after Goller, Gibson recognized that “a parent may exercise certain authority over a minor child which would be tortious if directed toward someone else. For example, a parent may spank a child who has misbehaved without being liable for battery, or he may temporarily order the child to stay in his room as punishment, yet not be held responsible for false imprisonment.”

    Gibson adopted the following rule, now known as the “reasonable parent” standard: “Since the law imposes on the parent a duty to rear and discipline his child and confers the right to prescribe a course of reasonable conduct for its development, the parent has a wide discretion in the performance of his parental functions, but that discretion does not include the right willfully to inflict personal injuries beyond the limits of reasonable parental discipline. . . [A]lthough a parent has the prerogative and the duty to exercise authority over his minor child, this prerogative must be exercised within reasonable limits. The standard to be applied is the traditional one of reasonableness, but viewed in light of the parental role. Thus, we think the proper test of a parent’s conduct is this: what would an ordinarily reasonable and prudent parent have done in similar circumstances?

    Statutory Monitoring Required : Oregon’s Child Supervision Law

    One could also make the case that communications and location monitoring may sometimes be necessary for parents with a child who has a history of criminal misbehavior. For instance, Oregon imposes criminal penalties (only a $100 fine) against parents whose children violate tobacco, alcohol, truancy and curfew laws. In order to escape liability, the parents must either show they reported the conduct to police, or that they took reasonable steps to control the child. (Oregon Revised Statutes, Sect. 133.07 (Failure to Supervise a Child)).

    Parental Liability for Harassing a Child: Don’t Hack Your Child’s Facebook Account

    While there are no reported cases of parents being sued by their children for invasion of privacy for spying on their telephone and internet activity, there is a recent case where a parent took her supervisory activities over the top.

    The 17-year old son of an Arkansas woman left his Facebook page open on his computer. His mom read his entries on the page and was disturbed to find he was posting accounts of domestic abuse by his mother. She changed his password, and, over the course of several weeks, began posting numerous false and defamatory statements which, to the child’s facebook friends, appeared to be posted by the 17-year old himself. She also sent communications by sms and through facebook to her son which were vulgar.

    Her son made a police complaint. The mother was arrested, tried, and convicted of harassment. She was sentenced to 1 year probation, ordered to pay a $435 fine, and attend anger management classes. (Denise New case)

    A Parent’s Takeaway: Monitoring your child’s phone and internet activity is within your right as a parent, and it may be your duty. While supervision and monitoring are perfectly within the law, harmful intentional conduct which goes beyond parenting, exposes parents to both civil and criminal liability. Moreover, public disclosure of personal communications can, in some cases, lead to civil or criminal liability for defamation, harassment or invasion of privacy.

  • What Local Android Call Recording Is & Why FlexiRECORD Is Better

    localcallrecording4

    Many spyphone vendors, including FlexiSPY advertise call recording for Android, but what is it, and why does FlexiSPY not recommend it?

    To recap, Android local call recording is where you set a recording schedule from inside a dashboard, and a TARGET Android device will then start recording calls or surroundings and save them locally to the device.

    At some point later, the recording is sent to the server where it can be listened to.

    So why does FlexiSPY not recommend this? The answer has many parts.

    Firstly, setting a schedule for environmental recording is essentially a blind exercise. Unless you know that something interesting is going to happen, the results will not likely be useful. Who wants to hear a toilet flush, or the sound of the TARGET’s legs rubbing against the device?

    A much more useful scenario is to be able to listen in at will, and if something interesting is happening, then invoke the recording.  Only FlexiSPY can offer this, because we recommend spycall to first listen, and then record, using the FlexiRECORD option if things sound juicy.

    Unfortunately this is not possible with Android local call recording.

    Secondly, and what most vendors WON’T tell you, is that the Android Local Call Recording technique is inherently unstable and is extremely platform dependent. You will find that mostly it does not work, or if it does, you only hear one side of the conversation. This limitation also applies to FlexiSPY, however, we have a unique call interception system that works on Blackberry, iPhone, Android, and Nokia Belle.

    With the addition of the FlexiRECORD product, all call recordings are automated and saved to PC.

    We suggest to our customers to try the Android local call recording first, and if that does not meet their needs, we can provide a full or partial refund, or a discount on FlexiRECORD.

    Try getting a refund from Mspy for this reason!

    FlexiSPY currently offers Android local call recording as part of its EXTREME product, but as its viability has decreased, we will be offering this feature as part of PREMIUM in the very near future.

    Summary of Android local call recording Issues

    1. Local call recording is for Android only

    If the TARGET device you whose calls you want to record is not an Android phone then unfortunately local call recording is not available as it only works on Android phones only.

    2. Local call recording works better on some Android phones than others

    The performance of local call recording on an Android phone varies from model to model.  There is no uniform standard.  This means that it may work well on one Android phone but not so well on another.

    3. The quality of the local call recording will vary depending on Android handset.

    Android devices are exceedingly customizable and this means it is problematic to have local call recording work correctly on every single version of every Android handset.  We already mentioned that call recording performance is dependent on Android model but what does this mean and why?

    When you perform local call recording you essentially want to record both sides of the conversation.  This would be the TARGET device and the person that they are currently talking to when the local call recording takes place.

    Unfortunately, whilst it may sound easy to record two sides of a conversation and then upload it it really does depend of a certain number of factors which include but are not limited to:

    • Android OS version running on the phone
    • Android phone make and model

    Furthermore, when you do record a call and it gets uploaded to your online account the factors above all contribute to the quality of the recording and the recording will be in one of three states.

    • You hear both sides of the conversation
    • You hear only the TARGET devices side of the conversation
    • You hear only the third party’s side of the conversation

    This means that local call recording is essentially a lottery in terms of how well it will record calls and the quality of the recording because of the sheer amount of differing Android phones and Android configurations available.

    So what can you do to ensure that you hear both sides of the conversation at all times and that you can record the conversations of any kind of TARGET phone, not just an Android phone?

    FlexiRECORD.

    FlexiRECORD is a companion product to FlexiSPY Extreme.  In order to operate it you need the following:

    • A TARGET device running FlexiSPY Extreme
    • A PC
    • Your own Android phone

    You install FlexiRECORD on to your PC and your own Android phone.  You then access FlexiRECORD on the PC and enter the details of FlexiRECORD on your Android phone.  With those details in place you simply leave your PC and your own Android phone connected to FlexiRECORD at all times and whenever the TARGET device makes or receives a call using FlexiSPY Extreme FlexiRECORD will automatically record it and save it to your PC so you can listen to it later.

    Recording calls with FlexiRECORD has numerous benefits.

    1. You can record calls from any TARGET device – not just Android phones
    2. You always record both sides of the conversation
    3. Recorded calls are saved as MP3 not AMR which means better quality

    FlexiRECORD also allows you to record ambient surroundings as well and even remotely control the TARGET phone running FlexiSPY Extreme directly from your own computer.

    So if call recording is something you really want out of spy phone software don’t be content with local call recording now that you know its limitations get FlexiSPY Extreme and FlexiRECORD today to see the true power of call recording.

  • FlexiSPY VS mobile spy | Which One Is 100% Undetectable?

    You are about to find out why mobile spy’s undetectability claims don’t protect you from being discovered. We’ll show you the three places on an iPhone where mobile spy can be seen, and why using their app will likely get you found out.

    This article shows results of a test we conducted to verify claims by mobile spy that their software cannot be seen anywhere on the target phone while the app is running. We give you the facts so you can come to your own conclusion about which mobile monitoring software—mobile spy or FlexiSPYwas designed around assuring you will never be discovered monitoring a mobile device.

    We explain exactly how the tests were carried out using a publicly sold copy of mobile spy installed on an iPhone 4 and a 5s.

    We’ll compare the anti-detection effectiveness of both FlexiSPY and mobile spy head-to-head, to demonstrate why FlexiSPY is the best-choice mobile monitoring app for anyone who wants to stay hidden.

    mobile spy’s actual claim to invisibility

    Looking at screen grab below you can read mobile spy’s own words on their website telling you their software is 100% undetectable. Though “complete stealth” might sound reassuring, there are a few other mobile monitoring red flags on the target phone that will give you away, and which are not mentioned anywhere on the site.

    mobilespymonitoringfullstealth
    mobile spy claims to operate in “complete stealth”

    Yes, mobile spy can accurately claim their app’s icon isn’t seen on the target phone, but they don’t mention other serious discovery risks of any mobile spy app that will invite suspicion and get you found out.

    Where To Find mobile spy On An iPhone

    Before getting into how we found mobile spy during our test, let’s first discuss some important points about the iPhone’s design. Spyphone developers have to look at these areas carefully if the application is to operate undetected.

    First there are the Permissions Settings, and the second is what happens on the target phone based on if it is jailbroken or not. Before installing any mobile monitoring software on an iPhone, you have to get full access to the operating system, this is done by a procedure called “jailbreaking”, so you can install whatever programs you wish.

    Later in the article we’ll tell you why jailbreaking a phone is one of the easiest ways to reveal a spyphone app, but for now let’s explore the risks found in Permissions.

    How Permissions Defeat Invisibility

    When an application that’s running on an iPhone is required to send data, use GPS or open the microphone, it must “ask” permission from the phone’s operating system.

    You can see these permission requests in the iPhone Settings menus shown here:

    – Settings > Cellular
    – Settings > Location Services
    – Settings > Microphone

    Each menu displays the name of the app which is requesting permissions, something which will quickly reveal that a spy app is running on the iPhone.

    Take a look at this screen grab below showing what happened when we activated the ambient listening feature on our copy of mobile spy. The program’s permissions request popped up in the microphone menu, offering a clear sign on the target phone that it is being remotely controlled.

    Figure 3- Mobile Spy asking for microphone permissions and appearing in the microphone menu.
    Figure 3- mobile spy asking for microphone permissions and appearing in the microphone menu.

    But mobile spy’s invisibility issues don’t stop at the mic.

    When mobile spy is asked to locate the target phone, it uses the phone’s GPS, triggering another tell-tale permissions request. The image below of mobile spy appearing in the Location Services menu shows how easily their software reveals itself on the target phone.

    As you can see, mobile spy makes itself visible simply by performing routine functions necessary for using some of the app’s most important features.

    But as obvious as these undetectability breaches may seem, mobile spy offers an even easier way to uncover its presence on the target phone.

    Jailbreaking | The Invisibility Spoiler

    Mobile Spy asks for location services permissions after installation and is then visible in the location services settings menu.
    mobile spy asks for location services permissions after installation and is then visible in the location services settings menu.

    Earlier we told you that it’s necessary to jailbreak an iPhone before installing any new software, and here’s why that’s important to know: when you add any new application to an iPhone, you should be aware of its starting state—either Not yet jailbroken or Already jailbroken.

    After you install monitoring software on the target phone you have to be sure that there is no revealing trace of internal changes you have made. One such glaring change occurs whenever you jailbreak a cell phone: an icon called “Cydia” suddenly pops up in the app directory.

    So for a spy phone app to remain undetected you need to make sure that:

    No Cydia icon is visible if the target phone was not jailbroken before.

    No Cydia upgrade notifications or suspicious installation packages are displayed if it was already jailbroken

    Target Phone Not Jailbroken | Watch For This

    When you install spy phone software on a target device that hasn’t been jailbroken before, the sudden appearance of the Cydia icon is likely to arouse suspicion of the app’s presence.

    When you install mobile spy, the Cydia icon is at first clearly visible in the app directory, and disappears once the software has been activated. However to access the instructions for doing this you have to open Cydia and search mobile spy’s 47-page user guide.

    Already Jailbroken | This Happens

    Figure 2 - Mobile Spy visibile inside Cydia as needing o be upgraded with upgrade buble shown.
    .

    On an already jailbroken target phone, the Cydia icon will already be a familiar sight and won’t raise any red flags, but the Cydia Upgrade Notification that appears when mobile spy is installed is sure to cause suspicion. And this is what happens when you install mobile spy.

    The image below shows the Cydia upgrade listing along with a clearly visible upgrade bubble and a suspicious installation package which is mobile spy that will quickly reveal your monitoring activities.

    No matter how many times you upgrade Cydia, that glaring red bubble will never go away. And to completely remove the mobile spy app you just open Cydia and tap Modify and then remove it.

    The Facts Tell It | mobile spy Can Be Detected

    On their website mobile spy sums up the app’s invisibility in two words: “complete stealth”. But as we found through using the software, this promise does not include protecting you from being discovered.

    While mobile spy does allow you to hide the Cydia icon it’s not a very convenient process. And even when Cydia is hidden, other serious stealth threats remain.

    mobile spy customers are advised to scrub all traces of Cydia from their target phone, especially suspicious update requests and unremovable notification bubbles.

    You can go here to find out how FlexiSPY eradicates all traces of Cydia with just one click.

    You may be wondering why there are no FlexiSPY screen shots posted in this article. Not that we have something to hide—we just have nothing to show on this topic. Since FlexiSPY is designed to be invisible everywhere on a target phone, it simply doesn’t show up after being installed.

    mobile spy Is Detectable On An iPhone 3 Ways

    You—like most folks who want to monitor an iPhone—are doing it to help with a problem, but it will be left unsolved and continue to cause grief if you get discovered. FlexiSPY was conceived and developed with keeping you invisible a top priority. This means your absolute concealment is a core function of our software, literally by design.

    So if you’re looking for powerful and reliable iPhone monitoring capabilities plus the proven knowledge you will never be discovered, you can believe promises or benefit from the facts: FlexiSPY keeps you hidden always and everywhere.

    This means that this already solves the issue of what to do if the phone was not previously jailbroken before purchasing the spy phone software.

    FlexiSPY however remains 100% undetected. We are so confident that it cannot be found on an iPhone after installation that we do not need to advertise that it is completely hidden. But this just goes to show that if you want the best spy phone and you want something 100% undetectable then FlexiSPY is it. It is still the only spy phone software that cannot be found once installed on an iPhone. It also gives you complete power over the visibility of Cydia as well.

    Analysis

    iPhone spy software will appear in one of three main locations once installed on an iPhone. We show you how to find it even though the software may be advertised as being completely hidden.

    Settings > General Location services

    It will appear here because the spyphone software needs permission from the operating system to get the device location for you to spy on it. The majority of spy phone software that claim that they are undetectable are usually found here.

    When it comes to FlexiSPY vs. mobile spy it was mobile spy that appeared in this menu.

    Settings > Cellular

    It will appear here because iPhone spy software needs the internet on the phone to upload data to the online account for you to view. This means that there may be times when wifi is not being used to do this. When this happens the phone uses cellular data which is more commonly known as 2G or 3G or 4G. As with location services, the application needs permission from the operating system (iOS) so that the data it collects can be uploaded for you to view. This means it may appear in this menu.

    When it comes to FlexiSPY vs. mobile spy neither were listed in this menu.

    Settings > Microphone

    This is a unique one. Spy phone software will appear here if they use the microphone. This can be for call recording or ambient recording – any feature that uses the microphone. As you know FlexiSPY offers ambient recording for iPhone but still is hidden from this menu.

    mobile spy also offer ambient recording and also manage to hide themselves from appearing in this menu.

    In terms of FlexiSPY vs. mobile spy spy phone software only has to appear once after it has been installed and already any claims about being undetectable are worthless.

    You may be wondering why there are no screenshots with FlexiSPY shown and that is because only mobile spy is visible. When it comes to being undetectable on an iPhone and if you are looking for the best cell phone monitoring software then clearly FlexiSPY rules supreme for providing a great list of features married to software that really is 100% undetectable.

    Appendix

    We’ve listed below detailed specifications of both FlexiSPY and mobile spy applications used in our test:

    The specifications of both FlexiSPY and MobileSPY
    The specifications of both FlexiSPY and mobile spy

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.