Category: 提示与技巧

在这里你可以阅读最新的FlexiSPY提示与技巧的帖子,在这里你可以学习如何充分利用你的FlexiSPY软件。

  • Easily Change Your Android SELinux Mode

    Easily Change Your Android SELinux Mode

    This guide will show you how to Change your Android SELinux mode to permissive on an Android phone, helping you better run various apps to their fullest.

    We are not responsible for any damages that occur through following this article. at the time of writing the steps worked fine for the test android phone we were using and we were able to change selinux successfully using a custom kernel.

    As we have mentioned throughout this article custom kernels are not available for all versions of every Android phone ever made. however popular phones should be covered. Always take care and backup the device at all stages and correctly choose the kernel for the android model number of the phone you are working with.

    Changing SELinux from enforced to permissive will Not Work on Samsung Android Phones with Samsung Knox enabled and it may also not work for other Android phones from other manufacturers depending on the Sndroid os version installed.

    What is SELinux?

    SELinux or ‘Security Enhanced Linux’ is an Android OS module that is designed to identify and address critical security gaps in the Android operating system. It is used to protect the Android operating software from malicious code or software being installed and causing damage to the phone.

    Unfortunately those same ‘security gaps’ associated with malicious software also allow many apps at their root features to function properly. With SELinux in Permissive mode the security gaps in the Android operating system are not fixed and so the programs can use those to run properly.

    With SELinux set to Enforced mode the security gaps are fixed, therefor the software cannot run all of its root features properly which results in Limited mode and reduced functionality.

    How does SELinux affect applications?

    When Samsung released Android OS 4.3 they changed the SELinux option from Permissive, which is what a lot of applications need, to Enforced which means that while most applications will work certain features will not.

    For example, when you install FlexiSPY on a rooted phone, as part of the installation process, while it checks for root permissions within SuperSU (after you grant access) it also checks the SELinux status to see if it is set to Enforced – if it is then it will try to force the permission status to permissive.

    If it is successful then the software runs in root mode with full access, whereas if it’s unsuccessful, then it will run in root mode with limited access.

    How To Check Your SELinux Settings

    On the phone, go to Settings > More > About Device and then scroll down to the bottom where you’ll see SE for Android Status

    Easily Change Your Android SELinux Mode To Permissive

    There is a program on the Play Store (link below) that can change the SELinux mode of non-Samsung Android phones and Samsung Android phones running OS 4.4.2 and below but anything above that and the software will not work – we mention about issues with OS 4.3 and above here

    All you need to do is download the application on to the Android phone, run it and tap the Permissive button but, if the Android phone is a Samsung Android phone with OS 4.3 or above installed which also has Knox running then it will no longer work.

    • Download and install SELinux Mode Changer from the Play Store onto your phone.
    • Run the application and set SELinux to Permissive
    • Restart the phone
    • Check the SELinux status in the About Device menu to see if it has changed.Note: This process will not only downgrade the OS version but it will also DELETE ALL DATA ON THE PHONE.

    Didn’t work? | Install a Custom Kernel

    One way to get around SELinux being set to Enforced is change the kernel to one which has been edited so that SELinux has been set to Permissive which should theoretically allow your apps, or FlexiSPY to run in Full mode.

    These kernels though may not exist or may be hard to find for every Android phone.

    Any Android phone, not just Samsung, whose SELinux status is set to Permissive can run FlexiSPY in FULL MODE.

    First of all you need to find out if the Android phone you have has SELinux set to permissive or not which we have explained earlier.

    SELinux cannot always be changed so easily depending on the make and mode of the Android phone.

    And this is why we have to install a custom kernel if the SELinux Mode Changer application fails to fix the problem.

    Please note that custom kernels with selinux set to permissive are not available for all android phones – regardless of whether they are made by samsung or not.

    Where can you download a custom kernel?

    The Android OS kernel is the most important part of the Android OS. It allows the phone software to interface with the hardware and the application that are installed on the phone, basically telling the phone how to run and what settings and configuration it has and then all this information is used for all installed programs on the Android phone.

    The best place to look for custom kernels is the forum on XDA Developers.

    How can I install a Custom Kernel which has SELinux set to permissive?

    For this example we are using a Samsung Galaxy S4 so we go to XDA forums to get started.

    The first thing to do is type in your Android phone model.

    A screenshot of the xda page where you search for your phone model

    Make sure you choose the correct one from the list as many of the same Android phones have country variants with different model numbers.

    You can find the model number to search for on the Android phone by going to the About Device (can also be called About Phone) menu and it will be listed.

    For example the model number of our Samsung Galaxy S4 is GT-I9505 so that is what we need for our custom kernel.

    Once you have entered the model number to search for you will get the main page for that Android phone.

    We need a custom kernel so we click the Kernels tab.

    Screenshot of the xda kernels tab

    You now need to simply browse through all the custom kernels until you have found one that says it has SELinux set to permissive.

    For our version of the Samsung Galaxy S4 we found one pretty easily.

    screenshot of the SELinux kernel with the permissive state active

    As you can see it matches the model number of our Samsung Galaxy S4 and has SELinux set to permissive and runs on Android OS 4.3.

    Note: never install a custom kernel on to a phone whose model number does not match. doing so can make the phone inoperable.

    Custom Kernel Installation Guide

    The first thing to do is to backup the phone completely. This is vitally important. We explain how to backup an Android phone completely in this article.

    Once you have backed up the phone completely download the ROM file from here.

    Once you have downloaded the kernel file to your PC you need to install Clockworkmod recovery on to your Android phone. If you have already rooted the Android phone then you already have Clockworkmod installed – you can learn more about rooting and how to root popular Android phones here.

    Now that you have backed up the Android phone and rooted it to install Clockworkmod recovery it is time to install the customized kernel.

    First you need to connect the Android phone to your PC.

    Once it is connected it will appear as a device. Simply copy the kernel zip file to the Downloads folder of the phone, once you have done that we can boot in to ClockworkMod recovery and flash the kernel.

    1. Make sure the Android phone is turned off completely.
    2. Hold down the Volume Up, Home button and power together until the model number appears.
    3. Let go of the key combination and Clockworkmod recovery should load.
    4. From the list of options choose Install zip from Sdcard
    5. Browse to the kernel zip file you copied to the phone and select it.
    6. Install the kernel and wait for it to complete.
    7. Choose ‘Reboot System Now’ to reboot the phone.

    Now that you have flashed the custom kernel and rebooted the phone it is time to check the SELinux status.

    screenshot of the about phone section that shows the new SELinux status

    Using the above screenshot as an example you would need to check the SELinux status which is highlighted and the Kernel version should also have been updated to reflect the custom kernel that you just installed.

    Providing everything was done correctly and SELinux was successfully changed to Permissive you can now install FlexiSPY (or deactivate and uninstall and reinstall to get full mode) and start taking advantage of the great features that FlexiSPY offers on a rooted phone.

  • How To Return The AT&T HTC One M8 To Stock ROM

    How To Return The AT&T HTC One M8 To Stock ROM

    This guide will show you how to downgrade the HTC One M8 OS software and return it to factory settings.

    Note: This is only for the T-Mobile or ATT HTC One M8 – DO NOT USE IT ON ANY OTHER VERSIONS

    Disclaimer: FlexiSPY is not responsible for downgrading the Android device in any way. Before performing any of these steps make sure you back up your Android device completely. These steps are performed at your own risk.

    What do you need to downgrade the HTC One M8?

    In order to downgrade the HTC One M8 you will need the following:

    • The HTC One M8 you wish to downgrade in your hand.
    • A PC.

    Note: This process will not only downgrade the OS version but it will also DELETE ALL DATA ON THE PHONE.

    Getting started

    The first thing you need to do is make sure you have set up the Android SDK on your PC and that ADB is installed and working.

    In order to use Fastboot to downgrade the HTC One M8 you must have the Android SDK downloaded and installed on to your computer

    You can download the SDK from here.

    Step 1 – Gain S-Off on your HTC One M8

    You need to gain S-Off on your HTC One M8 to be able to downgrade it and you can use Firewater and the website here to do this – please read all instructions carefully.

    Step 2 – Download the HTC USB drivers for your PC

    In order for your HTC One M8 to be recognised once you connect it to your PC, and for Fastboot to work please install the drivers from here.

    Step 3 – Enable USB debugging on the HTC One M8

    On the HTC One M8 you must enable USB debugging so that the PC recognizes it when you connect it and you can downgrade it.

    To do that, on the device, go to Menu > Settings > Developer options and make sure USB debugging is selected.

    Step 4 – Connect the HTC One M8 to your PC and run Fastboot

    Connect the HTC One M8 to your PC.

    On your PC browse to the Fastboot folder that you got after you installed the Android SDK.

    Hold down the shift key whilst right-clicking to open a command prompt window.

    Type “adb reboot bootloader” and press Enter. The phone will reboot into bootloader mode.

    On the phone select the Fastboot option.

    In the same command prompt window type “fastboot oem lock” and press Enter.

    The HTC One M8 bootloader will then be locked – this may take some time.

    You only need to lock the bootloader if you unlocked it for rooting the device – otherwise skip this step.

    Step 5 – Download the downgrade RUU file

    On your PC download the T-Mobile RUU (ROM upgrade utility) file that you will use to downgrade the phone. You can get it from here. The ATT version is here.

    Step 6 – Downgrade the phone

    With the HTC One M8 still in Fastboot mode and connected to your PC and the downgrade RUU file downloaded simply run the RUU file itself.

    On the window that appears select the Update option and follow the on-screen instructions.

    Once the entire process has finished the HTC One M8 will reboot and then you can remove it from your PC.

    Once the HTC One M8 boots up it will be running the same stock OS as it was when you first purchased it.

    You only need to lock the bootloader if you unlocked it for rooting the device – otherwise skip this step.

  • How To Downgrade A Samsung Galaxy Note 3 From OS 4.4.2 To 4.3

    How To Downgrade A Samsung Galaxy Note 3 From OS 4.4.2 To 4.3

    This guide will show you how to downgrade the Samsung Galaxy Note 3 from OS 4.4 to OS 4.3.

    Disclaimer: Please understand that this guide is provided ‘as is’. FlexiSPY is not responsible for it or its contents and you perform the downgrade procedure entirely by yourself and at your own risk. FlexiSPY is not responsible in any way for any damages that may incur through following this guide and by reading past this notice you agree to the notice given above:

    For this guide we are using a Note 3 whose model number is SM-N900

    Please make sure your Samsung Galaxy Note 3 model number matches the one used above as not all versions of the Note 3 can be downgraded.

    What is needed to downgrade?

    In order to downgrade the Note 3 you will need the following:

    • The Note 3 that you wish to downgrade in your hand
    • A PC.

    Why downgrade the OS of the Note 3?

    If you have rooted the Note 3 already what happens is that you no longer receive official system updates from Samsung so what happens if you want to change the OS version to an older one for performance reasons?

    All you have to do is backup the Note 3, download the ROM that you want to downgrade to and then flash the ROM to the phone using your PC and Odin.

    For one thing downgrading the Android OS to an older version can allow Galaxy Note 3s running OS 4.4.x to run FlexiSPY in FULL mode which means that, once the device is rooted, all FlexiSPY features will function provided you have rooted the phone before installing FlexiSPY.

    Running an older OS version can also add features that were removed in newer version or improve stability and reliability, especially if the new OS has just been released and so can be subject to bugs and issues.

    Backup the phone first

    Before you do anything make sure that the phone has been backed up first. We have discussed how to do that here (the steps are the same even though the phones are different) and the software used is EFS Professional (to backup all partitions – especially EFS as this is the most important).

    Once the phone has been completely backed up to your PC you now need to download the Samsung Galaxy Note 3 ROM for your country that is running OS 4.3.x.

    Download the 4.3.x ROM you need for the Note 3

    Now that you have backed up the phone completely (especially the EFS partition – we cannot stress that enough!) it is time to get the ROM you need.

    If you want to downgrade a Samsung Galaxy Note 3 running OS 4.4.x to 4.3.x or below in order to run FlexiSPY here is what you need to do.

    1. Browse to http://www.samfirmware.com/
    2. Click the Firmware tab at the top.
    3. Click the Check your firmware option.
    4. Search for the Samsung Galaxy Note 3 using the dropdown menu.
    It should look something like this..

    screenshot of the sammobile samsung galaxy s3 model checker

    5. Click Check firmware when done.

    Note – In this example using the Note 3 we chose Thailand as the country but you would choose your own country (e.g. USA or UK) which means that the model number (SM-N900) may also be different.

    6. Click Download – click the Download button again when ready to proceed (you may need to register a free account on Sammobile before you can download ROMS).

    7. Click the Download button once more to start the download process and save the ROM file to your PC.

    screenshot of the sammobile download that appears for your note 3 after choosing your options

    The filesize is 1.3GB so the download may take some time. Once downloaded save it somewhere that is easy to access such as the desktop.

    Download the unlocked Note 3 bootloader

    When Samsung released the Note 3, on many variants of the model, they have now locked the bootloader. This means that you cannot downgrade at all as you cannot unlock the bootloader on all versions of the Note 3 which is why this guide is for the Samsung Galaxy Note 3 model SM-N900 only.

    You can download the unlocked bootloader from here.

    Save it to your PC in an easy to find location such as the desktop.

    Get the Samsung Galaxy Note 3 Ready

    In order to flash the ROM to your Samsung Galaxy Note 3 you must perform a few tasks on your PC first.

    1. Download Samsung Kies for your PC so that the phone is recognised by Odin when you connect it using the USB cable.
    2. Download Odin.
    3. Put the Samsung Galaxy Note 3 in recovery mode
    a. Turn off the Samsung Galaxy Note 3 completely
    b. Hold down the volume down, home and power buttons together.
    c. Wait for the phone to turn on and it should boot in to download mode

    An example image showing you how to put the Samsung Galaxy Note 3 into download mode

    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode.

    An example of how the note 3 might look in download mode

    4. Connect the Samsung Galaxy Note 3 to your PC using the USB cable.
    5. Open Odin and it will look like this if everything is done correctly (ADDED means that the phone has been successfully recognized by Odin.)

    Screenshot of the Odin program recognizing the Note 3

    You now have to add the bootloader file you downloaded in to Odin.

    • Click the BL button
    • Browse to the bootloader zip file and choose it.

    Once added and Odin confirms it is okay simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    Screenshot of the Odin3 Rooting Tools Success message

    The Samsung Galaxy Note 3 will reboot and you can disconnect it from your PC.

    Booting up for the first time using the OS may take some time so please be patient.

    Once it boots up disconnect it from your PC.   You now need to boot it in to recovery.

    • Turn off the Samsung Galaxy Note 3 completely
    • Hold down the volume up, home and power buttons together.
    • Wait for the phone to turn on and it should boot in to recovery mode.

    Once in the recovery menu choose to wipe data/factory reset and also wipe the cache partition – THIS WILL DELETE ALL DATA ON THE DEVICE.

    After that reboot the phone back in to normal mode and then turn it off. You now need to boot in to download mode.

    • Turn off the Samsung Galaxy Note 3 completely
    • Hold down the volume down, home and power buttons together.
    • Wait for the phone to turn on and it should boot in to download mode.

    Connect the phone to your PC and it should be recognised by Odin.

    Screenshot of the Odin program recognizing the Note 3

    You now have to add the ROM file in to Odin.

    • Click the AP button
    • Browse to the ROM file and choose it.

    Once added and Odin confirms it is okay simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    Screenshot of the Odin3 Rooting Tools Success message

    How To Fix Any Issues After Downgrading

    If the Samsung Galaxy Note 3, after you flash the ROM, is stuck on the Samsung logo or constantly reboots then do the following.

    • Turn off the phone completely.
    • Hold down the Volume up, home and power buttons together.
    • Wait for the phone to display the Samsung logo and then let go

    It will now be in recovery mode which looks similar to this.

    an example of an android phone in recovery mode

    Using the Volume up and down keys scroll to Wipe data/factory reset and press the Power button to confirm

    Scroll down to Yes and press the Power button on that to confirm, the Samsung Galaxy Note 3 will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the Samsung Galaxy Note 3 will restart and boot up – this may take some time when booting for the first time so please be patient

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect – e.g. 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from sites such as XDA forums, save it to your PC and extract it.

    Put the Samsung Galaxy Note 3 in to download mode again and connect it to your PC and run Odin (see above for more information).

    Click the CP button and then point to the Modem binary file that you downloaded and extracted.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE SAMSUNG GALAXY NOTE 3 FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the Samsung Galaxy Note 3 to reboot and you should now have your working IMEI back and successfully downgraded the OS version.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • Introducing The New FlexiSPY GPS Navigator

    Most spy apps say that they let you spy on the targets location—but what they actually deliver is a dry list of data with a simple map. Unless you decide to risk eye strain and headaches, there is no way to quickly ‘move’ through the targets path.

    There is also no way to export spy routes to other systems like Google Earth or a TomTom where you could have this information available to you in the applications that you love.

    This is probably not an issue for the casual user, but our customers tend to be smart users, and professionals who have to make serious decisions based on what they are seeing.

    So we created the GPS Navigator.

    What The GPS Navigator Is

    FlexiSPY GPS navigator is a detachable widget that lets you quickly combine the data and map views of your targets locations and see exactly how they relate to each other. It also allows you to export the route data to a standard KML file, which you can send to Google Earth allowing you to save routes and use great tools like street view to see the route through the eyes of the target.

    As one of our testers said,” It’s so powerful it’s actually creepy!”

    What’s currently on the market

    Most spy phone apps give you a very basic overview of location tracking. This generally consists of simply a map window and a list of co-ordinates. Note how the data grid is below the map. Now imagine there are more than just a few records—you’ll will be scrolling up and down the page like a yoyo trying to match the data to the map. Now compare that to our navigator features.

    Here's a screenshot from the Mobile Spy application showing its long list of gps cordinates.

    Our Navigator features

    Detached Navigator –

    The detached navigator is a floating widget that you can place anywhere on the screen. As you interact with the data in the navigator the map window instantly responds by applying a pin at the selected location. You can then scroll through the data set.

    This makes it easy to visualize and move through a large data set of locations.

    A screenshot of the FlexiSPY gps detached navigator.

    The navigator widget also contains a list of GPS records, the GPS record is made up of the following:

    • Latitude & Longitude – View the co-ordinates of the TARGET device.
    • Accuracy – View how accurate the GPS reading is to the nearest meter.
    • Map View – View the selected co-ordinate in Google Maps.
    • Date and Time – Date and time of the TARGET device when the co-ordinates were taken.
    • Mark as favorite – Mark selected co-ordinates for quick retrieval for analysis later.

    You can also dock and undock the Navigator as well as view it in full-screen. This gives you a much better way to explore and analyze the location data. Any co-ordinate you click on in the map window is also highlighted in the GPS Navigator and vice-versa.

    New Map Window –

    The map window lets you visualize your targets movements in a number of ways, giving you greater insight into why they may have been there in the first place. Controls are offered to change the map overlay so you can see a satellite view or a map. The former is a good way to see what kind of buildings or roads are there and to easily recognize land marks. The latter is better for getting street names and directions.

    The map window a­lso lets you discover where your target was on any given day. To do this, you enter a date range and the map windows will show you ll the locations recorded for your target. To make it even easier to understand their route, you can use the ANIMATE tool to see each co-ordinate of the phone drop in place on to the math and join together to form a path of where the TARGET device has been

    A screenshot of the new FlexiSPY GPS map window

    Export Your GPS Data – Get More From Your Maps

    While FlexiSPY will get the GPS data for you, and allow you to examine it quickly, there are third party tools that let you do many other things with your route data. You may wish to load it into a GPS system like a Tom Tom, your car sat nav

    The GPS navigator also allows you to export the co-ordinates as a KML file that you can then import in to Google Maps or Google Earth to really explore where the TARGET device went.

    So, we are going to find out where co-ordinate 20 was by plugging the GPS data in to Google Maps.

    This is done by doing the following:

    • Click the Export option and then click the Download option when asked and save the KML file to your computer in an easy to find place such as your desktop.
    • Go to Google Maps at https://maps.google.com/
    • Click My Places.
    • Click the Or create with classic My Maps link.
    • Click Import and browse to the KML file that you downloaded in step 1.
    • Click Upload from File and the KML file will be uploaded in to Google Maps.
    • Click and drag the orange man on to the map and Google will immediately switch to street view.
      Seen in the screenshot below, the map windows has split in two. At the top we have Google street view and below is the map with us on it

    A screenshot of google street view showing the cordinates that flexispy captured

    • Using the left and right cursor keys to turn left and right and pressing the up or down cursor keys you can then ‘walk’ around the map as if you were really there!

    FlexiSPY Location Data + Google Earth

    You can also export the same KML data in to Google Earth as well. Google Earth allows you to explore it is more depth than Google Maps as well as allowing you to save individual locations to your collection of places so you can easily and conveniently know where the TARGET device will be, here are the steps for doing so.

    • Download Google Earth from http://www.google.com/earth/
    • Open Google Earth and go to File > Open and browse to the KML file you exported from FlexiSPY’s GPS Navigator. Select it and then click Open.
    • Click and drag the orange man on to the map screen to turn on Google street view. Doing this allows us to see where the phone has been in much greater detail.
    • If the TARGET device visits a location regularly which you want to keep an eye on you can click the button to add a pin to the location so that you can remember it later.
    • Click OK to add the pin at the yellow target location shown in the picture above. The place will be added to the list of locations currently inside Google Earth.
    • Google Earth allows you to save the list of places either as part of your own collection (titled ‘My Places’) which is ideal for storing common locations that the TARGET device is known to go to or arrive from or you can simply save a screenshot of the current location instead.

    FlexiSPY Location Data With Other Mapping Systems

    The location data we have explored here can be viewed and manipulated across many mediums, be it tablet, PC or smartphone and you can even import the KML data file in to in-car navigation systems such as TomTom Navigator too – now there really is no excuse for not knowing where they are at all times.

    • To convert the KML data file to the OV2 format for TomTom you can use the converter here.
    • To covert the KML data file to the GPX format for Garmin you can use the converter here.
    • To convert the KML data file to the LMX format for GPS units you can use the converter here.

    Currently we’re the only ones that give you this much functionality when it comes to tracking the location of a smartphone, but we’re always adding cool additions to our features! If you want to stay up to date on all the newest from us, then you should follow us on one of our social media channels!

  • How To Downgrade The OS Of Any Samsung Android Phone

    How To Downgrade The OS Of Any Samsung Android Phone

    Recently, on our Samsung S4 downgrade article, we were asked whether or not the steps in the article would work on a Note 3. Our answer that was, in theory, the process of backing up the EFS partition of the phone, downloading the older ROM and then flashing it using Odin should work because both phones are manufactured by Samsung and so they process is near enough the same.

    But before you downgrade the OS version there are a few things you need to consider.

      1. Downgrading the OS will mean that ALL data is wiped from the phone.

      2. Downgrading the OS to an older version means you will lose new OS features or updates.

      3. If you downgrade and then root the phone you can no longer upgrade to new OS versions because software update is disabled due to the device being rooted.

    Why downgrade the Android OS?

    For one thing downgrading the Android OS to an older version can allow Android phones running OS 4.4.x to run FlexiSPY in FULL mode which means that, once the device is rooted, all FlexiSPY features will function provided you have rooted the phone before installing FlexiSPY.

    Running an older OS version can also add features that were removed in newer version or improve stability and reliability, especially if the new OS has just been released and so can be subject to bugs and issues.

    What Does an Android OS Consist Of?

    If you want to take a closer look at what an Android OS consists of then backing up the Android phone using software such as EFS Professional can be used to tell you more about the software that runs the device.

    The main Android OS partitions are as follows:

    • BOOT – This contains information allowing the phone to boot up. Without this the phone will not start.
    • SYSTEM – This contains the OS itself. This can be wiped and you can still use the phone in download mode to flash as new ROM because the information from the BOOT partition is still present.
    • RECOVERY – This contains the recovery information. This allows you to perform alternate boot and maintenance options.
    • USERDATA (or DATA) – This contains your user information such as contacts, SMS messages, settings and applications installed. Wiping this partition alone is the same as a factory reset.
    • CACHE – This is where the Android OS stores frequently accessed applications components or data. Wiping this is fine, it automatically gets rebuilt once the device reboots.
    • MISC – This is important as it controls miscellaneous settings including but not limited to the network carrier configuration and settings and USB information. Wiping this will result in parts of the phone no longer working.
    • SDCARD – This is the SD card. Wiping this deletes all data on the SD card. On the Galaxy S devices this refers to the internal SD Card partition and not the actual SD card you insert which uses another partition.

    We can examine more about an Android OS using backup tools such as EFS Professional.

    A screenshot of the EFS professional program with selections ticked.

    In the above screenshot we have four partitions selected.

    EFS Contains the CSC information used in Odin (see below).

    BOOT Contains the bootloader information used in Odin (see below).

    RADIO Also contains important carrier information and settings.

    SYSTEM The actual OS itself that is currently installed.

    How are Samsung OS ROMS flashed to the device?

    Every Samsung phone has an operating system. This software is known as a ROM. When you downgrade the ROM the ROM you download can be one of two formats.

    1st Possible Format – All in one – An all in one file that contains all the ROM partition information and is the easiest to flash.

    screenshot of an example of an all in one file that contains all the rom partion information

    2nd Possible Format – Separate parts (see below) with a file for each part and a PIT file to put it all together

    A screenshot of an example of seperate parts file

    As you can see above there is quite a difference between an OS ROM that is all in one and one that is separated but for either case you will need Odin, a PC based program, to flash the ROM and downgrade it.

    Screenshot of the Odin3 program with a key for navigating the program

    The main buttons that you need to work with on Odin are as follows.

    PIT – This is the partition information table. For some ROMS, even if you flash individual parts it will not work without the corresponding PIT file that tells the phone how everything is separated and laid out.

    BL – Flash files to the device that only pertain to the bootloader (what happens when the phone boots up).

    AP – Flash the main ROM file. This is the option most people will need to focus on.

    CSC – This is the file that contains all the carrier and network information such as access point names and settings and other carrier/network related information.

    An Android ROM (often several gigabytes in size) is partitioned (split) in to different sections with each section responsible for different features and functions which have been explained above.

    So now that you know what an Android ROM is and what it consists of what happens next?

    Always backup the Samsung Android device first

    Before you do anything always back up the Samsung Android device first, just in case.

    This can be done in a variety of ways but we prefer using EFS Professional.

    To use this software you must make sure of three things:

      1. The Samsung Android phone you want to backup has been rooted by you.

      2. You have installed BusyBox on the Samsung Android phone from the Play Store.

      3. You have installed the Android SDK on your PC correctly and ADB works.

    Once you have made sure that the Samsung Android device meets the requirements download and run EFS Professional. We explain how to backup the phone and do all this here.

    With the phone backed up to your PC using EFS Professional the backup file will look like this.

    A screenshot of what the phone will look like after the Odin backup process

    All successful backups are stored in the EFSProBackup folder and all the backups have the model name, as well as date and time of when the backup occurred.

    At the time of writing this article the date is 9th September 2014, so, just to prove this works. We will backup the phone we are using for this article (Samsung Galaxy SIII – GT-I9300) using EFS Professional.

    A screenshot of the back up process on the samsung galaxy SIII using EFs professional

    As you can see we have selected just the EFS partition this time to backup and this will be explained why in the next section.

    We click the Backup button and the process starts – this can take some time and depending on how many applications you have installed and such the backup filesize may be large so make sure you have enough space on the phone itself or inserted SD card before starting the backup.

    As you can see from the screenshot below the backup was successful.

    a screenshot of the EFS showing that the backup was successful

    And the saved backup folder on the PC is shown here which contains the EFS partition information.

    A screenshot on the PC showing the efs partion information

    As you can see the backup archive data matches the time of writing (9th September 2014) and the device name is that of the Samsung Galaxy S3 that we are using (GT-I9300).

    When it comes to backing up a Samsung Android phone before downgrading the OS the only partition you really need to backup is EFS as we have done above (we still recommend you back up everything just to be sure) and we will explain why in the next section.

    Find the ROM that is correct for your Samsung Android device

    We touched upon this in our Samsung S4 downgrade article and showed the site to use to get the OS ROMs you are looking for.

    So, for example, if you want to downgrade a Samsung Galaxy Note 3 running OS 4.4.x to 4.3.x or below in order to run FlexiSPY here is what you need to do.

      1. Browse to http://www.samfirmware.com/

      2. Click the Firmware tab at the top.

      3. Click the Check your firmware option.

      4. Search for the Samsung Galaxy Note 3 using the dropdown menu

    So, it should look something like this.

    a screenshot of the sammobile backup

    Click Check firmware when done.

    Note – In this example using the Note 3 we chose Thailand as the country but you would choose your own country (e.g. USA or UK) which means that the model number (SM-N900) may also be different.

    You would obviously choose the Samsung Android phone model and country that applies to you which matches the Samsung Android phone whose OS you wish to downgrade.

      5. The latest firmware will appear.

    Click Download

      6. Click the Download button again when ready to proceed (you may need to register a free account on Sammobile before you can download ROMS).

      7. Click the Download button once more to start the download process and save the ROM file to your PC.

    As you can see, the filesize is 1.3GB so the download may take some time. Once downloaded save it somewhere that is easy to access such as the desktop.

    Get the Samsung Android phone ready

    In order to flash the ROM to your Samsung Android phone you must perform a few tasks on your PC first.

      1. Download Samsung Kies for your PC so that the phone is recognized by Odin when you connect it using the USB cable.

      2. Download Odin.

      3. Put the Samsung Android phone in recovery mode
    — a. Turn off the Samsung Android phone completely
    — b. Hold the volume down, home and power button together
    — c. Wait for the phone to turn on and it should boot into download mode.

    If you have done it correctly it will look like below and you then press the Volume up button to continue and it will be in download mode (this is using an S4 as an example but all Samsung Android phones will look the same in download mode).

    A picture of a black Samsung Galaxy S4 running in download mode

      4. Connect the Samsung Android phone to your PC using the USB cable.

      5. Open Odin and it will look like this if everything is done correctly (ADDED means that the phone has been successfully recognized by Odin.)

    You now have two ways to add the ROM file into Odin.

      1. If the ROM file is one file do the following:
    a. Click the AP button
    b. Browse to the ROM zip file and choose it.
      2. If the ROM file is in more than one part do the following:
    — a. Click PIT and add the PIT file.
    — b. Click BL and choose the BOOT file.
    — c. Click CP and choose the CODE file.
    — d. Click CSC and choose the MODEM file.

    Either way, once you have selected the correct way to flash the phone simply click Start to start the flashing process – this can take some time and please do not remove the phone from your computer in any way.

    Once done successfully Odin will look like this.

    A screenshot of how Odin will look like when done successfully

    The Samsung Android phone will reboot and you can disconnect it from your PC.

    Booting up for the first time using the OS may take some time so please be patient. Once it boots up you have successfully downgraded your Samsung Android phone.

    How to fix any issues after downgrading the OS

    If the Samsung Android phone, after you flash the ROM, is stuck on the Samsung logo then do the following

    Turn off the phone completely.
    Hold down the Volume up, home and power buttons together.
    Wait for the phone to display the Samsung logo and then let go.

    It will no be in recovery mode which looks similar to this.

    android phone in recovery mode

    Using the Volume up and down keys scroll to wipe data/factory reset and press the Power button to confirm.

    Scroll down to Yes and press the Power button on that to confirm.

    The Samsung Android phone will then perform a factory reset.

    When it is back on the screen shown above select Reboot and the Samsung Android Phone will restart and boot up – this may take some time when booting for the first time so please be patient.

    If, after the phone has booted up you find that you no longer have a cell signal and that your IMEI number is incorrect – 004999010640000/01 (Settings > More > About Device > Status > IMEI) then you need to download the modem file from sites such as XDA forums, save it to your PC and extract it.

    modem file downloaded

    Put the Samsung Android phone in to download mode again and connect it to your PC and run Odin (see above for more information).

    It will look like This Picture once connected as we have seen before.

    Click the CP button and then point to the Modem binary file shown in the last screenshot

    a screenshot of the modem recovery file

    Odin should now look like This Picture . You can see the Samsung Android phone has been added and the modem file is selected.

    Click Start to flash the modem and wait.

    DO NOT DISCONNECT THE SAMSUNG ANDROID PHONE FROM THE PC OR TURN IT OFF IN ANY WAY

    Once it has been done wait for the Samsung Android phone to reboot and you should now have your working IMEI back and successfully downgraded the OS version.

    As ever this guide is provided as is so if you have any issues or questions about this simply let us know in the comments and we will do our best to assist you.

  • How Can I Spy On An iPhone 6 Or An iPhone 6 Plus?

    How Can I Spy On An iPhone 6 Or An iPhone 6 Plus?

    Update – 7/7/2015

    You can now spy on up to iOS 8.4 with FlexiSPY! Learn more by checking out our post about this release, on the blog

    Update – 1/7/2015

    You can now spy on up to iOS 8.1.2 with FlexiSPY.

    To do so, you’ll need to jailbreak your iPhone, which we’ve provided a guide for – here

    Both FlexiSPY PREMIUM & FlexiSPY EXTREME are compatible with this latest jailbreak.

    Update 10/24/2014 – Now Outdated

    Pangu has now released a jailbreak for iOS8 / 8,1, it’s still advised that you not update your phone to iOS 8 as the jailbreak just released is not stable and FlexiSPY doesn’t support this latest jailbreak yet (as well as all other mobile spy software)

    Some of the information Below is out of date, but still contains important information:

    Original Post – Now Outdated

    Currently FlexiSPY (And all other mobile spy software) Do Not Support iOS 8 as there isn’t a jailbreak out for it yet.

    Please Do Not Update To iOS8. You can prevent the iOS 8 update by reading the section in the article called: Can You Stop iOS 8 From Being Updated By The User And Losing The Jailbreak?

    With the release of iOS8, the iPhone 6, and iPhone 6 plus, many people are wondering if it’s still going to be possible to install mobile spy software onto their Apple devices. The answer in short, is yes, You will be able to Spy on an iPhone 6, an iPhone 6 Plus, a device running iOS8, and possibly even the iWatch. However, the question that can’t be answered definitely yet, is: When Can I Spy On These New Devices?
    In this article we will answer some of the most common questions that we get from people, if you have after finishing the article, please contact us in the comments section at the bottom of the page.

    A Date For Spying On iOS8 Devices Hasn’t Been Set Yet

    Mobile spy software for iOS devices (such as the iPhone 6, 6 Plus, etc) all rely on the target phone being Jailbroken. This means that no mobile spy software can claim to work on an iOS device unless there’s been a jailbreak released for that iOS version. And currently, there is no jailbreak for iOS8.

    So again, Without the ability to jailbreak any iOS 8 device such as the iPhone 6, iPhone 6 Plus or Apple Watch it is not possible yet to install any spy phone software onto the device.

    How Long Will It Be Before I Can Jailbreak The iPhone 6?

    No one really knows.

    The time it takes for the latest version of iOS 8 to be released and the time it then takes for clever hackers to jailbreak the iOS (it is not something done by FlexiSPY in any way) can vary significantly. Actually it is taking longer and longer for a jailbreak to appear after the release of the latest version of iOS due to Apple making it more and more secure and thus fixing the exploits that jailbreak teams such as Evad3rs used to jailbreak the device.

    Ironically, when Apple released iOS 6.1.3 (which killed the iOS 6.1.2 jailbreak by Evad3rs) they actually credited the Evad3rs team for helping them fix it by finding the issues and exploits that Apple patched to make iOS 6.1.3 possible.

    Please be aware that there are currently many scam sites already advertising ways to jailbreak iOS 8 and these are all false – please be careful. You should follow one of our social media channels if you want to be the first to know when the jailbreak comes out.

    We know they’re false because:

    At the of publishing this article, iOS 8 was not even released yet to the public
    There is no jailbreak of any kind available yet for the finished version of iOS 8
    The video on the site shows how to jailbreak iOS 7 (if it really could jailbreak iOS 8 then why post bogus videos for an older iOS that anyone can jailbreak?)

    Here’s what one of these sites can look like, so be careful.

    A Screenshot of a scamsite that is advertising an ios8 untethered jailbreak though an untethered jailbreak, or any jailbreak for iOS8 doesn't even exist yet.

    Why is it taking so long to jailbreak iOS 8?

    iOS beta versions can be jailbroken but this does not mean the final version can be.

    At the time of writing (September 11th 2014) iOS 8 is not even out officially to the public and neither is the iPhone 6, iPhone 6 Plus and the Apple Watch is scheduled for the early part of 2015 so unfortunately you simply must wait.

    Once iOS 8 is released publicly people will start to look at ways to jailbreak it. This could be easy, it could be hard. For those that are unaware the last jailbreak for iOS 7.1.x came from a Chinese hacking group and was called Pangu. During tests of the jailbreak it still worked on the iOS 8 beta versions but this is no way indicative to say that the same jailbreak will work on the final version of iOS 8.

    The Pangu jailbreaking team is working on an ios 8 jailbreak, as seen in this screenshot of a beta ios 8 jailbreaking tool

    iOS 8 Tethered and Untethered Jailbreaks – What Are They?

    Untethered jailbreaks are always the best but take longest to arrive and no jailbreak is truly permanent.

    Once someone figures out how to jailbreak iOS 8 when it is released to the public it will be tethered only to start with. This is always the case. A tethered jailbreak is essentially the ‘quick and dirty’ way just to prove a jailbreak can be done and it is usually complex (the process is as technical as it gets before it is streamlined to make it easier for public consumption) and it also has one main caveat which is explained below.

    Tethered jailbreak – As soon as the iPhone is turned off or rebooted or loses power the jailbreak will be lost and, to boot up the phone to even use it you must connect it to your PC and then you have to jailbreak again and the process repeats until the phone is rebooted or loses power or turns off (rinse and repeat).

    As you can see, this is not ideal at all and this is why FlexiSPY does not start to develop software until an untethered jailbreak is available. For a tethered jailbreak, not only would the person need to keep rejailbreaking the phone but every time the jailbreak is lost FlexiSPY would need to be physically installed again and this is just not ideal. Of course if Apple update iOS 8 in the meantime and people upgrade to that then it can mean the tethered jailbreak no longer works which further means the wait for an untethered jailbreak increases.

    FlexiSPY understands that people cannot get the iPhone’s they wish to track all the time to keep jailbreaking it all the time if the jailbreak is tethered. Furthermore, from a development perspective, an untethered jailbreak is far safer to work with than a tethered one because an untethered jailbreak is permanent unless the iPhone is factory reset.

    A tethered jailbreak is the first to be available but is not really worth it.

    Untethered jailbreak – An untethered jailbreak takes the longest but it is the jailbreak that everyone wants and FlexiSPY prefers. An untethered jailbreak is permanent once applied unless the device is factory reset or upgraded to a new iOS version from Apple that fixes the exploits used in the untethered jailbreak (which means it is back to square one – waiting for a jailbreak for the new iOS 8 version and this is nothing to do with FlexiSPY).

    Untethered jailbreaks are what everybody really wants, including FlexiSPY, but the wait for them to appear gets longer and longer.

    Can You Stop iOS 8 From Being Updated By The User And Losing The Jailbreak?

    Nobody knows at this time but, in theory, if you can do it on iOS 7.x then iOS 8 should be able to also – given time.

    Now there are Cydia tweaks for iOS 7.x that you can get such as Recoveryguard that trick iOS in to thinking that the version installed is the latest one which stops the iPhone owner from being able to upgrade the iOS directly from the iPhone itself.

    However this does not apply if the iPhone is factory restored in iTunes as iTunes always checks for the latest iOS version before it restores or if the iOS is updated from ITunes itself.

    Please note that at the time of writing nobody knows if Recoveryguard is compatible with iOS 8 once it is released but it works fine in iOS 7 providing you have jailbroken the phone.

    You can install RecoveryGuard by adding the Cydia source http://cydia.pushfix.info to your list of Cydia sources and then tapping that source and finding RecoveryGuard and installing it the same as you installed FlexiSPY or any other Cydia program.

    screenshot of the recovery guard app which prevents the iphone from being restored

    Unfortunately though RecoveryGuard is a tweak you can only get through Cydia and you get Cydia by, yes, you guessed it, jailbreaking the phone so the people who create these tweaks also have to wait for iOS 8 to be jailbroken so that they can update their applications and make them compatible – the same as FlexiSPY.

    Can I Spy On Someone’s Apple iWatch?

    We are not sure if people want spy phone software for the Apple Watch. If you are interested,  let us know in the comments and we will be sure to look in to it.

    The Apple Watch still requires an iPhone to be tethered to it in order to receive notifications (you basically look at the watch on your wrist instead of pulling the iPhone out of your pocket instead – but not much more than that) so it may just be better to wait for FlexiSPY to fully support iOS 8 (which will run on the iPhone 4S, iPhone 5, iPhone 5S, iPhone 5 C, iPhone 6, iPhone 6 Plus, Apple Watch and all iPad generations starting from the iPad 2) instead so you can spy on the actual iPhone tethered to the Apple Watch and not the Apple Watch itself.

    How long do we need to wait for FlexiSPY?

    The Gold Master (final version) of iOS 8 was just released so our developers are getting to grips with that to see the new features and how we add even more great new features in to FlexiSPY but, as said, with no jailbreak there is not much we can do right no except speculate what we can do and just wait for any kind of jailbreak (tethered or untethered) and test our theories and get FlexISPY working.

    In the meantime though don’t forget that FlexiSPY still works on iPhone’s and iPad’s that have been jailbroken.  This is something we will of course retain in our software for iOS 8, our software can hide Cydia too meaning that, whether it is iOS 7 or iOS 8 you have just jailbroken to install FlexiSPY you can hide all traces of the jailbreak (Cydia) and our software also hides itself completely too for complete stealth.There’s actually a guide for doing so, here.

    That’s All For Now | But Stay Up To Date

    Currently this is the latest situation regarding FlexiSPY and iOS 8 and the new iPhone 6, iPhone 6 Plus and Apple Watch. However we will be sure to update this article with any new information regarding when FlexiSPY is available for iOS 8 but, in the meantime, join us as we all patiently wait for the iOS 8 jailbreak to arrive. To make sure you’re up to date with the jailbreak, please follow us on one of our social media channels.

  • How iCloud Can Rain Your Personal Data All Over The Internet

    How iCloud Can Rain Your Personal Data All Over The Internet

    “You’ve probably heard about the celebrity pictures that were stolen and linked all over over the internet.. Furthermore you probably also know that Apple’s iCloud was -at least in part- at fault”

    But what you may not be aware of is just how easy the whole thing was, and how, using applications that are simple to find, you too can gain access to practically anyone’s iCloud account – and you don’t need to be a hacker to do it.

    Notice: Everything in this article is for educational purposes only. Apple most likely have fixed the exploits that lead to the data leak so this is just a proof of concept article showing how it was most likely done. FlexiSPY is not responsible for any damages, loss or anything else that incurs if you do try to recreate these steps.

    iCloud icons creating a burst of clouds

    How Did The Leak Happen?

    According to reports it was simply due to the accounts that were compromised being unsecure. For example they failed to turn on two-step notification for their account or their password was just too easy to guess. Once access was gained in to the accounts, and because most iPhone users happily let their device upload all pictures to their iCloud account without ever thinking of the consequences, a second piece of software was used to then download all backups of said iPhone.

    Once those backups were downloaded the same program was used to explore its contents and this includes the pictures and videos that are now all over the internet and are being investigated by the FBI

    So who is to blame? Apple for not making it clear enough that iCloud backs up everything? Apple for not making sure two-step sign up is mandatory? The user for not really fully understanding the implications of having their data stored in the cloud which can potentially be hacked?

    If you own an iPhone every picture you take is uploaded to your iCloud account once you have signed in to the iPhone using your Apple ID. However this can be easily turned off (we stress that Apple have fixed the exploits so that passwords cannot be guessed by brute force which makes this hack no longer possible) so that you are no longer vulnerable.

    The process that led to the leak consists of several steps.

    2 Ways It Might Have Been Pulled Off

    1. First off, the hackers needed to have access or know the email address of the persons targeted.
    2. They used those email addresses to login to iCloud and guess the security password
    3. They gained access to the account and then proceeded to download any iCloud backups.

    Or it could have been done this way:

    1. The hackers knew the email addresses of the people they wanted to target.
    2. Hackers used a brute force tool and password list to guess the passwords.3. They gained access to the acocunt and then proceeded to download the iCloud backups.

    Either way, one thing that hasn’t come to the surface yet is how the hackers got the email addresses to start with.

    However there are many darknets where information like this is traded via the use of the encrypted TOR browser.

    Replicating The Hack

    This is done entirely for educational processes and, from the latest information, Apple have already fixed the iCloud vulnerabilities. So, for this we will just show you, hypothetically how it was done but we will investigate the software used to download and extract iCloud backups in more detail.

    The first thing is to obviously know the email address of the people you wish to target. We are using our own Apple ID that we have set up which already contains an iCloud backup. However the program that is being pointed at to guess the passwords was called iBrute.

    Picture Of The iBrute Link Hosted On Github
    This is a small program written in Python that will try to brute force (guess the password) of all email addresses in the mail.txt file using the passwords in the passlist.txt file. However in the release notes it confirms as we have said, Apple have patched the exploit which means the program will no longer work.

    So, for this, we are going to assume that we already have an account (Apple ID) whose password we know (which we do) so, because Apple fixed the exploit the next step is written from the perspective that iBrute worked and gave us an email address and password.

    Before we proceed to the next section we need to understand just how iCloud works on an iPhone after you enter your Apple ID which is like this.

    1. Enter your Apple ID on the iPhone – iCloud is enabled by default which photo sharing enabled.
    2. Set up a new photo stream on the iPhone and add pictures – wait for them to be uploaded to iCloud
    3. For PC download and install the iCloud Control Panel
    4. Once it is installed you are asked to log in to iCloud.
    5. You then click the Options button under Photos to see the photos that were be uploaded to iCloud
    6. You can set the options to upload all photo streams from the iPhone to iCloud.
    7. You can then see the iCloud photos that are stored on your PC.

    What you may not be aware of is that even though photo sharing is enabled by default it is not as easy as logging in to any iCloud account and viewing the pictures online. iCloud does not work that way and even though we have set up a photo stream as a test it will not appear on the iCloud website.

    Below you can see the photo stream on our PC we are using. We have added 3 extra pictures (you can just drag and drop any image file into the iCloud photos folder and it will sync.

    Sync The Photo Stream
    So, if we log in to iCloud directly we see the following – no pictures of any kind.

    So how does iCloud actually work?

    1. Sign into iCloud on any iDevice using your Apple ID
    2. Set up photo streaming and photo sharing in iCloud
    3. Take some pictures or videos on the device
    4. Login to a new iDevice with the same account.
    5. All pictures and videos taken will appear on the new device.

    So essentially iCloud is the backend that hosts and shares all pictures and vides (and other content such as emails and contacts) between all iDevices your account is logged in to but this also means that picture and videos backed up to iCloud are only visible on the specific iDevice.

    So how do you get access to the pictures or videos if you cannot do it directly from iCloud itself?

    This is the next thing we will discuss and where things get clever.

    Backing Up To iCloud

    Apple makes it pretty damn easy to back up data to the cloud, in-fact, it’s enabled on a persons iOS device by default. This includes automatic backup of photos from the camera roll.

    All you need to be back up the phone is to make sure that your phone is charging, connected to wifi, and is locked. Once the device is backed (specifically iCloud) you’re able to perform the same steps that the hackers used to get access to the information.

    Apple, for some strange reason, do not allow any iCloud backup to be password protected so it essentially means that should someone find software that can download all backups from an Apple ID and the respective iCloud account then they potentially have access to very personal or sensitive information.

    This is what the hackers did

    And this is what we will show you too (for educational purposes only)

    The first thing you need is the PC software that was used which is called Elcomsoft Phone Password Breaker.  This is from a Moscow based company and the software is sold on the basis that it allows you to recover files from phone backups from variety of different manufacturers (Apple, BlackBerry, and Microsoft) and is to be only used for legal purposes only.

    However looking at their main menu for a start tells you that this software could definitely be used for all the wrong reasons.

    password-recovery-elcomsoft
    Decrypt Backup – Simply drag and drop any iPhone or iPad backup made within iTunes in to this option for it to be decrypted and for you to be able to view all data stored inside the backup.

    Explore keychain – The keychain is encrypted by Apple and contains all the passwords on the device (iPhone or iPad). Again, just drop an iTunes backup on to this option to view all passwords used on the phone across all installed applications that have been stored in the keychain.

    For those who are interested the keychain stores the following information:

    1. Secure certificates
    2. Tokens (e.g. Twitter, Facebook etc.)
    3. Browser stored passwords
    4. Wi-Fi passwords for all networks a device was connected at least once
    5. Passwords, tokens and certificates stored by various applications

    And the final option is what we are looking for – Download backup from iCloud.

    download-backup-from-icloud
    It is obvious that the hackers just entered the email address and passwords of the people in question (which they obtained illegally as we explained) and then the software does the rest. For us we will be getting the data from the phone we just backed up.

    So we put in the username and password of our Apple ID that we set up for this exercise and then we sign in and our backup is clearly listed at the top.

    restore-original-file-names
    We then click the Download button and after a short time we can then choose any kind of information we want from inside the online backup.

    specific-to-download
    All we are really concerned about is the camera roll as that is where all videos and pictures are stored but this software allows us to grab any and all information from an iCloud backup associated with the Apple ID that was used to sign in.

    Essentially you just wait for the data to be downloaded to your PC and then you can pretty much do anything with it as you wish.

    Apple makes this possible due to iCloud not having two step verification when you sign in (e.g. you sign in with a username and password and then answer a security question) which means that, as we have shown, just get the email address and password of an Apple ID and you potentially have access to phone backups which contains clearly sensitive and personal information.

    How Can You Stop This From Happening?

    The easiest way to stop yourself and your iDevice from becoming the next victim is simple.

    1. Make sure your Apple ID password is strong
    2. Turn off iCloud backups on the iDevice itself
    3. Use a cloud system with better backup and security such as Dropbox

    Apple have since patched the brute force method used but they have still not improved iCloud security to encompass two step verification although, in the wake of this scandal, we hardly think Apple will rest and leave their premier cloud backup solution with such a gaping hole in it for the whole world to look in.

    We hope that you have found this article useful. Don’t forget that you can actually use FlexiSPY on your own iPhone or iPad to act as a secure and effective device backup tool so, if this interests you, why not check out a 24 hour demo of FlexiSPY right now?

  • How To Restore Any iPhone And Keep Your Jailbreak

    How To Restore Any iPhone And Keep Your Jailbreak

    For many people restoring an iPhone can mean hours of extra work restoring all installed applications, contacts and such but, most importantly, it means that the device needs to be jailbroken again. This is especially important when, say, an iPhone is restored and Apple wants it to be upgraded to an iOS version that cannot be jailbroken. How can you restore the said iPhone and keep the jailbreak? The following shows you how.

    FlexiSPY is not responsible for any damages incurred as a result of following this guide. Restoring the iPhone by following this guide will delete all contents and settings so make sure you have backed up the iPhone first before proceeding. Following these steps from hereon out is done so entirely at your own risk.

    What is needed to restore an iPhone and keep the jailbreak?

    To restore an iPhone and keep the jailbreak you simply need the iPhone you wish to restore physically in your hand.

    The iPhone must be jailbroken first, otherwise you cannot install the software mentioned below as it only works on a jailbroken device.

    The iPhone can be jailbroken running iOS 6.x or 7.x (up to 7.1.2) the steps are entirely the same and the end result (of the iPhone being restored completely and remaining jailbroken is exactly the same.) Now that we know what is needed it’s time to get started!

    Step 1 – Add the iLex R.A.T repository to Cydia

    The program that magically allows us to restore any iPhone and keep the jailbreak is called iLex R.A.T. You will need to add this repository to Cydia to be able to then install the program and run it.

    To do that please follow the steps below.

    1. Open up Cydia on the jailbroken iPhone
    2. Tap Sources.
    3. Tap Edit.
    4. Tap Add.
    5. In the dialog box that appears type http://cydia.myrepospace.com/ilexinfo/ and then tap Add Source.
      Give the iPhone some time to update the Cydia source list.
    6. Once the source has been added tap the new repository that has appeared.
    7. Tap All Packages.
    8. Tap iLex R.A.T. From the list.
    9. Tap Install.

    Wait for the program to install..

    Step 2 – Install Mobile Terminal Emulator

    In order to use the program once it has been installed you first need to install the mobile terminal emulator because all the commands are done by the command line. Mobile Terminal emulator is part of the standard Cydia BigBoss repository and you can install it by following these steps.

    1. Open up Cydia on the jailbroken iPhone
    2. Tap Sources.
    3. Tap  the source called apt.thebigboss.org
    4. Tap All Packages
    5. Scroll down to Mobile Terminal Emulator and tap it.
    6. Tap Install.

    Wait for the program to install. Once it has been done the mobile terminal icon will appear on the iPhone springboard. Tap it to continue on to the final step.

    Step 3 – Restore the iPhone and keep your jailbreak

    With the mobile terminal emulator open, type the following and then press return after each command.

      rat

    The iLex R.A.T. program will then present you with a long list of options. We need option 12.

    So type the following and press return.

      12

    You will be asked to confirm this so please do and then the restore process will start.

    The process may take some time.

    Once it has been done though, the iPhone will run the first use wizard (as it does when it has been completely factory reset) so you simply need to complete that again and, once the iPhone is ready for use, Cydia and the jailbreak will still be present and working.

  • How To Root The Nexus 5 Running The Android L Developer Preview

    How To Root The Nexus 5 Running The Android L Developer Preview

    [box type=”warning”] We no longer maintain rooting guides on our blog. This means that your phone might not be compatible with this guide. If you’re not sure, please consult our rooting team, who will root your phone, and install FlexiSPY for you, for a fee.
    Click here to learn more about our rooting service[/box]

    This article will show you how to root the Nexus 5 running the Android L developer

    FlexiSPY is not responsible for the steps or rooting process given inside this article. However, all care has been taken to make sure that the information contained here is as accurate as possible. Please read and follow the instructions carefully and remember that rooting is entirely your own responsibility and FlexiSPY is not responsible for it in any way.

    What’s Needed To Root?

    We already gave a detailed blog article on how to install the Android L developer preview on a Nexus 5 which you can read here.

    This article already assumes you have set up the following pre-requisites. If you have not done this please read the article linked above to learn how to set up the environment correctly:

    1. You have installed the Android SDK onto your PC
    2. You have enabled and are running USB debugging on the Nexus 5
    3. You have correctly set the path variable within Windows for Fastboot to be used by the Android SDK

    The next step is rooting it to allow you to get the most from the new Android OS.

    Thankfully Android L and the developer preview has already been rooted and the process is quite simple and we have documented it completely below.

    In order to root the Nexus 5 on Android L you will need the following:

    • A Nexus 5
    • The Android L developer preview image
    • A PC

    You will then need to install the Nexus root toolkit which you can find here.

    Once you open up the Nexus rooting toolkit it will look like the picture below.

    nexus root toolkit
    There are two steps to the rooting process. First of all, you must unlock the bootloader and second you can then root the Nexus 5.

    Simply click the Unlock button to start the bootloader unlocking process. This will DELETE ALL DATA on the Nexus 5 and so, if you wish to back it up first please follow the steps in the previous article before continuing.

    Once you have backed up the Nexus 5, as said, click Unlock and the following dialog box will appear with detailed instructions on the actual process and what will happen.

    As long as you have set up the Android development environment on your PC correctly (see the prerequisites given above) then all you need to do is connect the Nexus 5 to your PC and follow the steps that appear to unlock the bootloader. The entire process will be automated providing you have installed the Nexus 5 USB driver and Android SDK and you just have to click OK to start.

    The rooting toolkit will then check to see if USB debugging is enabled on the Nexus 5 and it will then proceed to restart the device and unlock the bootloader and it does this by using Fastboot and putting the phone into bootloader mode.

    The entire process is short and only takes a few minutes. Once it is done the Nexus 5 will boot up normally and the Nexus toolkit will display a message saying that the bootloader was successfully unlocked.

    You can tell if the bootloader has been successfully unlocked when the Nexus 5 is in Fastboot mode (as shown in the picture below) and the lock state is set to unlocked.

    bootloader
    With the bootloader unlocked you can now proceed to root the Nexus 5 running the developer preview of Android L. Open up Android toolkit again and make sure the Custom recovery option under Root is also selected.

    Once you click Root the following message will appear detailing the entire process which is also automated.

    Simply click OK to start and the entire process will begin. Again you need to make sure the Nexus 5 has USB debugging enabled and you successfully installed the Android SDK on the PC that the Nexus 5 is connected to (via USB) whilst performing the rooting process.

    The rooting process will also install the TWRP recovery as well which replaces the stock recovery used on the Nexus 5 and gives far more functionality. The TWRP recovery allows you to easily backup the Nexus 5, flash and install zip files (e.g. ROM kernels) as well as a whole host of other advanced features which is why, for this guide, to get the most out of the Nexus 5 we recommend you root the phone and install TWRP.

    Once the rooting process has been completed you will easily be able to tell that the Nexus 5 has been rooted because you will see a new application called SuperSU which means the Nexus 5 running Android L has now been successfully rooted!

  • How to Downgrade The Android L Developer Preview To Android OS 4.4.4 On A Nexus 5

    How to Downgrade The Android L Developer Preview To Android OS 4.4.4 On A Nexus 5

    This article will show you how how to downgrade from the Android L developer preview to Android OS 4.4.4 on a Nexus 5.

    Disclaimer: FlexiSPY is not responsible for the steps inside this article. However all care has been taken to make sure that the information contained here is as accurate as possible. Please read and follow the instructions carefully and remember that downgrading the OS is entirely your own responsibility and FlexiSPY is not responsible for it in any way.

    Why downgrade?

    We’ve already published articles on how to install the Android L developer preview on a Nexus 5 here. However Android L is still under development which means that certain features, functions or software may not work entirely as expected. It is also not recommended to run an OS that is currently in development on your main phone for reasons mentioned above.

    This means that ultimately you may wish to downgrade back to the latest version of the Android OS which is stable and works. In this case, for the Nexus 5, this is Android OS 4.4.4 and the process for downgrading from the Android L developer preview back to Android OS 4.4.4 on a Nexus 5 is actually not as hard as you may think.

    What’s needed to downgrade?

    In order to downgrade the Nexus 5 from Android L you need the following:

    • The Nexus 5 running Android L
    • A PC
    • The Nexus 5 OS 4.4.4 recovery image

    On the PC that you will be using to downgrade you must have first of all set up the Android environment correctly such as installing the Android SDK, setting the Windows path for Fastboot, making sure the bootloader of the Nexus 5 is unlocked and installing the correct Google USB driver so that the Nexus 5 is recognised completely by your PC when you plug it in.

    This article is written assuming that you have done this already. If you have not then you can learn more about setting up the Android environment needed by reading the first article in this series detailing how to upgrade to the Android L developer preview which you can find here.

    Step 1 – Download the Android OS 4.4.4 image

    The first you need to do is download the Android OS 4.4.4 image from here. Google provides these images for you so that you can easily downgrade the Nexus 5 should anything go wrong or reinstall the current OS version if the Nexus 5 is running OS 4.4.4.

    factory-images

    Please make sure that you download the correct version for the Nexus 5 model you are working with.

    Once you have downloaded the image file save it in a convenient location such as your desktop.

    Once you have saved the image file to your computer you must extract it to gain access to the files that are required to start the flashing process.

    Once you have extracted the files inside the downloaded image file it should look like the picture below.

    Step 2 – Flash the Android OS 4.4.4 image to the Nexus 5

    We already mentioned that we assume you have already set up the Android development environment on your PC but again, if you need a refresher, read the article here.

    To flash the Android image you first need to put the Nexus 5 in Fastboot mode.

    This is done by doing the following:

    • Make sure the Nexus 5 is turned off completely.
    • Connect the Nexus 5 to your PC using the USB cable
    • Hold down the volume down button and the power button together to turn it on.

    If done correctly the Nexus 5 will turn on in Fastboot mode and it will look like the picture below.

    nexus5-fastboot-mode

    With the Nexus 5 in Fastboot mode and connected to your PC browse, on your PC, to the folder where you saved the Nexus 5 Android OS 4.4.4 ROM.

    Simply double-click flash-all.bat and wait for the Nexus 5 to complete the steps and, once done properly, the Nexus 5 will restart and it will be running OS 4.4.4 again.

  • How To Install The Android L Preview On To A Nexus 5

    This article will show you how to install the Android L preview on to a Nexus 5.

    Bear in mind that the latest version of Android, Android L, is still under development.

    The version we are installing in this article is subject to change and you perform the steps in this guide at your own risk.

    While everything has been done to make sure the steps are accurate, FlexiSPY is not responsible for the contents of this guide or any damage that may be incurred from following this guide.

    What is Android L?

    Android L is the newest version of the popular Android OS. It will be Android OS version 5.0.

    As is the tradition with Android OS versions being named after desserts (Android OS 4.x (K) was named Kitkat for example with Jelly Bean and Ice Cream preceding them) many people believe that the ‘L’ will stand for lollipop but this is not confirmed (nor denied) by Google at this time so we just have to wait and see what Google decide to do.

    With the new Android OS not being scheduled for release until at least the end of 2014 it comes as no surprise that only a few select phones are eligible to be running this version currently.

    Luckily, here at FlexiSPY, we like to keep on top of all things tech which is why we have just installed the Android L developer preview on our Nexus 5 and we are going to show you how you can do the same in just a few quick and simple steps.

    What you need to install Android L

    In order to install the Android L developer preview on to a Nexus 5 you will need the following:

    • A Nexus 5 phone
    • The Android L developer preview image
    • A PC

    Step 1 – Backup the Nexus 5

    Because this is still development software we highly recommend that you back up the phone first completely before proceeding.

    To do that you, first of all, install the Nexus root toolkit which you can find here.

    Once you have downloaded the Nexus toolkit connect the Nexus 5 to your PC using the USB cable it came with. After that, you need to put the Nexus 5 in USB debugging mode before it will be seen while connected to the PC using the Nexus root toolkit program.

    To enable USB debugging on the Nexus 5 simply do the following:

    • Tap Apps
    • Tap Settings
    • Tap About Phone
    • Scroll down to Build Number and keep tapping that until you read you are now a developer. The Developer options menu has now been unlocked.
    • Tap the new Developer Options Menu.
    • Make sure Stay Awake is checked
    • Make sure USB debugging is checked.

    You also need to make sure you have installed the Nexus 5 USB driver otherwise even with USB debugging enabled the PC will still not recognize the phone. To learn how to do that click here.

    If, after enabling USB debugging and installing the USB driver and the Nexus 5 is still not recognized then try a different USB port on your computer because sometimes that can make the difference.

    Also make sure that, with the Nexus 5 connected to your PC, no on-screen notification on the Nexus 5 is visible asking you to accept USB debugging on the PC (you have to accept otherwise the PC will not find the phone).

    With all this done the Nexus 5 should now be recognized when you run the Nexus toolkit and it will look similar to this.

    The NExus Root Toolkit v1.8.6

    As you can see the Nexus root toolkit has identified the Nexus 5 and Android OS version so the next thing that we need to do is start the backup.

    The root toolkit takes care of the entire backup process, so click the Backup button to start.

    We want to create a complete backup of the Nexus 5 before we install anything on to it so simply click Create Android Backup File.

    There is quite a lot of text to read but essentially you just need to tap OK and then you can proceed to the next step.

    The next step will ask you where you wish to save the backup file to on your computer. Simply pick a convenient location and then the next window will explain more about the backup process and what will happen.

    While the backup is in progress make sure the Nexus 5 is not interrupted.

    Once the backup is complete the Nexus root toolkit will inform you.

    Downloading the Android L developer preview

    Google makes downloading the developer preview as simple as possible however there are some prerequisites first. You must make sure you have installed the Android SDK on your PC first.

    You must also make sure that, within Windows, you have set the path variable for Fastboot to match the location where you save the downloaded Android developer preview too.

    For more information how to install the Android SDK please see the details here.

    When you have successfully installed the Android SDK to a folder of your choice on your PC, it should look like this (we have installed the Android SDK to C:\Android for easy reference).

    sdk manager
    Here you can see the SDK (the SDK folder) has been installed and we have put all of this in a folder located at C:\Android for easy access as mentioned.

    You can download the Google L developer preview from the link here.

    Make sure you download the correct one for the Nexus 5 and then save the downloaded folder in the same folder as the SDK as shown below. We named our folder android for easy reference also.

    androidl

    Inside the android folder, you must extract the contents of the developer preview so it looks like this:

    bootloader-hammerhead-hhz11k
    Next, connect the Nexus 5 to the PC using the USB cable.

    Make sure it is powered off and the hold down the volume down button and the power button to turn it on and it will boot up in Fastboot mode which looks like this.

    The final thing that needs to be done is within Windows which is to set the Path of Fastboot so that it points to the Android SDK Fastboot files which we have located in C:\Android\SDK\Platform-Tools on our PC (for you it will be different).

    To set this do the following:

    On the Windows desktop (in this case Windows 8) open up file explorer. Right click your computer and then click Properties.

    With the system properties menu open click Advanced System Settings and the System Properties window will appear.

    With the System Properties window, open click Environment Variables and the menu that appears will look similar to what is shown below.
    In the Environment Variables window select Path and then click Edit.

    Add a semicolon, as shown in the example, and then type the full path to the Android SDK (in this example we use C:\Android as mentioned).

    Now that we have everything set we need to make sure the Nexus 5 is ready.

    • The Nexus 5 should be connected to your PC.
    • The Nexus 5 should be running in Fastboot mode.
    • You should have installed the Android SDK on to your PC in an easy to access location.
    • You should download the Android L developer preview image and saved it in a folder where you saved the Android SDK for easy reference.

    Now that you have done all these four things you simply run the flash-all.bat file inside the Android L developer preview folder.

    If all you see inside your Android L developer preview folder is a zip file you must extract it first to view all the files.

    view-all-the-files-sdk
    The Android L preview image will be flashed to the Nexus 5. This may take some time.

    DO NOT DISCONNECT THE NEXUS 5 FROM YOUR PC OR TURN IT OFF OR DO ANYTHING THAT WILL INTERRUPT THE FLASHING PROCESS IN Anyway.

    Once you have flashed the Android L developer preview the Nexus 5 will boot up for the first time. This may take some time also so please be patient. Once it boots up Android L will be fully ready for use.

  • 如何利用FLEXISPY监听IPHONE通话?

    如何利用FLEXISPY监听IPHONE通话?

    利用FlexiSPY监听iPhone通话监听手机通话听起来好像只有国家安全局(NSA)才能够做到,但实际上每个人都能做到这一点。

    监听iPhone通话只需合适的工具就能够完成。如果您的目标手机是iPhone,那么FlexiSPY就是您所需的监听工具。

    您在购买我们的iPhone跟踪软件后,可以按照本文的指南立即查看监听手机通话的具体步骤。此外,如果您正在寻找关于监听安卓设备的文章,您也可以在此处查看相关内容。现在,让我们开始吧!

    如何监听iPhone通话|准备工作

    第1步—登录到您的FlexiSPY控制面板。

    第2步—点击“控制中心”选项卡和“实时呼叫控件”。

    第3步—点击“启用呼叫拦截”。

    第4步—确保上述选项设置为“开启”(ON)状态。

    第5步—点击“管理监视列表”

    第6步—确保“全局选项”下的三个选项都已选中

    第7步—点击“监听控件”

    第8步—点击“设置监视器号”

    第9步—在国际格式中输入您的手机号码(+XX123456789),完成之后点击“立即同步”

    完成!

    在您完成这些操作步骤之后,目标智能手机每次进行通话时,您都会收到一条通知短信!

    我们希望这篇文章对您有所帮助。如果您对本文或任何其它介绍FlexiSPY功能的文章存有任何疑问,请通过以下的意见栏或社交媒体与我们联系!

  • 如何将三星GALAXY S4从4.4.2系统降级到4.2.2系统

     

    8

     
     

    本文将向您展示如何成功地将三星Galaxy S4从4.4.2系统降级到4.3系统

    免责声明:请注意本指南 “按原样”提供。FlexiSPY不对本文或其内容承担任何责任,您须亲自执行手机降级操作并自行承担风险。对于您因遵循本指南而引起的任何损害,FlexiSPY不会以任何方式承担责任,并且您通过阅读本通知内容表示同意上述意见:

    我们示例中的三星Galaxy S4型号为GT-I9500。

    以下操作步骤可能不适用于三星Galaxy S4手机的GT-I9505型号。您须亲自执行操作并自行承担风险。

    为什么要进行手机降级?

    FlexiSPY软件尚未完全兼容4.4.2操作系统。因此,如果您的目标设备在4.4.2系统上运行,而您希望使用FlexiSPY至尊版的监听通话和呼叫拦截等功能,那就需要进行手机降级。

    除此之外,手机降级实际上还可能致使S4手机要求性能提升,这是因为这款手机多年来都无法充分运行最新的安卓操作系统,而三星Galaxy S5手机也存在类似问题。

    注意,S4手机可能在某些地理区域还无法运行4.4.2操作系统,这完全取决于网络供应商和三星产品本身。

    手机降级需要哪些准备工作?

    对三星Galaxy S4手机进行降级所需的准备工作如下:

    • 需要降级的三星Galaxy S4,手机目前在4.4.2系统上运行。
    • 一台个人电脑。
    • 三星Galaxy S4手机的配套USB电缆。
    • 适于S4手机的4.2.2系统固件文件,具体取决于您所在的国家地区(见下文)。
    • S4手机的EFS分区备份(见下文)。
    • S4手机调制解调器的二进制文件(见下文)。
    • 适用于个人电脑的Root权限软件,即Odin软件(见下文)。

    现在我们已经拥有了所有必需的设备,那就开始吧!

    第1步—检查三星Galaxy S4手机上的安卓操作系统是否为4.4.2版本。

    转到手机的“应用”>“设置”>“更多”>“关于设备”,将会看到显示出的操作系统版本。在以下截图中,您将看到我们S4手机运行的安卓系统是4.4.2版本。

    oncellphone

    第2步—备份S4手机的EFS分区

    总体而言,在无需过多技术型操作的前提下(我们稍后将详细探讨EFS分区),您先对手机分区备份然后再进行降级操作能够始终确保安全。EFS分区使手机具备载体功能(例如识别网络和IMEI码)和拨出电话。

    如果没有这些数据,手机将无法正常工作。

    对EFS分区进行备份时,我们将会使用到EFS Professional电脑程序。该程序允许将EFS分区备份到计算机中以确保安全。

    您可在此处下载EFS Professional。

    要想运作EFS Professional程序,需要转到三星Galaxy S4手机的Play商店并下载和安装BusyBox。您必须首先取得三星Galaxy手机的Root权限才能安装BusyBox,并可通过此处的“监控手机评述”(Spy Phone Review)获取帮助。

    您在遇到询问提示框时只需取得Root权限,然后点击“安装”(Install)即可开始安装过程。

    Simply grant root access when asked and then tap Install to start the installation process.

    您在BusyBox安装完成并已取得三星Galaxy S4手机的Root权限之后,只需用S4手机的配套USB电缆将其连接到个人电脑,即可运行EFS Professional程序。

    EFS Professional程序在运行时,首先会检查S4手机以确保USB调试功能已启用(如需启用USB调试功能,需要转到S4手机的“设置”>“更多”>“关于设备”界面并点击“内部版本号”,直到显示“开发者选项”。进入“设置”>“更多”>“开发者选项”之后,确保检查USB调试功能。)

    您在S4手机屏幕上遇到询问提示框时只需点击“确定”(OK)即可。

    在个人电脑界面上,如果您已经运行EFS Professional程序,则电脑会确保已经取得S4手机的Root权限和安装好BusyBox,并且界面与下图所示内容相似。

    should_look_something_like_this

    点击“备份”选项卡。

    确保EFS Professional程序的界面与此图相似。您可以看到“所有分区”已被选择,但只有与EFS相关的四个分区已被选定备份,这是您需点击“备份”执行操作。

    备份过程完成后,先断开S4手机与个人电脑的连接,然后再重新连接。

    使用Windows资源管理器浏览S4手机的SD卡,您就会发现名为EFSProBackup的备份文件夹。

    您只需将该文件夹复制到您的个人电脑,并将其保存在安全的位置。

    copy-the-folder

    第3步—根据您所在的国家地区下载安卓4.2.2操作系统和S4版本

    接下来需要下载安卓4.2.1ROM,我们会用其对S4手机进行刷机以便降级。

    我们利用此处的网站来完成操作。

    点击下页的“固件数据库”

    click_firmware_database

    “类型”、“操作系统”、“型号”“国家”等项目下,选择与您的S4手机相符的数值。

    点击您要下载的4.2.2ROM

    确保详细信息与您想要降级的S4手机相匹配,然后点击“下载”按钮。

    confirmthedetails

    文件下载完成后,将其解压到您的计算机,如图所示

    注意,ROM文件大小会达几个GB,因此可能需要一些时间才能完成下载。

    第4步—在S4手机上进行4.2.1固件刷机

    您现在需要对S4手机上已经下载的固件进行刷机。

    为此,您需要在此处下载Odin程序。

    您需要将三星Galaxy S4手机设定为下载模式,操作方法如下:

    • 完全关闭S4手机。
    • 一起按下音量减小按钮、Home键和电源键。
    • 等待S4手机启动,此时应该进入下载模式。
    如果您的操作正确无误,那么手机屏幕应该如下图所示。您再持续按下音量增大按钮,手机将会处于下载模式。

    downloadmode

    现在您已经下载了Odin程序,只需将三星Galaxy S4手机连接到您的个人电脑,Windows就会自动下载驱动程序。

    您在启动Odin程序之后,如果一切顺利并且S4手机处于下载模式,则界面上应该显示“已添加!”如图所示

    您现在应该点击AP按钮,并浏览在此前步骤中已经下载和解压的固件文件。

    点击固件文件,然后点击“打开”

    固件文件将通过检查和添加到Odin程序,界面如下图所示。ROM文件的大小可能会使操作需要一段时间才能完成。

    当Odin程序的界面如下图所示时,您就可以对ROM文件进行刷机操作,这是原因Odin程序已经成功地检查了ROM文件。

    whenitlookslikethis

    此时您只需点击“开始”就可以进行ROM刷机。

    ROM刷机操作的耗时可能长达15分钟,因此需要一段时间

    切勿断开S4手机与个人电脑之间的连接,或是以任何方式关闭手机。

    当操作过程结束后,Odin程序的操作界面将会显示“通过”,S4手机将会重启和进入刚刚刷机的ROM模式。

    第5步—解决任何问题—无法启动

    如果S4手机的操作在ROM刷机后停在三星标志界面,则您需要执行以下操作:

    • 完全关闭S4手机。
    • 起按下音量增大按钮、HOME键和电源键。
    • 等待S4手机屏幕显示出S4标志,然后放开以上按键。

    手机现在将会处于恢复模式,界面与下图相似。

    recoverymode

    利用音量增大和减小按钮滚动到“清除”数据/恢复出厂设置,然后按下电源键确认。

    向下滚动到“是”,并按下电源键进行确认。

    三星Galaxy S4手机将会恢复到出厂设置。

    如果手机屏幕返回到上述界面,选择“重启”将会使S4手机重新启动和开机—第一次启动时可能需要耗费一些时间,所以请耐心等待。

    第6步—解决任何问题—IMEI丢失

    如果您在手机启动后却发现没有信号,那可能是IMEI码不正确—例如004999010640000/01(“设置”>“更多”>“关于设备”>“状态”> IMEI)。您需要从此处下载调制解调器文件,将其保存到您的电脑并进行解压。

    modemfile

    将三星Galaxy S4手机重新设为下载模式,并将其连接到您的计算机和运行Odin程序(更多信息参见第4步操作提示)。

    如前所述,连接完成后的手机界面如图所示

    点击CP按钮,然后指向上一张屏幕截图所示的调制解调器二进制文件

    pointtothelastscreenshot

    现在的Odin程序界面应该如图所示。您从中可以看出已经添加S4手机并且调制解调器文件已被选定。

    点击“开始”对调制解调器刷机并等待。

    切勿断开S4手机与个人电脑之间的连接,或是以任何方式关闭手机。

    操作完成后,等待S4手机重新启动。您现在就应该已经重获IMEI码,并且将S4手机的操作系统从4.4.2版本成功降级到4.2.2版本。

    本指南内容如上所述。如果您对此存有任何问题或疑问,请通过意见栏与我们联系,我们将尽力为您提供帮助。

    关注我们,保持更新。

  • 智能手机入侵《看门狗》非常真实并且正在发生

    智能手机入侵《看门狗》非常真实并且正在发生

    8

     
     

    “他们认为我是一个失控的人……但我从来没有过像现在这样多的控制权。”

    – 艾登•皮尔斯 《看门狗》

     

    于那些不熟悉游戏世界的人们来说,最近的热点之一就是Ubisoft推出的《看门狗》游戏。这款开放的游戏能够实现火爆GTA V游戏提供的一切,但其重点在于通过入侵城市来挫败敌人,而不只是依靠火力。

    《看门狗》中的场景发生在未来的芝加哥,届时整个城市都依赖于CtOS主系统。显然,具备任何黑客知识的人都可能入侵系统,并给城市及其居民带来各种骚动(从本质上讲,这就是《看门狗》游戏的关键)。

    很多人都已经在考虑艾登•皮尔斯完成黑客任务的合理性或可能性,比如调查谋杀您侄女的真凶。本文就是要向您说明,您在《看门狗》游戏世界所见和所做的一些事情,如今正在您的身边上演,并且已经持续发生了一段时间。

    centerman

    首先就是监听实时通话。在《看门狗》游戏刚启动时,您碰巧入侵了一个路人的手机,您可以在自己的手机上听到他的全部通话内容。

    呼叫拦截功能可以让您实时监听另一个人的通话内容,而对方完全无法察觉到您的存在。《看门狗》展示了类似所有好莱坞电影和电视上的场景,让您认为可以通过远程黑客攻击来对付一切(提示:其实不然)。与此不同的是,如果您真的想利用FlexiSPY来监听他人的手机通话,您首先当然需要获取他人的目标设备,这样才能安装好FlexiSPY软件。

    通话录音

    在《看门狗》游戏过程中,您会发现一些音频记录,使您更深入地了解人们在未来芝加哥城内的生活情况。在游戏中,艾登只需入侵电脑就可以开始监听手机上存储的音频记录。在FlexiRECORD产品中,FlexiRECORD也运用同样的操作原理。但在FlexiSPY的实际运用中,您首先需要将监控软件安装到目标设备,将FlexiRECORD安装到您的电脑及其连接的安卓手机上。

    之后,该软件就采用相同的工作方式。所有的通话内容都将被记录下来,并存储在您的电脑上。或者您也可以将录制的音频文件保存到您的手机,以便于在路上监听。

    在《看门狗》游戏中,您不仅可以监听实时通话内容,还可以在四处行走时秘密监听芝加哥居民之间的私密谈话。事实上,FlexiSPY也具有这项功能(称为监听通话功能),使您可以用自己的手机拨打目标设备,并监听后者在您拨打电话时的周围环境。

    FlexiSPY使得监听通话变得极其简单。您将FlexiSPY安装到目标手机后,只需到FlexiSPY在线控制面板输入您的手机号码,就可以启用监听通话功能并完成设置。

    您只需用自己的手机拨打目标手机,就可以开始秘密监听。

    oncellphone

    《看门狗》游戏的核心就是入侵。当您为了逃脱警察的追捕而入侵交通信号灯系统,并在飞驰而去时回头看到警察碰上了一脸茫然的司机,或者看到警察因为您造成的交通阻塞而变得无法动弹,此时应该没有什么事情更能使您感到满足了。但是,您知道《看门狗》同样能让您入侵他人的短信通讯吗?没错,您在现实生活中也可以做到这一点。因此,这意味着在游戏过程中,您可以破解他人的短信来获取泄露的信息,甚至通过向其发送短信来转移他们的注意力,以便于您秘密地进行监控。

    虽然目前的技术还不足以让您远程破解他人的手机(即使有很多欺诈信息),但您的确可以使用FlexiSPY软件拦截和读取他人的短信内容。

    FLEXIRECORD

    或者,您是否想尝试在逃逸之后再次入侵网桥?《看门狗》可以使您完成这些操作,Ubi Soft甚至用卡巴斯基作为杀毒顾问,以确保游戏中进行的黑客行为具有真实性,(虽然很多操作都更具夸张的戏剧效果—您可以想象一下约翰•特拉沃尔塔和休 •杰克曼主演的黑客电影《箭鱼》)。

    毫无疑问,《看门狗》是目前全球最热门的游戏。其在相互联系的互动城市与社会中的创新设计,会让您联想到自己的安全问题。我们都太依赖电脑或智能手机,并且这种情况只会变得更加严重,这意味着我们关注的数字世界面临着更大的黑客入侵风险。2001年瑞恩•菲利普的黑客电影《反托拉斯行动》中有一句经典台词,“我们不会认真对待任何事情,除非它与硬盘驱动器有关”。

    随着通讯设备真正成为我们生活的一部分(Galaxy Gear和Google Glass),上述情景变得比以往更加真实,而大量的可穿戴通讯设备也即将推出。我们的数据逐渐成为核心事物,因此健康的程序市场将变得炙手可热。

    毫无疑问,《看门狗》的发布促使我们反思在线安全及处理数字数据的安全问题,我们究竟多么依赖各种通讯设备,以及这些设备究竟对我们有多大的控制力(简单来说,这些设备控制我们的生活,而不是我们掌控通讯设备。我们只能关闭设备,并且不再使用它们)。

    flexirecordcomingup

    dont take seriously

    正是因为我们需要不断地查看Twitter、Facebook、短信及语音邮件,才使我们的设备始终处于开启状态并占据了我们的注意力。如果所有这些数据落入他人之手或是被人非法取得,都将造成糟糕的后果。但是,媒体首先需要了解什么是真正的黑客行为,以及其中到底涉及哪些操作,而不是借此炒作好莱坞电影和电视节目。

    远程操作是演示黑客行为的一贯做法,但实际上并非如此。《看门狗》的发布可能有助于摆脱这种局面。借助远程操作实现黑客行为传达的是一种错误信息,也使得许多非法企业可以通过提供欺诈软件来盈利。您想到在《看门狗》游戏中,一个操作系统(或者实际上是多个系统?每个系统负责掌控一类基础设施—例如供水和用电等)甚至可以控制整个城市是有点夸张,但也是真实可信的,因为这就是我们未来的生活状况。

    无人知晓

    也许Ubi Soft会在游戏的续集中解决上述问题,让艾登必须首先将黑客软件安装到目标设备,以及让黑客多人团队在线破解,通过控制操作系统的特定子系统(例如夺旗模式)来打败对手—这会使游戏变得更加有趣和逼真—或者至少他们能让我们事后隐藏所有的操作痕迹。为何现在不来体验一下《看门狗》游戏的真实性,立即对FlexiSPY软件免费试用24小时?此外,您使用优惠码FSPY5OFF购买FlexiSPY软件,还可享有5%折扣。优惠码有效期截至2014年6月30日。

     

    Explore All Our Features

  • 如何利用FLEXISPY跟踪安卓设备的 GPS位置?

    How To Track Android GPS Locations With FlexiSPY - Banner

    当您询问他人的终日行踪时,您能确定他们将向您告知真相吗?

    事实上,您除非亲眼见证他们所处的位置,或是在他们身上安装随身携带的GPS跟踪装置,否则永远也不会知道真相。

    以下内容将指导您如何利用FlexiSPY软件的跟踪GPS位置功能,来跟踪目标安卓设备的GPS位置。

    准备工作

    第1步—通过门户网站登录到FlexiSPY控制面板。

    Step 1 - Log in to your FlexiSPY dashboard via the Portal

    第2步—单击“位置”(Locations)选项卡。

    Click the Locations tab

    第3步—查看最新捕捉到的GPS位置信息。

    Step 3 - View the latest Captured GPS Locations

    完成!

    所有操作就是这么简单。您现在就可以成功地利用FlexiSPY跟踪目标安卓设备的GPS位置。

    当然,如果您对此功能或任何其它功能存有疑问,请随时通过以下的意见栏或社交媒体与我们联系!

  • 如何利用FLEXISPY监控安卓SKYPE聊天内容

    Spy On Android Skype Chats With FlexiSPY

    Skype是在电脑和手机上盛行的一种即时通讯平台。如果您知道有人在频繁使用Skype,或是刚开始对这种通讯平台产生浓厚兴趣,那您就会对他们的Skype聊天内容感到好奇。您只需购买我们的手机间谍软件,就可以监控目标安卓设备上的Skype聊天信息。以下内容将指导您如何实现操作目标。让我们开始吧!

    监控安卓设备上的Skype聊天内容—准备工作

    第1步—通过FlexiSPY门户网站登录到您的控制面板。

    Login to your FlexiSPY Portal

    第2步—单击“信息”(Messages)选项卡,然后单击“IM”(即时通讯)和Skype。

    Step 2 – Click the Messages tab and then click IM and then Skype.

    第3步—查看已经为您捕捉到的Skype聊天内容。

    Step 3 - View the captured Skype chats listed for your viewing.

    完成!

    所有操作就是这么简单。您现在就可以成功地监控安卓设备上的Skype聊天信息。当然,如果您对此功能或任何其它功能存有疑问,请随时通过以下的意见栏或社交媒体与我们联系!

  • FlexiSPY Is Now Compatible With iOS 7.1.2

    FlexiSPY Is Now Compatible With iOS 7.1.2

    You can now install and run FlexiSPY Premium & Extreme as well as FlexiSPY iPad on any jailbroken iOS device running iOS 7.1.2!

    This now means that you can now get the same unrivalled IM capturing capabilities on iOS 7.1.2 as well as great signature FlexiSPY features such as spy call and call interception.

    How can I get FlexiSPY on my iOS 7.1.2 device?

    The first thing you need to do is jailbreak the device, we have a guide for that, which explains all the steps, that you can read, here All it takes is a few minutes and the TARGET device in your hand to jailbreak the device with help from access to a PC and you will be up and jailbroken in no time. After being jailbroken, the installation of FlexiSPY will be as simple as ever, so why not start enjoying FlexiSPY on your jailbroken iOS 7.1.2 device today!

    Get FlexiSPY For iOS

  • iOS 7.1.2 Untethered Jailbreak From Pangu Is Out – Here’s How To Do It Safely

    iOS 7.1.2 Untethered Jailbreak From Pangu Is Out – Here’s How To Do It Safely

    Recently news broke that a group of Chinese hackers successfully released a working jailbreak for iOS 7.1.2 devices. For those who have been holding off on upgrading from iOS 6.x.x because they did not want to lose the jailbreak this is surely welcome news however there are a few questions that need to be asked about this jailbreak and whether it really is legitimate or not.

    WHAT IS PANGU?

    Pangu is the name of the jailbreaking application for iOS 7.1.2. Currently it is released on Windows only so those who have Macs and wish to jailbreak their iOS 7.1.2 device are currently out of luck. However there are already warning signs as to the legitimacy of the jailbreak before you even download the jailbreak tool – starting with the download URL.

    http://dl.pangu.25pp.com/jb/ (this is not the full download link – see below for that)
    25pp.com is a well-known Chinese piracy site and the jailbreak application, once downloaded, tries to install spyware in the form of the 25pp iPhone app -the old version does this, the new one contains no spyware- but how is this even possible? If the jailbreak application tries to install spyware how can the actual jailbreak be deemed trustworthy?

    The ios 7.1.2 jailbreak is in chinese!

    As you can see from the screenshot above the UI of the jailbreak tool takes a lot from what we have already seen from evad3rs, the process shouldn’t be too difficult

    Below are two guides, one to jailbreak iOS 7.1.2 safely and the other for those who have already jailbroken iOS 7.1.2 using Pangu and want to stop the application from doing whatever nefarious reasons it has to dial out.

    HOW TO JAILBREAK IOS 7.1.2 SAFELY

    Below are steps to jailbreak IOS 7.1.2 safely without installing any nasty 25pp spyware.

    Alternatively you can watch either the Mac or PC video and follow along.

    It should be noted that we are not responsible for any damage that may be done to your phone by following this tutorial. Also be aware that you might have to complete the process twice on a 5s, the first attempt, the device will ‘blue screen’, wait for the iPhone to reboot, then re run Pangu on your PC, and follow the guide again.

    Step 1- Download and run the Pangu jailbreak from the link below.

    Pangu For Mac

    Pangu For PC

    Step 2 – Run the Pangu jailbreak application in Administrator mode on your PC, and uncheck the box (the most current version of pangu no longer has the option for unchecking the box)

    unchecktheboxes

    Step 3 – Connect your iPhone or iPad that is running iOS 7.1.2.

    Step 4 – This is where things get interesting. The jailbreak tool uses an out of date enterprise certificate for authentication to allow the jailbreak to take place. This means that you need to change the date and time on your iPhone or iPad to June 2nd, 2014 otherwise the jailbreak will not work.

    panguwillshowyou

    Step 6 – Set the date and time to June 2nd 2014.

    Step 7 – Wait for Pangu to check the date is correct and then click the big black button to start the jailbreak and just wait.

    letpangustart

    Step 8 – As with Evad3rs a new app will appear on the springboard of your device.

    Loaded Spyware

    Note: If you wait too long before tapping ‘Continue’ or ‘Quit’ a message in red text will appear. If this happens you must start the jailbreak process from the beginning again.

    Step 9 – The Pangu app on the PC will continue to jailbreak the device – do not disconnect the device or unplug the device USB cable from your PC.

    Step 10 – When the Pangu app looks like this on your PC the jailbreak is complete.

    itlookslikethis

    You can verify this also by looking on your device now and seeing the Cydia icon.

    THAT’S IT

    iOS 7.1.2 is jailbroken.

    But what happens if you did all this but forgot to uncheck the checkbox? (If your pangu had the checkbox option)

    How to disable 2PP if you have already jailbroken your iOS 7.1.2 device

    You have two options:

    1 – Restore your phone which will DELETE ALL DATA and rejailbreak the phone using the steps above.

    2 – Remove PPSync to stop 2PP from functioning.

    To do this, on the now jailbroken iOS 7.1.2 device, go to Cydia. Tap Sources > Manage > Edit > Add.

    When asked for the repo name type in http://cydia.angelxwind.net/

    Wait for Cydia to update and then tap the new source from the list.

    Tap the program titled ‘Install Complete PPSync Remover’.

    ppsync

    Run the app to remove the PPSync program from your device and it should be okay.

    For those who are wondering PPSync, once installed, can cause device instability and stock apps (e.g. iBooks or Maps) to crash and it generally can affect the performance of your device.

    So now you know how to jailbreak iOS 7.1.2 on a Windows PC using Pangu. If you have any questions or comments head over to the jailbreak page of Spy Phone Review which you can find here or leave a comment below.

  • FLEXISPY是首款能够在IPHONE上监控SNAPCHAT信息的手机间谍软件

    snapchat-banner

    相比所有的其它手机间谍软件,FlexiSPY能够在大多数的即时通讯程序上捕捉各种文本和丰富的媒体信息。此外,FlexiSPY还是首款可在iPhone上捕捉流行的Snapchat即时通讯信息的手机间谍软件。

    什么是Snapchat?

    Snapchat是一种流行的即时通讯程序。您可以选择Snapchat联系人列表中的任何人,向其发送经过设定秒数就会“自毁”的图片。这意味着,您发送的图片会在收件人将其打开不久后消失,对方手机上不会再显示出其图片信息。

    或者,只是收发图片的双方这么认为而已。

    FlexiSPY将能够捕捉这样的图片信息。
    这意味着在FlexiSPY软件面前,Snapchat图片并非真的可以完全消失。您只需将FlexiSPY安装到运行Snapchat程序的任何iPhone上,即使在该程序上打开的图片已经消失后,软件也不会受限于收发图片的定时设置,而是捕捉到所有的图片信息并将其上传到FlexiSPY在线账户以便于您查看内容。

    Snapchat如何发挥作用?

    为了向您显示FlexiSPY软件捕捉Snapchat信息的强大功能,以及您为何需要这样的功能,让我们来了解一下实际操作。

    为了向您显示FlexiSPY软件捕捉Snapchat信息的强大功能,以及您为何需要这样的功能,让我们来了解一下实际操作。

    您在底部左上角会看到“3”,这表示收件人可以在目标iPhone上查看图片的时间为3秒钟,之后Snapchat程序就会将图片永久删除。

    您可以看到目标iPhone已经收到了发送的图片,并且图片可供随时查看。

    发送到目标设备的一张图片用Snapchat收取,可供查看的延迟时间为3秒钟。
    发送到目标设备的一张图片用Snapchat收取,可供查看的延迟时间为3秒钟。

    发送到目标设备的一张图片用Snapchat收取,可供查看的延迟时间为3秒钟。

    然而,到时FlexiSPY软件已经捕捉到图片信息,并将其上传到您的在线账户。因此,无论目标设备的用户认为使用Snapchat会有多么安全,FlexiSPY的操作总是领先一步。

    FlexiSPY是否真的捕捉到了Snapchat信息?

    我们发送到目标iPhone的图片在被查看之后,经过3秒钟就被Snapchat程序永久删除。现在,让我们来看一下FlexiSPY是否真的已经捕捉到了相关的图片信息。

    您只需登录到FlexiSPY在线账户,选择“信息”(Messages)>“即时通讯”(IM)> Snapchat,即可查看捕捉到的Snapchat数据。

    您在此可以看到已被成功捕捉到的Snapchat信息。

    FlexiSPY是唯一能够在iPhone上捕捉到Snapchat数据的手机间谍软件。
    FlexiSPY是唯一能够在iPhone上捕捉到Snapchat数据的手机间谍软件。

    FlexiSPY可以捕捉目标手机通过Snapchat收发的所有信息。

    但是,发送成功并且应该已被Snapchat永久删除的图片又会怎样呢?

    在下面的截图中,您可以看到FlexiSPY在目标手机上成功捕捉并上传到在线账户的图片。在此之前,该图片在发送到目标手机并经过3秒钟的查看时间之后,已经被Snapchat程序永久删除。

    只有FlexiSPY才能使您获取Snapchat试图隐藏的信息。
    只有FlexiSPY才能使您获取Snapchat试图隐藏的信息。

    只有FlexiSPY才能使您获取Snapchat试图隐藏的信息。

    在本文撰稿之时,FlexiSPY软件只可捕捉iPhone上的Snapchat信息,但适用于安卓设备的Snapchat信息捕捉功能即将发布。

    体验我们的所有软件功能
     

  • 间谍软件可见性|您的间谍软件真的可以隐身吗?

    所有的间谍软件产品都做出了“完全隐藏”、“无法检测”、“完全隐蔽”或类似的承诺。但事实上果真如此吗?如果您的间谍软件不能够真正地隐藏,最终不仅会使您无法进行操作,甚至可能给您带来严重的后果。

    隐身操作是购买手机间谍软件的重要考虑因素
    隐身操作是购买手机间谍软件的重要考虑因素

    在该系列的可见性文章中,我们将探讨隐身操作的重要性,以及每款应用程序保持隐藏状态的真正效果。

    我们将查看Stealth GenieMSPYMobile SpyMobiStealth等手机间谍软件,并将其与FlexiSPY进行比较。我们还会为您提供截图示例。该系列将对适用于安卓平台的主要间谍软件和监控程序进行比较。

    关于隐身操作的一些重要问题如下:

    • 应用程序自身是否可以较好地隐藏,或是目标手机的用户能否轻易地发现和禁用该程序?应用程序是否会被防毒和安全程序检测到?
    • 监控程序是否会干扰目标手机的正常使用情况?
    • 监控程序是否会过多地消耗目标手机的电池电量或数据流量?
    • 监控程序是否会以其它方式引起注意?

    隐身操作不只是隐藏图标。与FlexiSPY相似的所有其它同类产品充其量只能部分隐藏。无论这些软件是否号称能够实现谨慎操作、隐藏状态甚至完全隐蔽,最终仍会在许多方面暴露行踪。有时,发现这些软件的方法远比您预想得要简单的多。

    • 有时,一款程序通过自身的应用程序管理器就可能暴露踪迹。有经验的手机用户可以据此跟踪该程序的资源和数据使用情况,关闭正在运行的进程甚至将其卸载。
    • 另一款监控程序可能会被防病毒程序检测出来。后者会向目标手机的用户发送警报信息,并可提供自动卸载服务。
    • 其它监控程序可能会在需要Root权限的安装设备上留下自身的图标。
    • 如果监控程序无法适当地隐藏起来,目标设备上的各种系统实用工具也会报告出该程序的用电量、CPU运行时间、内存和数据使用总量等情况。

    FlexiSPY可见性系列文章从五个基本方面,说明了主要的其它手机间谍软件的实际可见性。您可以点击此处的手机间谍评论,或是直接通过上述链接来查看这些文章内容。
    如需获取更多信息,请通过此处查看关于可见性及其它方面的深入评论内容。

     

    体验我们的所有软件功能