100% found this document useful (2 votes)
661 views264 pages

Essential Guide for Cell Phone Technicians

The document is a comprehensive guide on software and hardware for mobile devices, detailing necessary tools for technicians, definitions of software, and various operating systems. It includes chapters on troubleshooting, device management, and technical skills required for mobile repair. The index indicates a structured approach to understanding mobile technology, with sections dedicated to both software and hardware components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
661 views264 pages

Essential Guide for Cell Phone Technicians

The document is a comprehensive guide on software and hardware for mobile devices, detailing necessary tools for technicians, definitions of software, and various operating systems. It includes chapters on troubleshooting, device management, and technical skills required for mobile repair. The index indicates a structured approach to understanding mobile technology, with sections dedicated to both software and hardware components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1

Index
Page
Biography 5
Acknowledgments 8
3) Dedication 10
4) Chapter 1 Software 12
5) Glossary 13
6) Necessary tools for the software technician 16
7) Definition of Software 30
8) Operating systems 31
Types of Operating Systems 31
10) Official and Unofficial Operating Systems 45
Operating System download sites 47
12) Unlock the bootloader, OEM Lock, USB Debugging 49
13) Processors and their relationship with the Operating System 67
14) How to Identify the Processor of a Cell Phone? 78
Manufacturers 83
16) Universal Methods 85
17) The Ways of Working Software 91
Security patch 92
19) Hard reset, Recovery and Backup 95
Cellular Controllers or Drivers 100
Device Administrator 108
Signed Drivers and Windows 8, 8.1 and 10 109
Mobile Applications 114
24) Root Android 117
25) Releases or Band Openings 120
Types of Bands 126
27) Apn 128
28) Network issues 130
IMEI 132
30) Google Account Blocking 140
31) Count My 150
iCloud iPhone 152
33) Remove password or user code from iPhone 155
34) Jailbreak 158
Security 160
36) Use of the Boxes 161
Box Crack 169
Boxes without a Box 170
39) Online Manufacturers Servers 172
40) Virus or Malware 173
2
Unfortunately, the Application has stopped. 175
42) Requirements for Installing Software 177
Software installers (Flashing) 178
Reviving Huawei with software issues 202
Encryption Error 209
46) Revive cell phones with Mtk processors 210
Revive Samsung by Usb Jig 216
48) Most common errors made by technicians when referring to software 218
49) Decipher or eliminate user codes and lock patterns 219
50) Insufficient Memory Issues on Android 223
51) Buttons on Screen 227
Receipt for the reception of Cell Phones 228
Program for Technical Service Control 229
Price List for technical services 230
Chinese Replicas 232
56) Remote Service 233
57) Coding for technicians 237
58) MDM Protection 238
Tracking of stolen phones 241
60) Taxonomy of telephone repair technicians 245
61) RMM Status: Prenormal Samsung 246
62) Additional Skills to Develop 247
63) Fastboot and ADB commands 252
Exercises and fault resolution 254
65) Chapter 2 Hardware 270
Essential Tools for a Hardware Technician 220
67) Components of a Cell Phone 161
Work area 166
69) Use of Hardware Tools 169
Basic Terminology 175
Disassembly and assembly of different cell phones. 178
72) Logic Card (PCB or printed circuit) divisions and subdivisions. 186
73) Source of Power Data 202
74) Most common faults and their solution. 204
75) Screen replacements, Glasses (Gel) and Touchscreens. 216
Manufacturing of display or LCD 226
77) Differentiate between software and hardware failures. 240
Chapter 3 Microelectronics 242
79) Definition 243
80) Theory 244
81) SMD electronic components 252
Continuity check and use of multimeter 263
83) Cellular electronic terminology 273

3
Practical tool for learning Microelectronics 275
85) Reading of Schematic Diagrams. 276
Detection of shorted or defective electronic components 293
Welding techniques, liquid and paste flux, tin. 296
88) Jumper or bridges for electrical continuity. 298
89) Reballing and reflow. 300
Reconstruction of push buttons or buttons 306
91) Installation of charging pins and their jumpers. 309
92) Use of Jtag 312
References 314
94) Photo Gallery 315

4
12
1) Software Glossary

Update: Upgrade the operating system version.

Adb: it is a driver that is closely related to what are the


USB debugging methods and fastboot are related to the ports of
USB connection.

Android: Operating system.

Open Bands: Remove the operator restriction to use only one SIM
What would be the operator that sold the equipment example Claro, Tigo, Movistar,
Telcel, Won, Movilnet, etc.

Apk:Aplicaciones Android

APN: It is the configuration to be able to access the internet data network in


mobile devices.

Downgrade: Lower the version of the operating system.

Backup: information backup.

Base Band: it is the modem or everything related to the signal.


of the device.

Bypass: To skip or violate security.

Bootloader: It is the boot manager of Android devices.

Bugs: Operating system errors, such as software failure


from the camera, gps, imei, etc; which are generated by its installation
operating system.

Bricked: The operating system has failed, so the phone


it will stay on the logo or it won’t be able to turn on and you need to reinstall the system.

Combination: It is a small operating system designed to be able to


access the system and enter the settings to be able to disable the oem for
modify the system and thus be able to remove accounts, open bands, and repair
IMEI, this combination is only for Samsung devices.

13
Command Console: It is a Windows cmd window where
the commands are entered to perform various actions both in USB debugging
like in fastboot.

Drivers: it is a software program that generates communication


between the computer and the cell phone.

Boxes or Box: are tools used for carrying out tasks of


software.

Crack: It is a software program that emulates the function of cash registers but
its functions are very limited and these files also have viruses
intended to damage the computer.

Custom: unofficial software or from some developer.

USB Debugging: Universal method to access the cell phone from


computer.

Dfu: It is the mode by which the operating system can be installed.


the iPhones.

Driver: it is a software program that generates communication between the


computer and the cell phone (It's the same as the controller).

Download Mode or Download Mode: It is the mode in which the firmware is flashed.
Samsung and LG.

Emmc: it is the memory responsible for keeping the system information


operational, when it fails, errors will begin in the software.

Fastboot: Universal method on Android to flash and remove accounts.

Flashing: It is the installation of the operating systems.

Firmware: it is the operating system.

Fix:Reparar

Format: it is the complete deletion of the phone including the system.


operational, so if the system loses power the phone will not turn on, it will be
It is necessary to reinstall the operating system.

14
Frp:Cuenta Google

Hard reset: factory values reset.

IMEI: it is the identification of the device or the identification number.

IMEI Null: the IMEI was lost, resulting in a generic or invalid IMEI.

Jailbreak: Break the security of iPhones to be able to install


applications outside the store.

Kernel: It is the core of the Linux or Android operating system.

Launcher: It is the main menu, the theme, or the system that creates the interface.
to open the applications and access the menu.

It is the bootloader lock.

Recovery: It is a start menu where we can perform different actions.


among them rebooting in fastboot, adb, making a backup, performing a hard reset among
other options.

Rom:Operating System.

Rooting: to obtain superuser permissions to modify the system.

Stock: original and official software.

Talkback: it is the application or method of assistance for visually impaired individuals.


blind and serves to be able to remove or delete Google accounts.

Tested: software that has been proven to work perfectly and that
they have already been used in other teams.

Test point: process by which a short is generated in the vbus line


to activate a USB port

Unlock:Desbloquear.

Wipe: Data deletion.

15
2) Necessary Tools for a Technician
Software

A laptop or portable computer preferably with Windows 7 32 or 64 bits


due to compatibility of programs and drivers, if the computer is going to use crack it
It is more advisable to install a computer freezer so that when restarting
not be affected by viruses, the minimum requirements for the laptop is a core
two duos with 2 gigabytes of RAM and a 250 GB hard drive, everyone will say
why a laptop, there are mobile devices that do not allow during the
installation disconnects from the computer, in underdeveloped countries like the
our electricity fails very often, in the case of Samsung it goes out
the electricity and we are installing the operating system the phone could not
never turn on again unless you have a box with JTAG. It is important that this
the laptop has its battery in perfect condition.

USB cables are needed for connection with the PC; it is recommended that these
cables should not be used for hardware or tested for the repair of the
load ports, meaning not to be used for hardware, the cable you use for
software only for that.

Necessary USB cables:

16
V8 or V9 cables are the most common in mobile devices.

2.- Type C cable for the new devices.

3.- iPhone 4 cable.

17
4.- iPhone 5 cable.

5.- V3 cable for old devices.

18
6.- F250 cable for old Samsung phones.

19
7.- Cable for Samsung Tablets.

Things we should not do:

Broken Cables

Old cables

20
Cables too long

21
Having several devices connected at the same time to the computer

Disconnect the device from the computer when flashing

22
Battery Discharged:

23
Bad Loading Port

Fold the Cable:

24
Hard Drive: this is necessary for storing information, software,
programs, etc; to avoid downloading the same thing all the time, this is very
convenient in countries where the internet is too slow. It is recommended to go
organizing the information in a detailed manner to know where everything is.
Many times we download software and it does not work for us, we download several until
what works for us, that which works for us we must save it on the disk because it is already there
tested and we know it will work for another one that reaches us and we reduce the
client wait time. This hard drive must have a minimum capacity of
a terabyte and it is recommended that it be from a reputable brand with capacity for
file transfer 3.0 and if it is shockproof or waterproof that would be the best
recommended.

Box or Service Boxes: they are necessary tools for the release or
band opening, IMEI repair, flashing or other services such as removing FRP
(Google accounts), removal of pattern or user codes, for those
devices that are not supported by the cracks, arrive in developing countries
to have a very high cost, which is why some technicians use some cracks that are
free and are available on the internet and generally contain viruses that go
to affect your computer.
In many countries, these boxes are viewed negatively, as many technicians only use them.
to remove reports of stolen phones, which have put them in the crosshairs of the
authorities are paying the just for the sinners with these tools.

25
Donglesson tools with the same method as the boxes but their range is a
a little more limited, they are difficult to recognize since they look like a pendrive or
USB memory. They are a bit delicate due to their structure, it is recommended to connect with
a USB extension so as not to break them when connecting to the PC, they are
more practical since when moving them they do not take up much space and are
almost imperceptible, camouflaging themselves in the store to avoid being stolen by the owners
of others' possessions and go unnoticed by the authorities.

Adapter and micro SD memory card exist many operating systems


that need to be installed by the memory card, is the case of the Huawei
that are done through the combination of the two volume keys and the button
of power and others that are installed through the recovery. The micro SD memory must
must be at least 8GB, class 10 to facilitate data transfer and
be faster the installation of an operating system.

26
OTG cable: it is necessary to install applications, remove Google accounts from
manual way, making a backup of information, etc. Note that it should be pointed out that
it will only be possible on those phones that have this option available.
It is also very useful for disabling the oem on those devices that
they updated with generic screens and the touch function stops working, with the otg
we connect a mouse, we go to the developer options and with
we disabled the OEM for then downgrade the version of Android and so on
recover the touch and with this we can install a lower version or downgrade the
software.

USB and OTG memory


One of the important things to highlight is that the public attention time
it must be very important, the less time we stay with the teams of
the clients, that's why it's important to have all kinds of tools, the USB memory
And OTG is very important for backing up customer information, installing
applications outside the store, install a x root from the recovery, update the
software, access the file explorer of the devices with FRP or Google account,
etc.

27
Internet access: it is important for making inquiries, downloading files,
communicate with other technicians, participate in chat or forums, etc. We can
Observe that the best way to learn is through research and practice. The best
the teacher and who can teach us many things is ourselves, to
through research and searching through the internet, it is also
It is advisable to join all WhatsApp, Facebook, Telegram, etc. groups.

One of the most famous groups is:


Clan Gsm
ClanCell
Servicellarauca
Yoreparo

28
Taringa

29
3) Definition of Software

The software is all the logical elements needed for the device.
perform all the tasks that the user assigns to him, can be defined as the part
logic that executes tasks that the physical part must accompany. It refers to everything
intangible and what differentiates it from hardware. Software is the set of
instructions and data in binary format (zeros and ones) stored in memory
main, which indicates to a device the tasks to be executed. That is, the software
hardware directs, software is the logical part of the computer system.
Software refers to the specific elements that make up an operating system, the
the difference between the two is that the software is an individual element and the
The operating system is the set of software necessary for the device
function.
Among the most well-known software on mobile devices, we have the systems
operational and applications. The software on the device can be replaced or
modified, many times the software can be affected by system errors,
virus or malware.

4) Operating Systems
30
The set of software programs that manages resources and activities of
a mobile device, this would be defined as the complete system software. Not
the more we turn on the device, the software starts to work activating the
bootloader which would be the start or the logo of the device, the software manages the
hardware from the most basic levels and also allow interaction with the
user.
It is worth noting that operating systems do not only work on computers.
or cell phones, we can also find it in televisions, mp4 players, tablets, or any
device that uses microprocessors, the system software enables that the
device fulfills its functions.
The framework is what enables the installation of applications and
this can vary depending on the versions of the same operating system, for
example despite the fact that two devices are identical with the same operating system
one has Android 2.2 and the other has Android 5.1, only the latter could be done the
WhatsApp installation.
The operating system performs five basic functions: providing an interface
the user, resource management, file management, the
task management and support and utility services.

4.1) Types of Mobile Operating Systems

A mobile operating system or mobile OS is a set of low-level programs


that allows the abstraction of the peculiarities of the specific hardware of
mobile phone and provides services to mobile applications that run on
He. Just like the PCs that use Windows, Linux or Mac OS, the devices
mobile phones have their operating systems such as Android, iOS, Windows Phone or
BlackBerry OS, among others. Mobile operating systems are much more
simple and are more oriented towards wireless connectivity, the formats
multimedia for mobile devices and the different ways to input information into them.

Android

31
The Android operating system is undoubtedly the market leader in mobile systems.
operativos, está basado en Linux, diseñado originalmente para cámaras fotográficas
professionals, it was later sold to Google and modified to be used in
mobile devices such as smartphones and then on tablets such as it is the
the Galaxy Tab case from Samsung is currently in development for
used on netbooks and PCs, the developer of this OS is Google, it was announced
in 2007 and released in 2008; in addition to the creation of the Open Handset
Alliance, made up of 78 companies from hardware, software, and telecommunications
dedicated to the development of open standards for mobile phones, this has helped them
much to Google to mainstream the OS, to the point of being used by companies like
HTC, LG, Samsung, Motorola among others.

Android Inc. is the company that created the mobile operating system. It was founded in 2003 and
it was bought by Google in 2005 and was launched on the market in 2007. Its name is
it owes to its inventor, Andy Rubin. Originally it was a system designed for the
digital cameras.

Android is based on Linux, having a kernel in this system and using


a virtual machine on this Kernel that is responsible for converting the code
written in Java of applications to code capable of understanding the Kernel.

Android applications are written and developed in Java, although with some
Own APIs for applications written in Java for PC and others
Existing platforms are not compatible with this system.

32
One of the great qualities or characteristics of this operating system is its
open source character. Android is distributed under two types of licenses, one that includes
all the Kernel code and what is GNU GPLv2 (this implies that its code must be put
within everyone's reach and that we can all do with this code whatever we like
opportune, modify it, expand it, shorten it, but we will always be obliged
to re-license it with the same license) Google also of course has
another license for the rest of the system components that is licensed under APACHE
v2 (implies that this code can be distributed to be modified and used at will)
of the one who uses it, but unlike the first case, the modifications and the code.
it is not mandatory to license it under the same conditions under which it
I found.

Versions of the Android operating systems

IOS

33
iOS is the operating system that powers devices like the iPhone, the iPad,
iPod Touch or Apple TV. Their simplicity and optimization are their pillars for
millions of users lean towards iOS instead of choosing other platforms
that need more powerful hardware to run the system smoothly
operational. Every year, Apple releases a major update to iOS that usually brings
exclusive features for the most cutting-edge devices available for sale
at that moment.

Previously named iPhone OS created by Apple originally for the


iPhone, later used in the iPod Touch and iPad. It is a derivative of Mac OS.
X was launched in 2007, increased interest with the iPod Touch and iPad which are
devices with the multimedia capabilities of the iPhone but without the ability to
making phone calls, its main revolution is almost a combination
perfect between hardware and software, the handling of the multi-touch screen that could not
surpassed by the competition until the launch of the Galaxy S I and II
part of Samsung.

Versions of the iPhone systems

34
Windows Phone

35
Windows Phone (abbreviated WP) is a mobile operating system developed by
Microsoft, as the successor to Windows Mobile. With Windows Phone; Microsoft offers
a new user interface that integrates several of its own services such as
OneDrive, Skype, and Xbox Live in the operating system. Competes directly against
Google's Android and Apple's iOS. Due to the obvious fragmentation of its
operating systems, Microsoft announced in January 2015 that it will discontinue
Windows Phone, to focus on a single more versatile system called
Windows 10 Mobile, available for all types of platforms (smartphones,
tablets and computers). It is designed to be similar to the versions of
Windows desktop aesthetically and there is a wide range of software available
third-party available for Windows Phone, which can be purchased through the
online store of Windows Store for mobiles.

36
37
BlackBerry

BlackBerry is a system developed by Research In Motion (RIM) that bets on


BlackBerry 6 will be focused on the corporate and non-corporate market.
the best experience of this system will be found on touchscreen devices
(Touch Screen), although RIM assured that on devices that have a
TouchPad or TrackPad can run it as they perform almost the same function. Thus
Still, RIM has not clarified which devices will be able to be updated.
to this version although there are many rumors about it. RIM in the development of
this OS focused on the multimedia aspect for the user, without leaving aside the
professional part, the integration of social networks is also shown and the
instant messaging in this. Undoubtedly, RIM wants to offer the user a new
experience in their BlackBerry team that no one knew.

38
Symbian

It was the result of the alliance of several mobile phone companies, among which are
they find Nokia as the most important, Sony Ericsson, Samsung, Siemens,
BenQ, Fujitsu, Lenovo, LG, Motorola, this alliance allowed them at one point
to be one of the pioneers and most used.
The aim of Symbian was to create an operating system for mobile devices that
could compete with that of Palm or Microsoft's Smartphone. Technically, the

39
Symbian operating system is a compact collection of executable code and various
files, most of them are dynamically linked libraries (DLL by
its acronyms in English) and other required data, including configuration files,
of images and typography, among other resident resources. Symbian is stored,
generally, in a flash circuit within the mobile device. Thanks to this type
In technology, information can be preserved even if the system has no power.
electric in the battery, as well as being feasible to reprogram, without the need
to separate it from the other circuits. The applications compatible with Symbian are
desarrollan a partir de lenguajes de programación orientados a objetos como, Java
(with its variants such as PJava, J2ME, etc.), Visual Basic for mobile devices,
among others, including some languages available in free version.

40
Firefox OS

41
Firefox OS is a mobile operating system, based on HTML5 with a Linux kernel, for
smartphones and tablets. It is developed by Mozilla Corporation with support from
other companies like Telefónica and a large community of volunteers from all over the
world. This operating system is especially focused on devices
mobiles including those of low range. It is designed to allow applications
HTML5 communicates directly with the device hardware using
JavaScript and Open Web APIs. It has been shown on smartphones and Raspberry Pi.
compatible with Android.

In February 2013, Mozilla announced plans for the global launch of Firefox.
OS. Mozilla has announced in a press conference ahead of the Mobile World
Congress in Barcelona, that the first wave of devices with Firefox OS will be
available Brazil, Colombia, Hungary, Mexico, Montenegro, Poland, Serbia, Spain
and Venezuela. Firefox has also announced that LG Electronics, ZTE, Huawei, and TCL
Corporations have committed to the manufacturing of devices with Firefox OS.

42
Ubuntu Touch

Ubuntu Touch is a mobile operating system based on Linux. It is developed by


Canonical Ltd. Presented to the public on January 2, 2013, through an announcement in
the Ubuntu website completes Canonical's process of developing an interface that
can be used on desktop computers, laptops, netbooks, tablets and
smartphones.

Ubuntu Touch is characterized by being a system designed for mobile platforms.


One of its most prominent features is:

Home screen without a locking/unlocking system (which works with a new


gesture system, and it is used to display notifications.

43
Among the most well-known are:

Android Apple's IOS 3) Windows Phone

4) Firefox OS 5) Ubuntu 6) Symbian

7.- Blackberry

44
4.2) Official and Unofficial Operating Systems

Stock Rom or Official Firmware


Se refiere al software desarrollado por los fabricantes del equipo, tales como
Samsung, Huawei, Zte, Lg, Apple, etc., which have already been verified and not
contains no bugs or errors, they can hit the market without any type of
problem, the bad thing about this type of software is that it contains applications
related to the manufacturer and/or the operator that makes it a bit more loaded
and that influences the speed of the CPU, which is referred to as bloated software or with
useless applications that are never used by the users.
redundancy.

45
Custom Rom o Firmware no official

They are developed by programmers who do not belong to the manufacturers,


they generally take a kernel from the official operating system and start to
develop modifications, many of these systems are not stable and contain
bugs or errors that prevent opening the camera, bluetooth, wi fi, etc.
Many of them corrupt the IMEI, or brick the device and can leave it completely unusable.
Our terminal is inoperative. The good thing is that they work more smoothly with the hardware.
since they eliminate all those trash and useless applications that come with the system
factory.

46
4.3) Download sites for Operating Systems

In all the years I have been repairing mobile devices, one of the pains of
Head has been downloading the software, many times I used to download the systems.
operations that sometimes I found it very difficult to download because of the speed of the
the internet was very slow and the operating system has a very high amount of
many times these operating systems did not work and I had to start over
from scratch, unless we download the appropriate operating system for our terminal
we can brick our device, Here I will leave you some websites where
You can download operating systems that have already been tested and almost all of them work.
to be good for our device, I also recommend that if the system
The software is useful on our terminal; we save it on an external hard drive.
I recommend that you start organizing the information into folders, for example, one
main folder called software, we create other ones inside called Alcatel,
Samsung, Huawei, Htc, Sony Zte; and within these the models with names
exact ones such as Huawey Y511, Blu Advance 4.0, etc.

47
Websites
[Link] (Samsung)
[Link] (Multibrand)
[Link] (Multibrand)
[Link]
[Link](Blue)
[Link] (Blue)
[Link](Multibrand)
[Link] (Lg)
[Link] Multibrand
[Link] (Samsung)
[Link] (Samsung)
[Link] Tablets
rockchip
[Link] Tablets
Allwinner

48
5) Developer options, unlock the
bootloader, Bloqueo de OEM y Depuración
Usb.

Developer Options

One of the possibilities of modifying the architecture of Android is the option to


developer, which starting from Android 5 is hidden by manufacturers for
warranty issue, one of the most important options in the work of
the software is that of the OEM, which is a lock made by the developers to
prevent the modification of the factory operating system and the most important for
they prevent the deletion of Google accounts and root.
When we talk about Google accounts, we can observe that to make a
removal or bypass of it we must disable the bootloader lock or
the oem. Another option that is very important would be the usb debugging that
it is a permission we give to the computer so that it can take control over
our terminal is very related to what root access is.

Android has many options to customize the mobile to our liking.


We can go to settings and tweak the screen or sound there, but there is also a
section for advanced users called "developer options". In this hidden menu
we have a long list of adjustments that often go unnoticed but
They can help us in specific situations.

How can we access the Android development options? The first step
to activate them, you need to go to Settings > Device Information and press
seven times on the build number. Once we press repeatedly we
a message of 'You are now a developer!' will appear. Then simply
We need to go back and in the settings list this new one will appear at the end.
section called Development Options.

This will depend on the manufacturer and the phone model, in some models
it varies quite a bit like in the case of Xiaomi or Huawei, the important thing is to achieve
the build number.

The question we will try to solve here is what all the options are for.
of Android development and what its function is. A list to try to discern
quickly which can be useful to us and understand all the possibilities that
tenemos en nuestro Android, sea cuál sea el fabricante.

49
Bootloader
Surely most of you have heard of the bootloader, especially
when you have tried to root your device or install a custom ROM.
For all these cases, the first step is to unlock the bootloader in order to
install new software that does not come from the manufacturer. Here we are going to
explain what the bootloader is and what it is used for.

What is the Bootloader?

Bootloader is the English name for the device's boot manager. It is the
first program that runs on the processor when you turn on a smartphone
Android. Is in charge of loading andlLinux Kerneland the Android operating system. The
Bootloader is a fundamental part of all machines that run a
operating system whether it is a smartphone or a computer.

How does the Bootloader work?

The bootloader is a program developed by the device's manufacturer.


for it to work with its specific hardware. When you turn on the smartphone
the bootloader performs tests to check which parts of the memory are
find the kernel or the recovery to load one of these parts.

If you press the power button, the bootloader understands that you want to load the
operating system and that's why it chooses the kernel to boot. If, on the contrary, you press
the key combination to enter recovery (reboot bootloader, restart
bootloader), the bootloader will choose to load the memory part where it is stored
recovery.

50
By default, the bootloader is locked, which means it can only boot.
a partition that has the manufacturer's or operator's digital signature, either the
original operating system or the manufacturer's recovery.

In order to install another operating system or another custom recovery, we must be able to
load a part of the memory that is not signed by the manufacturer, which implies
unlock the bootloader or even replace it and in most cases this
it voids the manufacturer's warranty.

Why do manufacturers lock the Bootloader?

The bootloader is locked so that it only reads the Android system that the manufacturer
install. In other words, the bootloader is used as a locking system for
Unofficial ROMs. This is where the controversy arises, as the bootloader works.
like a kind of customs that the software has to pass in order to be
executed on our devices. This implies that if we want to install a ROM
not official, first we will have to unlock the famous bootloader, which does not
it is always simple and entails the loss of the warranty.

This is where the controversy about losing the warranty when rooting the device also arises.
The problem lies in the bootloader since in the vast majority of cases of
Rooting modifies the bootloader.

At Samsung, there is also a security system called Knox, which


incorporates a function called KNOX Void Warranty into the bootloader, which
count the times you flash unsigned software from Samsung, usually
with Odin but also recognizes the flashes from the custom recovery.

Can the Bootloader be unlocked?

Yes, it can indeed be unlocked the Bootloader in most cases.


Some manufacturers make it easy by providing tools to do so or
simply through ADB and Fastboot, but in some cases, it is necessary to break
security with an exploit. In any case, the process of unlocking the bootloader
it assumes the loss of all data on the device (it is important to make a backup
security before unlocking), the loss of warranty and can put in
danger our terminals. (Ortega, 2017)

The OEM and Bootloader Unlocking

The OEM is the new way to unlock the bootloader.


it is hidden in Android 6.0 and later, if you try to make a modification of the
operating system without first deactivating the OEM or unlocking the bootloader
the system will not allow flashing, rooting, modifying recovery, or opening
bands, etc; and there are two things that can happen, either nothing happens or the phone
it can stay on the logo or something more radical like the phone not turning on anymore. In the

51
Android 6.0 devices' OEM is related to FRP or the Google account, it is
That's why even flashing won't remove the account; this account will only be removed by itself.
when we unlock the oem.

What becomes very important is to unlock the OEM so that it becomes easier for us.
repair a device due to device failure or because it has been left in the
logo.

Computer copy password

If we connect our Android to the PC and have USB debugging enabled,


we will be able to back up our device via ADB commands
Android. Through this option, we can also create a password to...
that backup is encrypted and only accessible by us.

Active screen / always on while charging

A very clear option. If we activate it, the screen will never go to sleep while
we are loading, very useful if for example we watch a movie from the mobile or the
tablet and we don't want it to turn off.

Enable HCI capture and inspection log via Bluetooth

Through here we can enable that via Bluetooth a developer or expert in


security can analyze the Bluetooth HCI (Host Controller Interface). If it is activated
a package is generated on the device at the path (/sdcard/btsnoop_hci.log) and from
There you can analyze it with tools like Wireshark.

52
Image color mode

On AMOLED screens, an option is added to activate sRGB mode. This is about


in a very common way of screen calibration that provides some tones
different; generally less saturated, but also somewhat more muted.

Execution services

This option sends us to a section where the device's memory is displayed,


what the applications and active processes occupy at any moment. Also
You can observe the applications that are cached and how much space they occupy. A
essential section for controlling all consumed resources.

Webview implementation

Webview is the process that allows applications to have a browser.


internal to connect to the internet. It used to be a proprietary application but starting from
Android 7.0 Nougat has its own Chrome app that acts as a webview. From
in this adjustment we can decide which is the default application for it.

Enable multiprocess Webview

Android intends for this option to be enabled by default in the future. Since
Android Nougat allows Webview to be multi-process and manage memory
more efficiently.

Automatic system updates

If we enable this option, the system itself will look for new updates and
it will directly show us the notification to update. If we do not have it activated
we will have to press each time to check for new versions.

Demo mode

Through this option we can activate the demonstration mode. It is very useful for
take screenshots always showing the same status bar, free of
notifications, with the network at maximum coverage and the battery at maximum

53
Debugging development options

USB debugging is an option to grant special permissions to the computer.


to have special access to the device, with this option we can root a
Android 4 and below, install applications directly from the computer.
we can read blocking patterns, etc.

Activating this mode is essential to access from the computer once.


Android SDK installed. If we want to exchange data between the PC and our
mobile or we want to configure it, we must do so with this option activated. If
You are probably used to fiddling with your Android, so you likely have it activated.

Revoke USB debugging permissions

From here we can eliminate USB debugging access for all


previously authorized computers. A sort of clearing cache when it comes to
take into account whether you have connected to that PC before, since when they connect
security keys are generated.

54
Always ask when connecting to USB

Simple option. If we activate it, a notification will pop up when we connect it via USB.
asking ourselves if we are sure and in what way we want to do it.

Allow ADB debugging in charging only mode

Normally when we use ADB commands, the mobile is not connected.


the mode only charges. With this option, the phone will charge and we can continue.
working. It is recommended to disable it when disconnecting from the PC.

Select an application to simulate location

Hay varias aplicaciones que nos permiten engañar al móvil y hacerle creer que
we are in another place. They are applications that deceive the GPS, from here
we will select the application that the system takes into account when
determine our location.

Enable view attribute inspection

With this option, the view attributes of the Android System Manager are activated. If
We perform a logcat, we will see the events in another way.

Select the debugging application

This adjustment allows you to select an application for debugging and prevent that
error messages appear. An option to force applications to
execute as they should.

Wait for the debugger

Related to the previous one. It prevents the application from starting until the
the debugger is not activated.

Verify applications via USB

Allows Google to scan applications you have installed via ADB or ADT and
to detect if they can be harmful. An extra layer of security that comes in handy in
the case that we install applications through that means.

Intermediate memory size of the register

From 64KB to 16MB, in the development options we can set the


size for Java. The usual was 32Kb, but it depends a lot on the architecture
from the device's CPU. If we set a very large buffer, we will notice a

55
greater latency between the sound when we speak and when it is received, although
it will also consume less.

Increase brightness to read in the sun

It is an option to improve the contrast and make the letters better.


defined when direct light hits. Although in most tests the
the results are quite unsatisfactory.

Through a logcat, if we have that option enabled, a developer can


access much more accurate information about what the wifi is being used for.
We do not recommend activating it unless you are going to use it.

Intensive transfer from WiFi to mobile network

If we activate this option, when we have poor WiFi coverage


it will automatically switch to mobile data. With this, we will save on battery already.
that it will not need to constantly search for WiFi and it will not be lacking either
disconnect the WiFi when leaving home. On the other hand, we might take something with us
surprise with the data since it may connect to them and we thought
that we were under the WiFi.

56
Always allow WiFi search while roaming

Imagine that we have two WiFi accesses with the same name, but one of them
it has better signal than the other. With this option, it will allow the mobile to access the SSID
what interests us most at any moment. Although, of course, we will see a slight
increased battery consumption when searching less frequently.

Mobile data always on

When we turn on WiFi, mobile data is turned off to avoid wasting it.
consume battery. With this option, the data will remain active in the background.
the plan and what we gain is that when the WiFi disappears, the change will be much more
quick since they will be active soon.

Select USB configuration

When connecting the USB to the computer, we can do it in various ways.


From here we will choose them. We have only charging, Media Transfer Protocol.
MTP, Picture Transfer Protocol (PTP), RNDIS (USB Ethernet), audio and MIDI. It
the most common method is charge mode or if we want to transfer files the usual thing is
use MTP and turn our mobile phone into a multimedia device.

Disable absolute volume

If we connect some Bluetooth headphones and want to control the volume


Regardless, we should activate this feature. We removed the volume.
maximum which in some cases is very annoying. In Android 6.0 it had problems,
but it was fixed in Nougat 7.0.

57
We move on to adjustments that modify what is displayed on the screen and in what way
It's done. The first is to show scores; it activates every time we press the
a small circle will appear on the screen marking where we clicked.
Minimalist and only lasts a few seconds.

Pointer location

Another adjustment to show the location of our touches, but it is much more
complete. It will leave us marked on screen with the entire journey of our last gesture
tactile, with the coordinates and even with the pressure applied.

Show screen updates

We don't notice it, but the screen of our mobile phone updates constantly. If
when we activate this option, it will light up every time it changes, with a pink flash
very eye-catching. Only recommended if we want to find out when the screen is
active and the content has changed.

Show design limits

Very curious. When activated, it will show us the borders of each screen element.
With this, we will know how far that section reaches and the limits of where our touch ends.
It will activate it. It provides a lot of information on how the menus are distributed.
from the mobile.

Window animation scale

Since the arrival of Material Design to Android, animations play a role


very important. They are a key element to convey a sense of fluidity or to show
striking and effective transitions. Here we can set the speed at which
the windows and menus open, from disabling so that there is no animation or
10x so that the effect is noticeable and we can see that curtain or zoom effect.

Transition-Animation Scale

A similar effect, but when changing screens. If we set a speed


the smaller the change will be immediate, if we choose a longer animation time
wide when we change we will notice the animation more and we will even be able to
appreciate how the windows appear little by little.

Scale duration animator

In this section, we establish the speed at which the various elements load.
from a menu. If we choose a shorter time, everything will appear instantly. If we choose

58
a higher time, the animations will stretch and everything will be shown step by
step.

Simulate secondary screens

With this adjustment, we can choose to simulate screens of various resolutions, from
480p up to 4K. A small floating window will appear that will repeat what is
show on our mobile, but in that new resolution. There is also the option of
display a dual screen at 720p and 1080p.

Smaller width

A very useful and recommended option. From here we can modify the DPI of
Android and changing the size of what is displayed. This is especially useful if
We have a phablet and we want more information to be displayed on the screen.

With this option, we force 2D elements to be rendered in all applications,


even though they don't do it by default. It's a double-edged sword, as in some
points improve the performance and quality of what is displayed but in others
moments of problems.

59
View updated GPU views

With this adjustment, every screen using the GPU will receive a red layer.
Basically, we will use it to know when the graph is being used.
our hardware.

Show hardware layer updates

In the same way that we used to have an option to know when the screen was
being updated, with this option we will be able to know when the layers of
hardware are active.

Debug excess GPU

There are some applications that have the ability to display information on top.
from others. With this option, we can choose to see when this happens to
to know if the behavior is normal or if they are overlapping incorrectly.

Debug non-rectangular clipping operations

A rather technical section. Better to go to StackExchange, but we understand that


It is an option to help developers create more defined areas.

Force MSAA 4x

If you have a high-end phone, this setting might be a good idea. Force the
multisample anti-aliasing improves the rendering of games and images in OpenGL
ES 2.0 and everything will look better graphically. On the contrary, performance will decrease in
proportion.

Disable HW overlays

With hardware overlays enabled, each application has its


own memory portion, if we disable it, we will cause the mobile to go
significantly slower. Mainly it is a debugging option for
developers.

Simulate color space

Through this option, we can configure our Android to adapt to


any vision problems. We are not talking about accessibility issues, since
this is configured from another menu. This option is for developers
they can see how people with these issues would view their application: from
achromatopsia (grays), protanomaly and deuteranomaly (red-green) or tritanomaly
(blue-yellow).

60
Since Android 5.0 Lollipop we have the possibility of USB audio and connecting through it
through devices such as amplifiers, microphones, speakers, or mixers. Since
Here we can deactivate it.

Strict mode

First monitoring option, we will receive a notification on the screen when the
applications are being developed that extend over time. Useful for
that developers know if everything works correctly.

CPU usage

By activating this setting, we will see the CPU usage in the upper corner. We
three numbers appear: the first represents the load in the last minute, the
second in the last five and third in the last fifteen. Useful to know if
there are applications that are consuming excessively.

GPU processing profile

Similar to the previous one, but shows the GPU usage through bars. It updates
in real time, but when taking up so much screen it becomes uncomfortable if you are not going to use it
that information for something concrete.

61
The Android system itself takes care of closing and managing the ...
background applications. When we switch from one application to another,
These remain in the background waiting to be opened again. If we activate
this option, the system will be much more aggressive and will consider closed the
applications upon leaving.

Limit of background processes

If you want to close Android applications and prevent them from running in the background
You should go to this setting. Here you can determine how many processes are
they will manage. We have everything from the usual limit, which is recommended, to
remove all processes until having four apps at once.

Errors without response

You will see a message saying 'the application is not responding' every time something fails.
Most applications are created to share all kinds of resources, but
sometimes they overlap with each other and do not manage energy well, then it is
When will we see this message that doesn't necessarily mean the application is failing?
completely.

62
Inactive applications

Clicking on it takes us to a screen that displays a list of all our


applications, those that we have active and those that Android itself has
dejado inactivas porque no las hemos utilizado en un tiempo.

Forced download of apps to external memory

Since Android 7.0 Nougat, it is possible to force applications to...


install on the SD memory. And it is very effective, over 90% of the apps will be able to be
fully installed on the SD. Except for some system applications or
messaging like WhatsApp, almost all can be transferred to the card to free up
space. Very useful if you have a new and updated phone but with little memory.
internal.

Force activity size adjustment

Another adjustment related to the Android multi-screen. With this adjustment, we will force
that all applications adapt to split screen, although initially they do not
they are not configured or optimized to work that way. We will need
restart the device to activate it, although we recommend being careful as
that some can cause all kinds of problems. (Pérez, 2018)

Unlocking the Bootloader and the OEM on some Android devices

In the case of Motorola, the first thing we need to do is register.


Motorola unlock bootloader page using an email and password to
Next, we must use a cmd kit like minimal adb and fastboot to generate
the unlock code from Motorola's official page, there in fastboot mode
we followed the steps indicated by the page, we received the code and generated the
unlock. When we unlock the Motorola bootloader, it will show us that
we have modified the system and this implies security risks, I remind you
that unlocking the device will void the warranty of the phones,
It is recommended to unlock the boot only when strictly necessary.

63
64
Unlocking the Bootloader of the New Samsung

The new Samsung devices will be unlocked differently.


first, you must activate the developer options, connect it to the wifi, and deactivate
the rmm status prenormal activating the system automatic updates
operational in settings to make the oem visible and there we deactivate the oem, then
we turned off the phone and entered download mode, to enter we connect with the
phone off, we press volume down-up at the same time and
we connect to the PC; after the initial screen appears, we hold down the
volume up for about 10 seconds to enter the bootloader unlocking
We select yes, so it would be unlocked.

65
Image taken from the internet.

66
6) Processors and their relationship with the System
Operative

What is a Cell Processor?

The processor acts as the 'brain' of a mobile phone. Just as it happens in


any other electronic device, the microprocessor is responsible for
execute the instructions and calculations at the lowest level.
The processor or microprocessor or by the initials in English means Central
Processor Unit is a central integrated electronic circuit, and it is the one that
review of greater complexity on the device's motherboard, this is the
in charge of executing the processes ordered by programming languages,
many of you will wonder what relationship processors have with the
software, the processes of software installation, release and repair of imei;
will depend directly on the processor, which means that each
The procedure for each phone will depend on the processor of that device.
some vary depending on their security.
Currently, the processors we can find in smartphones are
based on ARM architecture, which stands out for offering lower consumption of
energy and better heat dissipation, as well as having a reduced size,
suitable for devices such as mobile phones or tablets.

Every Android terminal, whether smartphone, phablet, or tablet, contains a


processor. It can be of various types and manufacturers. In Android for Beginners
Today, we will teach you the differences between manufacturers and we will shed some light on it.
of light on the dark world of processors and the data in which we must
let's pay attention.
In the case of the technicians, we must identify the type of processor, not the
characteristics of the processor for example, the response when asked to a
the technician about which processor it should be qualcomm, spd, mtk, hisilicon, etc;
and the response from an end customer would be a 2.5 GHz octacore Kirin, Snapdragon of
four cores, so we can observe that the characteristics of the processor
they are not important for cell phone repair in the software part.

67
Among the best-known processors are:

1) Mediatek or Mtk

It is one of the most well-known, it is the easiest to work with for technicians, since
its security is quite low which allows for releases, repairs of
IMEI and flashing, even manually, is built into its architecture in engineer mode.
that allows access to the internal configuration or design of these devices, to
To enter engineer mode, the following code is dialed: *#*#3646633#*#*.
They are among those who have the most problems with the stability of the operating system and
its relationship with the eMMC memory, if we flash the device with an eMMC memory
With defects, the equipment is probably not going to turn on. They mostly bring it.
mid-range or low-end devices due to their affordability. It is one
What is more susceptible to being affected by viruses or malware.

It is one of the most worked on with reflow, reballing, or eMMC memory replacement.
due to failures in it, which does not mean that it extends the life of the
device.
These processors use a notepad file extension in Windows
that is .txt (Scatter File) and is installed through a tool called sp flashtool,
that doesn't mean that there aren't other formats and other installers like .bin
that are flashed with the boot 8 of Miracle or the skf to install with sigma box.
It is also easy to revive when there are problems in the software by doing a test point.
to reactivate the flashing ports.

68
The way to connect the phone is as follows, the phone
completely turned off, the action is executed (frp, flash, repair imei or
open bands) and then connect, be careful not to press anything just connect;
when flashing we must try several versions of the flashtool, sometimes when flashing
They can throw several errors at us, many of which I have bypassed by changing the version.
delete the flashtool.

Another problem they have is system encryption, it may suddenly be that


it asks us for a password that we never entered, do we do a hard reset or
we flashed it and it still doesn't go away, the way to do it is by formatting in sp
flashtool (Don't be scared, it won't turn on) we disconnect and now in flashtool
We flashed it, the phone will now turn on and boot up properly but the IMEI will be lost;
What we would do next is repair the IMEI using a crack or a box; if it doesn't get repaired.
Root your device and with Root Explorer delete the nvram folder and your IMEI will return.

It is also very easy to back up operating systems when


They cannot be found online, one way is by using the NCK crack, we give it
where it says dump phone firmware and connects the phone turned off and
the operating system of that phone will be automatically saved in our
computer, so that if the phone does not turn on due to incorrect software
we can leave it as it was.

69
2) Qualcomm

This processor is the most stable and has excellent security, they are the devices
what else is hard for us when repairing them through software, when we receive a
client requesting our support on which terminal they should buy without any
Doubt we should tell him that he should buy a device with a processor.
Qualcomm. Generally in technical services, they have the highest cost.
in technical hours, that is to say, they are what is charged the most for technical services.

Due to the security of these devices, they have to be handled through


service boxes and many of them don't even have any kind of support
box.
To flash Qualcomm devices, most use a file with the .xml extension and it is used
like the software installer the qfil download and the software from qualcomm are
the heaviest of all and one of the most complicated to install.
It's easy to tell if a Qualcomm is bricked because we connect the device to the
computer and in the device manager it will show the qualcomm hs driver
usb qloader (9008), if we see this driver we already know it needs to be repaired
installing the operating system.

70
Some get flashed by doing a test point to activate the qualcomm hs-usb port.
qloader or with the phone turned off, connect while holding the volume button.
up and down, this process is also carried out to remove xiaomi account or to
delete Google accounts.

3) Intel

This type of processor is recently coming out with projects from the manufacturer.
Asus, The company presented the new series of Atom X3, X5, and X7 chips. The first,
the X3, previously known as SoFIA, will mainly arrive on mobile phones and
budget tablets, while the X5 and X7, previously known as
Cherry Trail will mainly arrive on higher-end tablets. Currently,
Asus is testing a series of mid-range and high-end phones with its
zenfone series, currently the nck and the umt have been incorporating different
actions to be taken with this type of processor.
Among the methods, processors, and manufacturer, there is the option of Intel and
spectrum and in the eft there is the option to flash using the methods of
USB debugging or in fastboot mode.
These phones can be flashed from the micro SD card by putting a ROM on it.
.zip or an [Link] that can be installed from recovery, from fastboot or
USB debugging can be done from the command console with minimal fastboot.

71
and adb through a series of commands that will depend on the type of connection
whether we are going to do fastboot or in debugging.

72
4) Spreadtrum or SPD

It is a processor that is not very common; it is used in mid-range devices.


Generally, its architecture has generated some problems with the system.
operational and some applications, for work in technical service is excellent
since any box crack can execute releases, IMEI repairs and with
the installation of the operating system is very easy and quite fast, since the
software do not exceed 800 mb.
The software installer is called spd upgrade tool and the software comes in a
.pac extension used for system restoration.
The connection method would be as follows, with the phone turned off it
I would run any option and then we would connect the device by pressing
volume down or volume up to activate the connection port or the driver.

73
Hi silicom

This processor is closely related to Huawei with its P6 models.


P7, P20, P30, Mate 20 Lite, etc., most of which are also known as Kirin.
to work with these processors we must activate the port in the following way,
we activate USB debugging from the settings, we go to about phone, let's go
the build number (Android 4 and above) and we tap there several times until
to enable developer mode to activate USB debugging, now we type
the following code *#*#2846579#*#* we select project menu, we enter
background settings, we select USB port setting and finally we activate the
set the manufacturing mode and we can proceed to work with the boxes.
Many of them are also not supported by any box.
Due to their security, most also work with cash and many of them
they are still not supported by any box, there are some new models that for
to take some actions we need to do a test point on the card. Many of
You must downgrade the software version on these phones to lower the version of
security patch, and after you downgrade you can do any job.

74
One of the important features to highlight is that these processors for
Working on the software side does not require being a root user.

Broadcom

Broadcom is a company that is globally known for its combo of


services in WiFi, Bluetooth, and GPS, and is currently developing processors for
cell phones.
They are very uncommon processors, which were designed for some
Samsung or Alcatel low-middle range. They are very intuitive when it comes to performing
the software processes. This processor has already been gone for a long time
both for cell phones and for tablets.

75
Infineon

It is a German manufacturer of microprocessors, an important client of the division.


the purchased LSI is the South Korean mobile manufacturer Samsung, the second
company in the sector after the Finnish Nokia. They are uncommon and almost do not exist
information on how to work with them. Just like Broadcom has stopped appearing so much
on cell phones as well as on tablets.

To act

76
The company Agere develops chips for low-cost devices, in order to
can be integrated into the same music players. They are developed
for people who need cheap yet attractive equipment, in this
feeling the effort of Agere and Samsung Electronics seeks to bring the mobile phones of
low cost to the greatest number of people possible, with high quality in reproduction
of music.
The truth is that I could hardly find information on the web about this type of
processors. The manufacturers also did not continue developing

These two types of processors are unique and exclusive to tablets.

Rockchip

They are processors intended almost exclusively for tablets, they are quite uncommon.
in technical services. They are present in Chinese manufacturers with
Android operating systems.

77
Allwinner

It is a leading company in semiconductor manufacturing and provides solutions in


SoC for other companies. To date, it has launched more than 50.
processors intended for Smartphones, Tablets, Smart Dongles all
with Android.
I do not recommend buying tablets with this processor, there are already many better ones than this.
This is the same or lower price. If you already have a tablet with this processor you
I recommend updating the firmware to the latest version if you notice it is slow or unstable. If
Everything works as it should, you were lucky and the tablet came updated.

6.1) How to Identify the Processor of a


Cell phone?

There are several ways to identify the type of processor in a cell phone, the
the easiest way is to search the internet for the characteristics of the devices and
There will be the type of processor that the device has.

78
Another way to identify the processor is by connecting it to the PC, but it's not 100%.
sure, but with a little experience we can identify the type of
processor, we go to the device manager and check the type of driver,
In the following images, we will show you several drivers and you will have to
identify them.

79
Another way to know the type of processor is to go

80
Another way to find out the type of processor is directly from the settings.
from the same device, this is the least secure way to know the type of processor
of the device, since many of them do not specify the reference in the settings
processor.

81
In the case of Chinese tablets and phones that do not have recognized brands or without
manufacturer's brand so we need to disassemble the equipment to identify the
type of processor or look for the code on the motherboard that it has on the card
logic or in the volume, power, or camera flexes.

82
Manufacturers
For years, the king of mobile phones was Motorola Inc., which created that
heavy brick weighing 784 grams that cost US$4.000 in 1984. Then the Finnish
Nokia Corp. was the first to launch smaller, digital phones and
became number one in 1998. Four years later, the Korean Samsung
Electronics Co. was the pioneer in color screen phones, and now competes
with Motorola for second place in the global mobile phone market. But
currently, phones with built-in cameras are the latest trend and
Nokia is once again in the competition.

Currently, there are very well-known brands, but we can see that
there are millions of brands and models, and also weekly or monthly
new manufacturers are emerging, so the mobile phone technician will never stop
Learn because it is important to stay updated daily.

Many manufacturers handle software flashing and repair only through


specific tools for each of their teams, so we can
observe that Samsung devices, despite their processor or features, all
They will be flashed in the same way, Odin is the installer and uses the same mode.
of connection that is through download and uses a file with the same extension.

83
84
Universal Methods in Android

They are called universal methods because all Android devices have them and
there we can flash any phone through fastboot or the
adb, of course this will depend on whether we find the software to be flashed onto one.
of the universal methods, for this we will proceed to describe each one of the
universal methods.

USB debugging: Many phones need to repair IMEI, unlock or


to open bands, among other things, we must have debugging enabled
usb and/or rooted, as is the case with Samsung using the z3x.

85
2) Fastboot: this method is widely used to remove Google accounts, such as in
the case of the Huawei that is placed in this method off by pressing
volume down and without releasing I connect it to the PC, and the other models we must
enter recovery and we go to reboot to bootloader.

How to enter Fastboot by processor or manufacturer?

Xiaomi

Generally, it enters fastboot mode with the phone off by connecting it to the
computer and pressing the volume down for 10 seconds until it appears the
next image.

86
Motorola

To enter fastboot mode on Motorola devices, it is done as follows,


pressing power and volume down simultaneously for 10 seconds, until
let the image that follows come out.

87
Huawei

Generally, it enters fastboot mode with the phone off by connecting it to the
computer and pressing the volume down for 10 seconds until it comes out the
next image.

88
Htc

To enter fastboot mode on motorolas, it is done as follows,


pressing power and volume down simultaneously for 10 seconds, until
let the image that follows come out.

89
Others for recovery

One of the options to enter fastboot mode is through recovery.


selecting the reboot to bootloader option.

90
9) The Three Ways of Working Software,
when flashing or for tasks to perform with
the boxes.

Through:
Processor
Many of the telephone boxes and installers are managed through the
type of processor that the device handles, which is done
it is necessary to identify the type of processor

Manufacturer
Many of the phones are approached depending on their architecture,
It's the case with phones like Samsung, LG, Sony

Method
The method is universal for all Android devices since all
they have both methods which are USB debugging and fastboot

In the case of these three ways of working, it is important to identify when we


It will be used by method, either by processor or by manufacturer, many
Sometimes with experience we could easily identify how to work with the
devices that reach us, although sometimes it is important to try all three, it has happened to me
It happened that I researched, and nothing comes up on the internet, but I start trying some things.
methods and it turns out it works, that's why it's very important to try several times and
be very persistent in this.

91
Security Patch

Security patches are security updates released by Google and


manufacturers to prevent devices from being modified, hacked or
affected by the virus, these security updates have been around for a long time
present on Android. Although their relevance has been increasing.
Over time, each manufacturer releases its updates for
keep your devices updated with the latest security software,
the manufacturers that update their devices the most are Samsung, LG, Sony,
Huawei, Xiaomi, Motorola.

The problem is that the installation of these patches does not depend on Google.
security on phones. That is why there can be significant differences between
phones at the time of receiving said patches. However, in 2018 there was a
important increase in the number of Android phones that obtained such
patches, as confirmed by Google itself. Partly, programs like Project
Treble or Android Enterprise Recommended are initiatives that help improve
the distribution of the same in the market.

The importance of them is something that is often underestimated. Thanks to the


security patches on Android, it is possible to keep phones protected against
all kinds of threats. Many types of threats affect Android, ranging from
malware, spyware and others. That is why, thanks to these patches, it is possible to secure a
a little more the phone in front of these problems. Especially considering that
Many data on the phone are sensitive. So it is avoided that someone has
access to them.

For this reason, they are a necessity for phones in the operating system. Although
for a while many manufacturers have not taken it too seriously
seriousness. Since it was observed how many brands did not release all the patches,
even though they told users that they had indeed been launched.

Some phones will be easier to repair or breach security depending on


of the security patch and the version of the operating system, for example it is not the
just delete an account from an android phone with a security patch of
June 2017 and an Android 6, to a phone with a security patch from February
from 2020 and an android 10 that is why it is important to know all this information.
device.

92
93
94
11) Hard reset, format, Recovery and Backup

Hard reset is a process by which mobile devices are subjected to a


factory reset returning to its original values, this process can be
do it in various ways, one can be through the internal settings of the
device, another runs through a process called recovery through a
key combination, another can be through a code and finally it
would be carried out through the use of boxes, dongles or cracks.

On Android devices, it is done with the


device off and running a combination
from keys that lead us to the image that is at our
right, through this menu we can carry out a
backup of the operating system, which is advisable
before performing a factory reset,
we can also perform a data backup of
user, we can reinstall the operating system,
We can update the version of our terminal.
There is a factory reset that comes with very options.
limited and we have custom recoveries that expand
the options to execute in the terminal like what it is
the assembling or disassembling of the storages, to do
external installations, enter fastboot mode, etc.

In the case of devices with spd processors, they would enter recovery mode with
volume down and power, or in the case of Motorola, HTC among others that first
we must enter fastboot mode, with the phone turned off and with the key of
Volume down, we enter fastboot, then navigate with the volume keys.
until reaching the recovery, select it with the power button until it appears
figure of the Android lying down, then we use the following combination to
to be able to access the menu, the first thing we do is press power while holding it
pressed and simultaneously we touch the volume up button and that's it
it would activate the recovery menu visualization.

One of the important options of recovery is to make a backup of the data.


the users, this is very important so that the client does not get angry with the technician
at the time of performing a factory reset, this backup can be done
also through computer programs, another thing to take into account is
the backup of the phone contacts which can be exported through

95
from the same contacts application to the sim card, micro sd card, or email
user's email.

Another recovery option is to access fastboot mode for flashing or installation of


some specific software or simply doing a hard reset, we can also
remove restrictions such as eliminating restrictions on Google accounts,
we can also enter the update through adb mode or debugging
usb.

96
Another option to hard reset and backup mobile phones is through
software programs or boxes to improve the process and speed up the process.

97
98
One of the phones that does not come with recovery is the case of Sony devices, which
they come with that option disabled from the factory, to be able to remove patterns,
Google accounts and passwords we must download a bypass unlock tft file.
what is done to flash using the Sony Flashtool installer.

99
12) Cellular Drivers

It is a program that serves as an interface between the device and the computer.
this program controls the connections of mobile devices. Each device
mobile must have an independent controller and this will be related to its
processor.
A driver acts as a translator between the device and the programs that
they use the computer. Each device has its own command system.
specialized that only their controller knows, however, most of
programs have access to devices using generic commands. The
controller, therefore, accepts generic commands from a program and then them
translate to the specialized commands for the device.
To access the drivers in Windows, we go to the start menu in the
bottom left corner, we click and the menu opens, there we look for my PC or Computer
and we right-click, go to properties and select administrator of
devices, as shown in the following image:

100
101
12.1) Types of Mobile Drivers to work with software

1) ADB debugging or Fastboot ADB

It is used to have control or access to the device from the computer and
to be able to manipulate and make some modifications of the cell phone from the PC, but
first you need to activate some permissions from the cell phone so that the
computer accesses the cell phone and this is closely related to the
root process and both generally perform tasks such as repair
of IMEI and other processes.

102
Modem

It is related to the manufacturers LG-Samsung and is used to flash between


other things.

103
Puerto Com

It is related to processors and its function will depend on the action to


to carry out like for example the MTKs that have several types of drivers as when it
They are going to flash that they have their preloader driver or the Mediatek drivers to repair IMEI.
to open bands.

104
Mtp

It is used in many boxes to eliminate patterns, codes, or passwords with


this port that is universal because all Androids have this port which is the
for mass storage or file transfer. In order to transfer
Information from the phone to the computer we must necessarily have this
driver, many of the Windows devices are recognized automatically or come with it
by default the phone is to be installed, in other cases we must install it
manually.

105
Universal Series Bus Without Flash Sony

It is used to execute different options solely and exclusively to work with


Sony brand equipment that can be installed directly or using the
Sony's flashtool.

106
Universal serial controller for iPhone

The drivers for iPhone devices are installed by the programs installed on
the computer such as iTunes and U3tools, to know if the device is
recognized we have to go to the device manager and look for the
universal serial controllers.

Just like with processors, we must investigate which specific driver to use.
to run the equipment repair, sometimes even though they are the same drivers
Ports will be used for flashing and others for repairing IMEI or unlocking.
the bands, this is the case for the mtk that use preloader drivers to flash them.
and to repair IMEI, Mediatek drivers are used.

107
Device Manager

One of the ways to see if the mobile devices are recognized by the
computer is through the device manager, here we can identify if
the phone is recognized, if it can be revived with software, if the phone is
bricked, or if the phone is having issues with the charging port or it doesn't work.

How to access the device manager, we can enter as follows


way, start menu, computer and there with the right button we go to properties and
there to the device manager, as shown in the following images:

108
12.3) Signed Drivers and Windows 8, 8.1, and 10

The signing of Windows drivers is an additional security measure of


operating system through which, when we are going to install a driver,
in our operating system, the signature is checked, and if it doesn't have one, or it
it detects that the signature is not correct, the installation is blocked.

In this way, by checking the driver's signature, Windows is able to


notify us if the system is unable to verify the identity of the author of the
driver (because, possibly, it has been released by a third party without authorization) or if the driver
it may have been modified by a third party, introducing corrupt code and even
malware. In addition, the malware that is distributed as drivers is the most
complex and difficult to remove, as it has direct access to the Windows kernel,
thus preventing its elimination and hiding from any type of analysis.

109
This safe mode has been present in Windows since XP, although it has not been
until the arrival of Windows 8 and Windows 10 when it has become much more
aggressive and difficult to evade due to Secure Boot systems.

Although certain drivers will always be signed, some, such as,


For example, the USB drivers of certain devices or development environments (the
bootloader mode of many Android phones) will not be digitally signed,
so, to install them, we will have to disable, even if only temporarily,
this option.

Therefore, if we need to install drivers that are not digitally signed,


the ADSLZone colleagues explain how to disable the check of
company to install unsigned drivers in Windows 10. (Velasco, 2017)

Steps to follow to disable mandatory use of signed drivers

Although it is possible to block automatic driver updates in Windows 10,


sometimes users may want to install certain drivers that despite
not be digitally signed by Microsoft or any of its suppliers, whether from

110
total trust. Therefore, we will show how to install drivers that are not
signed in Windows 10.

To do this, we will have to disable the mandatory use of drivers or


signed drivers, an option that is not very accessible. The first thing we have
what to do is go to the settings from the start menu of Windows 10 and to
continue navigating through the options Update and security > Recovery.
Once there, we press the Restart now button that we find inside
Advanced start to then choose the option Troubleshoot in the
next screen that is shown to us.

111
This will show us a new menu where we have to enter the options.
advanced to later choose the Startup Settings option. There we are
they will show the options that we can change with the restart and where we can
find the option to Disable mandatory use of signed drivers. For the
So, we click on Restart and then choose the option that we
Disable driver signature enforcement
signed drivers, by pressing the F+number key of the menu option, therefore
general F7. Next, Windows 10 will start with this feature disabled
and therefore, we will be able to install any driver even if it is not signed
digitally by the company.

112
This option will be disabled until the next time we turn on the
system, so if at any point we want to reinstall another driver from
For these characteristics, we will have to follow the same steps again.
But if what we want is to disable the mandatory use of signed drivers
So we're definitely going to open a command prompt window.
with administrator permissions, run the command bcedit /set testsigning on and a
continue to restart the system. To disable this option from the
troubleshooter, we must run the command [Link] -set
loadoptions DDISABLE_INTEGRITY_CHECKS. (Adeba, 2017)

113
Mobile Applications

It is defined as a software program that allows


the user to perform a set of tasks of any
type, designed to be executed on phones
smart, tablets and other mobile devices.

Applications can come directly from the manufacturer or from the store.
operating system, can also be developed by programmers
independents or as it appears in Android apps from unknown sources.

App stores

In Android Google Play Store


In the iOS App Store

On Windows Phone it is Windows Store


In Blackberry it would be BlackBerry World

On Amazon it is AmazonAppstore
In Firefox it is Marketplace

In Symbian seriaOvi

Regarding unknown origin applications, they are developed almost


exclusively for Android, since for other operating systems such as iOS
apps from Apple can only be installed through the store unless you do a
jailbreak, on Android, the applications have the apk extension which can be
stored in the device's memory to be installed later, also
They can be installed through boxes or simulators by activating USB debugging.
and the activation of unknown sources configuration so we can install
applications from the computer via the USB cable directly on the device
without needing to transfer it to the device's storage and/or have it in the
device a file explorer to access said application.
Applications vary based on user needs, among the most
we have known games, educational, recreational, entertainment, social networks,
access to services, remote control, payment of services, etc.

114
There is an endless number of mobile applications and their growth is exponential that
they generate millions of dollars, making it one of the companies with the highest
growth in the world achieving investments and sales anywhere
world.
In Android, applications may or may not need superuser permissions.
What does it mean that many applications require the device to be rooted?
to be able to execute different actions, for example buttons on the screen to
execute the menu, go back, or the home key, etc.

115
116
14) Root Android

The first thing to keep in mind is that Android is a distribution


Linux, which is an operating system for computers, and
this term comes from there, so knowing where from
we will proceed to define what root is, it is defined as the
special permission that a user will have to access everything
the information of the operating system being able to modify the
characteristics of the same, this type of user is known
like super su or super user.
Being super users allows us to have elevated privileges to override
the limitations imposed by the hardware manufacturer or the operator that sold it
smartphone, tablet, or whatever carries Android these days.
With root access, the user will have the ability to replace
system applications, configurations, run software
specialized that requires administrative permissions that give
another way are inaccessible.
How to recognize if our device is rooted, we can
download an application called root checker or we can
observe among the applications there is an icon like those that are in the
text.

Why root an Android?


1.-Uninstall any application even if it is from the system
2.-Move applications to the SD card
3.-Update the Android version
4.-We can unlock the bands and repair IMEI
5.-We can navigate, access, or delete files from the system.
We can increase the CPU speed (overclock) to improve the smoothness in the
games or decrease the CPU (underclock) so that the battery lasts longer.
7.-Increase or Decrease the volume of our device
8.-Remove virus from the System
9.-Modify the bands and the mobile data speed of the device
10.-Stop the applications running in the background

117
How to root an Android device:

1) Through programs from the computer in USB debugging mode, such


like iroot, kingoroot, root genius, etc.
2) Through applications such as kingoroot, framaroot, towelroot, these
applications mostly need an internet connection.
3) Flashing the root directly as if they were going to install the system
operational (Cf Autoroot).
4) Through the installation of a modified recovery and from there we move on to the
root file that is usually a zip file to the memory card and it
we install from the recovery.

In Android 5.0 and later, developers have blocked the installation of


easy way to root access, but they enabled OEM access (on some phones
the bootloader is already unlocked, and through here we can do the rest
then the anti-theft protection will be removed which allows us among other things to do
root to the mobile.

To root an Android 5.0, we often need to modify the recovery and from
there we installed root access through a zip file that modifies the kernel.
It happens a lot with Samsung devices that in order to unlock them we must root them.
root access on these devices can be very dangerous during installation, as
we can completely turn off the device.

118
119
15) Releases or Opening of Bands

When we refer to unlocking, unlocking or opening bands, we refer to


remove the blockage imposed by telephone companies on mobile devices
for use with another company, so we can see that when a
A SIM card from another carrier will require a code from our terminal.
liberation that is usually given by our operator or company.
And these devices come with a limited number of unlocking attempts for
prevent users and technicians from starting to guess these codes, if the user
the technician exceeds the number of attempts the device could lock
permanently and we would have to make use of a box or a crack (if it is that
allows).
Many devices today come with an application directly related to
the operators that sell the equipment called device unlock, and these generate the
automatic release after 3 months of use of the equipment with the
operator (At&t, Tmobile, Boost mobile, Verizon, etc) or remotely with the
payment of the release directly with the supplier.
These teams generally end up traveling from one country to another, and in their
Most do it with these restrictions, here we are going to teach you the different ones.
ways we can facilitate the release of these equipment:

1) Through the Manufacturer


2) Through operators such as Movistar, Entel, Claro, Tigo, Concel, Won,
etc.
3) Through online servers that use the Imei code to perform the
liberation.
4) Through programs called Calculators that use the Brand, the
model and the IMEI code to generate the release code.
5) Through the same device, for example by entering engineer mode and
removing the restriction.
6) Replacing the nvram folder by flashing or by deleting it
with the root explorer application.
7) Through the use of service boxes or boxes that eliminate the restriction of the
companies using the same software.
8) Through Box simulators or the so-called Cracks.
9) Through box calculators like Oss Client, Nck, Sigma, etc.

120
121
Opening of Bands through the calculator.

There are some software programs called calculators and some boxes them
they come incorporated, they work as follows; through the brand, the
model and the IMEI generate an algorithm that calculates a code that is entered in
the phone to be able to open the device bands, sometimes an error occurs in the
code but this happens when the IMEI of the device has been changed and because of
supposedly it will not match the brand and model of the device.

One way to open bands on the devices is through the boxes of


service that performs direct release by removing the restrictions imposed by the
operators or manufacturers so that they are not used with other companies.

122
One way to unlock a cell phone from a carrier in the United States, such as At&t,
Tmobile, Verizon, Sprint, Metro pcs and US Cellular; these operators bring a
agreement with the clients, who must maintain a plan for three months
at least with the operator and does not apply to those users who are in
mora with the company or those devices that appear as reported as
theft or robbery.

To unlock, you must do the following:

Connect it to a wifi network

The most important thing is to connect it to a wifi network that has a good connection or a
good bandwidth, to connect with the operators' servers
Americans and thus achieve the unlocking of the device bands.

123
Open the Unlock App Device application

124
In the case of iPhones, servers or rsim are used, which is a sim card that is
connect to the server to execute the band opening through an icidd code,
this sim card has a maximum number of devices to open the bands.

Another thing that should be highlighted is the type of bands that are needed to work.
in your country, for the signal to work perfectly, let me explain, if you have a
A device that works at 850 MHz and you take it to another that works at 2500 MHz will not
neither 3g nor 4g, that's why it's important to know your phone's bands and the area
where are you, below I show you a list of the bands from America.

Argentina - GSM-850 and 1900 MHz.


Bolivia - GSM-850 and 1900 MHZ.
Brazil - GSM-850, 900, 1800, and 1900 MHz.
Canada - GSM-850, 1900 MHz.
Chile - GSM-850 and 1900 MHz.
Colombia - GSM 850 and 1900 MHz.
Ecuador - GSM-850, 1900 MHz.

125
United States - GSM-850, 1900 MHz.
Nicaragua - 850-2500 MHz.
Mexico - GSM 850 - 1900 MHz.
Panama - GSM-850, 1900 MHz.
Peru - GSM 850-1900 MHz.
Paraguay - GSM 850 - 1900 MHz.
Uruguay- 850, 900, 1700, 1900, 2100 MHz
Venezuela - GSM 850, 900, 1800, 1900, 2100 MHz.

15.1) Types of Bands

In the case of mobile telephony, the current use of the 700 bands is defined (a
starting from 2019 with the second digital dividend), 800, 900, 1500, 1800, 1900, 2100,
2600 and 3500 MHz. Each of the frequency bands is intended for a

126
technology, for example, the 800 MHz band was released, shifting DTT to different frequencies
lower rates for exclusive use of 4G.

The mobile phone frequencies or mobile phone bands used in


Mobile telephony today is as follows:

2G/GSM: 900 and 1800 MHz.

3G/WCDMA: 900 (since September 2011) and 2100 MHz.


4G/LTE: 800 (since April 2015), 1500 MHz (coming soon), 1800 MHz and 2600
MHz.
5G: 700 Mhz(a partir de 2020), 1500 MHz (próximamente), 3.500 MHz
(coming soon).

The 1500 MHz band is in a licensing period for use.


coming soon in 4G/LTE services only in the downward direction, like
complement to other 4G/LTE bands (source).

Finally, the 3.5 GHz band is used for WiMAX (IEEE 802.16).

127
16) APN

The APN or Access Point Name is something like the access point to our network or
the mobile data and indicates to the mobile which virtual path it should connect to
internet. Logically, each operator has its own, like configuring the APN on the
In the following graph, we will explain how to configure an APN according to your operator for
activate mobile data.

128
The name can be anything just like the proxy or the port, what matters here
It would be to set the APN depending on the operator and depending on the country we are in.
for example movistar Venezuela, Colombia, Argentina, etc.

Without Apn With Apn

129
17) Network problems

The EFS file

Its full name is: Embedded File System, it is


an area protection of file encryption on the device and contains the
IMEI and baseband information.
In case of a problem with the encryption and protection device, we have to go back.
to download the EFS file from the device, but we will lose the IMEI and we must
fix it later.

2) NV Data File

It is used to fix network malfunctions and the loss of IMEI or IMEI.


generics on devices with unknown baseband.

3) Archivo de Cert (Certificados Samsung)

It is the most important in most Samsung devices from the year 2014 and
2015, where they had high protection in the IMEI file if it is a certificate.
of IMEI
The Cert file can be downloaded from one device and transferred to another.
device. Furthermore, if there is a closed device on a network, it is possible to recover
the Cert file from another operating device and write it to the locked device
for it to work normally, but before downloading the file it must be in
the router (Box) to allow access to Protection Zones It is also useful if
the IMEI is damaged or the IMEI is present but there is no network on the device and only appears
on your screen the famous emergency calls.
Certificates are also used to change the IMEI of a device and thus
remove the report from the phones illegally.

130
4) QCN File

It is a shortcut for the Qualcomm calibration network, it is a calibration file.


of calumics networks, files that we can extract and download again from all
the machines that carry the Qualcomm processor and that we need in the case of
delete the EFS files or the severity of the network failure, such as the interruption
And great care must be taken not to write it incorrectly or mistakenly to avoid problems.
Unknown version baseband

Nvram
It is an internal folder of our device that contains all the information.
about it, the identifiers for components such as bluetooth or the
Wi-Fi card as well as the IMEI of our device and its serial number.
This information is important because if we end up flashing a new ROM on
Our Android will set the identifiers to 0 or some generic ones.
that is to say we will no longer have the same MAC address in the components of
connection in addition to the fact that the display may not work as it should or we lose it.
I blocked the mobile operator's signal due to an error in the serial number of the
terminal or in the IMEI, which is why it is always important to have a backup of this
folder for anything and before getting our hands on our Android.

131
18) Imei

The term IMEI stands for International Mobile Equipment Identity, the IMEI is a
15-digit code that represents the identification of each device or as
For example, it would be the identity card of each person and when you
The device connects to a network and automatically sends this identifier.
To find out what our IMEI is, we can go to the box of our device and
some nook of this must have the IMEI number of our mobile, but this
it is not very advisable. To know our IMEI 100%, the most correct thing is to go to
to our dialing keypad and press this sequence: *#06#, in the
the moment we press the last key, all the digits will appear or we can
check the label on the back of the device.
In many developing countries, thefts are constantly occurring.
devices that the authorities are combating the theft of.
When reporting an IMEI, the device will lose signal, many technicians in the
currently they are modifying these IMEI codes in order to
to evade a theft report and for the device to be usable again in
anywhere in the world.

Hardware IMEI: It is the one that appears printed on the back where it is located.
battery, printed on the cover or appears registered on the SIM card tray.
Software Imei: It is related to the operating system and can be
modified with software programs modifying it in the operating system.

This means that we can have two different IMEIs on one phone, this means
to say that the phone has been modified to remove a theft report or it can
It also happens that the phone's SIM card was changed and it has two different IMEIs.
It may also be that when flashing a device, the IMEI gets corrupted or is flashed.
a backup of software and also copy an IMEI of the device to which
I copied the software.

The IMEI is divided into several fields: TAC, FAC, SNR, and SPARE. The IMEI code
It consists of four parts and follows the next outline:
1) The first part is the TAC, called Type Allocation Code, and consists of 6
first characters (XXXXXX), where the first two digits indicate the
country of manufacture of the equipment.

132
The second part (YY) is the Final Assembly Code (FAC) and indicates the manufacturer.
of the team.
3) The third part (ZZZZZZ), consisting of six characters, is the number of
phone series (SNR).
The last digit (W) is the check digit or Spare, used to verify that
the IMEI is correct.

Some technicians take the TAC and the FAC to generate new IMEI with some.
programs like the advanced imei generator, to remove device reports
stolen.
As we show in the following image, they select a custom process and
write the TAC of the team, that is, the first six numbers and the FAC, that is, the two
the following generate and it implements the algorithm to change the following digits
with a logical sequence.

133
When we have a device that has signal problems and it doesn't pick up a signal.
First, we must verify if the equipment is not reported stolen or missing.
lost, I have known many technicians who have disassembled equipment trying
repair antennas, signal amplifier, they have changed the PA or amplifier of
power and they have asked me what else they could do and I tell them to review
the IMEI and after doing all this, the technicians realize that it was just that
they were reported.
How to identify if our device is reported, there are several websites
depending on your country, I will leave you a link so you can verify the IMEI of
the devices that arrive at your premises:

Venezuela
[Link] It is worth noting that in
Venezuela is not 100% safe to verify IMEI in blacklist, the only way to verify
with certainty is placing a SIM card (Movilnet) making a call and he us
It will say whether it is blacklisted or not.

Colombia
[Link]

134
Peru
[Link]
Chile
[Link]
e&_pageLabel=P39800544561339422564087
Ecuador
[Link]
Bolivia
[Link]
Argentina
[Link]
Brazil
[Link]
Paraguay
[Link]
Uruguay
[Link]
Mexico
[Link]
Panama
[Link]

It is also advisable to change the IMEI to verify if the phone is


reported, as many phones take days, weeks, or months to be
added to the blacklist in each country, that is why this is recommended, later on
I recommend keeping the original IMEI and informing the customer about the issue.
of the device.
Finally, we can observe that some devices may lose this number.
due to an update issue, bad flashing, deletion of files by the
root access, etc; the only thing that can be done to fight against loss of

135
our IMEI number is a backup or copy of the folder in which
it is stored. If you are a root user, I would recommend having in the
terminals a super useful application, it's called Root explorer and to make a backup of the
folder where the imei is located.

In the case of Samsung, they may have the IMEI but it still won't pick up a signal, because
It is advisable to check the status of the IMEI and the baseband, for that let's go.
dial the following code *#0011# on the devices which would be Samsung
service mode that refers to a network test for these devices, one of the
options is the status of the imei, when the imei has baseband issues
It will appear in IMEI status: NG, which means it is corrupted. And it needs to be repaired.
making the device user root and patching certificate or network.

Many devices can end up with a generic IMEI after the band
based there has been modified by inexperienced hands, so it is recommended to have
Be careful when trying to modify the device's baseband.
In the case of the MTK, it is important to emphasize that sometimes it becomes impossible to repair.
the imei of mediatek devices, when we have tested with different
tools and we cannot repair it we will proceed with the following method,
we root the device and install the root explorer application and with it we
let's go to the internal memory of the device and delete the nvram folder, to
we restart and by magic we have the original IMEI again
our terminal.

136
For those who did not make the backup, they can recover it through the boxes.
or the crack that repairs the baseband through copies of
security of other devices (qcn, nvram, nv data, efs, certificates, etc) although
It is necessary to be sure that it is not a physical damage in the RF IC.
To know how to repair the IMEI of our device, it is advisable to identify the
device processor and search the internet on how to recover the imei of our
device.

Another thing to highlight is that through the internet we can


identify if the IMEI of our device exactly corresponds to the brand and the
Model of our team, it turns out that many technicians copy the IMEI of a device.
simple to a high-end team and when we check it in IMEI info we can
observe that the IMEI does not match the characteristics of the equipment.

137
We must also be vigilant in verifying that the devices entering are
our technical service is not reported since when there is an operation
police will find reported equipment you may be arrested and taken to
a judicial process for receiving, modifying, and altering terminal equipment
mobiles, so the first thing we must do, even before issuing the invoice
It is to verify on the website of each country if that team is reported.

In the particular case of Samsung, software problems can arise and


the baseband is generally affected when a custom ROM is flashed or
update from the same phone via Wi-Fi or using the phone's data and it's
update does not complete and the phone restarts losing the imei or it could be that
the IMEI will not be lost but the phone would remain without signal due to damage in the baseband
so it would be necessary to repair the base band, often just by passing one
nv data is recovered, other times it requires flashing, passing a certificate, rooting
And remove the efs with root explorer apk, transfer an efs or use the box in
repair and patch certificate.
Note: the improper use of this information is the responsibility of
technician who performs the imei change following this tutorial, the imei change
it is a crime punishable by prison, I am not responsible for the misuse that
this information is given, it is reminded that this information is from
didactic character.

138
139
19) Google Account Lock

Google has invented a new method to prevent thieves from being able to
access (a copy of Apple's iCloud) to our lost devices or
stolen, a new feature that links our Google account to our Android,
even if a factory reset is attempted, the device will prompt you upon startup
your email and your password.

This Google anti-theft protection, called Device Protection in English, is a


of the many new features that have arrived with Android 5.1 Lollipop, a union between
our Android to the main Google account that is used on the device. From
this way, if a thief tries to erase all the data from our Android, it
you will find a new screen at the beginning that will ask you for the password of our
Google account when you turn it on for the first time. There are several methods to
those users who have forgotten their email or password, the technician receives these
teams must require the user to present the box or the invoice of the device to
avoid working with a stolen device to bypass and remove this protection
we can use:

1) Use of talkback and applications such as Quickshortmaker, administrator of


Google accounts and Remote gsmedge

A) For this method we must be connected to a wifi network, the first thing that
what we must do is return to the main screen, on the main screen we must
activate the talkback in the following way, placing two fingers on the screen
from the beginning until a sign comes out, there we draw an L on the screen to
select the TalkBack settings.

B) With two fingers, we can scroll down to seek help and


comments or privacy policies (some open the browser directly), us
Let's get started with voice or Android accessibility and there a link opens up.
to a YouTube video.

C) We click the arrow at the top of the video, then it opens some
options halfway through the video and at the end, three dots appear, there we select another
arrow to redirect us to a video on youtube.

D) There we go to the top where our face appears.


assume that this is where a Google account is located, there we go and search for policy of
privacy and will give us access to the browser.

140
E) There we search for quickshortcutmaker apk, we download it, we install it and we
we open where it will show all the applications and activities of the system, there
we open in activities the start or launcher, we select it, we give it a try to
it opens the system for us and gives us access to the menu.

We can get it there in two ways or Google Account Manager (administrator


from Google accounts) or with Remote gsmedge.

The first way would be through quickshortcutmaker and the administrator


of Google accounts.

We installed quickshortcutmaker along with the Google account manager (this


It will depend on the version of Android, for example Google Account Manager Android 5,
Android 6, Android 7, Android 8), there we open quickshortcutmaker and search
Google account administrator, let's go where it says enter email and
password, there we open it and tell him to try and he will tell us to enter the
email and password, but we are going to look in the upper left part for about three
points there we give access with the browser, we enter our email and
password reset and done.

1.2) The other way is with the Remote Gsmedge application here in
quickshortcutmaker and we open the home or launcher and here we go into settings,
Let's go to biometric data and security, at the end there are other security adjustments.
we look for device administrator and disable it, we install Remote and
then we go to applications and click on the three dots at the top
left and we click on show system applications, next
we disabled two applications Google account manager and services of
google play, in case the option to disable applications does not appear
We do the following, we open quickshortcutmaker and there we go to activities.
we select the applications, we provide information about the application and there we
we give to deactivate, we go to accounts we add a google account, we go back
and we activated both applications.

After selecting any method, we restart, once added the


At the beginning, we go to settings, account, and we delete the account that we
we add and in settings we reset to factory values and that's it
without an account.

141
Full flashing

It is used for low-security devices that allow bypassing the


OEM lock and the ability to delete the account by restoring the data to its original state.
factory values.

3) Samsung Combination

The combination is installed via Odin, the combination is like a small system.
operation that allows us to enter the settings and there we activate the options of
developer deactivating the OEM which is the bootloader lock and activating the
USB debugging, after that we will flash the official software and it will remove the
Google account.

142
4) Fastboot mode Frp Cmd (mostly spd)

It's quite easy with this method, the only thing we need to do is put the phone in mode
fastboot and select the option for your device.

5) The use of boxes or cracks

It is much faster and is an almost foolproof method, it supports many models of


devices because it is very necessary to have them in technical service.

143
Due to software degradation

There are phones that have Android 5, and just by downgrading the original version to 4, they...
I would eliminate the account since this security does not exist in Android 4, also in the
huawei we can download the security patches and remove the google account.
It is always necessary to investigate since many technicians degrade the software.
Android O security patch in vain since those models are not supported.
and all that work or even the risk of bricking the phone will be in vain. When
we do software degradation we can use methods even manual ones that do not
they could be done with the updates.

7) OTG cable or OTG memory

Through the applications, with OTG memory the explorer will open for us.
files and there we can access the applications and install it without activating talkback.

144
8) Fishing method (sending an email to the owner)

It is used to deceive the owner and make them send their personal data so that they can
enter the password of the same user.

145
9) Voice call or Emergency Call

Sometimes with just a call we can save the contact during the call like this.
be able to enter the phone settings and with this delete the account. Also with
access to the calendar on the same call.

With a blocked sim card

This is a new method that works with the new Samsung models like
the A30 works as follows: we add a locked SIM card to it
the lock pin appears, we proceed to lock the phone and it.
with a key we take out the sim card, unlock it and it should appear a
lock in the top right corner, we select it, there we go to notifications
And adjustments, we go to the Google Play Store, further down it says see all, there we click show.
all applications and there we open youtube in the application notifications, about
And privacy policies, it opens the browser for us, we download Apex Launcher.
we install it and access the menu, there we download the manager of the
Google accounts and FRP bypass, then the FRP bypass opens and we access the three.
points up we access the browser and the rest is the same as the procedure for the
applications.

146
There is also the notification bar method; when taking out the SIM, we proceed to
unlock and quickly tap several times to pull down the notification bar
Remove the padlock and continue with the previous procedure.

Another option would be to exhaust the attempts of the SIM card code with the PUK code and to
the lock will come out next and we continue the previous process, it is important to note that
When we block the SIM card, it will become inoperative, meaning it will no longer function.
what is recommended to do with one that is not working.

With this same method, we can use it on the second home screen and that's it.
connected to wifi, it would be to press next several times until the screen turns
black when collapsing and there insert the blocked sim card, we take it out and quickly
we click accept on the message that the sim has been removed, then we go to the lock
and we select it to display the notification bar and there we activate the
bluetooth and we connect it to some bluetooth headphones, once connected we press
the button on the headphones to activate the voice search of google now to say
through the headphones settings there we go to biometric data and security, to enter
in other security settings and there we look to set windows by activating it, we give it
unlock to unpin to add a pattern and there we return to the beginning us
he is going to ask for the pattern, we add the one we put in and that's it without counting.

147
11) Through a text message

With an application called hustsms or through a message that one can send.
what we receive with the link to youtube or google and there we would follow the steps of
first tutorial. This method will depend on the security patch and the type of
operating system that the device has.

12) Through the emergency call and the calendar

We insert a working SIM card and dial emergency call there.


we dialed 112 and quickly pressed 4 to open the calendar, once opened
calendar we access the plus symbol in the bottom left corner to open some
options where we will look where it says description and there we will write the
YouTube address and we select at the top, once selected we
let's go to that event, we click the address taking us to youtube, they look for where
this is the account selecting privacy policies to access the browser and
we follow the steps of the first method.

148
Combination of methods

This method is carried out for those technicians who have experience in
account eliminations with cash registers, cracks, programs, and manual methods;
it consists of combining two or more methods for the elimination of accounts
many times one follows a tutorial and realizes that this method only goes up to
It is true that I must use another from there on, it has happened to me that sometimes
I even use methods that are not documented anywhere and that little by little
they open up as solutions for other technicians.

Note: it is advisable to ask the customer before doing a hard reset if


remember the email and your password so you don't have to do the deletion
from the account.

It is also worth noting that 60% of the accounts are handled manually, 30%
it comes with a box or boxes and 10% of the phones do not have any type of support
so it cannot be removed with any method or any box.

149
Xiaomi Account or Mi Account

It was created with the purpose of storing customer information in the cloud, but
over time it was taken with the intention of blocking the devices like with the
Google accounts, which have made them one of the most secure devices.
because you have a Google account and also an account with the security of the mi account.

To remove Xiaomi accounts we need an Ultimate Multi tool box or Nck with
a cable and a cable edl to carry out this procedure, many times we must
generate the usb port by doing a test point on the board with an edl cable as
the following image shows it.

150
It is also important to know what MIUI is, this is a version of Android that
has been developed exclusively for Xiaomi devices and this as well
is closely related to its security and the higher the MIUI
It will be more difficult to carry out the repair of the equipment; for now, we are going for the MIUI.
11.

151
Icloud Iphone

It is a device protection method that links it to an email.


electronic in case of theft, burglary or loss, so far it is one of the most
market insurance, which turns into devices with large sales as
they prevent devices from being used after their loss, it also prevents that
the people who steal the device access its information.
It was created with technologies that meet security standards of the
industry. In addition, it employs strict policies to protect information and is a leader
in the sector, as it integrates technologies aimed at preservation of the
privacy, such as full data encryption.
Icloud is a protection that Apple devices have to prevent them from
they are stolen and used by other people, this is a pretty good security
and it specifies that each time the device is turned on, it will request the email and
password with which the device was associated with the Apple account.
Never share your Apple ID password or verification codes
temporary with no one. Apple will never request this information to provide you
technical support.
Use two-factor authentication to protect your Apple ID. Get more
information about security and your Apple ID. If you think your Apple ID has been compromised.
risk, change the password immediately.
Many hackers create pages similar to those of Apple to send an email.
to the victim and tell them that they have recovered their device and need their email and
your password to verify that it is the same device, this scam is called
Phishing.

152
Many technicians and users fall victim to scams by supposed technicians who
They promise to remove the iCloud in 24 hours, it is almost impossible to delete the iCloud so...
We must not fall for this type of scam.
There are several methods to remove iCloud, one is through hardware, it would be
removing the NAND memory and reprogramming through a reader
EPROM memory, some place a NAND memory from a donor, like this
show the following image.

153
The other way to remove iCloud would be through functioning servers.
directly with Apple servers but the device must be with the IMEI
clean, that is, unreported, the other is through a command console in Python
from a MacBook computer, these commands in that programming window
he is going to bypass the iCloud account on the iPhone, the problem is that the
the device will lose signal.

Currently, methods have been developed to use on Windows and leave them with signal,
One of them is to start with a bootable memory of checkra1n and then
we do the second step directly from Windows, the signal will depend on
how the bands were opened, if the phone is directly from an operator like AT&T
the metro pcs, if the bands were made with an rsim or by server, etc.

154
22) Remove password or user code from
Iphone

The first thing we do is download and install 3uTools on the PC, which is the
program we will use to restore our iphone to its factory settings,
It is important to note that when starting the device, it will ask for the iCloud account.

First of all, even though you do not use iTunes, it is recommended to have it downloaded and
installed on the PC, this would help with the process and would be necessary to take it to
cable. It is also recommended to have a backup made to not
lose no information in case of restoring the device. Download and install
iTunes. You can download the program from the OFFICIAL APPLE PAGE but if
If you have Windows 10, you should download it from the Microsoft Store.

Access the 3uTools program, connect the device, and click on the section of
Flash and Jailbreak
Download the latest version or the one we want
restore/update (you will only be able to restore or update to versions that Apple
is being signed up to date). The download is done in the "Download" button of that
section. We can click on 'Import' in the case of having the downloaded version in the
PC, with the phone turned off we place it in DFU mode in the following way,
we hold down the home button and without releasing home we connect the usb cable
to the computer and it will be left to us as follows:

155
Click on Flash and wait for the restoration.

156
157
Jailbreak iPhone
It is defined as the method used to bypass security measures.
imposed by Apple on its operating system and to be able to install, modify, and change
anything about the system. Different developers have dedicated their lives to
thoroughly analyze Apple's software code to see where they can
colarse. A veces se realiza con mucha facilidad y en otras ocasiones ha costado
too much, but in the end there has always been a way to install in the
iPhone as many applications as you want without having to stick only to the ones available
in App Store.

How to do it in iOS 11, 12, and 13 in a few brief steps

LiberiOS Jailbreak IPA from its official site and Cydia Impactor is available
for macOS, Windows, Linux (32-bit and 64-bit).

2) Connect the iPhone, iPad, or iPod touch to your computer with the charging cable.
the LiberiOS IPA file.

3) Start Cydia Impactor on the device and your iOS device will be detected.
Drag the LiberiOS jailbreak IPA file that you downloaded.
previously to your UI. Enter the Apple ID and your account password.
Apple developer when requested, and wait for Cydia Impactor
Download the signed application on your iOS device.

158
4) Once LiberiOS jailbreak has loaded, start the application
Settings and go to Settings > General > Profiles and Management
devices (in some iOS versions it may be General > Management
of devices).

5) Tap the profile associated with the LiberiOS jailbreak application. Tap Profile of
Trust and confirm.

6) Launch the LiberiOS Jailbreak application from the Home screen and tap the
button Do it to start the jailbreak process.

After a while, the screen that should inform us should appear.


that the process has been completed successfully.

159
24) Security

Mobile telephony is characterized by being a widely used communication system.


spread due to their easy access, connectivity, and versatility. The phones
smartphones have operating systems similar to a
computer, and they have the advantage of using geographically distributed networks to
global level. This makes them vulnerable to risks from viruses or attacks
computer scientists.
Here we can highlight several security flaws in Android, you may wonder
because we only talk about Android, because it is the most popular operating system in the
world, which makes it more attractive to hackers and virus developers
IT professionals. Next, I will show you how to protect your clients from the
system vulnerabilities that hackers use.

Things that technicians should try to avoid

1) Do not enable in settings the installation of applications from unknown sources.


unknown
2) Do not activate developer mode and even less active debugging
Tell customers to avoid accessing pornographic pages that are the
that fill mobile devices with viruses and malware.
4) Remind customers that they must access from their browser on sites
insurance
5) Also inform customers to avoid entering on the phone in places
of advertising and misleading offers like winning a visa to the
United States
6) Remind the customer to set an email and password for the device.
7) Set a password or pattern that is not common or easy to guess.
decrypt
8) Avoid installing applications from unknown sources.
9) Do not access unknown Wi-Fi networks.
10) Do not open email from unknown people
11) Having a good antivirus installed
12) If the device has a fingerprint reader and/or face detector, activate it.

160
25) Use of Boxes or Dongles

The difference between a box and a dongle is immediately noticeable in the shape and
size, the dongles are very similar to a pen drive or a USB memory, the boxes
They have connections for UART cables and USB inputs for different types of work.
The box is an electronic device or gadget that contains algorithms.
programmatic tools designed to flash, unlock, repair IMEI, read passwords, read
or remove lock patterns, reset the device, among others. It has a
interface on the PC to allow executing all these commands, so that the
the computer must have the correct drivers installed. These devices
service contains the following cables:
USB - to connect it to the computer;
UART/Service - to connect devices via the COM port;
USB Hub - to connect other USB standard devices (for example, cards
from memory, etc.) except for phones;
JTAG - to connect devices via the JTAG interface.
Mostly, the release boxes also have an integrated card reader.
Intelligent. A smart card protects against unauthorized use of software and, in
the case of necessity serves to authorize oneself in developer servers
of the firmware.

The smart card or intelligent card is a SIM card that connects to a server and
it's practically the life of the box, in many cases for making the remote ones
suppliers of the boxes block this Smart card.

Generally, boxes or dongles work in the following way:

161
We select the processor, brand, adb method or fastboot.

We select the port (adb, com, modem) to connect the computer with
the mobile

162
We select the action we want to execute, such as release, repair.
IMEI, read pattern, remove user code, etc.

And finally we execute.

163
It is very important to remember that there are different ways to connect the equipment to
la computadora en unos casos fastboot, en adb, apagado, apagado presionando
lower volume and connecting the usb cable, without battery, turning off by pressing
both volume keys, without battery pressing both volume keys,
turned off by pressing the return key, turned off with the call key, turned off and
pressing 5, etc.
To know how to connect your equipment, it is good to turn to Google and check how to do it.
connect it, in the case of simple key spds it is important to emphasize that not
sale information on the network, so they must try different combinations like
connect the device and press the down key, menu, #-0-*, 7-8-9, etc.

164
165
Release boxes or liberation boxes as they are known in other countries are
essential if we want to have that extra in our workshops the most famous
son

Sigma box: it is the best when working with Qualcomm and MTK phones.
multi-brand but does not work with Samsung and LG models.

Z3X: its Samsung Tool Pro interface is extremely easy to use, it has a
software support and excellent combination, she is an expert in SAMSUNG and LG.

Octopus box: it is one of the most used for work with LG and Samsung devices.
it has customer support software support we have the option to have them
lite versions (Dongle) and with Jtag.

166
GCprokey: it is excellent when it comes to complementing the first two, it is multibrand.
we can make all the brands of cell phones such as Samsung, LG, Alcatel,
Huawei, Zte, Htc and Motorola.

Nck: One of the favorites for working with MTK cell phones is multi-brand Account
with the functions of working with all other mobile phone brands.

167
Miracle: it is a universal tool, specially designed for flashing,
repair and unlocking of the vast majority of Chinese mobile phones. Miracle
Box allows for flash reading/writing, IMEI repair without flashing the device.
device and other technical service operations for cell phones based on the
supported processors.

Falcon: it is a next-generation release box, designed for repair.


mobile phones from brands HTC, BlackBerry, Huawei, Samsung, Qualcomm, ZTE
LG and others.

168
Box Crack

They are programs that simulate the use of real boxes but with many
limitations, A hacker is a patch created without authorization from
program developer and the one who modifies it with the aim of copying the
behavior of the original software.

Due to the increase in piracy worldwide, large companies have


software applies a series of restrictions on the copies that are distributed with
the purpose of preventing the indiscriminate copying of your programs. The crack eliminates
those restrictions.

Most cracks have viruses that can affect your system.


computer, but if you still want to use the cracks, you will have to deactivate the
use your antivirus, I recommend installing all the programs and lastly I install
a computer freezer, I recommend either Deep Freeze or Shadow
Defender.

169
Boxes without a box

Currently, we can observe that for developers and owners of


the companies that develop these boxes realized that it was better to sell
the programs with a license that could be used online and this was more
economic than producing the boxes, one of the first to start with this is the
The Oss Client and the most famous in using this method is Chimera Tools, this type of
they call this service box without box, generally these services are paid annually
and does not require credits or anything like that, the Chimera tools is the one that supports the most phones.
currently supports and the one that provides the most development and updates to its
users.

170
171
28) Online Manufacturing Servers

In the case of Samsung, to be CPID, only Samsung or a Samsung technician.


with a GSPN account that is set as the primary server of Samsung where
certificates are generated for all Samsung devices and the repair of
Remote teams must be authorized by the same company, there is a
way to access these servers but it would be by purchasing a franchise but
this would be very expensive and only people with a lot of money could access it.
platforms, one of these that has bought the franchise and being one of the most
reconocidos en el mundo del software es Imei Guru.
Another way to access these platforms is if you are an authorized technician of
samsung, which would give you access with a username and a password to log in to
this platform, the most famous and most used platform is that of ANYCLIENT
used through the consumption of credits.

A very commonly used online server is the Motorola Tools Server, which is a program that
Motorola employees sell directly for the repair of their equipment.
but that they can be sold or rented using the credit modality and
that would start from the e5, g5 models up to the most recent ones, this one brings
band unlocking or opening service, imei repair, removal of
Google accounts, among others, and the most important thing is that the service is done automatically.
IMEI number of the device without the need to connect it to a computer sometimes only
A code generated by the server needs to be entered.

The other server corresponds to the Huawei ones with the FRP key or the online Huawei unlock.
what is used to delete accounts via codes, online IMEI repair
and fast online band opening.

172
Virus or Malware

Viruses and malware are software or programs designed to attack the system.
operational with the aim of corrupting the system or stealing information from
device, generally viruses or malware disguise themselves as files of the
system to trick the operating system, mobile device malware
It is a great company since Google would have to invest in developers to
to combat this threat, developers take advantage either due to lack of
prevention or by bad luck, to carry out a cyberattack on your smartphone. The
security threats are constant and to prevent them the first piece of advice is
make responsible use of your devices.
Security on mobile devices is a matter of utmost importance for
companies and users. And many more if we take into account that smartphones
they are in the crosshairs of cybercriminals and virus developers.
The most well-known is the so-called porn virus, which takes advantage of the activation of the
configuration of unknown sources to start installing applications from
pornographic origins using a server taking advantage of the internet connection of
device, installing several applications putting many in the background and
causing the phone to become very slow.
To protect clients from viruses, the first step is to deactivate the applications.
of unknown origin, the second would be to download a good antivirus from the store
to avoid contaminating the device, another is to avoid installing applications that are not
in the official system stores, disable debug mode, do not connect
unknown wifi networks, avoid opening advertisement links presented from the
browser and finally avoid receiving emails from recipients without
senders or unknown ones.
How to proceed if we are already infected, the first thing is to download an antivirus, if
this doesn't work we can use programs or boxes specialized in eliminating viruses and
If this doesn't work either, we need to flash and then perform a hard reset.
complete.

173
174
28) The application has stopped

If you have or have ever had an Android device, you might have seen it in your
Unfortunately, the application (...) has stopped.
terrifying us terribly, if you have received this notice you have wondered what it
can you explain why this annoying notification has happened.

Why does this notification appear?


Due to contamination by viruses or malware.

System Errors.
An application was removed from the system due to root access.
Due to the installation of a corrupted application.

For a custom rom.


Incompatible applications with the operating system.

What can we do to prevent this from happening?


Do not install applications from unknown sources.
Avoid installing unofficial operating systems
Have a good antivirus.

175
Do not access sites with advertisements.

How can we solve this problem?


Restart the device (turn it off and then on again).
Examine with a good antivirus.
Clear the application cache: Settings > Apps > Application Name >
Clear cache.
Force application detection: Settings > Applications > Application Name >
force detection
Delete application data, note that all our settings will be deleted: Settings >
Aplicaciones > Nombre Aplicación > Borrar Datos
Reinstall the application: Settings > Applications > Application Name > Uninstall.
Then go to the Google Play Store to install again. This will download the version.
more current, where there may be no issues.
Clear the cache from recovery.
Update the app from the Play Store.
Perform a hard reset from the settings or through recovery.
Reinstall the operating system.
If none of this works, it's most likely a hardware error.
related to the eMMC memory, but we will be addressing that later.

176
29) Requirements to install software

To carry out each of the installations, we must ensure that we have


these three things that we need for our installation are installed
any operating system.

Driver
We need to have all the drivers installed on our computer in order to
flash any type of device.

2) The Software Installer


We need to have each of the device installers saved.
our computer to perform the installation of the operating system.

3) The Software
It is strictly necessary to download or transfer the system to our computer.
operating system that we previously have saved on our hard drive.

Next, we will show you how to flash or install the operating system to
each of the different cell systems and features and tricks to be able to
make the correct installation of each of the operating systems

177
29.1) Software installers

Blackberry Quick Installer


It is easy to install, this is an .exe file and it runs as a program.
computer, but to install the operating system you must have it installed
BlackBerry Desktop Manager to install the drivers, the installation is very
It's intuitive; you just need to double-click the file and connect the device.

178
Sp Flashtool

In the MTK processors, you download the operating system, which is generally several.
files, we click on where it says scarter loadin and select one with the name
from [Link] and we go to where it says download or firmware upgrade, we click on it
any option and we connect the powered-off equipment.

The operating system comes in a txt extension that is a notepad, and the team
It must be connected turned off or is there also a trick when it is not recognized that
it is to connect without a battery and then connect the battery, this will be identified
with the USB VCOM preloader driver and the official MTK installer is the SP Flash Tool,
that doesn't mean it can also be flashed with another program or box with
a different extension like the .bin of miracle or the skf of sigma.
This procedure must be performed with 50% battery and we must verify that
the loading dock is in perfect condition.

179
Qualcomm

To download the software from this installer, we must select those that have
XML extension, we click on browse and look for the XML file and click on download
and we hope it ends.

180
Odin Samsung
Samsung operating systems come with a .tar or md5 extension,
new cell phones come with a differentiation by binary type, it is important
know the type of binary of the cell phone to flash in order to download the operating system
suitable; how to know which binary to use here I explain:

If by chance the team does not turn on, we can normally check in the
label or you can also enter download mode and check its model and binary.
The first thing is to bring the equipment into download mode, and this is done as follows
We press the power, volume down, and home buttons all together with the phone turned off.
at the same time we plug in a USB jig and it will look like this:

181
In the top left corner, we can see if the device is connected, more
below we have the options for autoreboot, repartition, and f reset time; no
we will select the re-partition unless we have memory problems and
we would like to flash the memory partitions with a pit. We are going to
select the file(s) to install as the software can be a file that
it would be the pda or the 4 files plus the pit.

.pit is a file that formats and reconfigures the terminal partitions and also
the flash counter resets. It is very unlikely that they will need to use this option.
The Ap or Pda is the Android system that contains almost all the information of
operating system.
The Phone or Cp is the baseband or modem of the phone (everything related to
with the signal and the IMEI).

182
The Csc is the Customized Product code and is specific to each ZONE
Geographic and its Operators. Contains specific software for the region where it
it will market the terminal, the configuration of the APN, data connection, MMS and
other configuration of each Operator.

After selecting the firmware, we click start and under no circumstances should we
to unplug the device from the cable that connects to the computer or the phone
it could enter into a hard brick or soft brick that would be difficult to repair.
At the end, to perform a clean installation of the system we must perform a hard reset.
reset.

iTunes iPhone

We can carry out the update or repair of the operating system


directly from the Apple server and the time of the update will depend on
your internet speed.
The other way to install iOS on your iPhone or iPad is by using the IPSW files.
iTunes, that is, install it manually. That is to say, it will not perform a
clean installation and you will notice this because the device will not restart.

183
Place the executable iOS IPSW file in an easily locatable place, for example,
on the desktop and make sure to have the latest version of iTunes.
While in iTunes, we press SHIFT + click on the 'Update' button and
we select the path where the software is located, press update, we wait for
that it restarts and we will have finished the process.

We can also install the operating system through the program.


called 3Utool which for me is better because if we disconnect the device it still continues.
downloading the operating system instead on iTunes the device every 20 minutes
It is deactivated from DFU and restarted, and iTunes pauses the download, and we have to go back.
to connect in DFU mode to resume the download.

3Utools iPhone

This software is the best for flashing iPhones, it is also very good for
download the firmware without needing to keep the phone connected
keep downloading and save the firmware in a folder so that there are no
need to download them again, make a backup, jailbreak, etc.

184
Phoenix Nokia Simbiam

The software for Nokia Symbian is sought by the type of rm and the model of
Once downloaded, we go to the local disk C, we look for files of
program, Nokia, Phoenix, Product and we place the software in that folder.
Open Phoenix, go to Files, then Manage Connections. Here, with the dates.
that are highlighted in the image, leave 'NO CONNECTION' at the top,
for this, select this and raise it with the arrows I mentioned, then
Apply.

Now they go to File again, then to Open Product, and a window will appear.
like the following image; here you look for the RM of your cell phone in the section
for example RM-342 for N78 and so on. In case you want to make a change of
So look for the RM of the firmware they are going to put, not the one they have.
Currently the cell phone. After they have chosen the RM, they will see that others come out.
menus up. So now go to Flashing, and then to Firmware Update. Here
a small window will pop up like the one you will see below. First,
they click on the 3 dots in the Product Code section and choose the variant of

185
firmware that they are going to install with its corresponding product code. If they have downloaded with
Navifirm does not require selection, just choose the only one that is available because that
"Filtering" of product codes was already done when downloading the firmware.

Then check the Dead Phone USB Flashing box, click on Refurbish,
After a couple of seconds, a notification will appear asking them to press the button.
Power of the team. Well, here you press power but just press it and
release it immediately, do not keep it pressed like when you turn on the phone,
they just press and release it, because if they hold it down for too long, the phone
it can be turned off and the installation would suddenly end.

Then, the typical sound of when one connects a hardware (like a


pendrive for example) At that moment, the phone screen turns white and
Phoenix comienza a hacer su tarea, que es, reinstalar el firmware. Lo dejan un par
After a few minutes, the phone should boot up and turn on.
normally, you will see the following message on the screen, indicating that the
process finished successfully.

Alcatel Mobile Upgrade


Download the exact version for your device, select the model, and give it
update and connect the powered off phone, the program connects to the server downloads
the software and installs it on the device, this process is quite tedious, so
They must keep it connected without removing it until the process is complete.

186
187
Upgrade Download spd Speadtrum

The firmware of the speadtrum processors has a .pac extension, which is


select by clicking on the gear and we look for the path where it is located
operating system, after the operating system is loaded we click on start and
we turn on the device by pressing volume down or volume up only
one of the two depending on the device, wait for the process to finish and that's it.

188
Sony Flashtool

We need to download the Flashtool from this page, we will install it.
Now we download the firmware for our mobile using the Flashtool.
Now we will place the firmware we have downloaded in the following folder
C:\Flashtool\firmwares, we will unzip the files into a folder and we
the firmware that we need to install will appear. Once we have placed the
firmware in the corresponding folder we will open the Flashtool tool in the
32-bit or 64-bit mode depending on the computer we have. Once opened,
we will give the lightning symbol and choose the Flashmode option

189
A window will open where we must choose the firmware we have downloaded.
previously and that we will have placed in its corresponding folder.

190
We will check all the wipe boxes, by default they are already checked so that the
we will leave it as it is. This will erase everything except what we have in the
internal memory, by performing a full wipe we will achieve a clean installation and with
for better mobile performance and without bugs. Now we need to go to the mobile to
Settings/Developer options/Enable USB debugging, we will enable it and
we will turn off the mobile, We click OK in Flashtool and when it asks us to connect
we will connect the mobile to the PC by holding down the volume down or back button.
The flashing will begin, we must not disconnect the mobile under any circumstances.
until the process finishes. When the flashing is complete, it will tell us that the mobile will go
to restart, but it doesn't do it, we will disconnect the mobile from the USB and turn it on.

191
LG Flashtool
We download the firmware of the LG phone we want to flash, this software
they come with a kdz extension and we can download them using the following
programs, all we have to do is enter the model and the device's IMEI, this is
It will connect to a server and proceed to download it to the PC.

We open the lg flashtool program and select 3GQCT in select type and in the
In phone mode, we set emergency and finally select the kdz, and we
we give normal flash.

192
They select a different country and choose the Spanish language and click ok.

193
If an error occurs while installing, we move the window and we will observe.
that the installation continues, we must not close the process or disconnect the equipment
until the installation process is completed.

Another program that we can use and is quite good is lgup.

194
Install LG UP on your PC.
Download the [Link] file so that it recognizes the LG properly.
Download the KDZ file, which is the stock firmware that we are going to install.

You need to create the common folder in the specified path in the link and put
inside the [Link] and the KDZ (do not extract to DZ or it will give an error at about 4%).
The folder where those files need to be placed is:
C:\Program Files (x86)\LG Electronics\LGUP\model\common

With the phone off, we will enter Download Mode using the volume button.
up and connecting the cable from the computer at the same time. It is not
It is necessary to unlock the bootloader again to install the stock firmware. This
it can be useful if you are thinking about installing a custom recovery in the future.

Now it's time to start the LG UP program. If it doesn't detect it properly:

Check that the two files are located in the correct folder.
Restart Windows.

We are now in LG UP, now we have to follow these steps:

In File PATH, put the path of the KDZ file and select it.
Then we press START.

In the following, you will see how the process is progressing, under no circumstances
You must stop the process.

195
Nokia Software Recovery tool

We connect the device to the computer, and the program will download the system.
operational through the server, it is strictly necessary to have a connection to
internet. The program executes the entire process.

196
Mi Flash Tool Xiaomi

This is the software installer for Xiaomi and you click where it says select.
locating the folder where the software was downloaded, we select it and then
we refresh so that the device detects us, but for it to detect us we must
connect it in two ways in fastboot mode or by doing a test point and then
we click where it says flash and it will show us a progress bar at the bottom
upper left. Sometimes it can give us an error when trying to flash, what we should
the first thing to do is change the adb driver, if this does not work we must change the
name of the firmware folder with a simple name and no spaces or
characters and the last thing would be to change the version of the software installer.

Update via Micro SD on Huawei

One way to install the operating system or upgrade our operating system,
In Huawei, there is a method that would be to place the dload folder on the micro card.
press and hold the power, volume up, and volume down buttons at the same time
time and would enter flashing mode.

197
Another update option is through [Link] and we flash it from the
recovery selecting install update from the sd.

Universal Flashing Methods

1) Update via Recovery

One of the ways to flash our device is by entering recovery and from there
there enable fastboot, adb or direct flashing from a zip file sometimes
called [Link], to install from recovery we must have at least
a 4 GB memory, it happens that sometimes phones do not recognize the memory
or the micro sd port is damaged what we must do is transfer the software to a
USB OTG memory or USB with an OTG adapter and we flash it as shown.
next image:

198
2) Update via Fastboot Method

Another way to flash is by putting the phone in fastboot mode and using a console.
by command or through the minimal fastboot and adb kit and with some lines of
command we can perform the installation of the operating system, we use the following
command (fastboot devices) to see if it recognizes it, after that we go and
we type the following command fastboot flash and select the file path
We drag the file to the command console, this flashing method
it does a lot on Motorola, Asus, and Nokia.

199
3) Update via ADB Method

One of the methods is through recovery by entering the update through the
adb, we open the minimal adb and fastboot console and type the following
adb sideload command, we add the file in the console or we give the path where
the file is there.

200
201
30) Reviving Huawei with Software Issues

In the case of phones that do not have a micro sd memory slot like in the
in the case of the Mate 10, we move the dload folder to a USB memory, and through
from an OTG adapter we flash the Huawei from recovery mode
pressing both buttons and the power button.

202
203
This method is for those phones that have access to recovery.
customized that has access to connect to the huawei server to
download and install the operating system, it runs with the phone turned off
and connects with the phone by pressing the volume up button, there
we connected to wifi and updated from the same phone.

3) Via Fastboot
Esta es una de las opciones que podemos utilizar para revivir un huawei, para esto
we need boxes or crack like eft, mct, sigma or nck; the first thing we have
What to do is place the phone in fastboot mode as follows,
we turn off the phone and connect to the computer by pressing the key of
volume down while in fastboot, we go to the box and select the
[Link] that is generally found in the dload folder where it comes from
software for the sd, we give it a flash and wait for it to finish flashing.

204
205
206
4) Via Test Point

It is one of the most used and one of the most effective; the phone is disassembled and it
proceed to make a small short on the card connecting two points on the motherboard
to generate a connection port named Huawei usb com 1.0 so that through
from this, the operating system installation can be carried out.

207
208
31) Encryption Error

This error is defined as the encryption of the operating system data due to
software errors and/or hardware errors, this data encryption makes it that
it is impossible to load the operating system, errors generally occur in the
system of the operating system, every time you start the device it will not enter it
system but it will give us an error on a screen with some letters as shown
in the images, it gives us access to recovery but when we perform the hard reset
nothing happens most of the times.

The first thing that needs to be mentioned is that this error is due to problems with
the eMMC, that is to say the internal memory of the device (where all the data is stored)
information related to the phone's operating system) many times it
repair by doing a hard reset of the device, other times it is necessary to install the
operating system and restore factory settings to repair and finally
replace the eMMC memory and this is caused by two reasons the first to
software issues and the second due to physical problems, meaning the eMMC is
corrupted or damaged, the second being the most significant cause, that is, not all the
The team will leave using reballing or reflow.

209
Reviving mobile phones with Mtk processors

Requirements:
1) The firmware of the equipment
2) SP Flashtool with the exact version for your device
A cable at least 6 cm
4) Screwdrivers
Heat Station, Soldering Station, Soldering Iron and Tin
6) Select a well-lit site
7) Have a personal computer and the battery lasts at least 30
minutes

Explanation:
It is an emergency method that is carried out when the equipment does not turn on due to
a bad installation of the operating system, due to formatting in flashtool, some
installation of an incorrect operating system; with the connection of points KCOL0 or
COL0 what is the + of the connection to the usb and any ground point on the motherboard
What can be the GND or any can connected to the board that causes it to
activate device recognition, since after the brick the device loses
the connection with the PC, after this we will be ready to perform the flashing.

Procedure:
The first thing we need to do is disassemble the equipment and locate the KCOL0 point and
we proceed to solder the KCOL0 cable to GND or any ground available
contact with the motherboard to activate the COM MTK, VCOM port,
PRELOADER, etc; the most advisable thing is to try to keep the driver.
PRELOADER that is suitable for flashing, it is necessary to verify in
the device manager as shown in the following image:

210
This is how the driver should be installed on the computer in order to perform the
Flashing, if you don't know how to access the device manager, go to start.
And you click, search for computer or my pc, right click on computer and search.
properties and a window opens, there opens the device manager and
busca los puertos COM y LPT; si no tienes los driver instalado aquí te dejo un enlace
for you to download them:

This is the connection of points KCOL0 and GND or Ground

211
212
Once we have performed the test point connecting the two points, we proceed to open.
the SP FLASHTOOL and select the operating system in the box where it asks
In the scatter-loading, we select our operating system and deselect
all the items, we will only select the preloader, (NOTE at all times during the process
The test point must be connected; otherwise, it will not work. You will only be able to disconnect it.
when I finish flashing the preloader); as shown in the following image:

Next, after finishing the flashing of the Preloader, we disconnect the


cable and we assemble the equipment and proceed to select in the flashtool in the
Loading scatter box the complete operating system the only thing is that we are going
to deselect the preloader as shown in the image:

213
There we flashed the equipment and it will be installed at 100%, totally.
functional, we would only need to charge well for our work.

Note this will not work if the team has damaged EMMC memory, for this
It is always good to do a memory test in the flash tool after the test point.
check nand and emmc as shown in the images:

214
215
33) Revive Samsung via Usb Jig

One of the most common problems with Samsung is damage to the system.
operational caused by poor handling, by a failed update or by a
bad flashing, all this will cause the operating system to fail leaving the
dispositivo en el logo o prendiendo directo en modo download (Soft brick) o que el
device does not turn on in any way (Hard brick). There is a way by
which we can force the device to enter download mode through
from a USB jig, which can be of industrial or professional manufacture and we have the
homemade.
To make a homemade USB jig we need to use the following components:
1 resistor of 300 kΩ or 3 of 100 kΩ arranged in series with 5% tolerance.
A V9 micro USB cable
Soldering iron
Tin
Flux or solder paste

What we are going to do is cut the USB cable at the end where it connects to the port.
of load to expose the wires for placing the resistance on the wires
number 4 and 5 remaining as follows:

One of the most common problems in Samsung devices is damage to the system.
operation caused by improper handling, by a failed update or by a
bad flashing, all this will cause the operating system to fail leaving the
device in logo or directly turning on in download mode (Soft brick) or that the
Device does not turn on in any way (Hard brick). There is a way through
which we can force the device to enter download mode through
from a USB jig, which can be industrial or professional grade and we have the
homemade.
To make a homemade USB jig we need to use the following components:
1 resistor of 300 kOhm or 3 of 100 kOhm placed in series with 5% tolerance.
A micro USB cable V9
Soldering iron
Tin
216
Flux or soldering paste

What we are going to do is cut the USB cable at the point where it connects to the port.
for loading to expose the wires to place the resistor on the wires
number 4 and 5 remaining as follows:

Now soldier, we will have to protect the components.


resistance so that it stays like the one we see in the
image on the right, after this we connect it to the
team and this device is going to cause a
small short that will activate the download mode in the
Samsung devices, at interest, force you to turn on in that
way and after this we can install the system
operational without any problems.

Note: the battery should not be stuck and should be well charged, I recommend
put it in the power supply, since many times when they are bricked
They drain the battery very quickly and do not allow the battery to charge, leaving it like this for a while.
Some days the battery gets stuck and you will have to detach it from the power source to put it on charge.
a universal charger.

217
34) Most common mistakes made by technicians when
refer to the software

I am going to make the software, only programmers make software, the technicians
we just installed it.
I am going to update the software, what we do is reinstall the same version of
operating system that I had.
3) Not backing up customer information.
4) Not informing the customer that the installation of an operating system may be at their own risk.
for eMMC memory errors.
The phone won't turn on, the board is burnt, the logic board burns out by itself.
when it catches fire.
The phone is very slow, or rather the phone is very heavy; could it be that it ate?
a lot and gained weight.
I had a virus that turned the phone off completely, viruses do not turn off a
phone completely.

218
I installed the software and the IMEI was changed, most software does not do this.
And if he does, we must repair the original IMEI.
9) Do not deliver the invoice.

35) Decipher or eliminate user codes,


lock patterns and passwords

One of the most common problems of the


clients forget passwords or patterns, in
In this case, we are going to explain how to eliminate
these blockages generated by clients
forgetful, in the first case and it is the easiest
it is the one of those with low security that with
just doing a hard reset wipes everything
type of restriction through recovery, which
we can enter through a combination
of keys with the phone turned off, we press
at the same time volume up and power,
volume down and power, volume up +
volume down and power or it can be home +
volume plus and power. If we follow the steps
a window will correctly appear as
This, what we have to do is navigate with the volume keys and select.

219
the two wipes, wipe data/Factory reset and wipe cache partition, we select reboot
system now and ready phone unlocked.
If the device is Mtk, we can read the codes through a box.
we select the processor in the menu window, we click on service and
we place Read Pattern Code, finally we press start and connect the equipment
off and will give us the lock pattern through numbers as shown in the
image.

If the device is in debug mode and rooted, in which case it is not rooted.
it can be done with kingoroot, the important thing is that the device is in mode
debugging and whether the debugging permission and root had previously been enabled,
if the device is in that debugging mode we will be able to read the pattern, code of
user and/or passwords of any device regardless of its
processor, it is recommended that the devices that arrive at the technical services
The debug mode has been activated and accept the permissions so that when the client
if we forget any of the phone's locks we can access the device
without deleting the customer's information.

In the following image, we can observe how the blocking patterns are read.
through a service box.

220
We also have the use of the boxes, such as the eft dongle that reads
passwords or patterns through the MTP storage driver or also with
the ADB to decrypt or remove patterns or passwords is one of the best
to avoid deleting customer information.

221
222
In the case of Samsung, we can remove lock patterns or passwords.
through a modified recovery or a TWRP (Team Win Recovery Project), they have
When mounting the data partition, it is preferable that the TWRP or the recovery has a manager.
the file explorer with the ability to access system files, there
search for and delete the following files (it is worth noting that it is also
It is advisable to make a copy of the files on the micro SD card or on the memory.
otg)
[Link]
[Link]
[Link]-wal
[Link]-shm

If it is a numeric, alphabetical, or alphanumeric password, we must delete the following:

[Link]
[Link]

At the end, you just need to restart the device and you're done.

Another solution would be to make a backup with Samsung Kies, do a hard


reset, remove the account and back up the information again.

223
36) Insufficient Memory Issues on Android

Before we start, we must differentiate the types of memory in devices.


mobiles.
1) RAM memory has nothing to do with storage but with
processing speed of information.
2) EMMC Memory is responsible for storing all the information of the software
on the device, it has nothing to do with storage.
Memory ROM has to do with everything related to storage.
information including the operating system, when buying a
device or install applications we must be very attentive to the
capacity of our ROM memory, sometimes when reaching the maximum of our
The ROM memory will display a warning of Insufficient Memory and this problem will not
it is solved by freeing up storage space, it can lead to
collapse of the operating system.
4) Micro SD memory is an external storage memory, which
it collaborates to store information outside of the ROM memory, when the
the micro SD memory is storing information causing the memory
the internal memory was freed by accelerating the device. To store exclusively
on the micro SD we need to go to settings, storage and select
as default storage the memory card.

The first thing is to remember that one of the


problems of phones with memory
insufficient are the applications, there are
phones with very limited ROM memory
like 512 mb or 1 gb including the system
operational, which does not allow the installation of
one or several applications, so that
recommended to go to settings, applications, and there you
show the amount of available memory and
this way you will be able to know the number of applications
what can we have on the device

Another thing to keep in mind is to disable.


automatic updates in play store or
in the corresponding store of the system
operational, in order to prevent the team
reduce the internal storage; if the customer has already completed the update or is

224
executed the updates
automatically we should go to the
settings, applications and there we go
application by application and
we uninstalled the update of the
application unless it is
strictly necessary as that of
Google services, WhatsApp,
etc.
In case we have done
the procedure y still
let's have a problem with memory
we can do the following in
some models, let's go to settings
applications, we select the downloaded applications to move to the SD card and it
It is automatically stored on our card.

If our terminal does not have this option, we will need to root our device.
We partition the memory card with a program for that, I recommend Mini.
partition magic tool, we placed it in a usb adapter (we backed up the information)

225
first) and we partition in the following way, we select the micro memory
we press delete and then create, we select primary for the partition and in
the FAT32 system to both partitions, and we leave at least one memory of
512 MB for application storage.

But in order to link to the micro SD memory card, we download or


we installed an application called link2sd, we opened it, mounted the memory and
We create the link to the SD as shown in the following image.

Another thing we can do is clear our cache, which is all


those waste elements that remain after using our applications
For them, we go to settings, then to storage, and we click on empty.
cache memory, as shown in the image.

226
227
Screen Buttons

In many of our countries, it is difficult to obtain refrains, and often the


the touch keys are in perfect condition, but for some reason the keys on the part
inferior they are useless, we can continue using that touch screen through an application
que simula los botones en pantalla, la cual ejecuta las acciones de cada una de las
physical keys.
Among the applications we can use to obtain on-screen keys, we have
the following:
Back [Link]
Button [Link]
Auto hidden soft keys [Link]

There is a difference with the framework or the version of Android, in Android 2.3 for
below we must install a version of the application and Android 2.3 or later
we must install another application so that it can work on our
device.

228
Receipt for the reception of Mobile Phones

Yoel Technological Solutions


CC. El Pilar Ejido
Ejido, Mérida State, Venezuela
N°12804
Professional Technical Service
In computing, mobile telephony, and tablets
Personal Data
Date: Nombre y Apellido: C.I
Address: Phone:
Brand: Model Imei:
Observations:_________________________________________________________
______________________________________________________________________
______________________________________________________________________

Budget: Fertilizer: Rest: Total:


Email: Key: Password: Lock Pattern
Failure to Repair
Camera Horn Loading Dock
Microphone Tactile Yes tray
Auricular Membrane Memory Reader
Screen Antenna Signal Amplifier
Sensor Cover Power Button
Vibra Call Flash LED Volume Buttons
Flex battery port Leave hits. Virus Install software.
Application Liberation FRP IMEI Null Horn
Update Whatsapp Backup Hard Reset Enlarge me.
Password Rooting Case Audio output. Others
State in which it is received
Light it Tapa Battery Reheat Consume Bat
Touch Party Sim Card Screws It turns off Buttons
Bad Screen Micro Card Case It restarts Others

Note: Equipment that does not turn on is accepted under the customer's responsibility, as it is.
Turned off does not allow checking for other faults; if there is an additional fault, it will be a separate repair.
With another charge, equipment that is taken to other technical services will lose its warranty for withdrawal.
The team must present the original invoice and will be given a maximum of 30 days to retrieve their equipment.
Otherwise it will be used as a replacement to cover expenses, after the contract is signed.
There will be no return of the equipment nor refund of money.

________________ ___________________
Client Signature Customer Fingerprint Recipient's Signature

229
Technical Service Control Program

The program is called SatManager and it is used to keep track and control everything related to
a technical service, among the options we have are the following:
Client Control
Equipment Control
Refractions or Spare Parts
Suppliers
Fault Database
Contact phones

230
40) Price List for Technical Services

Technological Solutions Yoel


Price List
June 2018
Software

No. Service With Box Sin Box Technical Remote $


1 Low-End Software Installation 4000-6000 2000-4000 3000 2500 4
2 Mid-Range Software Installation 6000-10000 4000-6000 5000 4000 6
3 High-End Software Installation 10000-30000 8000-18000 14000 10000 10
4 Nck Code 4000 3000 3000 2000 3
5 Liberation 3000-6000 2000-4000 2500 2000 3
6 High Gamma Release 10000-30000 8000-18000 14000 10000 10
7 Remove Low Range Google Account 6000-8000 4000-6000 5000 4000 5
8 Remove Google Account Medium Range 8000-12000 6000-8000 6000 5000 6
9 Remove High-End Google Account 12000-16000 8000-12000 8000 6000 8
10 Applications -------------- 1500 1500 600 1
11 Low-End Imei Repair 4000-6000 2000-4000 3000 2500 4
12 IMEI Repair Mid Range 6000-10000 4000-6000 5000 4000 6
13 High-end Imei Repair 10000-30000 8000-18000 14000 10000 10
14 Virus Removal 6000 4000 3000 2000 2
15 Information Backup -------------- 1000 1000 500 1
16 Rooting 3000 2000 1000 1000 2
17 High Gama Roteo 8000-10000 6000-8000 4000 2000 4
18 Memory Expansion 2000-4000 2000 2000 1000 2
19 High-End Memory Expansion 4000-6000 4000 3000 2000 4
20 Repair of Wifi and Bluetooth 4000 2000 2000 1000 2
21 Factory Restoration 4000 3000 3000 1500 3
22 High-end Factory Restoration 8000 6000 4000 3000 5
23 Revive Low Range 10000 6000 5000 4000 6
24 Revive Medium Range 15000 10000 8000 6000 8
25 Revive High Range 30000 20000 15000 10000 10
26 On-Screen Keys ------------- 2000 2000 1000 2

231
Hardware

No. Service Lower Range Gama Media High Gamma Technician


1 Microphone 2000 2000-4000 4000-10000 1500
2 Horn 2000 4000 6000 2000
3 Charging Pin 3000-5000 5000-8000 8000-15000 10000
4 Touch change 3000 5000 8000 2000
5 Change of Lens 6000 10000-15000 15000-30000 6000
6 Change of 3/4 4000 6000 8000 4000
7 Screen Change 4000 6000 8000 4000
8 Welded Screen Replacement 4000 6000 10000 4000
9 Repair of headphone output 2000 3000 4000 2000
10 Loading dock tracks 2000 4000 6000 2000
11 Repair of flex 4000 6000 8000 3000
12 Welding Points 1000 1000 1000 500
13 Revive 8000 14000 30000 8000
14 Jumpers 2000 4000 6000 2000
15 SIM tray change 3000 5000 8000 3000
16 SIM tray repair 1500 3000 5000 2000
17 Change of SD card reader 2000 4000 6000 2000
18 Change of an Ic 6000 10000 20000 6000
19 Processor Change 6000 10000 20000 6000
20 EMMC change 6000 10000 20000 6000
21 Reflow 4000 6000 8000 4000
22 Reballing 6000 8000 12000 6000
23 Power Button Repair 2000 4000 8000 2000
24 Repair of Volume Buttons 4000 6000 8000 4000
25 Camera Change 1000 2000 3000 1000
26 Case Change 2000 3000 5000 1000
27 Maintenance and Cleaning 1000 2000 3000 1000
28 Membrane and keyboard 1000 2000 3000 1000
29 Headphones 2000 6000 12000 2000
30 Antenna 2000 4000 8000 2000
31 Signal Amplifier Replacement 2000 4000 8000 2000
32 Flex Connector Change 3000 5000 8000 3000

232
Chinese Replicas

Currently, there is competition to sell a large number of devices,


In this competition for equipment sales, many companies start to copy.
the recognized brands with the aim of selling their equipment by making them pass
For original phones with the difference that the cost is too low.
These replicas generally do not come with refractors or spare parts for repair.
the same ones and the original one cannot be placed since its composition is
completely different, sometimes they are arranged in a place different from that of
original.
Generally, they also do not have software support and these are almost impossible.
to obtain, you usually have to disassemble them to see the type of processor and the
codes for the logic card to download its software. It is very important that
When we receive one of these devices, try to make a backup of the system.
operational for when we need the software to install it on another one that we
I arrived.
How to check if the phones are original or copies, to verify their
devices must enter the following codes:

Huawei:*#*#2846579#*#*
Vivo:*558# & *#*#4838#*#*
Xiaomi:*#*#64663#*#*
Samsung:*#0*#
Oppo:*#808#
Sony:*#*#7378423#*#*
Htc:*#*#3424#*#*
Lenovo:####1111#
Meizu:*#*#3646633#*#*
Zte:*#*#4636#*#*
Lg:3845#*model number# & *#546368#*model number#

If your phone opens a hidden menu with these codes, it is completely original.

233
Remote Services

Currently, we find ourselves in an interconnected, globalized world.


communicated and grouped on social networks, to which the world of service does not escape
Technician where a technician, for example, a Chilean can log into the computer.
from a technician in Mexico or vice versa and repair the equipment for the colleague remotely.

One of the most popular programs for connecting computers in a network is


TeamViewer, this program allows access to another computer with the option
to modify its characteristics, install software, uninstall programs,
install driver, etc. And it is not only used in mobile technical service, it also
we can use for the repair and maintenance of computers.

We also need to install a program to share USB ports online.


with which we can access the USB ports of another PC, for that we can use
any of these programs:
USB Network Gate
2) FlexiHub
USB Over Network

234
USB Redirector
5) VirtualHere

235
What we do is open the program and where it says usb remote devices and there we
we give the add server and there we place the IP address of the machine which we are going to
share the port, to obtain it we go to control panel, network and sharing center
shared, network connection, we click on details and there we will see the ipv4 address,
as shown in the image.

Then we look for the device we want to use, we click on shared, and it will start.
to install the driver on our computer, even if it is the Smart card driver
from our box.

236
Another program we need is Himachi,
that is used to connect two or more
networked computers and used in the following
way, it turns on with a create button
network that brings, when turned on will enable an IP
virtual, and it will enable the other buttons of the
program among them one that looks like a
triangle, they press it and there is an option that
you say to create a new network, they create their network with a user

and password (if they do not have it, they must register),
they leave the program running, then
run the usb network gate, connect the box or
dongle and the program must detect it,
they select and click on shared (a button that
he has the program) that way it is
enabling the key to share it on the network.
We can use boxes, dongles, or cracks,
but for that we must install the three
programs on the computers that they want
share the USB ports.

With the use of these three programs we can work remotely with our
box, of course they have to be careful since developers try to prevent that
this happens and for this they make a ban which seeks the smartcards that are doing
remote and blocks them.

237
Coding for technicians

Many of the technicians ask me why the technicians talk about formula or
codes.

F = Factor or Formula
Account Unlocking (FRP)
F1= Screen Unlock (Pattern, Password, Etc.)
F2= Flasheo
F3= Liberation or opening of bands
F4= IMEI Repair
CF = Final Customer
IT= Intermediario
TH= Hardware Technician

TS= Técnico Software


TSH = Software and Hardware Technician
TSD = Highly Gifted Technician (The one who thinks they are better than everyone else)

AP= Aprendiz
TNT = Technician who is never going to be a technician

Technician who relies solely and exclusively on professional tools


TM= Master Technician, the one who teaches others
Software Failure
FH = Hardware Failure
FHS = Hardware and Software Failure

238
MDM Protection
MDM (Mobile Device Management) is a new protection designed to prevent
that the devices are used after being stolen, so that they can be activated or
disable devices, remotely delete data, track devices, prevent
install the operating system, create backup copies, manage encryption and
manage the mandatory use of security policies, etc.
Many of the mobile devices with MDM will be impossible to flash.
it would also cost to modify any features of the device. Until the
moments it is not clear how it is going to work exactly but it is being discussed
What the sim card is going to be used for is to associate the phone with the sim, in a moment.
The device can only be used with the SIM card with which it was associated.

Some Applications that can activate MDM

AirWatch
AmTel MDM
BlackBerry Mobile Fusion

239
Boxtone Mobile Device Management
Citrix XenMobile
Dialogs Smartman Device Management
Excitor DME
FancyFon Mobility Center
Fiberlink MaaS360 Mobile Device Management
Fixmo SafeZone
Good Technology Mobile Device Management
IBM Endpoint Manager for Mobile Devices
Mformation Enterprise Mobility Manager
Microsoft Intune
MobileIron MDM
Rapid7 Mobilisafe
SAP Afaria
SOTI Mobile Device Management
Symantec Mobile Management Suite

240
One of the most well-known MDMs in mobile telephony is the blocking due to non-payment.
the phones that are assigned to customers via credit, the most well-known is the
blocking of the Claro operator that is present in several countries in Latin America,
those users who do not finish canceling their devices will be blocked with a
overlap that prevents the device from being used in any way.

What are the different solutions:


Root and remove all Claro applications
2) Disable all Claro applications
3) Eliminate all overlaps
4) Install the quickshortcutmaker application, open it in the activities, and there
we look for the process [Link] to open in information, there force the closure
deactivate, delete all data and deny all permissions.
5) Deactivate the Start application.
Flash an operator-free firmware.

241
Tracking of stolen phones

Currently, with the interconnection of devices and gadgets, we can do


tracking and tracing the current location specifying some sites where
the device has been, for this there are countless applications that can
access all information on our device, including taking photos of the person
who has the device and send it immediately to our email, to
we will now name some applications that have been designed with
the purpose of tracking and locating our device.
Through your Google email, by entering in the browser with the following phrase
[Link]/android/find, (it will ask for email and password) if the phone is not
turned off it will give you the exact information of where the device is located.

Is it possible to send audio, lock the device or perform a wipe?


complete, the problem with the last one is that if we do it we will no longer have access
to the device.

Through applications, one of them is Cerberus, one of the best because it has
a number of possibilities. The cell phone can be tracked even if it doesn't have internet

242
(through SMS or GPS commands) and perform a large number of other actions.
remote form. It also offers anti-uninstallation protection in case the
device undergoes a factory reset (although this functionality requires
root permissions and PRO function). The disadvantage of this application is that it requires
to be installed in advance on the device. Additionally, it is a service that there is
that you subscribe for an annual payment, although it offers a free trial period.

243
Another application that serves to track your phone is Prey, it is completely free and
bring a variety of options. You have to register in the app and do it
also through the browser.

Snuko is another type of 'silent watcher' that collects data about the device
missing (through geolocation, screenshots, IP addresses,
photos, etc) and also allows you to make online backups of the data.
Additionally, it locks the device to prevent information theft.

244
These mobile tracking systems are not infallible. If you cannot locate your
cell phone, probably the thief has already taken measures regarding this.

They already turned off the phone.

They did a hard reset.

They installed another operating system.

4) The shown location is not necessarily exact. It may be approximate.


and depending on the area, it can have a margin of error of a few
subways.

The tracking will show a notification on the cell phone, which will alert the person.
that you have on your mobile. Be careful to deactivate it.

Like Android and Samsung, Apple's iPhones also have their


own tracking system at [Link]/#find

7) Google's Find My Phone system (formerly known as Android Device


Manager) offers other interesting features in addition to cell phone tracking.
Allows you to make the phone ring (useful in case you have lost it). Or
also delete the storage data remotely.

8) Android phones already come with the tracking feature pre-activated,


just to serve in case of theft. You can verify it by going to Settings >
Google > Security > Find my device.

If they fall into the hands of a technician with knowledge who can deactivate
quickly any security system.

245
46) Taxonomy of repair technicians
telephones

Classification according to complexity and learning level

Level 1 Hardware
Technician Level 1 ------ Hardware Apprentice (T1-N1)
Technician Level 2 ------ Intermediate Hardware Technician (T1-N2)
Technician Level 3 ------ Advanced Hardware Technician (T1-N3)

Level 2 Software
Level 2 Technician ------ Software Apprentice (T2-N1)
Level 2 Technician ------ Intermediate Software Technician (T2-N2)

Level 2 Technician ------ Advanced Software Technician (T2-N3)

Level 3 Microelectronics
Technician 3 level 1 ------ Microelectronics Apprentice (T3-N1)
Level 3 Technician 2 ------ Intermediate Microelectronics Technician (T3-N2)

Technician 3 Level 3 ------ Advanced Microelectronics Technician (T3-N3)

Level 4 Software and Hardware


Technician 4 (T4)

Level 5 Software, Hardware, and Microelectronics


Technician 5 (T5)

246
47) RMM Status: prenormal Samsung

It is a new security feature in Samsung that is arriving on the devices.


through updates with new security patches, this security starts
with patches from February 2019 and consists of detecting any unauthorized modification
official in the operating system (Custom Rom, custom recovery, root, etc).
This is closely related to the locking of the bootloader or the OEM, it deals with
to avoid the flashing of the devices, if the OEM is not activated the RMM simply
it will not allow flashing the firmware, boot, recovery, or modem if it is disabled
the OEM will allow you to flash but it will generate an error in the operating system
preventing the phone from booting the system.

There are several solutions:


Flash Combination to activate OEM and flash a stock ROM

Flash custom recovery with RMM bypass

3) Flash custom recovery, wipe system and data, and finally install one
custom rom.

4) Flash combination to activate OEM and downgrade

5) When it arrives with efs not mounted and with rmm status: prenormal

Download an official firmware from Brazil or Trinidad and Tobago and flash it, activate
developer options.
Deactivate automatic date and time, we set the date back to 1/2/2019 and we start
to search for updates, we restart and search for updates and install them
update 8.0
Advance the date 7 days from 2/8/2019, look for the update and skip.

Advance the date to 15/2/2019, restart, search for updates, and jump again.
Move the date to 22/2/2019, restart, and check for updates without installing.
Set automatic date, go to developer options and voila, the OEM appears.
activated.
Repair drk and efs not mounted with certificate.

247
Additional Skills to Develop

1) Instrumental English

It is the acquisition of all the skills necessary to decipher,


understand and interpret texts of any kind in the English language.
Many of the texts for phone repair come in this language.
therefore it is recommended to study and recognize terms such as recovery,
wipe, download, brick, format, among others. In practice, we can observe
both on the phone and in phone repair programs and
command consoles use terms in English and we must
to know what instructions or what each of them means, here are some
examples:

248
249
250
Advanced knowledge of computing

It is essential for the person who wants to learn to repair phones in the part
the software almost perfectly masters the use of the computer, we must
study where the drivers are located, how to install them, manage cmd consoles,
programming commands, key combinations, extract, import or modify
files, and even make modifications to the Windows registry.
It is better for the phone software technician to also be a technician for
computers or has taken computer repair courses or has
They will be trained in computer repair in the area of formatting and installation.
of programs, since many of the repairs require us to master programs
computer experts, handling cracks, disabling antivirus and handling freezer
computers such as deep freeze or shadow defender.

3) Programming Language

Many of the flashing, system modification, the recovery modification,


roots, etc. They are often done through universal methods and through
from command consoles cmd, for this some command lines are needed
to perform different actions not only on Android devices, but also

251
we can observe that on iPhones there are also commands to jailbreak or
bypass iCloud through Python.

Logic and Problem Solving

Repairing phones requires a lot of logic, I always recommend doing


a guide of logical sequences in your head, as they ask me the
students when I teach my courses, for example if a phone does not get signal
we should do the following:
The first thing we need to do is check the IMEI on the blacklist page of
your country.
2) Repair the baseband.
3) Flash and repair the entire operating system.
4) Change the IMEI to see if it picks up a signal and then return to the original IMEI.
Sometimes phones take more than a month to be included in the list.
black.
5) After this, we proceed to work on the hardware part.
6) First, we check the coaxial cable and/or signal antenna.
We reviewed the signal amplifier.
8) We checked the PA or Power Amplifier.

This I call a logical sequence of fault repair.

252
49) Fastboot and ADB Commands

update <filename> to flash device from [Link]


flash all flash a boot + recovery + system
flash <partition> [ <filename> ] write a file on a flash partition
erase <partition> delete a flash partition
<partition> formats a flash partition
getvar <variable> shows a bootloader variable
boot <kernel> [ <ramdisk> ] download and boot the kernel
flash:raw boot <kernel> [ <ramdisk> ] creates a boot image and flashes it
devices list of connected devices
continue continue with the auto-start
reboot the device normally
reboot-bootloader restarts device in bootloader
help shows help message

fastboot oem unlock (to unlock the bootloader)

fastboot oem lock (to lock the bootloader)

fastboot devices (Devices connected in fastboot mode)


fastboot erase recovery (we erase the current recovery)
fastboot flash recovery [Link] (where "[Link]" corresponds to the
new recovery that we want to flash, sometimes we must provide the path where it is located
the file)
fastboot flash all (Flash all files)
fastboot erase system–w (we erase the system partition)
fastboot erase boot (we erase the boot)
fastboot update [Link] (we flash the new ROM, where
"[Link]" is the ROM that we want to install.
fastboot reboot (we restart the device)

253
fastboot erase system
fastboot erase userdata (Perform a hard reset)
fastboot erase cache
fastboot flash system [Link] (Flash the system)
fastboot flash boot [Link] (Flash the bootloader)
adb devices (devices connected in USB debugging)
adb install <[Link]> (install an application in USB debugging)
adb reboot bootloader (Reboot into fastboot mode)
adb reboot recovery
adb sideload [Link] (flash the firmware)

254
50) How to know if we are doing a good job
work?
The commandments of a good technician and a good technical service.

Local presence
Sometimes it doesn't matter where the store is located, even if it's in the poorest neighborhood or in the
the tip of a hill, its presence and organization are important, they say that
The first impression is what counts and appearance sells, which is why it's important.
presence of the premises.

2. Presence, consistency, and vocabulary of the employees.


Pueden ser muy buenos reparando teléfonos, pero sino dan confianza en sus
clients are not going to stay, it is also essential that the
employees are uniformed with a good presence, are decent with good
vocabulary, use the terminology corresponding to technical service, many
Technicians use profanity and vulgar vocabulary in the store with the customers there.

3. Effectiveness
Many technicians shy away from certain types of repairs and do not dare to fix them.
phones that we know are going to take work, when you have technicians who
they train, investigate, resolve the strongest cases the clients make you the best
advertising that exists in the world, a good technician is welcomed by any
Locally in the world, if you only repair 1 out of every 10 phones, you must be doing something wrong.
Well, the minimum would be 10, you should repair 3, anything above that would be excellent.

4. Excellence
When very little work comes through warranty, it is known that it is a good
work and it will be fully guaranteed, many times we do things for
step aside, we make a jumper without putting UV mask, we change a screen
and we leave it uncovered, what I recommend is to do a good job.

5. Attention
THIS IS THE MOST IMPORTANT, 70% OF CUSTOMERS LEAVE YOUR
LOCAL FOR POOR SERVICE.
255
Remember that customers are the ones who keep your business running, it hurts to say it but
the customer is always right, attending to them with care, letting them feel offered coffee
or a tea, watch television, treat him well and make sure his experience in our business
be the most pleasant.

6. The Dedication
When you only fix the easy things and do not accept difficult jobs and let them go without even
at least take a while to study it, many of the teams take us days or
weeks and many times we do not find the solution but this leaves us with a great
learning.

7. Delivery Time
The faster the delivery of the equipment, the better it is for the reputation of
technician, sometimes it makes me laugh with workshops that tell the customer that in 20 days 1 month
o 2 meses está listo su equipo, me parece una falta de respeto con el cliente si crees
If you can't repair a device, it's better to return it.

8. Knowledge of employees and technicians working in the establishment

Currently, many clients know what you are talking about, so if you don't know
clients will know what you talk about, it is always advisable to use the
appropriate terminology and mastering the topic being discussed, if we do not know about
What is being discussed is better not to intervene in the conversation.

9. Responsibility
When you tell the customer that you will be open on Monday and you don't even open the store, when you shut down
the phone not to respond to customers, irresponsibility is the cause of the
loss of customers, the best advertising you can have is word of mouth and the
recommendation from your clients to future clients.

10. Honesty
I worked in many places where they removed parts from phones, it was not done to them.
nothing and they charged him, for example to open bands and he was already free, many
things like that. In the world of technical service, all the traps and thefts or
charges that we want to make to the clients come to light and those things
they are going to make your business have a bad reputation, I remember there was a technician who

256
they called him Rafa trap or a business they called 'the workshop catches everything that doesn't'
fix it, it's broken.

11. The Preparation


I think it is the most important thing, most technicians do not like to read or research.
and innovate in solutions, the success of repairs lies in your preparation, because
for me this is a university degree, as you study more you advance and
you will find it easier to provide solutions to many issues, attend courses, conferences and
all the events, look for those colleagues who are the most knowledgeable about a topic
and learn from him as much as you can.

12. Humility
In this world, I always come across many who call themselves masters, the
genius, the best of America, the best of Colombia, the best of Mexico, the best of
Peru, the best of Venezuela, but there are many good people in this world and who
They very rarely show what they know, we must be careful because
we could end up looking ridiculous, as we are going to want to stand out and be better than the
there will always be someone who knows more than us and makes us look bad
bad.

Two heads think better than one


The path to achievement is being able to share experiences by sharing.
experiences with other technicians, the one who thinks they know everything and is better
that the others end up losing, since due to their position they stop learning and restrict
his area of knowledge limiting and preventing him from learning other techniques, that one
who shares his experiences with others every day learns and receives feedback
you can learn from the experience of others, even from the most inexperienced, when someone
I asked you what you know about technical service, just say that you know the basics.

14. The Specialization


For me, there are four branches in phone repair: software, hardware,
microelectronics and screen remanufacturing, So far I do not know
no one who masters the four areas perfectly, and if we think about it
each of the topics of each of the areas that one thinks they know
everything is just in its infancy.

257
15. Investment
Tools don't make you a better Technician, but they help you make things easier.
Your work is meticulous; invest in tools and you will be able to offer a quality service. The
investment in professional tools and machines, when customers see that
take the screens with a clothes iron and stick them with silicone and solidify them with
a soldering iron that they sell where the Chinese are, do you think the customer is going to stay in your
business, try to make your clients see that you have quality tools
that will help you do a quality job.

258
Coding for technicians

Many of the technicians ask me why the technicians talk about formula or
codes.

F = Factor or Formula
Account Unlocking (FRP)
F1= Screen Unlock (Pattern, Password, Etc.)
F2= Flasheo
F3= Liberation or opening of bands
F4= IMEI Repair
CF = Final Customer
IT= Intermediario
TH= Hardware Technician

TS= Técnico Software


TSH = Software and Hardware Technician
TSD = Highly Gifted Technician (The one who thinks they are better than everyone else)

AP= Aprendiz
TNT = Technician who is never going to be a technician

Technician who relies solely and exclusively on professional tools


TM= Master Technician, the one who teaches others
Software Failure
FH = Hardware Failure
FHS = Hardware and Software Failure

238
What can happen if I root and do not unlock the bootloader?

6) What is USB debugging used for?

7) How is each of the phones flashed?

8) How to know if we have a software failure?

260
9) If a phone does not turn on, how can you tell if it is a software failure?

Can a software failure be identified through a driver?

11) Name several ways to unlock the bands of a Cell Phone?

12) When is the JTAG going to be used?

261
13) What is the test point used for?

14) What is the USB jig used for?

15) Why is the IMEI lost?

16) What is Fastboot used for?

17) What is a binary and what is it used for?

262
18) What driver is needed to flash an MTK?

What is the first thing to do when a phone gets stuck?


logo?

20) What needs to be done after unlocking the bands on a phone for
that I get internet?

21) What actions can be performed with the recovery menu?

22) Why should we root a phone?

263
23) What to do when a phone has insufficient memory?

24) What relationship does the Google account have with OEM locking?

25) How can we bypass the iCloud account?

26) How many accounts do Xiaomi have?

27) How can we unlock the bands of the iPhones?

28) Which processor is the best and has good security?

264
29) Name three ways to flash a Huawei?

30) What are the names of 6 boxes and which phones do they work for?

31) What is a Calculator?

What are remote services?

33) What is the first thing we should check if a phone has no signal?

265
34) Which driver corresponds to USB debugging and fastboot?

35) What three things do we need to flash?

36) What are the three ways to work with software?

37) What is the Samsung software installer?

38) What are the drivers for working with software?

What is a bootloop?

40) How many parts is an IMEI divided into?

266
41) How to unlock the phone bands brought from the United States?

42) How many files does Samsung software include and what does each one mean?

43) How many ways can we delete Google accounts?

What does F4 mean?

What does FRP mean?

46) If a phone is flashed and does not change or stays stuck on the logo, what do you think?
What is it due to?

47) For what options is a combination used?

267
48) What are the various ways to install applications?

49) How can we decipher patterns and passwords on Android?

50) What is the only phone brand that does not have a recovery?

51) Which phones have download mode?

52) What is DFU mode?

53) What types of accounts?

268
What is Miui?

Why is the version of Android and the security patch important?

56) Name several ways to revive a Huawei?

57) Which phone brand does not have recovery?

58) Which phones could be repaired by the server without connecting to the PC?

269
59) Name two boxes without boxes?

60) What is the latest iOS software for iPhone?

270

You might also like