Category: Советы и Хитрости

Здесь Вы можете прочитать последние FlexiSPY Советы и хитрости сообщения, где вы можете узнать, как получить максимальную отдачу от вашего программного обеспечения FlexiSPY.

  • Easily Change Your Android SELinux Mode

    Easily Change Your Android SELinux Mode

    This guide will show you how to Change your Android SELinux mode to permissive on an Android phone, helping you better run various apps to their fullest.

    We are not responsible for any damages that occur through following this article. at the time of writing the steps worked fine for the test android phone we were using and we were able to change selinux successfully using a custom kernel.

    As we have mentioned throughout this article custom kernels are not available for all versions of every Android phone ever made. however popular phones should be covered. Always take care and backup the device at all stages and correctly choose the kernel for the android model number of the phone you are working with.

    Changing SELinux from enforced to permissive will Not Work on Samsung Android Phones with Samsung Knox enabled and it may also not work for other Android phones from other manufacturers depending on the Sndroid os version installed.

    What is SELinux?

    SELinux or ‘Security Enhanced Linux’ is an Android OS module that is designed to identify and address critical security gaps in the Android operating system. It is used to protect the Android operating software from malicious code or software being installed and causing damage to the phone.

    Unfortunately those same ‘security gaps’ associated with malicious software also allow many apps at their root features to function properly. With SELinux in Permissive mode the security gaps in the Android operating system are not fixed and so the programs can use those to run properly.

    With SELinux set to Enforced mode the security gaps are fixed, therefor the software cannot run all of its root features properly which results in Limited mode and reduced functionality.

    How does SELinux affect applications?

    When Samsung released Android OS 4.3 they changed the SELinux option from Permissive, which is what a lot of applications need, to Enforced which means that while most applications will work certain features will not.

    For example, when you install FlexiSPY on a rooted phone, as part of the installation process, while it checks for root permissions within SuperSU (after you grant access) it also checks the SELinux status to see if it is set to Enforced – if it is then it will try to force the permission status to permissive.

    If it is successful then the software runs in root mode with full access, whereas if it’s unsuccessful, then it will run in root mode with limited access.

    How To Check Your SELinux Settings

    On the phone, go to Settings > More > About Device and then scroll down to the bottom where you’ll see SE for Android Status

    Easily Change Your Android SELinux Mode To Permissive

    There is a program on the Play Store (link below) that can change the SELinux mode of non-Samsung Android phones and Samsung Android phones running OS 4.4.2 and below but anything above that and the software will not work – we mention about issues with OS 4.3 and above here

    All you need to do is download the application on to the Android phone, run it and tap the Permissive button but, if the Android phone is a Samsung Android phone with OS 4.3 or above installed which also has Knox running then it will no longer work.

    • Download and install SELinux Mode Changer from the Play Store onto your phone.
    • Run the application and set SELinux to Permissive
    • Restart the phone
    • Check the SELinux status in the About Device menu to see if it has changed.Note: This process will not only downgrade the OS version but it will also DELETE ALL DATA ON THE PHONE.

    Didn’t work? | Install a Custom Kernel

    One way to get around SELinux being set to Enforced is change the kernel to one which has been edited so that SELinux has been set to Permissive which should theoretically allow your apps, or FlexiSPY to run in Full mode.

    These kernels though may not exist or may be hard to find for every Android phone.

    Any Android phone, not just Samsung, whose SELinux status is set to Permissive can run FlexiSPY in FULL MODE.

    First of all you need to find out if the Android phone you have has SELinux set to permissive or not which we have explained earlier.

    SELinux cannot always be changed so easily depending on the make and mode of the Android phone.

    And this is why we have to install a custom kernel if the SELinux Mode Changer application fails to fix the problem.

    Please note that custom kernels with selinux set to permissive are not available for all android phones – regardless of whether they are made by samsung or not.

    Where can you download a custom kernel?

    The Android OS kernel is the most important part of the Android OS. It allows the phone software to interface with the hardware and the application that are installed on the phone, basically telling the phone how to run and what settings and configuration it has and then all this information is used for all installed programs on the Android phone.

    The best place to look for custom kernels is the forum on XDA Developers.

    How can I install a Custom Kernel which has SELinux set to permissive?

    For this example we are using a Samsung Galaxy S4 so we go to XDA forums to get started.

    The first thing to do is type in your Android phone model.

    A screenshot of the xda page where you search for your phone model

    Make sure you choose the correct one from the list as many of the same Android phones have country variants with different model numbers.

    You can find the model number to search for on the Android phone by going to the About Device (can also be called About Phone) menu and it will be listed.

    For example the model number of our Samsung Galaxy S4 is GT-I9505 so that is what we need for our custom kernel.

    Once you have entered the model number to search for you will get the main page for that Android phone.

    We need a custom kernel so we click the Kernels tab.

    Screenshot of the xda kernels tab

    You now need to simply browse through all the custom kernels until you have found one that says it has SELinux set to permissive.

    For our version of the Samsung Galaxy S4 we found one pretty easily.

    screenshot of the SELinux kernel with the permissive state active

    As you can see it matches the model number of our Samsung Galaxy S4 and has SELinux set to permissive and runs on Android OS 4.3.

    Note: never install a custom kernel on to a phone whose model number does not match. doing so can make the phone inoperable.

    Custom Kernel Installation Guide

    The first thing to do is to backup the phone completely. This is vitally important. We explain how to backup an Android phone completely in this article.

    Once you have backed up the phone completely download the ROM file from here.

    Once you have downloaded the kernel file to your PC you need to install Clockworkmod recovery on to your Android phone. If you have already rooted the Android phone then you already have Clockworkmod installed – you can learn more about rooting and how to root popular Android phones here.

    Now that you have backed up the Android phone and rooted it to install Clockworkmod recovery it is time to install the customized kernel.

    First you need to connect the Android phone to your PC.

    Once it is connected it will appear as a device. Simply copy the kernel zip file to the Downloads folder of the phone, once you have done that we can boot in to ClockworkMod recovery and flash the kernel.

    1. Make sure the Android phone is turned off completely.
    2. Hold down the Volume Up, Home button and power together until the model number appears.
    3. Let go of the key combination and Clockworkmod recovery should load.
    4. From the list of options choose Install zip from Sdcard
    5. Browse to the kernel zip file you copied to the phone and select it.
    6. Install the kernel and wait for it to complete.
    7. Choose ‘Reboot System Now’ to reboot the phone.

    Now that you have flashed the custom kernel and rebooted the phone it is time to check the SELinux status.

    screenshot of the about phone section that shows the new SELinux status

    Using the above screenshot as an example you would need to check the SELinux status which is highlighted and the Kernel version should also have been updated to reflect the custom kernel that you just installed.

    Providing everything was done correctly and SELinux was successfully changed to Permissive you can now install FlexiSPY (or deactivate and uninstall and reinstall to get full mode) and start taking advantage of the great features that FlexiSPY offers on a rooted phone.

  • How To Return The AT&T HTC One M8 To Stock ROM

    How To Return The AT&T HTC One M8 To Stock ROM

    This guide will show you how to downgrade the HTC One M8 OS software and return it to factory settings.

    Note: This is only for the T-Mobile or ATT HTC One M8 – DO NOT USE IT ON ANY OTHER VERSIONS

    Disclaimer: FlexiSPY is not responsible for downgrading the Android device in any way. Before performing any of these steps make sure you back up your Android device completely. These steps are performed at your own risk.

    What do you need to downgrade the HTC One M8?

    In order to downgrade the HTC One M8 you will need the following:

    • The HTC One M8 you wish to downgrade in your hand.
    • A PC.

    Note: This process will not only downgrade the OS version but it will also DELETE ALL DATA ON THE PHONE.

    Getting started

    The first thing you need to do is make sure you have set up the Android SDK on your PC and that ADB is installed and working.

    In order to use Fastboot to downgrade the HTC One M8 you must have the Android SDK downloaded and installed on to your computer

    You can download the SDK from here.

    Step 1 — Gain S-Off on your HTC One M8

    You need to gain S-Off on your HTC One M8 to be able to downgrade it and you can use Firewater and the website here to do this – please read all instructions carefully.

    Step 2 – Download the HTC USB drivers for your PC

    In order for your HTC One M8 to be recognised once you connect it to your PC, and for Fastboot to work please install the drivers from here.

    Step 3 – Enable USB debugging on the HTC One M8

    On the HTC One M8 you must enable USB debugging so that the PC recognizes it when you connect it and you can downgrade it.

    To do that, on the device, go to Menu > Settings > Developer options and make sure USB debugging is selected.

    Step 4 – Connect the HTC One M8 to your PC and run Fastboot

    Connect the HTC One M8 to your PC.

    On your PC browse to the Fastboot folder that you got after you installed the Android SDK.

    Hold down the shift key whilst right-clicking to open a command prompt window.

    Type “adb reboot bootloader” and press Enter. The phone will reboot into bootloader mode.

    On the phone select the Fastboot option.

    In the same command prompt window type “fastboot oem lock” and press Enter.

    The HTC One M8 bootloader will then be locked – this may take some time.

    You only need to lock the bootloader if you unlocked it for rooting the device – otherwise skip this step.

    Step 5 – Download the downgrade RUU file

    On your PC download the T-Mobile RUU (ROM upgrade utility) file that you will use to downgrade the phone. You can get it from here. The ATT version is here.

    Step 6 — Downgrade the phone

    With the HTC One M8 still in Fastboot mode and connected to your PC and the downgrade RUU file downloaded simply run the RUU file itself.

    On the window that appears select the Update option and follow the on-screen instructions.

    Once the entire process has finished the HTC One M8 will reboot and then you can remove it from your PC.

    Once the HTC One M8 boots up it will be running the same stock OS as it was when you first purchased it.

    You only need to lock the bootloader if you unlocked it for rooting the device – otherwise skip this step.

  • How To Downgrade A Samsung Galaxy Note 3 From OS 4.4.2 To 4.3

    How To Downgrade A Samsung Galaxy Note 3 From OS 4.4.2 To 4.3

    This guide will show you how to downgrade the Samsung Galaxy Note 3 from OS 4.4 to OS 4.3.

    Disclaimer: Please understand that this guide is provided ‘as is’. FlexiSPY is not responsible for it or its contents and you perform the downgrade procedure entirely by yourself and at your own risk. FlexiSPY is not responsible in any way for any damages that may incur through following this guide and by reading past this notice you agree to the notice given above:

    For this guide we are using a Note 3 whose model number is SM-N900

    Please make sure your Samsung Galaxy Note 3 model number matches the one used above as not all versions of the Note 3 can be downgraded.

    What is needed to downgrade?

    In order to downgrade the Note 3 you will need the following:

    • The Note 3 that you wish to downgrade in your hand
    • A PC.

    Why downgrade the OS of the Note 3?

    If you have rooted the Note 3 already what happens is that you no longer receive official system updates from Samsung so what happens if you want to change the OS version to an older one for performance reasons?

    All you have to do is backup the Note 3, download the ROM that you want to downgrade to and then flash the ROM to the phone using your PC and Odin.

    For one thing downgrading the Android OS to an older version can allow Galaxy Note 3s running OS 4.4.x to run FlexiSPY in FULL mode which means that, once the device is rooted, all FlexiSPY features will function provided you have rooted the phone before installing FlexiSPY.

    Running an older OS version can also add features that were removed in newer version or improve stability and reliability, especially if the new OS has just been released and so can be subject to bugs and issues.

    Backup the phone first

    Before you do anything make sure that the phone has been backed up first. We have discussed how to do that here (the steps are the same even though the phones are different) and the software used is EFS Professional (to backup all partitions – especially EFS as this is the most important).

    Once the phone has been completely backed up to your PC you now need to download the Samsung Galaxy Note 3 ROM for your country that is running OS 4.3.x.

    Download the 4.3.x ROM you need for the Note 3

    Now that you have backed up the phone completely (especially the EFS partition – we cannot stress that enough!) it is time to get the ROM you need.

    If you want to downgrade a Samsung Galaxy Note 3 running OS 4.4.x to 4.3.x or below in order to run FlexiSPY here is what you need to do.

    1. Browse to http://www.samfirmware.com/
    2. Click the Firmware tab at the top.
    3. Click the Check your firmware option.
    4. Search for the Samsung Galaxy Note 3 using the dropdown menu.
    It should look something like this..

    screenshot of the sammobile samsung galaxy s3 model checker

    5. Click Check firmware when done.

    Note – In this example using the Note 3 we chose Thailand as the country but you would choose your own country (e.g. USA or UK) which means that the model number (SM-N900) may also be different.

    6. Click Download — click the Download button again when ready to proceed (you may need to register a free account on Sammobile before you can download ROMS).

    7. Click the Download button once more to start the download process and save the ROM file to your PC.

    screenshot of the sammobile download that appears for your note 3 after choosing your options

    The filesize is 1.3GB so the download may take some time. Once downloaded save it somewhere that is easy to access such as the desktop.

    Download the unlocked Note 3 bootloader

    When Samsung released the Note 3, on many variants of the model, they have now locked the bootloader. This means that you cannot downgrade at all as you cannot unlock the bootloader on all versions of the Note 3 which is why this guide is for the Samsung Galaxy Note 3 model SM-N900 only.

    You can download the unlocked bootloader from here.

    Save it to your PC in an easy to find location such as the desktop.

    Get the Samsung Galaxy Note 3 Ready

    In order to flash the ROM to your Samsung Galaxy Note 3 you must perform a few tasks on your PC first.

    1. Download Samsung Kies for your PC so that the phone is recognised by Odin when you connect it using the USB cable.
    2. Download Odin.
    3. Put the Samsung Galaxy Note 3 in recovery mode
    a. Turn off the Samsung Galaxy Note 3 completely
    b. Hold down the volume down, home and power buttons together.
    c. Wait for the phone to turn on and it should boot in to download mode

    An example image showing you how to put the Samsung Galaxy Note 3 into download mode

    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode.

    An example of how the note 3 might look in download mode

    4. Connect the Samsung Galaxy Note 3 to your PC using the USB cable.
    5. Open Odin and it will look like this if everything is done correctly (ADDED means that the phone has been successfully recognized by Odin.)

    Screenshot of the Odin program recognizing the Note 3

    You now have to add the bootloader file you downloaded in to Odin.

    • Click the BL button
    • Browse to the bootloader zip file and choose it.

    Once added and Odin confirms it is okay simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    Screenshot of the Odin3 Rooting Tools Success message

    The Samsung Galaxy Note 3 will reboot and you can disconnect it from your PC.

    Booting up for the first time using the OS may take some time so please be patient.

    Once it boots up disconnect it from your PC.   You now need to boot it in to recovery.

    • Turn off the Samsung Galaxy Note 3 completely
    • Hold down the volume up, home and power buttons together.
    • Wait for the phone to turn on and it should boot in to recovery mode.

    Once in the recovery menu choose to wipe data/factory reset and also wipe the cache partition – THIS WILL DELETE ALL DATA ON THE DEVICE.

    After that reboot the phone back in to normal mode and then turn it off. You now need to boot in to download mode.

    • Turn off the Samsung Galaxy Note 3 completely
    • Hold down the volume down, home and power buttons together.
    • Wait for the phone to turn on and it should boot in to download mode.

    Connect the phone to your PC and it should be recognised by Odin.

    Screenshot of the Odin program recognizing the Note 3

    You now have to add the ROM file in to Odin.

    • Click the AP button
    • Browse to the ROM file and choose it.

    Once added and Odin confirms it is okay simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    Screenshot of the Odin3 Rooting Tools Success message

    How To Fix Any Issues After Downgrading

    If the Samsung Galaxy Note 3, after you flash the ROM, is stuck on the Samsung logo or constantly reboots then do the following.

    • Turn off the phone completely.
    • Hold down the Volume up, home and power buttons together.
    • Wait for the phone to display the Samsung logo and then let go

    It will now be in recovery mode which looks similar to this.

    an example of an android phone in recovery mode

    Using the Volume up and down keys scroll to Wipe data/factory reset and press the Power button to confirm

    Scroll down to Yes and press the Power button on that to confirm, the Samsung Galaxy Note 3 will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the Samsung Galaxy Note 3 will restart and boot up – this may take some time when booting for the first time so please be patient

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect – e.g. 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from sites such as XDA forums, save it to your PC and extract it.

    Put the Samsung Galaxy Note 3 in to download mode again and connect it to your PC and run Odin (see above for more information).

    Click the CP button and then point to the Modem binary file that you downloaded and extracted.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE SAMSUNG GALAXY NOTE 3 FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the Samsung Galaxy Note 3 to reboot and you should now have your working IMEI back and successfully downgraded the OS version.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • Introducing The New FlexiSPY GPS Navigator

    Most spy apps say that they let you spy on the targets location—but what they actually deliver is a dry list of data with a simple map. Unless you decide to risk eye strain and headaches, there is no way to quickly ‘move’ through the targets path.

    There is also no way to export spy routes to other systems like Google Earth or a TomTom where you could have this information available to you in the applications that you love.

    This is probably not an issue for the casual user, but our customers tend to be smart users, and professionals who have to make serious decisions based on what they are seeing.

    So we created the GPS Navigator.

    What The GPS Navigator Is

    FlexiSPY GPS navigator is a detachable widget that lets you quickly combine the data and map views of your targets locations and see exactly how they relate to each other. It also allows you to export the route data to a standard KML file, which you can send to Google Earth allowing you to save routes and use great tools like street view to see the route through the eyes of the target.

    As one of our testers said,” It’s so powerful it’s actually creepy!”

    What’s currently on the market

    Most spy phone apps give you a very basic overview of location tracking. This generally consists of simply a map window and a list of co-ordinates. Note how the data grid is below the map. Now imagine there are more than just a few records—you’ll will be scrolling up and down the page like a yoyo trying to match the data to the map. Now compare that to our navigator features.

    Here's a screenshot from the Mobile Spy application showing its long list of gps cordinates.

    Our Navigator features

    Detached Navigator —

    The detached navigator is a floating widget that you can place anywhere on the screen. As you interact with the data in the navigator the map window instantly responds by applying a pin at the selected location. You can then scroll through the data set.

    This makes it easy to visualize and move through a large data set of locations.

    A screenshot of the FlexiSPY gps detached navigator.

    The navigator widget also contains a list of GPS records, the GPS record is made up of the following:

    • Latitude & Longitude – View the co-ordinates of the TARGET device.
    • Accuracy – View how accurate the GPS reading is to the nearest meter.
    • Map View – View the selected co-ordinate in Google Maps.
    • Date and Time – Date and time of the TARGET device when the co-ordinates were taken.
    • Mark as favorite – Mark selected co-ordinates for quick retrieval for analysis later.

    You can also dock and undock the Navigator as well as view it in full-screen. This gives you a much better way to explore and analyze the location data. Any co-ordinate you click on in the map window is also highlighted in the GPS Navigator and vice-versa.

    New Map Window —

    The map window lets you visualize your targets movements in a number of ways, giving you greater insight into why they may have been there in the first place. Controls are offered to change the map overlay so you can see a satellite view or a map. The former is a good way to see what kind of buildings or roads are there and to easily recognize land marks. The latter is better for getting street names and directions.

    The map window a­lso lets you discover where your target was on any given day. To do this, you enter a date range and the map windows will show you ll the locations recorded for your target. To make it even easier to understand their route, you can use the ANIMATE tool to see each co-ordinate of the phone drop in place on to the math and join together to form a path of where the TARGET device has been

    A screenshot of the new FlexiSPY GPS map window

    Export Your GPS Data – Get More From Your Maps

    While FlexiSPY will get the GPS data for you, and allow you to examine it quickly, there are third party tools that let you do many other things with your route data. You may wish to load it into a GPS system like a Tom Tom, your car sat nav

    The GPS navigator also allows you to export the co-ordinates as a KML file that you can then import in to Google Maps or Google Earth to really explore where the TARGET device went.

    So, we are going to find out where co-ordinate 20 was by plugging the GPS data in to Google Maps.

    This is done by doing the following:

    • Click the Export option and then click the Download option when asked and save the KML file to your computer in an easy to find place such as your desktop.
    • Go to Google Maps at https://maps.google.com/
    • Click My Places.
    • Click the Or create with classic My Maps link.
    • Click Import and browse to the KML file that you downloaded in step 1.
    • Click Upload from File and the KML file will be uploaded in to Google Maps.
    • Click and drag the orange man on to the map and Google will immediately switch to street view.
      Seen in the screenshot below, the map windows has split in two. At the top we have Google street view and below is the map with us on it

    A screenshot of google street view showing the cordinates that flexispy captured

    • Using the left and right cursor keys to turn left and right and pressing the up or down cursor keys you can then ‘walk’ around the map as if you were really there!

    FlexiSPY Location Data + Google Earth

    You can also export the same KML data in to Google Earth as well. Google Earth allows you to explore it is more depth than Google Maps as well as allowing you to save individual locations to your collection of places so you can easily and conveniently know where the TARGET device will be, here are the steps for doing so.

    • Download Google Earth from http://www.google.com/earth/
    • Open Google Earth and go to File > Open and browse to the KML file you exported from FlexiSPY’s GPS Navigator. Select it and then click Open.
    • Click and drag the orange man on to the map screen to turn on Google street view. Doing this allows us to see where the phone has been in much greater detail.
    • If the TARGET device visits a location regularly which you want to keep an eye on you can click the button to add a pin to the location so that you can remember it later.
    • Click OK to add the pin at the yellow target location shown in the picture above. The place will be added to the list of locations currently inside Google Earth.
    • Google Earth allows you to save the list of places either as part of your own collection (titled ‘My Places’) which is ideal for storing common locations that the TARGET device is known to go to or arrive from or you can simply save a screenshot of the current location instead.

    FlexiSPY Location Data With Other Mapping Systems

    The location data we have explored here can be viewed and manipulated across many mediums, be it tablet, PC or smartphone and you can even import the KML data file in to in-car navigation systems such as TomTom Navigator too – now there really is no excuse for not knowing where they are at all times.

    • To convert the KML data file to the OV2 format for TomTom you can use the converter here.
    • To covert the KML data file to the GPX format for Garmin you can use the converter here.
    • To convert the KML data file to the LMX format for GPS units you can use the converter here.

    Currently we’re the only ones that give you this much functionality when it comes to tracking the location of a smartphone, but we’re always adding cool additions to our features! If you want to stay up to date on all the newest from us, then you should follow us on one of our social media channels!

  • How To Downgrade The OS Of Any Samsung Android Phone

    How To Downgrade The OS Of Any Samsung Android Phone

    Recently, on our Samsung S4 downgrade article, we were asked whether or not the steps in the article would work on a Note 3. Our answer that was, in theory, the process of backing up the EFS partition of the phone, downloading the older ROM and then flashing it using Odin should work because both phones are manufactured by Samsung and so they process is near enough the same.

    But before you downgrade the OS version there are a few things you need to consider.

      1. Downgrading the OS will mean that ALL data is wiped from the phone.

      2. Downgrading the OS to an older version means you will lose new OS features or updates.

      3. If you downgrade and then root the phone you can no longer upgrade to new OS versions because software update is disabled due to the device being rooted.

    Why downgrade the Android OS?

    For one thing downgrading the Android OS to an older version can allow Android phones running OS 4.4.x to run FlexiSPY in FULL mode which means that, once the device is rooted, all FlexiSPY features will function provided you have rooted the phone before installing FlexiSPY.

    Running an older OS version can also add features that were removed in newer version or improve stability and reliability, especially if the new OS has just been released and so can be subject to bugs and issues.

    What Does an Android OS Consist Of?

    If you want to take a closer look at what an Android OS consists of then backing up the Android phone using software such as EFS Professional can be used to tell you more about the software that runs the device.

    The main Android OS partitions are as follows:

    • BOOT – This contains information allowing the phone to boot up. Without this the phone will not start.
    • SYSTEM – This contains the OS itself. This can be wiped and you can still use the phone in download mode to flash as new ROM because the information from the BOOT partition is still present.
    • RECOVERY – This contains the recovery information. This allows you to perform alternate boot and maintenance options.
    • USERDATA (or DATA) – This contains your user information such as contacts, SMS messages, settings and applications installed. Wiping this partition alone is the same as a factory reset.
    • CACHE – This is where the Android OS stores frequently accessed applications components or data. Wiping this is fine, it automatically gets rebuilt once the device reboots.
    • MISC – This is important as it controls miscellaneous settings including but not limited to the network carrier configuration and settings and USB information. Wiping this will result in parts of the phone no longer working.
    • SDCARD – This is the SD card. Wiping this deletes all data on the SD card. On the Galaxy S devices this refers to the internal SD Card partition and not the actual SD card you insert which uses another partition.

    We can examine more about an Android OS using backup tools such as EFS Professional.

    A screenshot of the EFS professional program with selections ticked.

    In the above screenshot we have four partitions selected.

    EFS Contains the CSC information used in Odin (see below).

    BOOT Contains the bootloader information used in Odin (see below).

    RADIO Also contains important carrier information and settings.

    SYSTEM The actual OS itself that is currently installed.

    How are Samsung OS ROMS flashed to the device?

    Every Samsung phone has an operating system. This software is known as a ROM. When you downgrade the ROM the ROM you download can be one of two formats.

    1st Possible Format — All in one – An all in one file that contains all the ROM partition information and is the easiest to flash.

    screenshot of an example of an all in one file that contains all the rom partion information

    2nd Possible Format — Separate parts (see below) with a file for each part and a PIT file to put it all together

    A screenshot of an example of seperate parts file

    As you can see above there is quite a difference between an OS ROM that is all in one and one that is separated but for either case you will need Odin, a PC based program, to flash the ROM and downgrade it.

    Screenshot of the Odin3 program with a key for navigating the program

    The main buttons that you need to work with on Odin are as follows.

    PIT – This is the partition information table. For some ROMS, even if you flash individual parts it will not work without the corresponding PIT file that tells the phone how everything is separated and laid out.

    BL – Flash files to the device that only pertain to the bootloader (what happens when the phone boots up).

    AP – Flash the main ROM file. This is the option most people will need to focus on.

    CSC — This is the file that contains all the carrier and network information such as access point names and settings and other carrier/network related information.

    An Android ROM (often several gigabytes in size) is partitioned (split) in to different sections with each section responsible for different features and functions which have been explained above.

    So now that you know what an Android ROM is and what it consists of what happens next?

    Always backup the Samsung Android device first

    Before you do anything always back up the Samsung Android device first, just in case.

    This can be done in a variety of ways but we prefer using EFS Professional.

    To use this software you must make sure of three things:

      1. The Samsung Android phone you want to backup has been rooted by you.

      2. You have installed BusyBox on the Samsung Android phone from the Play Store.

      3. You have installed the Android SDK on your PC correctly and ADB works.

    Once you have made sure that the Samsung Android device meets the requirements download and run EFS Professional. We explain how to backup the phone and do all this here.

    With the phone backed up to your PC using EFS Professional the backup file will look like this.

    A screenshot of what the phone will look like after the Odin backup process

    All successful backups are stored in the EFSProBackup folder and all the backups have the model name, as well as date and time of when the backup occurred.

    At the time of writing this article the date is 9th September 2014, so, just to prove this works. We will backup the phone we are using for this article (Samsung Galaxy SIII – GT-I9300) using EFS Professional.

    A screenshot of the back up process on the samsung galaxy SIII using EFs professional

    As you can see we have selected just the EFS partition this time to backup and this will be explained why in the next section.

    We click the Backup button and the process starts – this can take some time and depending on how many applications you have installed and such the backup filesize may be large so make sure you have enough space on the phone itself or inserted SD card before starting the backup.

    As you can see from the screenshot below the backup was successful.

    a screenshot of the EFS showing that the backup was successful

    And the saved backup folder on the PC is shown here which contains the EFS partition information.

    A screenshot on the PC showing the efs partion information

    As you can see the backup archive data matches the time of writing (9th September 2014) and the device name is that of the Samsung Galaxy S3 that we are using (GT-I9300).

    When it comes to backing up a Samsung Android phone before downgrading the OS the only partition you really need to backup is EFS as we have done above (we still recommend you back up everything just to be sure) and we will explain why in the next section.

    Find the ROM that is correct for your Samsung Android device

    We touched upon this in our Samsung S4 downgrade article and showed the site to use to get the OS ROMs you are looking for.

    So, for example, if you want to downgrade a Samsung Galaxy Note 3 running OS 4.4.x to 4.3.x or below in order to run FlexiSPY here is what you need to do.

      1. Browse to http://www.samfirmware.com/

      2. Click the Firmware tab at the top.

      3. Click the Check your firmware option.

      4. Search for the Samsung Galaxy Note 3 using the dropdown menu

    So, it should look something like this.

    a screenshot of the sammobile backup

    Click Check firmware when done.

    Note – In this example using the Note 3 we chose Thailand as the country but you would choose your own country (e.g. USA or UK) which means that the model number (SM-N900) may also be different.

    You would obviously choose the Samsung Android phone model and country that applies to you which matches the Samsung Android phone whose OS you wish to downgrade.

      5. The latest firmware will appear.

    Click Download

      6. Click the Download button again when ready to proceed (you may need to register a free account on Sammobile before you can download ROMS).

      7. Click the Download button once more to start the download process and save the ROM file to your PC.

    As you can see, the filesize is 1.3GB so the download may take some time. Once downloaded save it somewhere that is easy to access such as the desktop.

    Get the Samsung Android phone ready

    In order to flash the ROM to your Samsung Android phone you must perform a few tasks on your PC first.

      1. Download Samsung Kies for your PC so that the phone is recognized by Odin when you connect it using the USB cable.

      2. Download Odin.

      3. Put the Samsung Android phone in recovery mode
    — a. Turn off the Samsung Android phone completely
    — b. Hold the volume down, home and power button together
    — c. Wait for the phone to turn on and it should boot into download mode.

    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode (this is using an S4 as an example but all Samsung Android phones will look the same in download mode).

    A picture of a black Samsung Galaxy S4 running in download mode

      4. Connect the Samsung Android phone to your PC using the USB cable.

      5. Open Odin and it will look like this if everything is done correctly (ADDED means that the phone has been successfully recognized by Odin.)

    You now have two ways to add the ROM file into Odin.

      1. If the ROM file is one file do the following:
    a. Click the AP button
    b. Browse to the ROM zip file and choose it.
      2. If the ROM file is in more than one part do the following:
    — a. Click PIT and add the PIT file.
    — b. Click BL and choose the BOOT file.
    — c. Click CP and choose the CODE file.
    — d. Click CSC and choose the MODEM file.

    Either way, once you have selected the correct way to flash the phone simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    A screenshot of how Odin will look like when done successfully

    The Samsung Android phone will reboot and you can disconnect it from your PC.

    Booting up for the first time using the OS may take some time so please be patient. Once it boots up you have successfully downgraded your Samsung Android phone.

    How to fix any issues after downgrading the OS

    If the Samsung Android phone, after you flash the ROM, is stuck on the Samsung logo then do the following

    Turn off the phone completely.
    Hold down the Volume up, home and power buttons together.
    Wait for the phone to display the Samsung logo and then let go.

    It will no be in recovery mode which looks similar to this.

    android phone in recovery mode

    Using the Volume up and down keys scroll to wipe data/factory reset and press the Power button to confirm.

    Scroll down to Yes and press the Power button on that to confirm.

    The Samsung Android phone will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the Samsung Android Phone will restart and boot up — this may take some time when booting for the first time so please be patient.

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect — 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from sites such as XDA forums, save it to your PC and extract it.

    modem file downloaded

    Put the Samsung Android phone in to download mode again and connect it to your PC and run Odin (see above for more information).

    It will look like This Picture once connected as we have seen before.

    Click the CP button and then point to the Modem binary file shown in the last screenshot

    a screenshot of the modem recovery file

    Odin should now look like This Picture . You can see the Samsung Android phone has been added and the modem file is selected.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE SAMSUNG ANDROID PHONE FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the Samsung Android phone to reboot and you should now have your working IMEI back and successfully downgraded the OS version.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • How Can I Spy On An iPhone 6 Or An iPhone 6 Plus?

    How Can I Spy On An iPhone 6 Or An iPhone 6 Plus?

    Update — 7/7/2015

    You can now spy on up to iOS 8.4 with FlexiSPY! Learn more by checking out our post about this release, on the blog

    Update — 1/7/2015

    You can now spy on up to iOS 8.1.2 with FlexiSPY.

    To do so, you’ll need to jailbreak your iPhone, which we’ve provided a guide for — here

    Both FlexiSPY PREMIUM & FlexiSPY EXTREME are compatible with this latest jailbreak.

    Update 10/24/2014 — Now Outdated

    Pangu has now released a jailbreak for iOS8 / 8,1, it’s still advised that you not update your phone to iOS 8 as the jailbreak just released is not stable and FlexiSPY doesn’t support this latest jailbreak yet (as well as all other mobile spy software)

    Some of the information Below is out of date, but still contains important information:

    Original Post — Now Outdated

    Currently FlexiSPY (And all other mobile spy software) Do Not Support iOS 8 as there isn’t a jailbreak out for it yet.

    Please Do Not Update To iOS8. You can prevent the iOS 8 update by reading the section in the article called: Can You Stop iOS 8 From Being Updated By The User And Losing The Jailbreak?

    With the release of iOS8, the iPhone 6, and iPhone 6 plus, many people are wondering if it’s still going to be possible to install mobile spy software onto their Apple devices. The answer in short, is yes, You will be able to Spy on an iPhone 6, an iPhone 6 Plus, a device running iOS8, and possibly even the iWatch. However, the question that can’t be answered definitely yet, is: When Can I Spy On These New Devices?
    In this article we will answer some of the most common questions that we get from people, if you have after finishing the article, please contact us in the comments section at the bottom of the page.

    A Date For Spying On iOS8 Devices Hasn’t Been Set Yet

    Mobile spy software for iOS devices (such as the iPhone 6, 6 Plus, etc) all rely on the target phone being Jailbroken. This means that no mobile spy software can claim to work on an iOS device unless there’s been a jailbreak released for that iOS version. And currently, there is no jailbreak for iOS8.

    So again, Without the ability to jailbreak any iOS 8 device such as the iPhone 6, iPhone 6 Plus or Apple Watch it is not possible yet to install any spy phone software onto the device.

    How Long Will It Be Before I Can Jailbreak The iPhone 6?

    No one really knows.

    The time it takes for the latest version of iOS 8 to be released and the time it then takes for clever hackers to jailbreak the iOS (it is not something done by FlexiSPY in any way) can vary significantly. Actually it is taking longer and longer for a jailbreak to appear after the release of the latest version of iOS due to Apple making it more and more secure and thus fixing the exploits that jailbreak teams such as Evad3rs used to jailbreak the device.

    Ironically, when Apple released iOS 6.1.3 (which killed the iOS 6.1.2 jailbreak by Evad3rs) they actually credited the Evad3rs team for helping them fix it by finding the issues and exploits that Apple patched to make iOS 6.1.3 possible.

    Please be aware that there are currently many scam sites already advertising ways to jailbreak iOS 8 and these are all false – please be careful. You should follow one of our social media channels if you want to be the first to know when the jailbreak comes out.

    We know they’re false because:

    At the of publishing this article, iOS 8 was not even released yet to the public
    There is no jailbreak of any kind available yet for the finished version of iOS 8
    The video on the site shows how to jailbreak iOS 7 (if it really could jailbreak iOS 8 then why post bogus videos for an older iOS that anyone can jailbreak?)

    Here’s what one of these sites can look like, so be careful.

    A Screenshot of a scamsite that is advertising an ios8 untethered jailbreak though an untethered jailbreak, or any jailbreak for iOS8 doesn't even exist yet.

    Why is it taking so long to jailbreak iOS 8?

    iOS beta versions can be jailbroken but this does not mean the final version can be.

    At the time of writing (September 11th 2014) iOS 8 is not even out officially to the public and neither is the iPhone 6, iPhone 6 Plus and the Apple Watch is scheduled for the early part of 2015 so unfortunately you simply must wait.

    Once iOS 8 is released publicly people will start to look at ways to jailbreak it. This could be easy, it could be hard. For those that are unaware the last jailbreak for iOS 7.1.x came from a Chinese hacking group and was called Pangu. During tests of the jailbreak it still worked on the iOS 8 beta versions but this is no way indicative to say that the same jailbreak will work on the final version of iOS 8.

    The Pangu jailbreaking team is working on an ios 8 jailbreak, as seen in this screenshot of a beta ios 8 jailbreaking tool

    iOS 8 Tethered and Untethered Jailbreaks – What Are They?

    Untethered jailbreaks are always the best but take longest to arrive and no jailbreak is truly permanent.

    Once someone figures out how to jailbreak iOS 8 when it is released to the public it will be tethered only to start with. This is always the case. A tethered jailbreak is essentially the ‘quick and dirty’ way just to prove a jailbreak can be done and it is usually complex (the process is as technical as it gets before it is streamlined to make it easier for public consumption) and it also has one main caveat which is explained below.

    Tethered jailbreak – As soon as the iPhone is turned off or rebooted or loses power the jailbreak will be lost and, to boot up the phone to even use it you must connect it to your PC and then you have to jailbreak again and the process repeats until the phone is rebooted or loses power or turns off (rinse and repeat).

    As you can see, this is not ideal at all and this is why FlexiSPY does not start to develop software until an untethered jailbreak is available. For a tethered jailbreak, not only would the person need to keep rejailbreaking the phone but every time the jailbreak is lost FlexiSPY would need to be physically installed again and this is just not ideal. Of course if Apple update iOS 8 in the meantime and people upgrade to that then it can mean the tethered jailbreak no longer works which further means the wait for an untethered jailbreak increases.

    FlexiSPY understands that people cannot get the iPhone’s they wish to track all the time to keep jailbreaking it all the time if the jailbreak is tethered. Furthermore, from a development perspective, an untethered jailbreak is far safer to work with than a tethered one because an untethered jailbreak is permanent unless the iPhone is factory reset.

    A tethered jailbreak is the first to be available but is not really worth it.

    Untethered jailbreak – An untethered jailbreak takes the longest but it is the jailbreak that everyone wants and FlexiSPY prefers. An untethered jailbreak is permanent once applied unless the device is factory reset or upgraded to a new iOS version from Apple that fixes the exploits used in the untethered jailbreak (which means it is back to square one – waiting for a jailbreak for the new iOS 8 version and this is nothing to do with FlexiSPY).

    Untethered jailbreaks are what everybody really wants, including FlexiSPY, but the wait for them to appear gets longer and longer.

    Can You Stop iOS 8 From Being Updated By The User And Losing The Jailbreak?

    Nobody knows at this time but, in theory, if you can do it on iOS 7.x then iOS 8 should be able to also – given time.

    Now there are Cydia tweaks for iOS 7.x that you can get such as Recoveryguard that trick iOS in to thinking that the version installed is the latest one which stops the iPhone owner from being able to upgrade the iOS directly from the iPhone itself.

    However this does not apply if the iPhone is factory restored in iTunes as iTunes always checks for the latest iOS version before it restores or if the iOS is updated from ITunes itself.

    Please note that at the time of writing nobody knows if Recoveryguard is compatible with iOS 8 once it is released but it works fine in iOS 7 providing you have jailbroken the phone.

    You can install RecoveryGuard by adding the Cydia source http://cydia.pushfix.info to your list of Cydia sources and then tapping that source and finding RecoveryGuard and installing it the same as you installed FlexiSPY or any other Cydia program.

    screenshot of the recovery guard app which prevents the iphone from being restored

    Unfortunately though RecoveryGuard is a tweak you can only get through Cydia and you get Cydia by, yes, you guessed it, jailbreaking the phone so the people who create these tweaks also have to wait for iOS 8 to be jailbroken so that they can update their applications and make them compatible – the same as FlexiSPY.

    Can I Spy On Someone’s Apple iWatch?

    We are not sure if people want spy phone software for the Apple Watch. If you are interested,  let us know in the comments and we will be sure to look in to it.

    The Apple Watch still requires an iPhone to be tethered to it in order to receive notifications (you basically look at the watch on your wrist instead of pulling the iPhone out of your pocket instead – but not much more than that) so it may just be better to wait for FlexiSPY to fully support iOS 8 (which will run on the iPhone 4S, iPhone 5, iPhone 5S, iPhone 5 C, iPhone 6, iPhone 6 Plus, Apple Watch and all iPad generations starting from the iPad 2) instead so you can spy on the actual iPhone tethered to the Apple Watch and not the Apple Watch itself.

    How long do we need to wait for FlexiSPY?

    The Gold Master (final version) of iOS 8 was just released so our developers are getting to grips with that to see the new features and how we add even more great new features in to FlexiSPY but, as said, with no jailbreak there is not much we can do right no except speculate what we can do and just wait for any kind of jailbreak (tethered or untethered) and test our theories and get FlexISPY working.

    In the meantime though don’t forget that FlexiSPY still works on iPhone’s and iPad’s that have been jailbroken.  This is something we will of course retain in our software for iOS 8, our software can hide Cydia too meaning that, whether it is iOS 7 or iOS 8 you have just jailbroken to install FlexiSPY you can hide all traces of the jailbreak (Cydia) and our software also hides itself completely too for complete stealth.There’s actually a guide for doing so, here.

    That’s All For Now | But Stay Up To Date

    Currently this is the latest situation regarding FlexiSPY and iOS 8 and the new iPhone 6, iPhone 6 Plus and Apple Watch. However we will be sure to update this article with any new information regarding when FlexiSPY is available for iOS 8 but, in the meantime, join us as we all patiently wait for the iOS 8 jailbreak to arrive. To make sure you’re up to date with the jailbreak, please follow us on one of our social media channels.

  • How iCloud Can Rain Your Personal Data All Over The Internet

    How iCloud Can Rain Your Personal Data All Over The Internet

    «You’ve probably heard about the celebrity pictures that were stolen and linked all over over the internet.. Furthermore you probably also know that Apple’s iCloud was -at least in part- at fault»

    But what you may not be aware of is just how easy the whole thing was, and how, using applications that are simple to find, you too can gain access to practically anyone’s iCloud account — and you don’t need to be a hacker to do it.

    Notice: Everything in this article is for educational purposes only. Apple most likely have fixed the exploits that lead to the data leak so this is just a proof of concept article showing how it was most likely done. FlexiSPY is not responsible for any damages, loss or anything else that incurs if you do try to recreate these steps.

    iCloud icons creating a burst of clouds

    How Did The Leak Happen?

    According to reports it was simply due to the accounts that were compromised being unsecure. For example they failed to turn on two-step notification for their account or their password was just too easy to guess. Once access was gained in to the accounts, and because most iPhone users happily let their device upload all pictures to their iCloud account without ever thinking of the consequences, a second piece of software was used to then download all backups of said iPhone.

    Once those backups were downloaded the same program was used to explore its contents and this includes the pictures and videos that are now all over the internet and are being investigated by the FBI

    So who is to blame? Apple for not making it clear enough that iCloud backs up everything? Apple for not making sure two-step sign up is mandatory? The user for not really fully understanding the implications of having their data stored in the cloud which can potentially be hacked?

    If you own an iPhone every picture you take is uploaded to your iCloud account once you have signed in to the iPhone using your Apple ID. However this can be easily turned off (we stress that Apple have fixed the exploits so that passwords cannot be guessed by brute force which makes this hack no longer possible) so that you are no longer vulnerable.

    The process that led to the leak consists of several steps.

    2 Ways It Might Have Been Pulled Off

    1. First off, the hackers needed to have access or know the email address of the persons targeted.
    2. They used those email addresses to login to iCloud and guess the security password
    3. They gained access to the account and then proceeded to download any iCloud backups.

    Or it could have been done this way:

    1. The hackers knew the email addresses of the people they wanted to target.
    2. Hackers used a brute force tool and password list to guess the passwords.3. They gained access to the acocunt and then proceeded to download the iCloud backups.

    Either way, one thing that hasn’t come to the surface yet is how the hackers got the email addresses to start with.

    However there are many darknets where information like this is traded via the use of the encrypted TOR browser.

    Replicating The Hack

    This is done entirely for educational processes and, from the latest information, Apple have already fixed the iCloud vulnerabilities. So, for this we will just show you, hypothetically how it was done but we will investigate the software used to download and extract iCloud backups in more detail.

    The first thing is to obviously know the email address of the people you wish to target. We are using our own Apple ID that we have set up which already contains an iCloud backup. However the program that is being pointed at to guess the passwords was called iBrute.

    Picture Of The iBrute Link Hosted On Github
    This is a small program written in Python that will try to brute force (guess the password) of all email addresses in the mail.txt file using the passwords in the passlist.txt file. However in the release notes it confirms as we have said, Apple have patched the exploit which means the program will no longer work.

    So, for this, we are going to assume that we already have an account (Apple ID) whose password we know (which we do) so, because Apple fixed the exploit the next step is written from the perspective that iBrute worked and gave us an email address and password.

    Before we proceed to the next section we need to understand just how iCloud works on an iPhone after you enter your Apple ID which is like this.

    1. Enter your Apple ID on the iPhone – iCloud is enabled by default which photo sharing enabled.
    2. Set up a new photo stream on the iPhone and add pictures – wait for them to be uploaded to iCloud
    3. For PC download and install the iCloud Control Panel
    4. Once it is installed you are asked to log in to iCloud.
    5. You then click the Options button under Photos to see the photos that were be uploaded to iCloud
    6. You can set the options to upload all photo streams from the iPhone to iCloud.
    7. You can then see the iCloud photos that are stored on your PC.

    What you may not be aware of is that even though photo sharing is enabled by default it is not as easy as logging in to any iCloud account and viewing the pictures online. iCloud does not work that way and even though we have set up a photo stream as a test it will not appear on the iCloud website.

    Below you can see the photo stream on our PC we are using. We have added 3 extra pictures (you can just drag and drop any image file into the iCloud photos folder and it will sync.

    Sync The Photo Stream
    So, if we log in to iCloud directly we see the following – no pictures of any kind.

    So how does iCloud actually work?

    1. Sign into iCloud on any iDevice using your Apple ID
    2. Set up photo streaming and photo sharing in iCloud
    3. Take some pictures or videos on the device
    4. Login to a new iDevice with the same account.
    5. All pictures and videos taken will appear on the new device.

    So essentially iCloud is the backend that hosts and shares all pictures and vides (and other content such as emails and contacts) between all iDevices your account is logged in to but this also means that picture and videos backed up to iCloud are only visible on the specific iDevice.

    So how do you get access to the pictures or videos if you cannot do it directly from iCloud itself?

    This is the next thing we will discuss and where things get clever.

    Backing Up To iCloud

    Apple makes it pretty damn easy to back up data to the cloud, in-fact, it’s enabled on a persons iOS device by default. This includes automatic backup of photos from the camera roll.

    All you need to be back up the phone is to make sure that your phone is charging, connected to wifi, and is locked. Once the device is backed (specifically iCloud) you’re able to perform the same steps that the hackers used to get access to the information.

    Apple, for some strange reason, do not allow any iCloud backup to be password protected so it essentially means that should someone find software that can download all backups from an Apple ID and the respective iCloud account then they potentially have access to very personal or sensitive information.

    This is what the hackers did

    And this is what we will show you too (for educational purposes only)

    The first thing you need is the PC software that was used which is called Elcomsoft Phone Password Breaker.  This is from a Moscow based company and the software is sold on the basis that it allows you to recover files from phone backups from variety of different manufacturers (Apple, BlackBerry, and Microsoft) and is to be only used for legal purposes only.

    However looking at their main menu for a start tells you that this software could definitely be used for all the wrong reasons.

    password-recovery-elcomsoft
    Decrypt Backup – Simply drag and drop any iPhone or iPad backup made within iTunes in to this option for it to be decrypted and for you to be able to view all data stored inside the backup.

    Explore keychain – The keychain is encrypted by Apple and contains all the passwords on the device (iPhone or iPad). Again, just drop an iTunes backup on to this option to view all passwords used on the phone across all installed applications that have been stored in the keychain.

    For those who are interested the keychain stores the following information:

    1. Secure certificates
    2. Tokens (e.g. Twitter, Facebook etc.)
    3. Browser stored passwords
    4. Wi-Fi passwords for all networks a device was connected at least once
    5. Passwords, tokens and certificates stored by various applications

    And the final option is what we are looking for — Download backup from iCloud.

    download-backup-from-icloud
    It is obvious that the hackers just entered the email address and passwords of the people in question (which they obtained illegally as we explained) and then the software does the rest. For us we will be getting the data from the phone we just backed up.

    So we put in the username and password of our Apple ID that we set up for this exercise and then we sign in and our backup is clearly listed at the top.

    restore-original-file-names
    We then click the Download button and after a short time we can then choose any kind of information we want from inside the online backup.

    specific-to-download
    All we are really concerned about is the camera roll as that is where all videos and pictures are stored but this software allows us to grab any and all information from an iCloud backup associated with the Apple ID that was used to sign in.

    Essentially you just wait for the data to be downloaded to your PC and then you can pretty much do anything with it as you wish.

    Apple makes this possible due to iCloud not having two step verification when you sign in (e.g. you sign in with a username and password and then answer a security question) which means that, as we have shown, just get the email address and password of an Apple ID and you potentially have access to phone backups which contains clearly sensitive and personal information.

    How Can You Stop This From Happening?

    The easiest way to stop yourself and your iDevice from becoming the next victim is simple.

    1. Make sure your Apple ID password is strong
    2. Turn off iCloud backups on the iDevice itself
    3. Use a cloud system with better backup and security such as Dropbox

    Apple have since patched the brute force method used but they have still not improved iCloud security to encompass two step verification although, in the wake of this scandal, we hardly think Apple will rest and leave their premier cloud backup solution with such a gaping hole in it for the whole world to look in.

    We hope that you have found this article useful. Don’t forget that you can actually use FlexiSPY on your own iPhone or iPad to act as a secure and effective device backup tool so, if this interests you, why not check out a 24 hour demo of FlexiSPY right now?

  • КАК ЗАПИСЫВАТЬ ЗВОНКИ С ПОМОЩЬЮ FLEXISPY И ТЕЛЕФОНА НА БАЗЕ АНДРОИД

    Возможность записывать чужие телефонные звонки может

     

    стать началом множества крутых шпионских историй.

    С FlexiSPY вы сможете легко записывать чужие телефонные разговоры и прослушивать их на досуге, с комфортом, на своем компьютере.

    Как это можно сделать?

    Вам понадобится 3 вещи

    1. Смартфон на базе Андроид
    2. Лицензионный FlexiSPY, купленный на http://www.flexispy.com/ru
    3. Шаг 3 – Войдите в Кабинет пользователя.

    Если все вышеуказанные требования выполнены, вы можете начинать записывать разговоры.

    Приступим!

    Шаг 1 – Возьмите в руки телефон, за которым вы хотите следить.

    Шаг 2 – Установите FlexiSPY на этот телефон и активируйте программу.

    Шаг 3 – Войдите в Кабинет пользователя.

    FlexiSPY Portal

    Шаг 4 –ВыберитевкладкуControl Center инажмитенаCall Controls.

    FlexiSPY Call Controls

    Шаг 5 – ВыберитеEnable Call Recording.

    EnableCallControls

    Шаг 6 – Выберите опцию «On», если она еще не выбрана

    settoon

    Шаг 7 – ВыберитеLive Call Controls. Затем – ManageWatchlist

    FlexiSPY Managewatchlist

    Шаг 8 – Убедитесь, что все поля во вкладке GlobalOptions отмечены.

    FlexiSPY All Options Checked

    После этого любой звонок, сделанный с этого смартфона, будет записан программой FlexiSPY. Запись разговора будет передана с Андроида в ваш Кабинет пользователя.

    Шаг 9 – Чтобы прослушать записанные звонки, нажмите на AudioImprint  и выберите Calls

    FlexiSPY Audioimprint

    Шаг 10 – Записанный разговор виден внутри вашего Кабинета пользователя.

    FlexiSPY RecordedCallIsVisible

    Шаг 11 – Нажмите Download, чтобы сохранить запись на компьютере и прослушивать позже.

    Вот и все!

    Мы надеемся, что эта короткая статья помогла вам понять, какими широкими возможностями обладает программа FlexiSPY на смартфонах с операционной системой Андроид. Но FlexiSPY может намного больше обычного перехвата звонков! Следите за новыми статьями, объясняющими, как пользоваться абсолютно каждой функцией FlexiSPY

  • КАК СЛЕДИТЬ ЗА ЧУЖИМИ АУДИО ЗАМЕТКАМИ С ПОМОЩЬЮ FLEXISPY И ТЕЛЕФОНА НА БАЗЕ АНДРОИД

    SpyingOnAudioMessages

    С аудио заметками очень просто и удобно работать. Вы можете записывать интервью, свои текущие мысли, музыку на концертах, можно даже настроить приложение таким образом, что оно будет самостоятельно отсылать сделанные записи на вашу электронную почту – невероятно полезная функция. Но иногда люди используют аудио заметки для более гнусных целей. Возможно, ваш работник записывает конфиденциальную информацию на бизнес встречах, ваш ребенок – указания, чтобы посетить дом незнакомца, или ваш муж записывает милые любовные послания своей «просто коллеги». Нельзя угадать, что в этих заметках, не прослушав их. Но если их все-таки записали, вы, несомненно, услышите важную информацию.

    Что нужно для начала записи аудио заметок?

    1. Наблюдаемый телефон на базе Андроид
    2. Программа FlexiSPY, купленная на http://www.flexispy.com/ru
    3. 15-20 минут времени (это зависит от марки и модели смартфона)

    Если все вышеуказанные требования выполнены, вы можете начинать следить за установленными приложениями других людей.

    Итак, приступим!

    Шаг 1 – Возьмите в руки телефон, за которым вы хотите следить. Убедитесь, что модель телефона поддерживает FlexiSPY

    –\\ Если у вас есть вопросы по поводу этой обучающей статьи, свяжитесь со службой поддержки FlexiSPY, и вам с радостью помогут\\–

    Шаг 2 – Установите FlexiSPY на этот телефон и активируйте программу.

    Шаг 3 – Войдите в Кабинет пользователя FlexiSPY.

    FlexiSPY Portal

    Шаг 4 – Выберите вкладку Control Center

    ControlCenter

    Шаг 5 – Нажмите на Photo Controls.

    PhotoControls

    Шаг 6 – Выберите Historical Media.

    HistoricalMedia

    Шаг 7 – Поставьте опцию Get Audio врежим On.

    GetAudioOn

    Шаг 8 – Выберите Sync Now.

    SyncNow

    Шаг 9 – Должно появиться уведомление о том, что команда была послана успешно.

    Confirmation

    Аудиозаписи телефона будут перехвачены и загружены в ваш Кабинет пользователя примерно в течение часа.

    Примите к сведению, что в зависимости от размера файла и скорости интернет-соединения на смартфоне, процесс может занять некоторое время.

    Шаг 10 – После этого перейдите во вкладку Media и выберите Sounds

    MediaSounds

    Шаг 11 – Вы увидите ярлык загруженного файла

    GetFile

    Шаг 12 – Нажмите Get File для загрузки полного аудиофайла в ваш Кабинет пользователя FlexiSPY.

    GetAudio

    Шаг 13 – Выберите Get Audios для начала процесса загрузки аудио на ваш компьютер.

    GetAudioFinal

     Готово

    На этом – все

    Если вы считаете эту статью полезной, прочтите нашу статью об отслеживании приложения WhatsApp Chats For Android. Если у вас появились какие-либо вопросы, без колебаний задавайте их ниже в комментариях, в социальных сетях или с помощью онлайн чата!

    Следите за нашими новыми статьями, объясняющими, как пользоваться абсолютно каждой функцией FlexiSPY.

  • ЗАПИСЬ ОКРУЖЕНИЯ С FLEXISPY НА АНДРОИДЕ

    Вы когда-либо хотели прослушивать чужие телефоны, чтобы знать правду ли вам говорят о своем местоположении? Такое можно встретить только в шпионских фильмах, в воображении сразу возникает Шон Коннери со своими шпионскими «жучками». Но теперь даже обычному человеку под силу вести прослушку.

    Как это возможно?

    Вам понадобятся только 3 вещи.

    1. Наблюдаемый телефон на базе Андроид
    2. Программа FlexiSPY, купленная на http://www.flexispy.com/ru
    3. 15-20 минут времени (это зависит от модели смартфона)

    Шаг 1 – Возьмите в руки наблюдаемый телефон

    //Если у вас есть вопросы, свяжитесь сослужбой поддержки FlexiSPY, и вам с радостью помогут//

    Шаг 2 – Установите FlexiSPY на этот телефон по инструкциям из личного кабинета FlexiSPY и активируйте программу.

    Шаг 3 – Войдите в свой личный кабинет FlexiSPY.

    FlexiSPY Portal

    Шаг 4 – Выберите вкладку ControlCenter и нажмите на Call Controls.

    FlexiSPY Call Controls

    Шаг 5 – Нажмите Start Ambient Recording.

    StartAmbientRecording

    Шаг 6 –Установите длительность записи, передвинув слайдер на нужную позицию (длительность варьируется только в пределах от 5 до 60 минут)

    Start Ambient Recording Now

    Шаг 7 –Нажмите наStart Ambient Recording Now

    Запись начнется примерно через час после нажатияStartAmbientRecordingNowи будет длиться указанный отрезок времени.

    Имейте в виду, что время загрузки записи в ваш личный кабинет зависит от качества интернет-соединения на используемом Андроиде, так что процесс может занять некоторое время.

     

    Шаг 8 –Чтобы прослушать запись после загрузки выберитеAudioRecordingsи нажмитеAmbient.

    Ambient

    Шаг 9 –Запись окружения будет воспроизведена.

    Download Recorded File

    Шаг 10 –Для загрузки файла на компьютер и его воспроизведения выберите Download.

    Save Download

    Шаг 11 – Запись будет воспроизведена на компьютере.

    RecordingWillPlay
    Готово

    Мы надеемся, что эта короткая статья помогла вам понять, какими широкими возможностями обладает программаFlexiSPY на смартфонах с операционной системой Андроид. Помните, чтоFlexiSPY может намного больше обычного перехвата звонков! Следите за новыми статьями, поясняющими, как пользоваться абсолютно каждой функцией FlexiSPY

  • Spoof SMS — Секретное Oружие, Которым Вы Уже Должны Были Пользоваться

    FlexiSPY SPoof SMS

    Что Такое Spoof SMS?

    Spoof SMS — это уникальная функция FlexiSPY. Она настолько мощна, что ееприменение требует огромной ответственности — и возможно понадобится только одна попытка, при правильном использовании… Хотелось ли вам когда-нибудь заманить на встречу одного из контактов Наблюдаемого телефона, чтобы разобраться что к чему или узнать кто это на самом деле? Или наоборот, отправить сообщение, чтобы они не явились на встречу! Все это возможно — с помощью Фиктивных SMS.

    Технически мы не подменяем само сообщение; SMS отправляется с наблюдаемого номера и отображается у получателя как любое другое полученное с этого номера SMS. То, что мы подменяем — это нашу секретную личность, в качестве автора этого сообщения. SMS отправляется тайно, без осознания самого Пользователя, и привязать его не к чему, кроме как к НаблюдаемомуНомеру, с которого сообщение и было отправлено.

    Использование Фиктивных SMS Чтобы Выудить Информацию

    Шпионский Сценарий – Пример работы Фиктивных SMS.

    Мы имеем основания полагать, что Маргарет пользователь наблюдаемого телефона снова встречается с Билом — с которым, по ее словам, она рассталась два месяца назад. Мы отслеживали звонки, сообщения и внутренние чаты, и знаем, что они снова общаются. Журнал звонков не дал нам достаточно информации, но большее количество звонков именно в те дни, когда она приходит домой поздно, показаласьвесьма подозрительной.

    Теперь нужно тщательно продумать содержание нашего Фиктивного SMS, мы же не хотим спровоцировать еще один роман (если он уже не начался). Что мы можем сделать, так это выудить интересующую нас информацию, т.е. задать вопросы, не выдавая нашей личности.

    Вот что мы решили написать в SMS: «Билл, я начала вести дневник. Ты помнишь день и время нашей последней встречи

    Через несколько минут мы получаем ответ: «Конечно, прошлый четверг около 7:30. С нетерпением жду завтрашнего вечера

    В этом случае нам повезло с дополнительной информацией. Мы надеялись на то, что последняя встреча была два месяца назад, но помимо того, что наши подозрения оправдались, мы еще и узнали о планах на будущее. Технология — ужасная сволочь, когда дело касается горькой правды, но, согласитесь, лучше быть в курсе!

    Постарайтесь Не Попасться — Если Вам Не Все Равно!

    Мы не сможем остановить Билла, если он решит позвонить Маргарет вместо того, чтобы отправить SMS. А это вполне возможно, так как по журналу звонков видно, что они чаще обменивались звонками нежели сообщениями. Такие моменты следует учитывать при использовании Фиктивных SMS.

    Отсюда можно сделать вывод, что используя Фиктивные SMS нужно быть очень осторожным, чтобы не попасться и не вызвать подозрения. В конечном счете получатель SMS и пользователь наблюдаемого телефона все равно будут общаться и, возможно, поговорят практически сразу. Если ваше сообщение кажется странным и необычным, они могут его обсудить.

    Именно поэтому мы не советуем прибегать к помощи Фиктивных SMS без необходимости. С другой стороны, если вы ждали подходящего случая и не волнуетесь о последствиях или вам нужно получить необходимую информацию, то эта функция вам очень пригодится.

    Не важно, как вы собираетесь ее использовать, всегда хорошо знать, что вы имеете такую возможность. Spoof SMS — это поистине уникальная функция, доступная только у FlexiSPY.

  • How To Restore Any iPhone And Keep Your Jailbreak

    How To Restore Any iPhone And Keep Your Jailbreak

    For many people restoring an iPhone can mean hours of extra work restoring all installed applications, contacts and such but, most importantly, it means that the device needs to be jailbroken again. This is especially important when, say, an iPhone is restored and Apple wants it to be upgraded to an iOS version that cannot be jailbroken. How can you restore the said iPhone and keep the jailbreak? The following shows you how.

    FlexiSPY is not responsible for any damages incurred as a result of following this guide. Restoring the iPhone by following this guide will delete all contents and settings so make sure you have backed up the iPhone first before proceeding. Following these steps from hereon out is done so entirely at your own risk.

    What is needed to restore an iPhone and keep the jailbreak?

    To restore an iPhone and keep the jailbreak you simply need the iPhone you wish to restore physically in your hand.

    The iPhone must be jailbroken first, otherwise you cannot install the software mentioned below as it only works on a jailbroken device.

    The iPhone can be jailbroken running iOS 6.x or 7.x (up to 7.1.2) the steps are entirely the same and the end result (of the iPhone being restored completely and remaining jailbroken is exactly the same.) Now that we know what is needed it’s time to get started!

    Step 1 — Add the iLex R.A.T repository to Cydia

    The program that magically allows us to restore any iPhone and keep the jailbreak is called iLex R.A.T. You will need to add this repository to Cydia to be able to then install the program and run it.

    To do that please follow the steps below.

    1. Open up Cydia on the jailbroken iPhone
    2. Tap Sources.
    3. Tap Edit.
    4. Tap Add.
    5. In the dialog box that appears type http://cydia.myrepospace.com/ilexinfo/ and then tap Add Source.
      Give the iPhone some time to update the Cydia source list.
    6. Once the source has been added tap the new repository that has appeared.
    7. Tap All Packages.
    8. Tap iLex R.A.T. From the list.
    9. Tap Install.

    Wait for the program to install..

    Step 2 — Install Mobile Terminal Emulator

    In order to use the program once it has been installed you first need to install the mobile terminal emulator because all the commands are done by the command line. Mobile Terminal emulator is part of the standard Cydia BigBoss repository and you can install it by following these steps.

    1. Open up Cydia on the jailbroken iPhone
    2. Tap Sources.
    3. Tap  the source called apt.thebigboss.org
    4. Tap All Packages
    5. Scroll down to Mobile Terminal Emulator and tap it.
    6. Tap Install.

    Wait for the program to install. Once it has been done the mobile terminal icon will appear on the iPhone springboard. Tap it to continue on to the final step.

    Step 3 — Restore the iPhone and keep your jailbreak

    With the mobile terminal emulator open, type the following and then press return after each command.

      rat

    The iLex R.A.T. program will then present you with a long list of options. We need option 12.

    So type the following and press return.

      12

    You will be asked to confirm this so please do and then the restore process will start.

    The process may take some time.

    Once it has been done though, the iPhone will run the first use wizard (as it does when it has been completely factory reset) so you simply need to complete that again and, once the iPhone is ready for use, Cydia and the jailbreak will still be present and working.

  • How To Root The Nexus 5 Running The Android L Developer Preview

    How To Root The Nexus 5 Running The Android L Developer Preview

    [box type=»warning»] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    This article will show you how to root the Nexus 5 running the Android L developer

    FlexiSPY is not responsible for the steps or rooting process given inside this article. However, all care has been taken to make sure that the information contained here is as accurate as possible. Please read and follow the instructions carefully and remember that rooting is entirely your own responsibility and FlexiSPY is not responsible for it in any way.

    What’s Needed To Root?

    We already gave a detailed blog article on how to install the Android L developer preview on a Nexus 5 which you can read here.

    This article already assumes you have set up the following pre-requisites. If you have not done this please read the article linked above to learn how to set up the environment correctly:

    1. You have installed the Android SDK onto your PC
    2. You have enabled and are running USB debugging on the Nexus 5
    3. You have correctly set the path variable within Windows for Fastboot to be used by the Android SDK

    The next step is rooting it to allow you to get the most from the new Android OS.

    Thankfully Android L and the developer preview has already been rooted and the process is quite simple and we have documented it completely below.

    In order to root the Nexus 5 on Android L you will need the following:

    • A Nexus 5
    • The Android L developer preview image
    • A PC

    You will then need to install the Nexus root toolkit which you can find here.

    Once you open up the Nexus rooting toolkit it will look like the picture below.

    nexus root toolkit
    There are two steps to the rooting process. First of all, you must unlock the bootloader and second you can then root the Nexus 5.

    Simply click the Unlock button to start the bootloader unlocking process. This will DELETE ALL DATA on the Nexus 5 and so, if you wish to back it up first please follow the steps in the previous article before continuing.

    Once you have backed up the Nexus 5, as said, click Unlock and the following dialog box will appear with detailed instructions on the actual process and what will happen.

    As long as you have set up the Android development environment on your PC correctly (see the prerequisites given above) then all you need to do is connect the Nexus 5 to your PC and follow the steps that appear to unlock the bootloader. The entire process will be automated providing you have installed the Nexus 5 USB driver and Android SDK and you just have to click OK to start.

    The rooting toolkit will then check to see if USB debugging is enabled on the Nexus 5 and it will then proceed to restart the device and unlock the bootloader and it does this by using Fastboot and putting the phone into bootloader mode.

    The entire process is short and only takes a few minutes. Once it is done the Nexus 5 will boot up normally and the Nexus toolkit will display a message saying that the bootloader was successfully unlocked.

    You can tell if the bootloader has been successfully unlocked when the Nexus 5 is in Fastboot mode (as shown in the picture below) and the lock state is set to unlocked.

    bootloader
    With the bootloader unlocked you can now proceed to root the Nexus 5 running the developer preview of Android L. Open up Android toolkit again and make sure the Custom recovery option under Root is also selected.

    Once you click Root the following message will appear detailing the entire process which is also automated.

    Simply click OK to start and the entire process will begin. Again you need to make sure the Nexus 5 has USB debugging enabled and you successfully installed the Android SDK on the PC that the Nexus 5 is connected to (via USB) whilst performing the rooting process.

    The rooting process will also install the TWRP recovery as well which replaces the stock recovery used on the Nexus 5 and gives far more functionality. The TWRP recovery allows you to easily backup the Nexus 5, flash and install zip files (e.g. ROM kernels) as well as a whole host of other advanced features which is why, for this guide, to get the most out of the Nexus 5 we recommend you root the phone and install TWRP.

    Once the rooting process has been completed you will easily be able to tell that the Nexus 5 has been rooted because you will see a new application called SuperSU which means the Nexus 5 running Android L has now been successfully rooted!

  • How to Downgrade The Android L Developer Preview To Android OS 4.4.4 On A Nexus 5

    How to Downgrade The Android L Developer Preview To Android OS 4.4.4 On A Nexus 5

    This article will show you how how to downgrade from the Android L developer preview to Android OS 4.4.4 on a Nexus 5.

    Disclaimer: FlexiSPY is not responsible for the steps inside this article. However all care has been taken to make sure that the information contained here is as accurate as possible. Please read and follow the instructions carefully and remember that downgrading the OS is entirely your own responsibility and FlexiSPY is not responsible for it in any way.

    Why downgrade?

    We’ve already published articles on how to install the Android L developer preview on a Nexus 5 here. However Android L is still under development which means that certain features, functions or software may not work entirely as expected. It is also not recommended to run an OS that is currently in development on your main phone for reasons mentioned above.

    This means that ultimately you may wish to downgrade back to the latest version of the Android OS which is stable and works. In this case, for the Nexus 5, this is Android OS 4.4.4 and the process for downgrading from the Android L developer preview back to Android OS 4.4.4 on a Nexus 5 is actually not as hard as you may think.

    What’s needed to downgrade?

    In order to downgrade the Nexus 5 from Android L you need the following:

    • The Nexus 5 running Android L
    • A PC
    • The Nexus 5 OS 4.4.4 recovery image

    On the PC that you will be using to downgrade you must have first of all set up the Android environment correctly such as installing the Android SDK, setting the Windows path for Fastboot, making sure the bootloader of the Nexus 5 is unlocked and installing the correct Google USB driver so that the Nexus 5 is recognised completely by your PC when you plug it in.

    This article is written assuming that you have done this already. If you have not then you can learn more about setting up the Android environment needed by reading the first article in this series detailing how to upgrade to the Android L developer preview which you can find here.

    Step 1 — Download the Android OS 4.4.4 image

    The first you need to do is download the Android OS 4.4.4 image from here. Google provides these images for you so that you can easily downgrade the Nexus 5 should anything go wrong or reinstall the current OS version if the Nexus 5 is running OS 4.4.4.

    factory-images

    Please make sure that you download the correct version for the Nexus 5 model you are working with.

    Once you have downloaded the image file save it in a convenient location such as your desktop.

    Once you have saved the image file to your computer you must extract it to gain access to the files that are required to start the flashing process.

    Once you have extracted the files inside the downloaded image file it should look like the picture below.

    Step 2 — Flash the Android OS 4.4.4 image to the Nexus 5

    We already mentioned that we assume you have already set up the Android development environment on your PC but again, if you need a refresher, read the article here.

    To flash the Android image you first need to put the Nexus 5 in Fastboot mode.

    This is done by doing the following:

    • Make sure the Nexus 5 is turned off completely.
    • Connect the Nexus 5 to your PC using the USB cable
    • Hold down the volume down button and the power button together to turn it on.

    If done correctly the Nexus 5 will turn on in Fastboot mode and it will look like the picture below.

    nexus5-fastboot-mode

    With the Nexus 5 in Fastboot mode and connected to your PC browse, on your PC, to the folder where you saved the Nexus 5 Android OS 4.4.4 ROM.

    Simply double-click flash-all.bat and wait for the Nexus 5 to complete the steps and, once done properly, the Nexus 5 will restart and it will be running OS 4.4.4 again.

  • How To Install The Android L Preview On To A Nexus 5

    This article will show you how to install the Android L preview on to a Nexus 5.

    Bear in mind that the latest version of Android, Android L, is still under development.

    The version we are installing in this article is subject to change and you perform the steps in this guide at your own risk.

    While everything has been done to make sure the steps are accurate, FlexiSPY is not responsible for the contents of this guide or any damage that may be incurred from following this guide.

    What is Android L?

    Android L is the newest version of the popular Android OS. It will be Android OS version 5.0.

    As is the tradition with Android OS versions being named after desserts (Android OS 4.x (K) was named Kitkat for example with Jelly Bean and Ice Cream preceding them) many people believe that the ‘L’ will stand for lollipop but this is not confirmed (nor denied) by Google at this time so we just have to wait and see what Google decide to do.

    With the new Android OS not being scheduled for release until at least the end of 2014 it comes as no surprise that only a few select phones are eligible to be running this version currently.

    Luckily, here at FlexiSPY, we like to keep on top of all things tech which is why we have just installed the Android L developer preview on our Nexus 5 and we are going to show you how you can do the same in just a few quick and simple steps.

    What you need to install Android L

    In order to install the Android L developer preview on to a Nexus 5 you will need the following:

    • A Nexus 5 phone
    • The Android L developer preview image
    • A PC

    Step 1 – Backup the Nexus 5

    Because this is still development software we highly recommend that you back up the phone first completely before proceeding.

    To do that you, first of all, install the Nexus root toolkit which you can find here.

    Once you have downloaded the Nexus toolkit connect the Nexus 5 to your PC using the USB cable it came with. After that, you need to put the Nexus 5 in USB debugging mode before it will be seen while connected to the PC using the Nexus root toolkit program.

    To enable USB debugging on the Nexus 5 simply do the following:

    • Tap Apps
    • Tap Settings
    • Tap About Phone
    • Scroll down to Build Number and keep tapping that until you read you are now a developer. The Developer options menu has now been unlocked.
    • Tap the new Developer Options Menu.
    • Make sure Stay Awake is checked
    • Make sure USB debugging is checked.

    You also need to make sure you have installed the Nexus 5 USB driver otherwise even with USB debugging enabled the PC will still not recognize the phone. To learn how to do that click here.

    If, after enabling USB debugging and installing the USB driver and the Nexus 5 is still not recognized then try a different USB port on your computer because sometimes that can make the difference.

    Also make sure that, with the Nexus 5 connected to your PC, no on-screen notification on the Nexus 5 is visible asking you to accept USB debugging on the PC (you have to accept otherwise the PC will not find the phone).

    With all this done the Nexus 5 should now be recognized when you run the Nexus toolkit and it will look similar to this.

    The NExus Root Toolkit v1.8.6

    As you can see the Nexus root toolkit has identified the Nexus 5 and Android OS version so the next thing that we need to do is start the backup.

    The root toolkit takes care of the entire backup process, so click the Backup button to start.

    We want to create a complete backup of the Nexus 5 before we install anything on to it so simply click Create Android Backup File.

    There is quite a lot of text to read but essentially you just need to tap OK and then you can proceed to the next step.

    The next step will ask you where you wish to save the backup file to on your computer. Simply pick a convenient location and then the next window will explain more about the backup process and what will happen.

    While the backup is in progress make sure the Nexus 5 is not interrupted.

    Once the backup is complete the Nexus root toolkit will inform you.

    Downloading the Android L developer preview

    Google makes downloading the developer preview as simple as possible however there are some prerequisites first. You must make sure you have installed the Android SDK on your PC first.

    You must also make sure that, within Windows, you have set the path variable for Fastboot to match the location where you save the downloaded Android developer preview too.

    For more information how to install the Android SDK please see the details here.

    When you have successfully installed the Android SDK to a folder of your choice on your PC, it should look like this (we have installed the Android SDK to C:\Android for easy reference).

    sdk manager
    Here you can see the SDK (the SDK folder) has been installed and we have put all of this in a folder located at C:\Android for easy access as mentioned.

    You can download the Google L developer preview from the link here.

    Make sure you download the correct one for the Nexus 5 and then save the downloaded folder in the same folder as the SDK as shown below. We named our folder android for easy reference also.

    androidl

    Inside the android folder, you must extract the contents of the developer preview so it looks like this:

    bootloader-hammerhead-hhz11k
    Next, connect the Nexus 5 to the PC using the USB cable.

    Make sure it is powered off and the hold down the volume down button and the power button to turn it on and it will boot up in Fastboot mode which looks like this.

    The final thing that needs to be done is within Windows which is to set the Path of Fastboot so that it points to the Android SDK Fastboot files which we have located in C:\Android\SDK\Platform-Tools on our PC (for you it will be different).

    To set this do the following:

    On the Windows desktop (in this case Windows 8) open up file explorer. Right click your computer and then click Properties.

    With the system properties menu open click Advanced System Settings and the System Properties window will appear.

    With the System Properties window, open click Environment Variables and the menu that appears will look similar to what is shown below.
    In the Environment Variables window select Path and then click Edit.

    Add a semicolon, as shown in the example, and then type the full path to the Android SDK (in this example we use C:\Android as mentioned).

    Now that we have everything set we need to make sure the Nexus 5 is ready.

    • The Nexus 5 should be connected to your PC.
    • The Nexus 5 should be running in Fastboot mode.
    • You should have installed the Android SDK on to your PC in an easy to access location.
    • You should download the Android L developer preview image and saved it in a folder where you saved the Android SDK for easy reference.

    Now that you have done all these four things you simply run the flash-all.bat file inside the Android L developer preview folder.

    If all you see inside your Android L developer preview folder is a zip file you must extract it first to view all the files.

    view-all-the-files-sdk
    The Android L preview image will be flashed to the Nexus 5. This may take some time.

    DO NOT DISCONNECT THE NEXUS 5 FROM YOUR PC OR TURN IT OFF OR DO ANYTHING THAT WILL INTERRUPT THE FLASHING PROCESS IN Anyway.

    Once you have flashed the Android L developer preview the Nexus 5 will boot up for the first time. This may take some time also so please be patient. Once it boots up Android L will be fully ready for use.

  • How to Downgrade a Samsung Galaxy S4 from 4.4.2 to 4.2.2

    How to Downgrade a Samsung Galaxy S4 from 4.4.2 to 4.2.2

    This article will show you how how to successfully downgrade a Samsung Galaxy S4 from OS 4.4.2 to 4.3

    Disclaimer: Please understand that this guide is provided ‘as is’. FlexiSPY is not responsible for it or its contents and you perform the downgrade procedure entirely by yourself and at your own risk. FlexiSPY is not responsible in any way for any damages that may incur through following this guide and by reading past this notice you agree to the notice given above:

    Our Samsung Galaxy S4 is model number GT-I9500.

    These steps may not work on the GT-I9505 version of the Samsung Galaxy S4 and you perform them at your own risk.

    Why Downgrade?

    FlexiSPY is not yet fully compatible with OS 4.4.2 and so if your target device is running OS version 4.4.2 and you want FlexiSPY Extreme features such as spy call and call interception to function then you need to downgrade.

    Not only that but downgrading may actually cause a performance increase due to the S4, which is getting on in years, not being able to fully run the latest Android OS version as well as something such as the Samsung Galaxy S5

    Please note also that in certain geographical regions the S4 may not yet be able to run OS 4.4.2 and that depends entirely on the network providers and Samsung themselves.

    What is needed to downgrade?

    To downgrade the Samsung Galaxy S4 you will need the following

    • The Samsung Galaxy S4 you wish to downgrade which is running OS 4.4.2
    • A PC.
    • The USB cable that cmae with the Samsung Galaxy S4
    • The OS 4.2.2 firmware file for your S4 according to your country (see later)
    • A backup of the EFS partition of the S$ (see later)
    • The modem binary file of the S4 (see later)
    • The rooting software for PC called Odin (see later)

    Now that we have all the necessary equipment it’s time to get started!

     Step 1 Check the Android OS version is 4.4.2 on the Samsung Galaxy S4

    On the phone itself go to Apps > Settings > More > About Device and the OS version will be listed. You can see our S4 is running Android version 4.4.2 in the screenshot below.

    oncellphone

     Step 2 Backup the EFS partition of the S4

    Basically, without getting too technical (we will discuss more about the EFS partition later) it is always safe to make sure you backup the phone first before you downgrade.The EFS partition is responsible for allowing the phone to have carrier functionality and make calls such as getting the network identified and IMEI number

    Without this data the phone cannot function as a phone

    To backup the EFS partition we will use a program called EFS Professional which is a PC program that allows us to backup the EFS partition to a computer to keep it safe

    You can download EFS Professional from here.

    On the Samsung Galaxy S4 go to the Play Store and download and install BusyBox as this is required for EFS Professional to work. You must have rooted the Samsung Galaxy first to install BusyBox and you can head on over to Spy Phone Review here for assistance with that.

    Simply grant root access when asked and then tap Install to start the installation process.

    Simply grant root access when asked and then tap Install to start the installation process.

    With BusyBox installed and the Samsung Galaxy S4 rooted simply plug the S4 in to your PC using the USB cable it came with and run EFS Professional.

    When you run EFS Professional it will perform checks on the S4 itself first to make sure USB debugging is enabled (to enable USB debugging, on the S4 itself go to Settings > More > About Device and continue to tap Build Number until the Developer Options option is shown. Once inside Settings > More > Developer Options make sure that USB debugging is checked.)

    Simply tap OK on the S4 when asked.

    Back on the PC if you run EFS Professional it will make sure the S4 is rooted and BusyBox is installed and it should look similar to this.

    should_look_something_like_this

    Tap the Backup tab.

    Make sure EFS Professional looks like This Picture  . You can see that All Partitions is selected but only the four partitions related to EFS are selected to be backed up, then Click Backup to start.

    Once the backup process is complete disconnect the S4 from the PC and reconnect it again.

    Using Windows Explorer browse to the SD card of the S4 and you will find the backup folder titled EFSProBackup.

    Simply copy this folder to your PC and keep it in a safe place.

    copy-the-folder

     Step 3 – Download the Android 4.2.2 OS for your country and S4 version

    The next thing that is required is to download the Android 4.2.1 ROM that we will flash to the S4 to downgrade it.

    To do this we use the website here.

    Click Firmware Database to be taken to the page below.

    click_firmware_database

    Under TYPE, OS, MODEL and COUNTRY select the values that match your S4

    Click the 4.2.2 ROM you want to download

    Make sure the details are correct for the S4 you are wanting to downgrade and then click the Download button

    confirmthedetails

    Once it has been downloaded extract it to your computer as shown in This Picture    

    Please note that the ROM files can be several gigabytes in size and downloading them may take some time.

     Step 4 – Flash the 4.2.1 firmware on to the S4

    You now need to flash the firmware that was downloaded on to the S4.

    To do this you will need a program called Odin which you can download from here

    You need to put the Samsung Galaxy S4 in to download mode which you do so by doing the following:

    • Turn off the S4 completely
    • Hold down the volume down, home and power buttons together
    • Wait for the S4 to turn on and it should boot in to download mode
    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode

    downloadmode

    Now you have downloaded Odin connect the Samsung Galaxy S4 to your PC and Windows should download the drivers automatically.

    Once you launch Odin, if all is successful and the S4 is in download mode, it should say Added! as shown in This Picture    

    You now click the AP button and browse to the firmware file you downloaded and extracted from the previous step.

    Click the firmware file and click Open.

    The firmware file will be checked and then added to Odin so it looks like the screen below. Due to the filesize of the ROM this can take some time.

    When Odin looks like the screenshot below you are ready to flash the ROM file because the ROM file has been checked successfully by Odin.

    whenitlookslikethis

    All you need to do is click Start to flash the ROM.

    Flashing the ROM can take up to 15 minutes and will take some time

    DO NOT DISCONNECT THE S4 FROM THE PC OR TURN IT OFF IN ANY WAY

    When the process is finished Odin will say PASS and the S4 will restart and boot in to the newly flashed ROM

     Step 5 — Resolving any issues — unable to boot up

    If the S4, after you flash the ROM, is stuck on the Samsung logo then do the following

    • Turn off the S4 completely.
    • Hold down the Volume up, home and power buttons together.
    • Wait for the S4 to display the S4 logo and then let go

    It will now be in recovery mode which looks similar to this.

    recoverymode

    Using the Volume up and down keys scroll to Wipe data/factory reset and press the Power button to confirm

    Scroll down to Yes and press the Power button on that to confirm.

    The Samsung Galaxy S4 will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the S4 will restart and boot up – this may take some time when booting for the first time so please be patient

     Step 6 — Resolving any issues — Loss of IMEI

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect — e.g. 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from here, save it to your PC and extract it.

    modemfile

    Put the Samsung Galaxy S4 in to download mode again and connect it to your PC and run Odin (see step 4 for more information).

    It will look like This Picture   once connected as we have seen before

    Click the CP button and then point to the Modem binary file shown in the last screenshot

    pointtothelastscreenshot

    Odin should now look like This Picture  . You can see the S4 has been added and the modem file is selected.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE S4 FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the S4 to reboot and you should now have your working IMEI back and successfully downgraded the S4 from 4.4.2 to 4.2.2.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • FlexiSPY Is Now Compatible With iOS 7.1.2

    FlexiSPY Is Now Compatible With iOS 7.1.2

    You can now install and run FlexiSPY Premium & Extreme as well as FlexiSPY iPad on any jailbroken iOS device running iOS 7.1.2!

    This now means that you can now get the same unrivalled IM capturing capabilities on iOS 7.1.2 as well as great signature FlexiSPY features such as spy call and call interception.

    How can I get FlexiSPY on my iOS 7.1.2 device?

    The first thing you need to do is jailbreak the device, we have a guide for that, which explains all the steps, that you can read, here All it takes is a few minutes and the TARGET device in your hand to jailbreak the device with help from access to a PC and you will be up and jailbroken in no time. After being jailbroken, the installation of FlexiSPY will be as simple as ever, so why not start enjoying FlexiSPY on your jailbroken iOS 7.1.2 device today!

    Get FlexiSPY For iOS

  • iOS 7.1.2 Untethered Jailbreak From Pangu Is Out — Here’s How To Do It Safely

    iOS 7.1.2 Untethered Jailbreak From Pangu Is Out — Here’s How To Do It Safely

    Recently news broke that a group of Chinese hackers successfully released a working jailbreak for iOS 7.1.2 devices. For those who have been holding off on upgrading from iOS 6.x.x because they did not want to lose the jailbreak this is surely welcome news however there are a few questions that need to be asked about this jailbreak and whether it really is legitimate or not.

    WHAT IS PANGU?

    Pangu is the name of the jailbreaking application for iOS 7.1.2. Currently it is released on Windows only so those who have Macs and wish to jailbreak their iOS 7.1.2 device are currently out of luck. However there are already warning signs as to the legitimacy of the jailbreak before you even download the jailbreak tool – starting with the download URL.

    http://dl.pangu.25pp.com/jb/ (this is not the full download link – see below for that)
    25pp.com is a well-known Chinese piracy site and the jailbreak application, once downloaded, tries to install spyware in the form of the 25pp iPhone app -the old version does this, the new one contains no spyware- but how is this even possible? If the jailbreak application tries to install spyware how can the actual jailbreak be deemed trustworthy?

    The ios 7.1.2 jailbreak is in chinese!

    As you can see from the screenshot above the UI of the jailbreak tool takes a lot from what we have already seen from evad3rs, the process shouldn’t be too difficult

    Below are two guides, one to jailbreak iOS 7.1.2 safely and the other for those who have already jailbroken iOS 7.1.2 using Pangu and want to stop the application from doing whatever nefarious reasons it has to dial out.

    HOW TO JAILBREAK IOS 7.1.2 SAFELY

    Below are steps to jailbreak IOS 7.1.2 safely without installing any nasty 25pp spyware.

    Alternatively you can watch either the Mac or PC video and follow along.

    It should be noted that we are not responsible for any damage that may be done to your phone by following this tutorial. Also be aware that you might have to complete the process twice on a 5s, the first attempt, the device will ‘blue screen’, wait for the iPhone to reboot, then re run Pangu on your PC, and follow the guide again.

    Step 1- Download and run the Pangu jailbreak from the link below.

    Pangu For Mac

    Pangu For PC

    Step 2 – Run the Pangu jailbreak application in Administrator mode on your PC, and uncheck the box (the most current version of pangu no longer has the option for unchecking the box)

    unchecktheboxes

    Step 3 – Connect your iPhone or iPad that is running iOS 7.1.2.

    Step 4 – This is where things get interesting. The jailbreak tool uses an out of date enterprise certificate for authentication to allow the jailbreak to take place. This means that you need to change the date and time on your iPhone or iPad to June 2nd, 2014 otherwise the jailbreak will not work.

    panguwillshowyou

    Step 6 – Set the date and time to June 2nd 2014.

    Step 7 — Wait for Pangu to check the date is correct and then click the big black button to start the jailbreak and just wait.

    letpangustart

    Step 8 – As with Evad3rs a new app will appear on the springboard of your device.

    Loaded Spyware

    Note: If you wait too long before tapping ‘Continue’ or ‘Quit’ a message in red text will appear. If this happens you must start the jailbreak process from the beginning again.

    Step 9 – The Pangu app on the PC will continue to jailbreak the device – do not disconnect the device or unplug the device USB cable from your PC.

    Step 10 – When the Pangu app looks like this on your PC the jailbreak is complete.

    itlookslikethis

    You can verify this also by looking on your device now and seeing the Cydia icon.

    THAT’S IT

    iOS 7.1.2 is jailbroken.

    But what happens if you did all this but forgot to uncheck the checkbox? (If your pangu had the checkbox option)

    How to disable 2PP if you have already jailbroken your iOS 7.1.2 device

    You have two options:

    1 – Restore your phone which will DELETE ALL DATA and rejailbreak the phone using the steps above.

    2 – Remove PPSync to stop 2PP from functioning.

    To do this, on the now jailbroken iOS 7.1.2 device, go to Cydia. Tap Sources > Manage > Edit > Add.

    When asked for the repo name type in http://cydia.angelxwind.net/

    Wait for Cydia to update and then tap the new source from the list.

    Tap the program titled ‘Install Complete PPSync Remover’.

    ppsync

    Run the app to remove the PPSync program from your device and it should be okay.

    For those who are wondering PPSync, once installed, can cause device instability and stock apps (e.g. iBooks or Maps) to crash and it generally can affect the performance of your device.

    So now you know how to jailbreak iOS 7.1.2 on a Windows PC using Pangu. If you have any questions or comments head over to the jailbreak page of Spy Phone Review which you can find here or leave a comment below.

  • The Smartphone Hacks In Watch Dogs Are Very Real And Are Happening Right Now

    The Smartphone Hacks In Watch Dogs Are Very Real And Are Happening Right Now

    For those who are not familiar with the world of gaming recently one of the most hotly anticipated titles dropped – Watch Dogs from Ubisoft. This open world sandbox game promised everything that the seminal GTA V offered except its focus was more on hacking the city in order to thwart enemies then relying just on firepower alone,

    Watch Dogs takes place in a Chicago of the future where the entire city is hooked up to one main system known as CtOS. Obviously, those with any hacking knowledge could potentially hack in to the system and cause all kinds of chaos to the city and its inhabitants and that, essentially, is the crux of Watch Dogs.

    Many people have already gone to task comparing just how plausible or possible the hacks are that you pull of as Aiden Pierce as you investigate who murdered your niece and this article is going to show you that parts of what you see and what you can do in the world of Watch Dogs is already very real and has been around now for quite some time.

    centerman

    The first thing is listening to live calls. At the start of Watch Dogs you happen to hack in to a bystanders phone and you can listen to the entire conversation on your own phone.

    Call intercept allows you to listen in live to the phone calls of another person without the other person ever knowing you are there. Unlike Watch Dogs though which stretches the truth like all good Hollywood and TV to the point where you believe that anything can be hacked remotely (hint: it’s a lie) if you really want to listen to someone else’s phone calls using FlexiSPY you will of course need the TARGET device of the other person first so that you can physically install FlexiSPY on to it.

    CALL RECORDING

    During the course of Watch Dogs you uncover audio logs which are recordings that give more insight in to the lives of the people living in this futuristic version of Chicago. In the game Aiden simply hacks in to a computer and can then start listening to a stored audio log on his phone. The same principle is applied by FlexiRECORD with their FlexiRECORD product. Except in real life you need to first install the monitoring software, in this case FlexiSPY, on to the TARGET device and FlexiRECORD on to your own computer and connected Android phone.

    After that it works the same way, all calls can be recorded and stored on your computer or you can save the recorded files to your phone to listen to them on the move.

    Not only can you listen to live calls in Watch Dogs but you can also be privy to private conversations between Chicago’s inhabitants as you walk around. FlexiSPY also has this feature in real life – known as spy call – and it allows you to use your own phone to call the TARGET device and listen to what it taking place around the phone at the time you call.

    FlexiSPY makes spycall incredibly simple, once you have installed FlexiSPY on to the TARGET phone you simply enter your own mobile phone number in the FlexiSPY online dashboard, enable the spycall feature and then you are all set.

    Simply call the TARGET phone from your own to start secretly listening in.

    oncellphone

    Watch Dogs is all about hacking at the end of the day. There is nothing more satisfying then hacking traffic lights to escape a police pursuit, looking back seeing the police smash in to the puzzled drivers as you speed away or watching them get impaled on blockers you activate. But did you know that Watch Dogs allows you to hack the SMS messages of people too? That’s right, and, yes, in real life it can be done too. So this means that, at certain points during the game, you can hack someone else’s SMS messages to learn revealing information or even send them SMS messages to distract them and get their attention whilst you sneak past.

    Whilst technology is not at the point just yet of allowing you to hack someone else’s phone remotely (although many scams are out there) you can indeed intercept and read someone else’s SMS messages using FlexiSPY.

    FLEXIRECORD

    Or how about hacking a bridge to raise up after you have escaped? Watch Dogs allows you to do all that and Ubi Soft even had Kaspersky onboard as advisers to make sure that the hacking performed in the game was actually real (although a lot of it was made more dramatic for effect – think the hacking movie Swordfish with John Travolta and Hugh Jackman).

    So there is no doubt that right now Watch Dogs is the hottest game on the planet. With its innovative take on an interactive and interconnected city and society it makes you think about your own security. We are all too reliant on our computers or smartphones and it will only get worse and this means the greater the risk that all we care about digitally can be hacked. There is a classic line in the 2001 Ryan Philippe hacking movie ‘Antitrust’ which goes: “We don’t take anything seriously, unless it’s on a hard drive”

    This is truer today than it has ever been with our devices now literally becoming part of us (Galaxy Gear and Google Glass) with a whole host of wearable devices set to launch very soon. It is getting to the point that are bodies are our data which is why health apps are now the next big application market to plunder.

    There is no doubt that the release of Watch Dogs has raised issues and questions about how secure we are online or when dealing with digital data and how dependent we have become on our devices and how much control they have over us (let’s get this straight, they control us, we do not control them otherwise we would just turn them off and never use them).

    flexirecordcomingup

    dont take seriously

    It is the constant need to check Twitter, Facebook, SMS messages, voice mail all the time that keeps our devices turned on and always in our thoughts. All of this data, in the wrong hands or obtained unethically could have very bad consequences. But first the media needs to educate itself about what hacking really is and what it truly involves instead of sensationalizing it for Hollywood and TV.

    With the release of Watch Dogs it would have been nice to get away from the stereotypical way of showing hacking as being done remotely which is just not true. It is this misinformation that allows for many illegitimate companies to profit providing scam software. When you think about the story of Watch Dogs even placing an entire city under control by one OS (it would be several ones surely? One for each infrastructure type — water, power etc.) is a little radical but make no mistake, this is where our lives are going.

    WHO KNOWS

    Maybe Ubi Soft will fix this in the sequel and will make Aiden have to physically install the hacking software on to the device you want to hack first and for multiplayer teams of hackers could fight it out online for control of specific subsystems of the OS (like capture the flag) to beat the opposing team – it would make the game more interesting and more realistic — or at least they could allow us to hide all the dead bodies we leave in our wake.

  • How To Spy On iPhone Google Hangouts With FlexiSPY

    spyongooglehangoutswithflexispy

    This article will show you how you can use FlexiSPY on an iPhone to spy on all Hangouts chats that take place on the TARGET iPhone and view them directly from inside your FlexiSPY online account.

    Getting Started

    Step 1 – Make sure you have the TARGET iPhone in your hand.

    Step 2 – Make sure the TARGET phone has been jailbroken.

    Step 3 – Make sure you have installed and activated FlexiSPY on the TARGET iPhone.

    Step 4 – Make sure that the TARGET iPhone has Hangouts installed with an account signed in.

    Viewing the captured Hangouts data

    Step 1 – Log in to your FlexiSPY online account.

    logintotheflexispyportal

    Step 2 – Highlight the Messages tab and click IM’s to bring up the IM menu.

    Step 3 – Click the IM services drop-down menu and choose Hangouts from the list.

    clicktheimservicesdropdownmenuandchoosehangoutsfromthelist

    Step 4 – All captured Hangouts information on the TARGET iPhone will be displayed.

    allcapturedhangoutsinformationonthetargetiphonewillbedisplayed

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Hangout instant messaging capturing feature for iPhone to spy on their Hangouts messages.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!