Essential Guide for Cell Phone Technicians
Essential Guide for Cell Phone Technicians
Index
Page
Biography 5
Acknowledgments 8
3) Dedication 10
4) Chapter 1 Software 12
5) Glossary 13
6) Necessary tools for the software technician 16
7) Definition of Software 30
8) Operating systems 31
Types of Operating Systems 31
10) Official and Unofficial Operating Systems 45
Operating System download sites 47
12) Unlock the bootloader, OEM Lock, USB Debugging 49
13) Processors and their relationship with the Operating System 67
14) How to Identify the Processor of a Cell Phone? 78
Manufacturers 83
16) Universal Methods 85
17) The Ways of Working Software 91
Security patch 92
19) Hard reset, Recovery and Backup 95
Cellular Controllers or Drivers 100
Device Administrator 108
Signed Drivers and Windows 8, 8.1 and 10 109
Mobile Applications 114
24) Root Android 117
25) Releases or Band Openings 120
Types of Bands 126
27) Apn 128
28) Network issues 130
IMEI 132
30) Google Account Blocking 140
31) Count My 150
iCloud iPhone 152
33) Remove password or user code from iPhone 155
34) Jailbreak 158
Security 160
36) Use of the Boxes 161
Box Crack 169
Boxes without a Box 170
39) Online Manufacturers Servers 172
40) Virus or Malware 173
2
Unfortunately, the Application has stopped. 175
42) Requirements for Installing Software 177
Software installers (Flashing) 178
Reviving Huawei with software issues 202
Encryption Error 209
46) Revive cell phones with Mtk processors 210
Revive Samsung by Usb Jig 216
48) Most common errors made by technicians when referring to software 218
49) Decipher or eliminate user codes and lock patterns 219
50) Insufficient Memory Issues on Android 223
51) Buttons on Screen 227
Receipt for the reception of Cell Phones 228
Program for Technical Service Control 229
Price List for technical services 230
Chinese Replicas 232
56) Remote Service 233
57) Coding for technicians 237
58) MDM Protection 238
Tracking of stolen phones 241
60) Taxonomy of telephone repair technicians 245
61) RMM Status: Prenormal Samsung 246
62) Additional Skills to Develop 247
63) Fastboot and ADB commands 252
Exercises and fault resolution 254
65) Chapter 2 Hardware 270
Essential Tools for a Hardware Technician 220
67) Components of a Cell Phone 161
Work area 166
69) Use of Hardware Tools 169
Basic Terminology 175
Disassembly and assembly of different cell phones. 178
72) Logic Card (PCB or printed circuit) divisions and subdivisions. 186
73) Source of Power Data 202
74) Most common faults and their solution. 204
75) Screen replacements, Glasses (Gel) and Touchscreens. 216
Manufacturing of display or LCD 226
77) Differentiate between software and hardware failures. 240
Chapter 3 Microelectronics 242
79) Definition 243
80) Theory 244
81) SMD electronic components 252
Continuity check and use of multimeter 263
83) Cellular electronic terminology 273
3
Practical tool for learning Microelectronics 275
85) Reading of Schematic Diagrams. 276
Detection of shorted or defective electronic components 293
Welding techniques, liquid and paste flux, tin. 296
88) Jumper or bridges for electrical continuity. 298
89) Reballing and reflow. 300
Reconstruction of push buttons or buttons 306
91) Installation of charging pins and their jumpers. 309
92) Use of Jtag 312
References 314
94) Photo Gallery 315
4
12
1) Software Glossary
Open Bands: Remove the operator restriction to use only one SIM
What would be the operator that sold the equipment example Claro, Tigo, Movistar,
Telcel, Won, Movilnet, etc.
Apk:Aplicaciones Android
13
Command Console: It is a Windows cmd window where
the commands are entered to perform various actions both in USB debugging
like in fastboot.
Crack: It is a software program that emulates the function of cash registers but
its functions are very limited and these files also have viruses
intended to damage the computer.
Download Mode or Download Mode: It is the mode in which the firmware is flashed.
Samsung and LG.
Fix:Reparar
14
Frp:Cuenta Google
IMEI Null: the IMEI was lost, resulting in a generic or invalid IMEI.
Launcher: It is the main menu, the theme, or the system that creates the interface.
to open the applications and access the menu.
Rom:Operating System.
Tested: software that has been proven to work perfectly and that
they have already been used in other teams.
Unlock:Desbloquear.
15
2) Necessary Tools for a Technician
Software
USB cables are needed for connection with the PC; it is recommended that these
cables should not be used for hardware or tested for the repair of the
load ports, meaning not to be used for hardware, the cable you use for
software only for that.
16
V8 or V9 cables are the most common in mobile devices.
17
4.- iPhone 5 cable.
18
6.- F250 cable for old Samsung phones.
19
7.- Cable for Samsung Tablets.
Broken Cables
Old cables
20
Cables too long
21
Having several devices connected at the same time to the computer
22
Battery Discharged:
23
Bad Loading Port
24
Hard Drive: this is necessary for storing information, software,
programs, etc; to avoid downloading the same thing all the time, this is very
convenient in countries where the internet is too slow. It is recommended to go
organizing the information in a detailed manner to know where everything is.
Many times we download software and it does not work for us, we download several until
what works for us, that which works for us we must save it on the disk because it is already there
tested and we know it will work for another one that reaches us and we reduce the
client wait time. This hard drive must have a minimum capacity of
a terabyte and it is recommended that it be from a reputable brand with capacity for
file transfer 3.0 and if it is shockproof or waterproof that would be the best
recommended.
Box or Service Boxes: they are necessary tools for the release or
band opening, IMEI repair, flashing or other services such as removing FRP
(Google accounts), removal of pattern or user codes, for those
devices that are not supported by the cracks, arrive in developing countries
to have a very high cost, which is why some technicians use some cracks that are
free and are available on the internet and generally contain viruses that go
to affect your computer.
In many countries, these boxes are viewed negatively, as many technicians only use them.
to remove reports of stolen phones, which have put them in the crosshairs of the
authorities are paying the just for the sinners with these tools.
25
Donglesson tools with the same method as the boxes but their range is a
a little more limited, they are difficult to recognize since they look like a pendrive or
USB memory. They are a bit delicate due to their structure, it is recommended to connect with
a USB extension so as not to break them when connecting to the PC, they are
more practical since when moving them they do not take up much space and are
almost imperceptible, camouflaging themselves in the store to avoid being stolen by the owners
of others' possessions and go unnoticed by the authorities.
26
OTG cable: it is necessary to install applications, remove Google accounts from
manual way, making a backup of information, etc. Note that it should be pointed out that
it will only be possible on those phones that have this option available.
It is also very useful for disabling the oem on those devices that
they updated with generic screens and the touch function stops working, with the otg
we connect a mouse, we go to the developer options and with
we disabled the OEM for then downgrade the version of Android and so on
recover the touch and with this we can install a lower version or downgrade the
software.
27
Internet access: it is important for making inquiries, downloading files,
communicate with other technicians, participate in chat or forums, etc. We can
Observe that the best way to learn is through research and practice. The best
the teacher and who can teach us many things is ourselves, to
through research and searching through the internet, it is also
It is advisable to join all WhatsApp, Facebook, Telegram, etc. groups.
28
Taringa
29
3) Definition of Software
The software is all the logical elements needed for the device.
perform all the tasks that the user assigns to him, can be defined as the part
logic that executes tasks that the physical part must accompany. It refers to everything
intangible and what differentiates it from hardware. Software is the set of
instructions and data in binary format (zeros and ones) stored in memory
main, which indicates to a device the tasks to be executed. That is, the software
hardware directs, software is the logical part of the computer system.
Software refers to the specific elements that make up an operating system, the
the difference between the two is that the software is an individual element and the
The operating system is the set of software necessary for the device
function.
Among the most well-known software on mobile devices, we have the systems
operational and applications. The software on the device can be replaced or
modified, many times the software can be affected by system errors,
virus or malware.
4) Operating Systems
30
The set of software programs that manages resources and activities of
a mobile device, this would be defined as the complete system software. Not
the more we turn on the device, the software starts to work activating the
bootloader which would be the start or the logo of the device, the software manages the
hardware from the most basic levels and also allow interaction with the
user.
It is worth noting that operating systems do not only work on computers.
or cell phones, we can also find it in televisions, mp4 players, tablets, or any
device that uses microprocessors, the system software enables that the
device fulfills its functions.
The framework is what enables the installation of applications and
this can vary depending on the versions of the same operating system, for
example despite the fact that two devices are identical with the same operating system
one has Android 2.2 and the other has Android 5.1, only the latter could be done the
WhatsApp installation.
The operating system performs five basic functions: providing an interface
the user, resource management, file management, the
task management and support and utility services.
Android
31
The Android operating system is undoubtedly the market leader in mobile systems.
operativos, está basado en Linux, diseñado originalmente para cámaras fotográficas
professionals, it was later sold to Google and modified to be used in
mobile devices such as smartphones and then on tablets such as it is the
the Galaxy Tab case from Samsung is currently in development for
used on netbooks and PCs, the developer of this OS is Google, it was announced
in 2007 and released in 2008; in addition to the creation of the Open Handset
Alliance, made up of 78 companies from hardware, software, and telecommunications
dedicated to the development of open standards for mobile phones, this has helped them
much to Google to mainstream the OS, to the point of being used by companies like
HTC, LG, Samsung, Motorola among others.
Android Inc. is the company that created the mobile operating system. It was founded in 2003 and
it was bought by Google in 2005 and was launched on the market in 2007. Its name is
it owes to its inventor, Andy Rubin. Originally it was a system designed for the
digital cameras.
Android applications are written and developed in Java, although with some
Own APIs for applications written in Java for PC and others
Existing platforms are not compatible with this system.
32
One of the great qualities or characteristics of this operating system is its
open source character. Android is distributed under two types of licenses, one that includes
all the Kernel code and what is GNU GPLv2 (this implies that its code must be put
within everyone's reach and that we can all do with this code whatever we like
opportune, modify it, expand it, shorten it, but we will always be obliged
to re-license it with the same license) Google also of course has
another license for the rest of the system components that is licensed under APACHE
v2 (implies that this code can be distributed to be modified and used at will)
of the one who uses it, but unlike the first case, the modifications and the code.
it is not mandatory to license it under the same conditions under which it
I found.
IOS
33
iOS is the operating system that powers devices like the iPhone, the iPad,
iPod Touch or Apple TV. Their simplicity and optimization are their pillars for
millions of users lean towards iOS instead of choosing other platforms
that need more powerful hardware to run the system smoothly
operational. Every year, Apple releases a major update to iOS that usually brings
exclusive features for the most cutting-edge devices available for sale
at that moment.
34
Windows Phone
35
Windows Phone (abbreviated WP) is a mobile operating system developed by
Microsoft, as the successor to Windows Mobile. With Windows Phone; Microsoft offers
a new user interface that integrates several of its own services such as
OneDrive, Skype, and Xbox Live in the operating system. Competes directly against
Google's Android and Apple's iOS. Due to the obvious fragmentation of its
operating systems, Microsoft announced in January 2015 that it will discontinue
Windows Phone, to focus on a single more versatile system called
Windows 10 Mobile, available for all types of platforms (smartphones,
tablets and computers). It is designed to be similar to the versions of
Windows desktop aesthetically and there is a wide range of software available
third-party available for Windows Phone, which can be purchased through the
online store of Windows Store for mobiles.
36
37
BlackBerry
38
Symbian
It was the result of the alliance of several mobile phone companies, among which are
they find Nokia as the most important, Sony Ericsson, Samsung, Siemens,
BenQ, Fujitsu, Lenovo, LG, Motorola, this alliance allowed them at one point
to be one of the pioneers and most used.
The aim of Symbian was to create an operating system for mobile devices that
could compete with that of Palm or Microsoft's Smartphone. Technically, the
39
Symbian operating system is a compact collection of executable code and various
files, most of them are dynamically linked libraries (DLL by
its acronyms in English) and other required data, including configuration files,
of images and typography, among other resident resources. Symbian is stored,
generally, in a flash circuit within the mobile device. Thanks to this type
In technology, information can be preserved even if the system has no power.
electric in the battery, as well as being feasible to reprogram, without the need
to separate it from the other circuits. The applications compatible with Symbian are
desarrollan a partir de lenguajes de programación orientados a objetos como, Java
(with its variants such as PJava, J2ME, etc.), Visual Basic for mobile devices,
among others, including some languages available in free version.
40
Firefox OS
41
Firefox OS is a mobile operating system, based on HTML5 with a Linux kernel, for
smartphones and tablets. It is developed by Mozilla Corporation with support from
other companies like Telefónica and a large community of volunteers from all over the
world. This operating system is especially focused on devices
mobiles including those of low range. It is designed to allow applications
HTML5 communicates directly with the device hardware using
JavaScript and Open Web APIs. It has been shown on smartphones and Raspberry Pi.
compatible with Android.
In February 2013, Mozilla announced plans for the global launch of Firefox.
OS. Mozilla has announced in a press conference ahead of the Mobile World
Congress in Barcelona, that the first wave of devices with Firefox OS will be
available Brazil, Colombia, Hungary, Mexico, Montenegro, Poland, Serbia, Spain
and Venezuela. Firefox has also announced that LG Electronics, ZTE, Huawei, and TCL
Corporations have committed to the manufacturing of devices with Firefox OS.
42
Ubuntu Touch
43
Among the most well-known are:
7.- Blackberry
44
4.2) Official and Unofficial Operating Systems
45
Custom Rom o Firmware no official
46
4.3) Download sites for Operating Systems
In all the years I have been repairing mobile devices, one of the pains of
Head has been downloading the software, many times I used to download the systems.
operations that sometimes I found it very difficult to download because of the speed of the
the internet was very slow and the operating system has a very high amount of
many times these operating systems did not work and I had to start over
from scratch, unless we download the appropriate operating system for our terminal
we can brick our device, Here I will leave you some websites where
You can download operating systems that have already been tested and almost all of them work.
to be good for our device, I also recommend that if the system
The software is useful on our terminal; we save it on an external hard drive.
I recommend that you start organizing the information into folders, for example, one
main folder called software, we create other ones inside called Alcatel,
Samsung, Huawei, Htc, Sony Zte; and within these the models with names
exact ones such as Huawey Y511, Blu Advance 4.0, etc.
47
Websites
[Link] (Samsung)
[Link] (Multibrand)
[Link] (Multibrand)
[Link]
[Link](Blue)
[Link] (Blue)
[Link](Multibrand)
[Link] (Lg)
[Link] Multibrand
[Link] (Samsung)
[Link] (Samsung)
[Link] Tablets
rockchip
[Link] Tablets
Allwinner
48
5) Developer options, unlock the
bootloader, Bloqueo de OEM y Depuración
Usb.
Developer Options
How can we access the Android development options? The first step
to activate them, you need to go to Settings > Device Information and press
seven times on the build number. Once we press repeatedly we
a message of 'You are now a developer!' will appear. Then simply
We need to go back and in the settings list this new one will appear at the end.
section called Development Options.
This will depend on the manufacturer and the phone model, in some models
it varies quite a bit like in the case of Xiaomi or Huawei, the important thing is to achieve
the build number.
The question we will try to solve here is what all the options are for.
of Android development and what its function is. A list to try to discern
quickly which can be useful to us and understand all the possibilities that
tenemos en nuestro Android, sea cuál sea el fabricante.
49
Bootloader
Surely most of you have heard of the bootloader, especially
when you have tried to root your device or install a custom ROM.
For all these cases, the first step is to unlock the bootloader in order to
install new software that does not come from the manufacturer. Here we are going to
explain what the bootloader is and what it is used for.
Bootloader is the English name for the device's boot manager. It is the
first program that runs on the processor when you turn on a smartphone
Android. Is in charge of loading andlLinux Kerneland the Android operating system. The
Bootloader is a fundamental part of all machines that run a
operating system whether it is a smartphone or a computer.
If you press the power button, the bootloader understands that you want to load the
operating system and that's why it chooses the kernel to boot. If, on the contrary, you press
the key combination to enter recovery (reboot bootloader, restart
bootloader), the bootloader will choose to load the memory part where it is stored
recovery.
50
By default, the bootloader is locked, which means it can only boot.
a partition that has the manufacturer's or operator's digital signature, either the
original operating system or the manufacturer's recovery.
In order to install another operating system or another custom recovery, we must be able to
load a part of the memory that is not signed by the manufacturer, which implies
unlock the bootloader or even replace it and in most cases this
it voids the manufacturer's warranty.
The bootloader is locked so that it only reads the Android system that the manufacturer
install. In other words, the bootloader is used as a locking system for
Unofficial ROMs. This is where the controversy arises, as the bootloader works.
like a kind of customs that the software has to pass in order to be
executed on our devices. This implies that if we want to install a ROM
not official, first we will have to unlock the famous bootloader, which does not
it is always simple and entails the loss of the warranty.
This is where the controversy about losing the warranty when rooting the device also arises.
The problem lies in the bootloader since in the vast majority of cases of
Rooting modifies the bootloader.
51
Android 6.0 devices' OEM is related to FRP or the Google account, it is
That's why even flashing won't remove the account; this account will only be removed by itself.
when we unlock the oem.
What becomes very important is to unlock the OEM so that it becomes easier for us.
repair a device due to device failure or because it has been left in the
logo.
A very clear option. If we activate it, the screen will never go to sleep while
we are loading, very useful if for example we watch a movie from the mobile or the
tablet and we don't want it to turn off.
52
Image color mode
Execution services
Webview implementation
Android intends for this option to be enabled by default in the future. Since
Android Nougat allows Webview to be multi-process and manage memory
more efficiently.
If we enable this option, the system itself will look for new updates and
it will directly show us the notification to update. If we do not have it activated
we will have to press each time to check for new versions.
Demo mode
Through this option we can activate the demonstration mode. It is very useful for
take screenshots always showing the same status bar, free of
notifications, with the network at maximum coverage and the battery at maximum
53
Debugging development options
54
Always ask when connecting to USB
Simple option. If we activate it, a notification will pop up when we connect it via USB.
asking ourselves if we are sure and in what way we want to do it.
Hay varias aplicaciones que nos permiten engañar al móvil y hacerle creer que
we are in another place. They are applications that deceive the GPS, from here
we will select the application that the system takes into account when
determine our location.
With this option, the view attributes of the Android System Manager are activated. If
We perform a logcat, we will see the events in another way.
This adjustment allows you to select an application for debugging and prevent that
error messages appear. An option to force applications to
execute as they should.
Related to the previous one. It prevents the application from starting until the
the debugger is not activated.
Allows Google to scan applications you have installed via ADB or ADT and
to detect if they can be harmful. An extra layer of security that comes in handy in
the case that we install applications through that means.
55
greater latency between the sound when we speak and when it is received, although
it will also consume less.
56
Always allow WiFi search while roaming
Imagine that we have two WiFi accesses with the same name, but one of them
it has better signal than the other. With this option, it will allow the mobile to access the SSID
what interests us most at any moment. Although, of course, we will see a slight
increased battery consumption when searching less frequently.
When we turn on WiFi, mobile data is turned off to avoid wasting it.
consume battery. With this option, the data will remain active in the background.
the plan and what we gain is that when the WiFi disappears, the change will be much more
quick since they will be active soon.
57
We move on to adjustments that modify what is displayed on the screen and in what way
It's done. The first is to show scores; it activates every time we press the
a small circle will appear on the screen marking where we clicked.
Minimalist and only lasts a few seconds.
Pointer location
Another adjustment to show the location of our touches, but it is much more
complete. It will leave us marked on screen with the entire journey of our last gesture
tactile, with the coordinates and even with the pressure applied.
We don't notice it, but the screen of our mobile phone updates constantly. If
when we activate this option, it will light up every time it changes, with a pink flash
very eye-catching. Only recommended if we want to find out when the screen is
active and the content has changed.
Very curious. When activated, it will show us the borders of each screen element.
With this, we will know how far that section reaches and the limits of where our touch ends.
It will activate it. It provides a lot of information on how the menus are distributed.
from the mobile.
Transition-Animation Scale
In this section, we establish the speed at which the various elements load.
from a menu. If we choose a shorter time, everything will appear instantly. If we choose
58
a higher time, the animations will stretch and everything will be shown step by
step.
With this adjustment, we can choose to simulate screens of various resolutions, from
480p up to 4K. A small floating window will appear that will repeat what is
show on our mobile, but in that new resolution. There is also the option of
display a dual screen at 720p and 1080p.
Smaller width
A very useful and recommended option. From here we can modify the DPI of
Android and changing the size of what is displayed. This is especially useful if
We have a phablet and we want more information to be displayed on the screen.
59
View updated GPU views
With this adjustment, every screen using the GPU will receive a red layer.
Basically, we will use it to know when the graph is being used.
our hardware.
In the same way that we used to have an option to know when the screen was
being updated, with this option we will be able to know when the layers of
hardware are active.
There are some applications that have the ability to display information on top.
from others. With this option, we can choose to see when this happens to
to know if the behavior is normal or if they are overlapping incorrectly.
Force MSAA 4x
If you have a high-end phone, this setting might be a good idea. Force the
multisample anti-aliasing improves the rendering of games and images in OpenGL
ES 2.0 and everything will look better graphically. On the contrary, performance will decrease in
proportion.
Disable HW overlays
60
Since Android 5.0 Lollipop we have the possibility of USB audio and connecting through it
through devices such as amplifiers, microphones, speakers, or mixers. Since
Here we can deactivate it.
Strict mode
First monitoring option, we will receive a notification on the screen when the
applications are being developed that extend over time. Useful for
that developers know if everything works correctly.
CPU usage
By activating this setting, we will see the CPU usage in the upper corner. We
three numbers appear: the first represents the load in the last minute, the
second in the last five and third in the last fifteen. Useful to know if
there are applications that are consuming excessively.
Similar to the previous one, but shows the GPU usage through bars. It updates
in real time, but when taking up so much screen it becomes uncomfortable if you are not going to use it
that information for something concrete.
61
The Android system itself takes care of closing and managing the ...
background applications. When we switch from one application to another,
These remain in the background waiting to be opened again. If we activate
this option, the system will be much more aggressive and will consider closed the
applications upon leaving.
If you want to close Android applications and prevent them from running in the background
You should go to this setting. Here you can determine how many processes are
they will manage. We have everything from the usual limit, which is recommended, to
remove all processes until having four apps at once.
You will see a message saying 'the application is not responding' every time something fails.
Most applications are created to share all kinds of resources, but
sometimes they overlap with each other and do not manage energy well, then it is
When will we see this message that doesn't necessarily mean the application is failing?
completely.
62
Inactive applications
Another adjustment related to the Android multi-screen. With this adjustment, we will force
that all applications adapt to split screen, although initially they do not
they are not configured or optimized to work that way. We will need
restart the device to activate it, although we recommend being careful as
that some can cause all kinds of problems. (Pérez, 2018)
63
64
Unlocking the Bootloader of the New Samsung
65
Image taken from the internet.
66
6) Processors and their relationship with the System
Operative
67
Among the best-known processors are:
1) Mediatek or Mtk
It is one of the most well-known, it is the easiest to work with for technicians, since
its security is quite low which allows for releases, repairs of
IMEI and flashing, even manually, is built into its architecture in engineer mode.
that allows access to the internal configuration or design of these devices, to
To enter engineer mode, the following code is dialed: *#*#3646633#*#*.
They are among those who have the most problems with the stability of the operating system and
its relationship with the eMMC memory, if we flash the device with an eMMC memory
With defects, the equipment is probably not going to turn on. They mostly bring it.
mid-range or low-end devices due to their affordability. It is one
What is more susceptible to being affected by viruses or malware.
It is one of the most worked on with reflow, reballing, or eMMC memory replacement.
due to failures in it, which does not mean that it extends the life of the
device.
These processors use a notepad file extension in Windows
that is .txt (Scatter File) and is installed through a tool called sp flashtool,
that doesn't mean that there aren't other formats and other installers like .bin
that are flashed with the boot 8 of Miracle or the skf to install with sigma box.
It is also easy to revive when there are problems in the software by doing a test point.
to reactivate the flashing ports.
68
The way to connect the phone is as follows, the phone
completely turned off, the action is executed (frp, flash, repair imei or
open bands) and then connect, be careful not to press anything just connect;
when flashing we must try several versions of the flashtool, sometimes when flashing
They can throw several errors at us, many of which I have bypassed by changing the version.
delete the flashtool.
69
2) Qualcomm
This processor is the most stable and has excellent security, they are the devices
what else is hard for us when repairing them through software, when we receive a
client requesting our support on which terminal they should buy without any
Doubt we should tell him that he should buy a device with a processor.
Qualcomm. Generally in technical services, they have the highest cost.
in technical hours, that is to say, they are what is charged the most for technical services.
70
Some get flashed by doing a test point to activate the qualcomm hs-usb port.
qloader or with the phone turned off, connect while holding the volume button.
up and down, this process is also carried out to remove xiaomi account or to
delete Google accounts.
3) Intel
This type of processor is recently coming out with projects from the manufacturer.
Asus, The company presented the new series of Atom X3, X5, and X7 chips. The first,
the X3, previously known as SoFIA, will mainly arrive on mobile phones and
budget tablets, while the X5 and X7, previously known as
Cherry Trail will mainly arrive on higher-end tablets. Currently,
Asus is testing a series of mid-range and high-end phones with its
zenfone series, currently the nck and the umt have been incorporating different
actions to be taken with this type of processor.
Among the methods, processors, and manufacturer, there is the option of Intel and
spectrum and in the eft there is the option to flash using the methods of
USB debugging or in fastboot mode.
These phones can be flashed from the micro SD card by putting a ROM on it.
.zip or an [Link] that can be installed from recovery, from fastboot or
USB debugging can be done from the command console with minimal fastboot.
71
and adb through a series of commands that will depend on the type of connection
whether we are going to do fastboot or in debugging.
72
4) Spreadtrum or SPD
73
Hi silicom
74
One of the important features to highlight is that these processors for
Working on the software side does not require being a root user.
Broadcom
75
Infineon
To act
76
The company Agere develops chips for low-cost devices, in order to
can be integrated into the same music players. They are developed
for people who need cheap yet attractive equipment, in this
feeling the effort of Agere and Samsung Electronics seeks to bring the mobile phones of
low cost to the greatest number of people possible, with high quality in reproduction
of music.
The truth is that I could hardly find information on the web about this type of
processors. The manufacturers also did not continue developing
Rockchip
They are processors intended almost exclusively for tablets, they are quite uncommon.
in technical services. They are present in Chinese manufacturers with
Android operating systems.
77
Allwinner
There are several ways to identify the type of processor in a cell phone, the
the easiest way is to search the internet for the characteristics of the devices and
There will be the type of processor that the device has.
78
Another way to identify the processor is by connecting it to the PC, but it's not 100%.
sure, but with a little experience we can identify the type of
processor, we go to the device manager and check the type of driver,
In the following images, we will show you several drivers and you will have to
identify them.
79
Another way to know the type of processor is to go
80
Another way to find out the type of processor is directly from the settings.
from the same device, this is the least secure way to know the type of processor
of the device, since many of them do not specify the reference in the settings
processor.
81
In the case of Chinese tablets and phones that do not have recognized brands or without
manufacturer's brand so we need to disassemble the equipment to identify the
type of processor or look for the code on the motherboard that it has on the card
logic or in the volume, power, or camera flexes.
82
Manufacturers
For years, the king of mobile phones was Motorola Inc., which created that
heavy brick weighing 784 grams that cost US$4.000 in 1984. Then the Finnish
Nokia Corp. was the first to launch smaller, digital phones and
became number one in 1998. Four years later, the Korean Samsung
Electronics Co. was the pioneer in color screen phones, and now competes
with Motorola for second place in the global mobile phone market. But
currently, phones with built-in cameras are the latest trend and
Nokia is once again in the competition.
Currently, there are very well-known brands, but we can see that
there are millions of brands and models, and also weekly or monthly
new manufacturers are emerging, so the mobile phone technician will never stop
Learn because it is important to stay updated daily.
83
84
Universal Methods in Android
They are called universal methods because all Android devices have them and
there we can flash any phone through fastboot or the
adb, of course this will depend on whether we find the software to be flashed onto one.
of the universal methods, for this we will proceed to describe each one of the
universal methods.
85
2) Fastboot: this method is widely used to remove Google accounts, such as in
the case of the Huawei that is placed in this method off by pressing
volume down and without releasing I connect it to the PC, and the other models we must
enter recovery and we go to reboot to bootloader.
Xiaomi
Generally, it enters fastboot mode with the phone off by connecting it to the
computer and pressing the volume down for 10 seconds until it appears the
next image.
86
Motorola
87
Huawei
Generally, it enters fastboot mode with the phone off by connecting it to the
computer and pressing the volume down for 10 seconds until it comes out the
next image.
88
Htc
89
Others for recovery
90
9) The Three Ways of Working Software,
when flashing or for tasks to perform with
the boxes.
Through:
Processor
Many of the telephone boxes and installers are managed through the
type of processor that the device handles, which is done
it is necessary to identify the type of processor
Manufacturer
Many of the phones are approached depending on their architecture,
It's the case with phones like Samsung, LG, Sony
Method
The method is universal for all Android devices since all
they have both methods which are USB debugging and fastboot
91
Security Patch
The problem is that the installation of these patches does not depend on Google.
security on phones. That is why there can be significant differences between
phones at the time of receiving said patches. However, in 2018 there was a
important increase in the number of Android phones that obtained such
patches, as confirmed by Google itself. Partly, programs like Project
Treble or Android Enterprise Recommended are initiatives that help improve
the distribution of the same in the market.
For this reason, they are a necessity for phones in the operating system. Although
for a while many manufacturers have not taken it too seriously
seriousness. Since it was observed how many brands did not release all the patches,
even though they told users that they had indeed been launched.
92
93
94
11) Hard reset, format, Recovery and Backup
In the case of devices with spd processors, they would enter recovery mode with
volume down and power, or in the case of Motorola, HTC among others that first
we must enter fastboot mode, with the phone turned off and with the key of
Volume down, we enter fastboot, then navigate with the volume keys.
until reaching the recovery, select it with the power button until it appears
figure of the Android lying down, then we use the following combination to
to be able to access the menu, the first thing we do is press power while holding it
pressed and simultaneously we touch the volume up button and that's it
it would activate the recovery menu visualization.
95
from the same contacts application to the sim card, micro sd card, or email
user's email.
96
Another option to hard reset and backup mobile phones is through
software programs or boxes to improve the process and speed up the process.
97
98
One of the phones that does not come with recovery is the case of Sony devices, which
they come with that option disabled from the factory, to be able to remove patterns,
Google accounts and passwords we must download a bypass unlock tft file.
what is done to flash using the Sony Flashtool installer.
99
12) Cellular Drivers
It is a program that serves as an interface between the device and the computer.
this program controls the connections of mobile devices. Each device
mobile must have an independent controller and this will be related to its
processor.
A driver acts as a translator between the device and the programs that
they use the computer. Each device has its own command system.
specialized that only their controller knows, however, most of
programs have access to devices using generic commands. The
controller, therefore, accepts generic commands from a program and then them
translate to the specialized commands for the device.
To access the drivers in Windows, we go to the start menu in the
bottom left corner, we click and the menu opens, there we look for my PC or Computer
and we right-click, go to properties and select administrator of
devices, as shown in the following image:
100
101
12.1) Types of Mobile Drivers to work with software
It is used to have control or access to the device from the computer and
to be able to manipulate and make some modifications of the cell phone from the PC, but
first you need to activate some permissions from the cell phone so that the
computer accesses the cell phone and this is closely related to the
root process and both generally perform tasks such as repair
of IMEI and other processes.
102
Modem
103
Puerto Com
104
Mtp
105
Universal Series Bus Without Flash Sony
106
Universal serial controller for iPhone
The drivers for iPhone devices are installed by the programs installed on
the computer such as iTunes and U3tools, to know if the device is
recognized we have to go to the device manager and look for the
universal serial controllers.
Just like with processors, we must investigate which specific driver to use.
to run the equipment repair, sometimes even though they are the same drivers
Ports will be used for flashing and others for repairing IMEI or unlocking.
the bands, this is the case for the mtk that use preloader drivers to flash them.
and to repair IMEI, Mediatek drivers are used.
107
Device Manager
One of the ways to see if the mobile devices are recognized by the
computer is through the device manager, here we can identify if
the phone is recognized, if it can be revived with software, if the phone is
bricked, or if the phone is having issues with the charging port or it doesn't work.
108
12.3) Signed Drivers and Windows 8, 8.1, and 10
109
This safe mode has been present in Windows since XP, although it has not been
until the arrival of Windows 8 and Windows 10 when it has become much more
aggressive and difficult to evade due to Secure Boot systems.
110
total trust. Therefore, we will show how to install drivers that are not
signed in Windows 10.
111
This will show us a new menu where we have to enter the options.
advanced to later choose the Startup Settings option. There we are
they will show the options that we can change with the restart and where we can
find the option to Disable mandatory use of signed drivers. For the
So, we click on Restart and then choose the option that we
Disable driver signature enforcement
signed drivers, by pressing the F+number key of the menu option, therefore
general F7. Next, Windows 10 will start with this feature disabled
and therefore, we will be able to install any driver even if it is not signed
digitally by the company.
112
This option will be disabled until the next time we turn on the
system, so if at any point we want to reinstall another driver from
For these characteristics, we will have to follow the same steps again.
But if what we want is to disable the mandatory use of signed drivers
So we're definitely going to open a command prompt window.
with administrator permissions, run the command bcedit /set testsigning on and a
continue to restart the system. To disable this option from the
troubleshooter, we must run the command [Link] -set
loadoptions DDISABLE_INTEGRITY_CHECKS. (Adeba, 2017)
113
Mobile Applications
Applications can come directly from the manufacturer or from the store.
operating system, can also be developed by programmers
independents or as it appears in Android apps from unknown sources.
App stores
On Amazon it is AmazonAppstore
In Firefox it is Marketplace
In Symbian seriaOvi
114
There is an endless number of mobile applications and their growth is exponential that
they generate millions of dollars, making it one of the companies with the highest
growth in the world achieving investments and sales anywhere
world.
In Android, applications may or may not need superuser permissions.
What does it mean that many applications require the device to be rooted?
to be able to execute different actions, for example buttons on the screen to
execute the menu, go back, or the home key, etc.
115
116
14) Root Android
117
How to root an Android device:
To root an Android 5.0, we often need to modify the recovery and from
there we installed root access through a zip file that modifies the kernel.
It happens a lot with Samsung devices that in order to unlock them we must root them.
root access on these devices can be very dangerous during installation, as
we can completely turn off the device.
118
119
15) Releases or Opening of Bands
120
121
Opening of Bands through the calculator.
There are some software programs called calculators and some boxes them
they come incorporated, they work as follows; through the brand, the
model and the IMEI generate an algorithm that calculates a code that is entered in
the phone to be able to open the device bands, sometimes an error occurs in the
code but this happens when the IMEI of the device has been changed and because of
supposedly it will not match the brand and model of the device.
122
One way to unlock a cell phone from a carrier in the United States, such as At&t,
Tmobile, Verizon, Sprint, Metro pcs and US Cellular; these operators bring a
agreement with the clients, who must maintain a plan for three months
at least with the operator and does not apply to those users who are in
mora with the company or those devices that appear as reported as
theft or robbery.
The most important thing is to connect it to a wifi network that has a good connection or a
good bandwidth, to connect with the operators' servers
Americans and thus achieve the unlocking of the device bands.
123
Open the Unlock App Device application
124
In the case of iPhones, servers or rsim are used, which is a sim card that is
connect to the server to execute the band opening through an icidd code,
this sim card has a maximum number of devices to open the bands.
Another thing that should be highlighted is the type of bands that are needed to work.
in your country, for the signal to work perfectly, let me explain, if you have a
A device that works at 850 MHz and you take it to another that works at 2500 MHz will not
neither 3g nor 4g, that's why it's important to know your phone's bands and the area
where are you, below I show you a list of the bands from America.
125
United States - GSM-850, 1900 MHz.
Nicaragua - 850-2500 MHz.
Mexico - GSM 850 - 1900 MHz.
Panama - GSM-850, 1900 MHz.
Peru - GSM 850-1900 MHz.
Paraguay - GSM 850 - 1900 MHz.
Uruguay- 850, 900, 1700, 1900, 2100 MHz
Venezuela - GSM 850, 900, 1800, 1900, 2100 MHz.
In the case of mobile telephony, the current use of the 700 bands is defined (a
starting from 2019 with the second digital dividend), 800, 900, 1500, 1800, 1900, 2100,
2600 and 3500 MHz. Each of the frequency bands is intended for a
126
technology, for example, the 800 MHz band was released, shifting DTT to different frequencies
lower rates for exclusive use of 4G.
Finally, the 3.5 GHz band is used for WiMAX (IEEE 802.16).
127
16) APN
The APN or Access Point Name is something like the access point to our network or
the mobile data and indicates to the mobile which virtual path it should connect to
internet. Logically, each operator has its own, like configuring the APN on the
In the following graph, we will explain how to configure an APN according to your operator for
activate mobile data.
128
The name can be anything just like the proxy or the port, what matters here
It would be to set the APN depending on the operator and depending on the country we are in.
for example movistar Venezuela, Colombia, Argentina, etc.
129
17) Network problems
2) NV Data File
It is the most important in most Samsung devices from the year 2014 and
2015, where they had high protection in the IMEI file if it is a certificate.
of IMEI
The Cert file can be downloaded from one device and transferred to another.
device. Furthermore, if there is a closed device on a network, it is possible to recover
the Cert file from another operating device and write it to the locked device
for it to work normally, but before downloading the file it must be in
the router (Box) to allow access to Protection Zones It is also useful if
the IMEI is damaged or the IMEI is present but there is no network on the device and only appears
on your screen the famous emergency calls.
Certificates are also used to change the IMEI of a device and thus
remove the report from the phones illegally.
130
4) QCN File
Nvram
It is an internal folder of our device that contains all the information.
about it, the identifiers for components such as bluetooth or the
Wi-Fi card as well as the IMEI of our device and its serial number.
This information is important because if we end up flashing a new ROM on
Our Android will set the identifiers to 0 or some generic ones.
that is to say we will no longer have the same MAC address in the components of
connection in addition to the fact that the display may not work as it should or we lose it.
I blocked the mobile operator's signal due to an error in the serial number of the
terminal or in the IMEI, which is why it is always important to have a backup of this
folder for anything and before getting our hands on our Android.
131
18) Imei
The term IMEI stands for International Mobile Equipment Identity, the IMEI is a
15-digit code that represents the identification of each device or as
For example, it would be the identity card of each person and when you
The device connects to a network and automatically sends this identifier.
To find out what our IMEI is, we can go to the box of our device and
some nook of this must have the IMEI number of our mobile, but this
it is not very advisable. To know our IMEI 100%, the most correct thing is to go to
to our dialing keypad and press this sequence: *#06#, in the
the moment we press the last key, all the digits will appear or we can
check the label on the back of the device.
In many developing countries, thefts are constantly occurring.
devices that the authorities are combating the theft of.
When reporting an IMEI, the device will lose signal, many technicians in the
currently they are modifying these IMEI codes in order to
to evade a theft report and for the device to be usable again in
anywhere in the world.
Hardware IMEI: It is the one that appears printed on the back where it is located.
battery, printed on the cover or appears registered on the SIM card tray.
Software Imei: It is related to the operating system and can be
modified with software programs modifying it in the operating system.
This means that we can have two different IMEIs on one phone, this means
to say that the phone has been modified to remove a theft report or it can
It also happens that the phone's SIM card was changed and it has two different IMEIs.
It may also be that when flashing a device, the IMEI gets corrupted or is flashed.
a backup of software and also copy an IMEI of the device to which
I copied the software.
The IMEI is divided into several fields: TAC, FAC, SNR, and SPARE. The IMEI code
It consists of four parts and follows the next outline:
1) The first part is the TAC, called Type Allocation Code, and consists of 6
first characters (XXXXXX), where the first two digits indicate the
country of manufacture of the equipment.
132
The second part (YY) is the Final Assembly Code (FAC) and indicates the manufacturer.
of the team.
3) The third part (ZZZZZZ), consisting of six characters, is the number of
phone series (SNR).
The last digit (W) is the check digit or Spare, used to verify that
the IMEI is correct.
Some technicians take the TAC and the FAC to generate new IMEI with some.
programs like the advanced imei generator, to remove device reports
stolen.
As we show in the following image, they select a custom process and
write the TAC of the team, that is, the first six numbers and the FAC, that is, the two
the following generate and it implements the algorithm to change the following digits
with a logical sequence.
133
When we have a device that has signal problems and it doesn't pick up a signal.
First, we must verify if the equipment is not reported stolen or missing.
lost, I have known many technicians who have disassembled equipment trying
repair antennas, signal amplifier, they have changed the PA or amplifier of
power and they have asked me what else they could do and I tell them to review
the IMEI and after doing all this, the technicians realize that it was just that
they were reported.
How to identify if our device is reported, there are several websites
depending on your country, I will leave you a link so you can verify the IMEI of
the devices that arrive at your premises:
Venezuela
[Link] It is worth noting that in
Venezuela is not 100% safe to verify IMEI in blacklist, the only way to verify
with certainty is placing a SIM card (Movilnet) making a call and he us
It will say whether it is blacklisted or not.
Colombia
[Link]
134
Peru
[Link]
Chile
[Link]
e&_pageLabel=P39800544561339422564087
Ecuador
[Link]
Bolivia
[Link]
Argentina
[Link]
Brazil
[Link]
Paraguay
[Link]
Uruguay
[Link]
Mexico
[Link]
Panama
[Link]
135
our IMEI number is a backup or copy of the folder in which
it is stored. If you are a root user, I would recommend having in the
terminals a super useful application, it's called Root explorer and to make a backup of the
folder where the imei is located.
In the case of Samsung, they may have the IMEI but it still won't pick up a signal, because
It is advisable to check the status of the IMEI and the baseband, for that let's go.
dial the following code *#0011# on the devices which would be Samsung
service mode that refers to a network test for these devices, one of the
options is the status of the imei, when the imei has baseband issues
It will appear in IMEI status: NG, which means it is corrupted. And it needs to be repaired.
making the device user root and patching certificate or network.
Many devices can end up with a generic IMEI after the band
based there has been modified by inexperienced hands, so it is recommended to have
Be careful when trying to modify the device's baseband.
In the case of the MTK, it is important to emphasize that sometimes it becomes impossible to repair.
the imei of mediatek devices, when we have tested with different
tools and we cannot repair it we will proceed with the following method,
we root the device and install the root explorer application and with it we
let's go to the internal memory of the device and delete the nvram folder, to
we restart and by magic we have the original IMEI again
our terminal.
136
For those who did not make the backup, they can recover it through the boxes.
or the crack that repairs the baseband through copies of
security of other devices (qcn, nvram, nv data, efs, certificates, etc) although
It is necessary to be sure that it is not a physical damage in the RF IC.
To know how to repair the IMEI of our device, it is advisable to identify the
device processor and search the internet on how to recover the imei of our
device.
137
We must also be vigilant in verifying that the devices entering are
our technical service is not reported since when there is an operation
police will find reported equipment you may be arrested and taken to
a judicial process for receiving, modifying, and altering terminal equipment
mobiles, so the first thing we must do, even before issuing the invoice
It is to verify on the website of each country if that team is reported.
138
139
19) Google Account Lock
Google has invented a new method to prevent thieves from being able to
access (a copy of Apple's iCloud) to our lost devices or
stolen, a new feature that links our Google account to our Android,
even if a factory reset is attempted, the device will prompt you upon startup
your email and your password.
A) For this method we must be connected to a wifi network, the first thing that
what we must do is return to the main screen, on the main screen we must
activate the talkback in the following way, placing two fingers on the screen
from the beginning until a sign comes out, there we draw an L on the screen to
select the TalkBack settings.
C) We click the arrow at the top of the video, then it opens some
options halfway through the video and at the end, three dots appear, there we select another
arrow to redirect us to a video on youtube.
140
E) There we search for quickshortcutmaker apk, we download it, we install it and we
we open where it will show all the applications and activities of the system, there
we open in activities the start or launcher, we select it, we give it a try to
it opens the system for us and gives us access to the menu.
1.2) The other way is with the Remote Gsmedge application here in
quickshortcutmaker and we open the home or launcher and here we go into settings,
Let's go to biometric data and security, at the end there are other security adjustments.
we look for device administrator and disable it, we install Remote and
then we go to applications and click on the three dots at the top
left and we click on show system applications, next
we disabled two applications Google account manager and services of
google play, in case the option to disable applications does not appear
We do the following, we open quickshortcutmaker and there we go to activities.
we select the applications, we provide information about the application and there we
we give to deactivate, we go to accounts we add a google account, we go back
and we activated both applications.
141
Full flashing
3) Samsung Combination
The combination is installed via Odin, the combination is like a small system.
operation that allows us to enter the settings and there we activate the options of
developer deactivating the OEM which is the bootloader lock and activating the
USB debugging, after that we will flash the official software and it will remove the
Google account.
142
4) Fastboot mode Frp Cmd (mostly spd)
It's quite easy with this method, the only thing we need to do is put the phone in mode
fastboot and select the option for your device.
143
Due to software degradation
There are phones that have Android 5, and just by downgrading the original version to 4, they...
I would eliminate the account since this security does not exist in Android 4, also in the
huawei we can download the security patches and remove the google account.
It is always necessary to investigate since many technicians degrade the software.
Android O security patch in vain since those models are not supported.
and all that work or even the risk of bricking the phone will be in vain. When
we do software degradation we can use methods even manual ones that do not
they could be done with the updates.
Through the applications, with OTG memory the explorer will open for us.
files and there we can access the applications and install it without activating talkback.
144
8) Fishing method (sending an email to the owner)
It is used to deceive the owner and make them send their personal data so that they can
enter the password of the same user.
145
9) Voice call or Emergency Call
Sometimes with just a call we can save the contact during the call like this.
be able to enter the phone settings and with this delete the account. Also with
access to the calendar on the same call.
This is a new method that works with the new Samsung models like
the A30 works as follows: we add a locked SIM card to it
the lock pin appears, we proceed to lock the phone and it.
with a key we take out the sim card, unlock it and it should appear a
lock in the top right corner, we select it, there we go to notifications
And adjustments, we go to the Google Play Store, further down it says see all, there we click show.
all applications and there we open youtube in the application notifications, about
And privacy policies, it opens the browser for us, we download Apex Launcher.
we install it and access the menu, there we download the manager of the
Google accounts and FRP bypass, then the FRP bypass opens and we access the three.
points up we access the browser and the rest is the same as the procedure for the
applications.
146
There is also the notification bar method; when taking out the SIM, we proceed to
unlock and quickly tap several times to pull down the notification bar
Remove the padlock and continue with the previous procedure.
Another option would be to exhaust the attempts of the SIM card code with the PUK code and to
the lock will come out next and we continue the previous process, it is important to note that
When we block the SIM card, it will become inoperative, meaning it will no longer function.
what is recommended to do with one that is not working.
With this same method, we can use it on the second home screen and that's it.
connected to wifi, it would be to press next several times until the screen turns
black when collapsing and there insert the blocked sim card, we take it out and quickly
we click accept on the message that the sim has been removed, then we go to the lock
and we select it to display the notification bar and there we activate the
bluetooth and we connect it to some bluetooth headphones, once connected we press
the button on the headphones to activate the voice search of google now to say
through the headphones settings there we go to biometric data and security, to enter
in other security settings and there we look to set windows by activating it, we give it
unlock to unpin to add a pattern and there we return to the beginning us
he is going to ask for the pattern, we add the one we put in and that's it without counting.
147
11) Through a text message
With an application called hustsms or through a message that one can send.
what we receive with the link to youtube or google and there we would follow the steps of
first tutorial. This method will depend on the security patch and the type of
operating system that the device has.
148
Combination of methods
This method is carried out for those technicians who have experience in
account eliminations with cash registers, cracks, programs, and manual methods;
it consists of combining two or more methods for the elimination of accounts
many times one follows a tutorial and realizes that this method only goes up to
It is true that I must use another from there on, it has happened to me that sometimes
I even use methods that are not documented anywhere and that little by little
they open up as solutions for other technicians.
It is also worth noting that 60% of the accounts are handled manually, 30%
it comes with a box or boxes and 10% of the phones do not have any type of support
so it cannot be removed with any method or any box.
149
Xiaomi Account or Mi Account
It was created with the purpose of storing customer information in the cloud, but
over time it was taken with the intention of blocking the devices like with the
Google accounts, which have made them one of the most secure devices.
because you have a Google account and also an account with the security of the mi account.
To remove Xiaomi accounts we need an Ultimate Multi tool box or Nck with
a cable and a cable edl to carry out this procedure, many times we must
generate the usb port by doing a test point on the board with an edl cable as
the following image shows it.
150
It is also important to know what MIUI is, this is a version of Android that
has been developed exclusively for Xiaomi devices and this as well
is closely related to its security and the higher the MIUI
It will be more difficult to carry out the repair of the equipment; for now, we are going for the MIUI.
11.
151
Icloud Iphone
152
Many technicians and users fall victim to scams by supposed technicians who
They promise to remove the iCloud in 24 hours, it is almost impossible to delete the iCloud so...
We must not fall for this type of scam.
There are several methods to remove iCloud, one is through hardware, it would be
removing the NAND memory and reprogramming through a reader
EPROM memory, some place a NAND memory from a donor, like this
show the following image.
153
The other way to remove iCloud would be through functioning servers.
directly with Apple servers but the device must be with the IMEI
clean, that is, unreported, the other is through a command console in Python
from a MacBook computer, these commands in that programming window
he is going to bypass the iCloud account on the iPhone, the problem is that the
the device will lose signal.
Currently, methods have been developed to use on Windows and leave them with signal,
One of them is to start with a bootable memory of checkra1n and then
we do the second step directly from Windows, the signal will depend on
how the bands were opened, if the phone is directly from an operator like AT&T
the metro pcs, if the bands were made with an rsim or by server, etc.
154
22) Remove password or user code from
Iphone
The first thing we do is download and install 3uTools on the PC, which is the
program we will use to restore our iphone to its factory settings,
It is important to note that when starting the device, it will ask for the iCloud account.
First of all, even though you do not use iTunes, it is recommended to have it downloaded and
installed on the PC, this would help with the process and would be necessary to take it to
cable. It is also recommended to have a backup made to not
lose no information in case of restoring the device. Download and install
iTunes. You can download the program from the OFFICIAL APPLE PAGE but if
If you have Windows 10, you should download it from the Microsoft Store.
Access the 3uTools program, connect the device, and click on the section of
Flash and Jailbreak
Download the latest version or the one we want
restore/update (you will only be able to restore or update to versions that Apple
is being signed up to date). The download is done in the "Download" button of that
section. We can click on 'Import' in the case of having the downloaded version in the
PC, with the phone turned off we place it in DFU mode in the following way,
we hold down the home button and without releasing home we connect the usb cable
to the computer and it will be left to us as follows:
155
Click on Flash and wait for the restoration.
156
157
Jailbreak iPhone
It is defined as the method used to bypass security measures.
imposed by Apple on its operating system and to be able to install, modify, and change
anything about the system. Different developers have dedicated their lives to
thoroughly analyze Apple's software code to see where they can
colarse. A veces se realiza con mucha facilidad y en otras ocasiones ha costado
too much, but in the end there has always been a way to install in the
iPhone as many applications as you want without having to stick only to the ones available
in App Store.
LiberiOS Jailbreak IPA from its official site and Cydia Impactor is available
for macOS, Windows, Linux (32-bit and 64-bit).
2) Connect the iPhone, iPad, or iPod touch to your computer with the charging cable.
the LiberiOS IPA file.
3) Start Cydia Impactor on the device and your iOS device will be detected.
Drag the LiberiOS jailbreak IPA file that you downloaded.
previously to your UI. Enter the Apple ID and your account password.
Apple developer when requested, and wait for Cydia Impactor
Download the signed application on your iOS device.
158
4) Once LiberiOS jailbreak has loaded, start the application
Settings and go to Settings > General > Profiles and Management
devices (in some iOS versions it may be General > Management
of devices).
5) Tap the profile associated with the LiberiOS jailbreak application. Tap Profile of
Trust and confirm.
6) Launch the LiberiOS Jailbreak application from the Home screen and tap the
button Do it to start the jailbreak process.
159
24) Security
160
25) Use of Boxes or Dongles
The difference between a box and a dongle is immediately noticeable in the shape and
size, the dongles are very similar to a pen drive or a USB memory, the boxes
They have connections for UART cables and USB inputs for different types of work.
The box is an electronic device or gadget that contains algorithms.
programmatic tools designed to flash, unlock, repair IMEI, read passwords, read
or remove lock patterns, reset the device, among others. It has a
interface on the PC to allow executing all these commands, so that the
the computer must have the correct drivers installed. These devices
service contains the following cables:
USB - to connect it to the computer;
UART/Service - to connect devices via the COM port;
USB Hub - to connect other USB standard devices (for example, cards
from memory, etc.) except for phones;
JTAG - to connect devices via the JTAG interface.
Mostly, the release boxes also have an integrated card reader.
Intelligent. A smart card protects against unauthorized use of software and, in
the case of necessity serves to authorize oneself in developer servers
of the firmware.
The smart card or intelligent card is a SIM card that connects to a server and
it's practically the life of the box, in many cases for making the remote ones
suppliers of the boxes block this Smart card.
161
We select the processor, brand, adb method or fastboot.
We select the port (adb, com, modem) to connect the computer with
the mobile
162
We select the action we want to execute, such as release, repair.
IMEI, read pattern, remove user code, etc.
163
It is very important to remember that there are different ways to connect the equipment to
la computadora en unos casos fastboot, en adb, apagado, apagado presionando
lower volume and connecting the usb cable, without battery, turning off by pressing
both volume keys, without battery pressing both volume keys,
turned off by pressing the return key, turned off with the call key, turned off and
pressing 5, etc.
To know how to connect your equipment, it is good to turn to Google and check how to do it.
connect it, in the case of simple key spds it is important to emphasize that not
sale information on the network, so they must try different combinations like
connect the device and press the down key, menu, #-0-*, 7-8-9, etc.
164
165
Release boxes or liberation boxes as they are known in other countries are
essential if we want to have that extra in our workshops the most famous
son
Sigma box: it is the best when working with Qualcomm and MTK phones.
multi-brand but does not work with Samsung and LG models.
Z3X: its Samsung Tool Pro interface is extremely easy to use, it has a
software support and excellent combination, she is an expert in SAMSUNG and LG.
Octopus box: it is one of the most used for work with LG and Samsung devices.
it has customer support software support we have the option to have them
lite versions (Dongle) and with Jtag.
166
GCprokey: it is excellent when it comes to complementing the first two, it is multibrand.
we can make all the brands of cell phones such as Samsung, LG, Alcatel,
Huawei, Zte, Htc and Motorola.
Nck: One of the favorites for working with MTK cell phones is multi-brand Account
with the functions of working with all other mobile phone brands.
167
Miracle: it is a universal tool, specially designed for flashing,
repair and unlocking of the vast majority of Chinese mobile phones. Miracle
Box allows for flash reading/writing, IMEI repair without flashing the device.
device and other technical service operations for cell phones based on the
supported processors.
168
Box Crack
They are programs that simulate the use of real boxes but with many
limitations, A hacker is a patch created without authorization from
program developer and the one who modifies it with the aim of copying the
behavior of the original software.
169
Boxes without a box
170
171
28) Online Manufacturing Servers
A very commonly used online server is the Motorola Tools Server, which is a program that
Motorola employees sell directly for the repair of their equipment.
but that they can be sold or rented using the credit modality and
that would start from the e5, g5 models up to the most recent ones, this one brings
band unlocking or opening service, imei repair, removal of
Google accounts, among others, and the most important thing is that the service is done automatically.
IMEI number of the device without the need to connect it to a computer sometimes only
A code generated by the server needs to be entered.
The other server corresponds to the Huawei ones with the FRP key or the online Huawei unlock.
what is used to delete accounts via codes, online IMEI repair
and fast online band opening.
172
Virus or Malware
Viruses and malware are software or programs designed to attack the system.
operational with the aim of corrupting the system or stealing information from
device, generally viruses or malware disguise themselves as files of the
system to trick the operating system, mobile device malware
It is a great company since Google would have to invest in developers to
to combat this threat, developers take advantage either due to lack of
prevention or by bad luck, to carry out a cyberattack on your smartphone. The
security threats are constant and to prevent them the first piece of advice is
make responsible use of your devices.
Security on mobile devices is a matter of utmost importance for
companies and users. And many more if we take into account that smartphones
they are in the crosshairs of cybercriminals and virus developers.
The most well-known is the so-called porn virus, which takes advantage of the activation of the
configuration of unknown sources to start installing applications from
pornographic origins using a server taking advantage of the internet connection of
device, installing several applications putting many in the background and
causing the phone to become very slow.
To protect clients from viruses, the first step is to deactivate the applications.
of unknown origin, the second would be to download a good antivirus from the store
to avoid contaminating the device, another is to avoid installing applications that are not
in the official system stores, disable debug mode, do not connect
unknown wifi networks, avoid opening advertisement links presented from the
browser and finally avoid receiving emails from recipients without
senders or unknown ones.
How to proceed if we are already infected, the first thing is to download an antivirus, if
this doesn't work we can use programs or boxes specialized in eliminating viruses and
If this doesn't work either, we need to flash and then perform a hard reset.
complete.
173
174
28) The application has stopped
If you have or have ever had an Android device, you might have seen it in your
Unfortunately, the application (...) has stopped.
terrifying us terribly, if you have received this notice you have wondered what it
can you explain why this annoying notification has happened.
System Errors.
An application was removed from the system due to root access.
Due to the installation of a corrupted application.
175
Do not access sites with advertisements.
176
29) Requirements to install software
Driver
We need to have all the drivers installed on our computer in order to
flash any type of device.
3) The Software
It is strictly necessary to download or transfer the system to our computer.
operating system that we previously have saved on our hard drive.
Next, we will show you how to flash or install the operating system to
each of the different cell systems and features and tricks to be able to
make the correct installation of each of the operating systems
177
29.1) Software installers
178
Sp Flashtool
In the MTK processors, you download the operating system, which is generally several.
files, we click on where it says scarter loadin and select one with the name
from [Link] and we go to where it says download or firmware upgrade, we click on it
any option and we connect the powered-off equipment.
The operating system comes in a txt extension that is a notepad, and the team
It must be connected turned off or is there also a trick when it is not recognized that
it is to connect without a battery and then connect the battery, this will be identified
with the USB VCOM preloader driver and the official MTK installer is the SP Flash Tool,
that doesn't mean it can also be flashed with another program or box with
a different extension like the .bin of miracle or the skf of sigma.
This procedure must be performed with 50% battery and we must verify that
the loading dock is in perfect condition.
179
Qualcomm
To download the software from this installer, we must select those that have
XML extension, we click on browse and look for the XML file and click on download
and we hope it ends.
180
Odin Samsung
Samsung operating systems come with a .tar or md5 extension,
new cell phones come with a differentiation by binary type, it is important
know the type of binary of the cell phone to flash in order to download the operating system
suitable; how to know which binary to use here I explain:
If by chance the team does not turn on, we can normally check in the
label or you can also enter download mode and check its model and binary.
The first thing is to bring the equipment into download mode, and this is done as follows
We press the power, volume down, and home buttons all together with the phone turned off.
at the same time we plug in a USB jig and it will look like this:
181
In the top left corner, we can see if the device is connected, more
below we have the options for autoreboot, repartition, and f reset time; no
we will select the re-partition unless we have memory problems and
we would like to flash the memory partitions with a pit. We are going to
select the file(s) to install as the software can be a file that
it would be the pda or the 4 files plus the pit.
.pit is a file that formats and reconfigures the terminal partitions and also
the flash counter resets. It is very unlikely that they will need to use this option.
The Ap or Pda is the Android system that contains almost all the information of
operating system.
The Phone or Cp is the baseband or modem of the phone (everything related to
with the signal and the IMEI).
182
The Csc is the Customized Product code and is specific to each ZONE
Geographic and its Operators. Contains specific software for the region where it
it will market the terminal, the configuration of the APN, data connection, MMS and
other configuration of each Operator.
After selecting the firmware, we click start and under no circumstances should we
to unplug the device from the cable that connects to the computer or the phone
it could enter into a hard brick or soft brick that would be difficult to repair.
At the end, to perform a clean installation of the system we must perform a hard reset.
reset.
iTunes iPhone
183
Place the executable iOS IPSW file in an easily locatable place, for example,
on the desktop and make sure to have the latest version of iTunes.
While in iTunes, we press SHIFT + click on the 'Update' button and
we select the path where the software is located, press update, we wait for
that it restarts and we will have finished the process.
3Utools iPhone
This software is the best for flashing iPhones, it is also very good for
download the firmware without needing to keep the phone connected
keep downloading and save the firmware in a folder so that there are no
need to download them again, make a backup, jailbreak, etc.
184
Phoenix Nokia Simbiam
The software for Nokia Symbian is sought by the type of rm and the model of
Once downloaded, we go to the local disk C, we look for files of
program, Nokia, Phoenix, Product and we place the software in that folder.
Open Phoenix, go to Files, then Manage Connections. Here, with the dates.
that are highlighted in the image, leave 'NO CONNECTION' at the top,
for this, select this and raise it with the arrows I mentioned, then
Apply.
Now they go to File again, then to Open Product, and a window will appear.
like the following image; here you look for the RM of your cell phone in the section
for example RM-342 for N78 and so on. In case you want to make a change of
So look for the RM of the firmware they are going to put, not the one they have.
Currently the cell phone. After they have chosen the RM, they will see that others come out.
menus up. So now go to Flashing, and then to Firmware Update. Here
a small window will pop up like the one you will see below. First,
they click on the 3 dots in the Product Code section and choose the variant of
185
firmware that they are going to install with its corresponding product code. If they have downloaded with
Navifirm does not require selection, just choose the only one that is available because that
"Filtering" of product codes was already done when downloading the firmware.
Then check the Dead Phone USB Flashing box, click on Refurbish,
After a couple of seconds, a notification will appear asking them to press the button.
Power of the team. Well, here you press power but just press it and
release it immediately, do not keep it pressed like when you turn on the phone,
they just press and release it, because if they hold it down for too long, the phone
it can be turned off and the installation would suddenly end.
186
187
Upgrade Download spd Speadtrum
188
Sony Flashtool
We need to download the Flashtool from this page, we will install it.
Now we download the firmware for our mobile using the Flashtool.
Now we will place the firmware we have downloaded in the following folder
C:\Flashtool\firmwares, we will unzip the files into a folder and we
the firmware that we need to install will appear. Once we have placed the
firmware in the corresponding folder we will open the Flashtool tool in the
32-bit or 64-bit mode depending on the computer we have. Once opened,
we will give the lightning symbol and choose the Flashmode option
189
A window will open where we must choose the firmware we have downloaded.
previously and that we will have placed in its corresponding folder.
190
We will check all the wipe boxes, by default they are already checked so that the
we will leave it as it is. This will erase everything except what we have in the
internal memory, by performing a full wipe we will achieve a clean installation and with
for better mobile performance and without bugs. Now we need to go to the mobile to
Settings/Developer options/Enable USB debugging, we will enable it and
we will turn off the mobile, We click OK in Flashtool and when it asks us to connect
we will connect the mobile to the PC by holding down the volume down or back button.
The flashing will begin, we must not disconnect the mobile under any circumstances.
until the process finishes. When the flashing is complete, it will tell us that the mobile will go
to restart, but it doesn't do it, we will disconnect the mobile from the USB and turn it on.
191
LG Flashtool
We download the firmware of the LG phone we want to flash, this software
they come with a kdz extension and we can download them using the following
programs, all we have to do is enter the model and the device's IMEI, this is
It will connect to a server and proceed to download it to the PC.
We open the lg flashtool program and select 3GQCT in select type and in the
In phone mode, we set emergency and finally select the kdz, and we
we give normal flash.
192
They select a different country and choose the Spanish language and click ok.
193
If an error occurs while installing, we move the window and we will observe.
that the installation continues, we must not close the process or disconnect the equipment
until the installation process is completed.
194
Install LG UP on your PC.
Download the [Link] file so that it recognizes the LG properly.
Download the KDZ file, which is the stock firmware that we are going to install.
You need to create the common folder in the specified path in the link and put
inside the [Link] and the KDZ (do not extract to DZ or it will give an error at about 4%).
The folder where those files need to be placed is:
C:\Program Files (x86)\LG Electronics\LGUP\model\common
With the phone off, we will enter Download Mode using the volume button.
up and connecting the cable from the computer at the same time. It is not
It is necessary to unlock the bootloader again to install the stock firmware. This
it can be useful if you are thinking about installing a custom recovery in the future.
Check that the two files are located in the correct folder.
Restart Windows.
In File PATH, put the path of the KDZ file and select it.
Then we press START.
In the following, you will see how the process is progressing, under no circumstances
You must stop the process.
195
Nokia Software Recovery tool
We connect the device to the computer, and the program will download the system.
operational through the server, it is strictly necessary to have a connection to
internet. The program executes the entire process.
196
Mi Flash Tool Xiaomi
This is the software installer for Xiaomi and you click where it says select.
locating the folder where the software was downloaded, we select it and then
we refresh so that the device detects us, but for it to detect us we must
connect it in two ways in fastboot mode or by doing a test point and then
we click where it says flash and it will show us a progress bar at the bottom
upper left. Sometimes it can give us an error when trying to flash, what we should
the first thing to do is change the adb driver, if this does not work we must change the
name of the firmware folder with a simple name and no spaces or
characters and the last thing would be to change the version of the software installer.
One way to install the operating system or upgrade our operating system,
In Huawei, there is a method that would be to place the dload folder on the micro card.
press and hold the power, volume up, and volume down buttons at the same time
time and would enter flashing mode.
197
Another update option is through [Link] and we flash it from the
recovery selecting install update from the sd.
One of the ways to flash our device is by entering recovery and from there
there enable fastboot, adb or direct flashing from a zip file sometimes
called [Link], to install from recovery we must have at least
a 4 GB memory, it happens that sometimes phones do not recognize the memory
or the micro sd port is damaged what we must do is transfer the software to a
USB OTG memory or USB with an OTG adapter and we flash it as shown.
next image:
198
2) Update via Fastboot Method
Another way to flash is by putting the phone in fastboot mode and using a console.
by command or through the minimal fastboot and adb kit and with some lines of
command we can perform the installation of the operating system, we use the following
command (fastboot devices) to see if it recognizes it, after that we go and
we type the following command fastboot flash and select the file path
We drag the file to the command console, this flashing method
it does a lot on Motorola, Asus, and Nokia.
199
3) Update via ADB Method
One of the methods is through recovery by entering the update through the
adb, we open the minimal adb and fastboot console and type the following
adb sideload command, we add the file in the console or we give the path where
the file is there.
200
201
30) Reviving Huawei with Software Issues
In the case of phones that do not have a micro sd memory slot like in the
in the case of the Mate 10, we move the dload folder to a USB memory, and through
from an OTG adapter we flash the Huawei from recovery mode
pressing both buttons and the power button.
202
203
This method is for those phones that have access to recovery.
customized that has access to connect to the huawei server to
download and install the operating system, it runs with the phone turned off
and connects with the phone by pressing the volume up button, there
we connected to wifi and updated from the same phone.
3) Via Fastboot
Esta es una de las opciones que podemos utilizar para revivir un huawei, para esto
we need boxes or crack like eft, mct, sigma or nck; the first thing we have
What to do is place the phone in fastboot mode as follows,
we turn off the phone and connect to the computer by pressing the key of
volume down while in fastboot, we go to the box and select the
[Link] that is generally found in the dload folder where it comes from
software for the sd, we give it a flash and wait for it to finish flashing.
204
205
206
4) Via Test Point
It is one of the most used and one of the most effective; the phone is disassembled and it
proceed to make a small short on the card connecting two points on the motherboard
to generate a connection port named Huawei usb com 1.0 so that through
from this, the operating system installation can be carried out.
207
208
31) Encryption Error
This error is defined as the encryption of the operating system data due to
software errors and/or hardware errors, this data encryption makes it that
it is impossible to load the operating system, errors generally occur in the
system of the operating system, every time you start the device it will not enter it
system but it will give us an error on a screen with some letters as shown
in the images, it gives us access to recovery but when we perform the hard reset
nothing happens most of the times.
The first thing that needs to be mentioned is that this error is due to problems with
the eMMC, that is to say the internal memory of the device (where all the data is stored)
information related to the phone's operating system) many times it
repair by doing a hard reset of the device, other times it is necessary to install the
operating system and restore factory settings to repair and finally
replace the eMMC memory and this is caused by two reasons the first to
software issues and the second due to physical problems, meaning the eMMC is
corrupted or damaged, the second being the most significant cause, that is, not all the
The team will leave using reballing or reflow.
209
Reviving mobile phones with Mtk processors
Requirements:
1) The firmware of the equipment
2) SP Flashtool with the exact version for your device
A cable at least 6 cm
4) Screwdrivers
Heat Station, Soldering Station, Soldering Iron and Tin
6) Select a well-lit site
7) Have a personal computer and the battery lasts at least 30
minutes
Explanation:
It is an emergency method that is carried out when the equipment does not turn on due to
a bad installation of the operating system, due to formatting in flashtool, some
installation of an incorrect operating system; with the connection of points KCOL0 or
COL0 what is the + of the connection to the usb and any ground point on the motherboard
What can be the GND or any can connected to the board that causes it to
activate device recognition, since after the brick the device loses
the connection with the PC, after this we will be ready to perform the flashing.
Procedure:
The first thing we need to do is disassemble the equipment and locate the KCOL0 point and
we proceed to solder the KCOL0 cable to GND or any ground available
contact with the motherboard to activate the COM MTK, VCOM port,
PRELOADER, etc; the most advisable thing is to try to keep the driver.
PRELOADER that is suitable for flashing, it is necessary to verify in
the device manager as shown in the following image:
210
This is how the driver should be installed on the computer in order to perform the
Flashing, if you don't know how to access the device manager, go to start.
And you click, search for computer or my pc, right click on computer and search.
properties and a window opens, there opens the device manager and
busca los puertos COM y LPT; si no tienes los driver instalado aquí te dejo un enlace
for you to download them:
211
212
Once we have performed the test point connecting the two points, we proceed to open.
the SP FLASHTOOL and select the operating system in the box where it asks
In the scatter-loading, we select our operating system and deselect
all the items, we will only select the preloader, (NOTE at all times during the process
The test point must be connected; otherwise, it will not work. You will only be able to disconnect it.
when I finish flashing the preloader); as shown in the following image:
213
There we flashed the equipment and it will be installed at 100%, totally.
functional, we would only need to charge well for our work.
Note this will not work if the team has damaged EMMC memory, for this
It is always good to do a memory test in the flash tool after the test point.
check nand and emmc as shown in the images:
214
215
33) Revive Samsung via Usb Jig
One of the most common problems with Samsung is damage to the system.
operational caused by poor handling, by a failed update or by a
bad flashing, all this will cause the operating system to fail leaving the
dispositivo en el logo o prendiendo directo en modo download (Soft brick) o que el
device does not turn on in any way (Hard brick). There is a way by
which we can force the device to enter download mode through
from a USB jig, which can be of industrial or professional manufacture and we have the
homemade.
To make a homemade USB jig we need to use the following components:
1 resistor of 300 kΩ or 3 of 100 kΩ arranged in series with 5% tolerance.
A V9 micro USB cable
Soldering iron
Tin
Flux or solder paste
What we are going to do is cut the USB cable at the end where it connects to the port.
of load to expose the wires for placing the resistance on the wires
number 4 and 5 remaining as follows:
One of the most common problems in Samsung devices is damage to the system.
operation caused by improper handling, by a failed update or by a
bad flashing, all this will cause the operating system to fail leaving the
device in logo or directly turning on in download mode (Soft brick) or that the
Device does not turn on in any way (Hard brick). There is a way through
which we can force the device to enter download mode through
from a USB jig, which can be industrial or professional grade and we have the
homemade.
To make a homemade USB jig we need to use the following components:
1 resistor of 300 kOhm or 3 of 100 kOhm placed in series with 5% tolerance.
A micro USB cable V9
Soldering iron
Tin
216
Flux or soldering paste
What we are going to do is cut the USB cable at the point where it connects to the port.
for loading to expose the wires to place the resistor on the wires
number 4 and 5 remaining as follows:
Note: the battery should not be stuck and should be well charged, I recommend
put it in the power supply, since many times when they are bricked
They drain the battery very quickly and do not allow the battery to charge, leaving it like this for a while.
Some days the battery gets stuck and you will have to detach it from the power source to put it on charge.
a universal charger.
217
34) Most common mistakes made by technicians when
refer to the software
I am going to make the software, only programmers make software, the technicians
we just installed it.
I am going to update the software, what we do is reinstall the same version of
operating system that I had.
3) Not backing up customer information.
4) Not informing the customer that the installation of an operating system may be at their own risk.
for eMMC memory errors.
The phone won't turn on, the board is burnt, the logic board burns out by itself.
when it catches fire.
The phone is very slow, or rather the phone is very heavy; could it be that it ate?
a lot and gained weight.
I had a virus that turned the phone off completely, viruses do not turn off a
phone completely.
218
I installed the software and the IMEI was changed, most software does not do this.
And if he does, we must repair the original IMEI.
9) Do not deliver the invoice.
219
the two wipes, wipe data/Factory reset and wipe cache partition, we select reboot
system now and ready phone unlocked.
If the device is Mtk, we can read the codes through a box.
we select the processor in the menu window, we click on service and
we place Read Pattern Code, finally we press start and connect the equipment
off and will give us the lock pattern through numbers as shown in the
image.
If the device is in debug mode and rooted, in which case it is not rooted.
it can be done with kingoroot, the important thing is that the device is in mode
debugging and whether the debugging permission and root had previously been enabled,
if the device is in that debugging mode we will be able to read the pattern, code of
user and/or passwords of any device regardless of its
processor, it is recommended that the devices that arrive at the technical services
The debug mode has been activated and accept the permissions so that when the client
if we forget any of the phone's locks we can access the device
without deleting the customer's information.
In the following image, we can observe how the blocking patterns are read.
through a service box.
220
We also have the use of the boxes, such as the eft dongle that reads
passwords or patterns through the MTP storage driver or also with
the ADB to decrypt or remove patterns or passwords is one of the best
to avoid deleting customer information.
221
222
In the case of Samsung, we can remove lock patterns or passwords.
through a modified recovery or a TWRP (Team Win Recovery Project), they have
When mounting the data partition, it is preferable that the TWRP or the recovery has a manager.
the file explorer with the ability to access system files, there
search for and delete the following files (it is worth noting that it is also
It is advisable to make a copy of the files on the micro SD card or on the memory.
otg)
[Link]
[Link]
[Link]-wal
[Link]-shm
[Link]
[Link]
At the end, you just need to restart the device and you're done.
223
36) Insufficient Memory Issues on Android
224
executed the updates
automatically we should go to the
settings, applications and there we go
application by application and
we uninstalled the update of the
application unless it is
strictly necessary as that of
Google services, WhatsApp,
etc.
In case we have done
the procedure y still
let's have a problem with memory
we can do the following in
some models, let's go to settings
applications, we select the downloaded applications to move to the SD card and it
It is automatically stored on our card.
If our terminal does not have this option, we will need to root our device.
We partition the memory card with a program for that, I recommend Mini.
partition magic tool, we placed it in a usb adapter (we backed up the information)
225
first) and we partition in the following way, we select the micro memory
we press delete and then create, we select primary for the partition and in
the FAT32 system to both partitions, and we leave at least one memory of
512 MB for application storage.
226
227
Screen Buttons
There is a difference with the framework or the version of Android, in Android 2.3 for
below we must install a version of the application and Android 2.3 or later
we must install another application so that it can work on our
device.
228
Receipt for the reception of Mobile Phones
Note: Equipment that does not turn on is accepted under the customer's responsibility, as it is.
Turned off does not allow checking for other faults; if there is an additional fault, it will be a separate repair.
With another charge, equipment that is taken to other technical services will lose its warranty for withdrawal.
The team must present the original invoice and will be given a maximum of 30 days to retrieve their equipment.
Otherwise it will be used as a replacement to cover expenses, after the contract is signed.
There will be no return of the equipment nor refund of money.
________________ ___________________
Client Signature Customer Fingerprint Recipient's Signature
229
Technical Service Control Program
The program is called SatManager and it is used to keep track and control everything related to
a technical service, among the options we have are the following:
Client Control
Equipment Control
Refractions or Spare Parts
Suppliers
Fault Database
Contact phones
230
40) Price List for Technical Services
231
Hardware
232
Chinese Replicas
Huawei:*#*#2846579#*#*
Vivo:*558# & *#*#4838#*#*
Xiaomi:*#*#64663#*#*
Samsung:*#0*#
Oppo:*#808#
Sony:*#*#7378423#*#*
Htc:*#*#3424#*#*
Lenovo:####1111#
Meizu:*#*#3646633#*#*
Zte:*#*#4636#*#*
Lg:3845#*model number# & *#546368#*model number#
If your phone opens a hidden menu with these codes, it is completely original.
233
Remote Services
234
USB Redirector
5) VirtualHere
235
What we do is open the program and where it says usb remote devices and there we
we give the add server and there we place the IP address of the machine which we are going to
share the port, to obtain it we go to control panel, network and sharing center
shared, network connection, we click on details and there we will see the ipv4 address,
as shown in the image.
Then we look for the device we want to use, we click on shared, and it will start.
to install the driver on our computer, even if it is the Smart card driver
from our box.
236
Another program we need is Himachi,
that is used to connect two or more
networked computers and used in the following
way, it turns on with a create button
network that brings, when turned on will enable an IP
virtual, and it will enable the other buttons of the
program among them one that looks like a
triangle, they press it and there is an option that
you say to create a new network, they create their network with a user
and password (if they do not have it, they must register),
they leave the program running, then
run the usb network gate, connect the box or
dongle and the program must detect it,
they select and click on shared (a button that
he has the program) that way it is
enabling the key to share it on the network.
We can use boxes, dongles, or cracks,
but for that we must install the three
programs on the computers that they want
share the USB ports.
With the use of these three programs we can work remotely with our
box, of course they have to be careful since developers try to prevent that
this happens and for this they make a ban which seeks the smartcards that are doing
remote and blocks them.
237
Coding for technicians
Many of the technicians ask me why the technicians talk about formula or
codes.
F = Factor or Formula
Account Unlocking (FRP)
F1= Screen Unlock (Pattern, Password, Etc.)
F2= Flasheo
F3= Liberation or opening of bands
F4= IMEI Repair
CF = Final Customer
IT= Intermediario
TH= Hardware Technician
AP= Aprendiz
TNT = Technician who is never going to be a technician
238
MDM Protection
MDM (Mobile Device Management) is a new protection designed to prevent
that the devices are used after being stolen, so that they can be activated or
disable devices, remotely delete data, track devices, prevent
install the operating system, create backup copies, manage encryption and
manage the mandatory use of security policies, etc.
Many of the mobile devices with MDM will be impossible to flash.
it would also cost to modify any features of the device. Until the
moments it is not clear how it is going to work exactly but it is being discussed
What the sim card is going to be used for is to associate the phone with the sim, in a moment.
The device can only be used with the SIM card with which it was associated.
AirWatch
AmTel MDM
BlackBerry Mobile Fusion
239
Boxtone Mobile Device Management
Citrix XenMobile
Dialogs Smartman Device Management
Excitor DME
FancyFon Mobility Center
Fiberlink MaaS360 Mobile Device Management
Fixmo SafeZone
Good Technology Mobile Device Management
IBM Endpoint Manager for Mobile Devices
Mformation Enterprise Mobility Manager
Microsoft Intune
MobileIron MDM
Rapid7 Mobilisafe
SAP Afaria
SOTI Mobile Device Management
Symantec Mobile Management Suite
240
One of the most well-known MDMs in mobile telephony is the blocking due to non-payment.
the phones that are assigned to customers via credit, the most well-known is the
blocking of the Claro operator that is present in several countries in Latin America,
those users who do not finish canceling their devices will be blocked with a
overlap that prevents the device from being used in any way.
241
Tracking of stolen phones
Through applications, one of them is Cerberus, one of the best because it has
a number of possibilities. The cell phone can be tracked even if it doesn't have internet
242
(through SMS or GPS commands) and perform a large number of other actions.
remote form. It also offers anti-uninstallation protection in case the
device undergoes a factory reset (although this functionality requires
root permissions and PRO function). The disadvantage of this application is that it requires
to be installed in advance on the device. Additionally, it is a service that there is
that you subscribe for an annual payment, although it offers a free trial period.
243
Another application that serves to track your phone is Prey, it is completely free and
bring a variety of options. You have to register in the app and do it
also through the browser.
Snuko is another type of 'silent watcher' that collects data about the device
missing (through geolocation, screenshots, IP addresses,
photos, etc) and also allows you to make online backups of the data.
Additionally, it locks the device to prevent information theft.
244
These mobile tracking systems are not infallible. If you cannot locate your
cell phone, probably the thief has already taken measures regarding this.
The tracking will show a notification on the cell phone, which will alert the person.
that you have on your mobile. Be careful to deactivate it.
If they fall into the hands of a technician with knowledge who can deactivate
quickly any security system.
245
46) Taxonomy of repair technicians
telephones
Level 1 Hardware
Technician Level 1 ------ Hardware Apprentice (T1-N1)
Technician Level 2 ------ Intermediate Hardware Technician (T1-N2)
Technician Level 3 ------ Advanced Hardware Technician (T1-N3)
Level 2 Software
Level 2 Technician ------ Software Apprentice (T2-N1)
Level 2 Technician ------ Intermediate Software Technician (T2-N2)
Level 3 Microelectronics
Technician 3 level 1 ------ Microelectronics Apprentice (T3-N1)
Level 3 Technician 2 ------ Intermediate Microelectronics Technician (T3-N2)
246
47) RMM Status: prenormal Samsung
3) Flash custom recovery, wipe system and data, and finally install one
custom rom.
5) When it arrives with efs not mounted and with rmm status: prenormal
Download an official firmware from Brazil or Trinidad and Tobago and flash it, activate
developer options.
Deactivate automatic date and time, we set the date back to 1/2/2019 and we start
to search for updates, we restart and search for updates and install them
update 8.0
Advance the date 7 days from 2/8/2019, look for the update and skip.
Advance the date to 15/2/2019, restart, search for updates, and jump again.
Move the date to 22/2/2019, restart, and check for updates without installing.
Set automatic date, go to developer options and voila, the OEM appears.
activated.
Repair drk and efs not mounted with certificate.
247
Additional Skills to Develop
1) Instrumental English
248
249
250
Advanced knowledge of computing
It is essential for the person who wants to learn to repair phones in the part
the software almost perfectly masters the use of the computer, we must
study where the drivers are located, how to install them, manage cmd consoles,
programming commands, key combinations, extract, import or modify
files, and even make modifications to the Windows registry.
It is better for the phone software technician to also be a technician for
computers or has taken computer repair courses or has
They will be trained in computer repair in the area of formatting and installation.
of programs, since many of the repairs require us to master programs
computer experts, handling cracks, disabling antivirus and handling freezer
computers such as deep freeze or shadow defender.
3) Programming Language
251
we can observe that on iPhones there are also commands to jailbreak or
bypass iCloud through Python.
252
49) Fastboot and ADB Commands
253
fastboot erase system
fastboot erase userdata (Perform a hard reset)
fastboot erase cache
fastboot flash system [Link] (Flash the system)
fastboot flash boot [Link] (Flash the bootloader)
adb devices (devices connected in USB debugging)
adb install <[Link]> (install an application in USB debugging)
adb reboot bootloader (Reboot into fastboot mode)
adb reboot recovery
adb sideload [Link] (flash the firmware)
254
50) How to know if we are doing a good job
work?
The commandments of a good technician and a good technical service.
Local presence
Sometimes it doesn't matter where the store is located, even if it's in the poorest neighborhood or in the
the tip of a hill, its presence and organization are important, they say that
The first impression is what counts and appearance sells, which is why it's important.
presence of the premises.
3. Effectiveness
Many technicians shy away from certain types of repairs and do not dare to fix them.
phones that we know are going to take work, when you have technicians who
they train, investigate, resolve the strongest cases the clients make you the best
advertising that exists in the world, a good technician is welcomed by any
Locally in the world, if you only repair 1 out of every 10 phones, you must be doing something wrong.
Well, the minimum would be 10, you should repair 3, anything above that would be excellent.
4. Excellence
When very little work comes through warranty, it is known that it is a good
work and it will be fully guaranteed, many times we do things for
step aside, we make a jumper without putting UV mask, we change a screen
and we leave it uncovered, what I recommend is to do a good job.
5. Attention
THIS IS THE MOST IMPORTANT, 70% OF CUSTOMERS LEAVE YOUR
LOCAL FOR POOR SERVICE.
255
Remember that customers are the ones who keep your business running, it hurts to say it but
the customer is always right, attending to them with care, letting them feel offered coffee
or a tea, watch television, treat him well and make sure his experience in our business
be the most pleasant.
6. The Dedication
When you only fix the easy things and do not accept difficult jobs and let them go without even
at least take a while to study it, many of the teams take us days or
weeks and many times we do not find the solution but this leaves us with a great
learning.
7. Delivery Time
The faster the delivery of the equipment, the better it is for the reputation of
technician, sometimes it makes me laugh with workshops that tell the customer that in 20 days 1 month
o 2 meses está listo su equipo, me parece una falta de respeto con el cliente si crees
If you can't repair a device, it's better to return it.
Currently, many clients know what you are talking about, so if you don't know
clients will know what you talk about, it is always advisable to use the
appropriate terminology and mastering the topic being discussed, if we do not know about
What is being discussed is better not to intervene in the conversation.
9. Responsibility
When you tell the customer that you will be open on Monday and you don't even open the store, when you shut down
the phone not to respond to customers, irresponsibility is the cause of the
loss of customers, the best advertising you can have is word of mouth and the
recommendation from your clients to future clients.
10. Honesty
I worked in many places where they removed parts from phones, it was not done to them.
nothing and they charged him, for example to open bands and he was already free, many
things like that. In the world of technical service, all the traps and thefts or
charges that we want to make to the clients come to light and those things
they are going to make your business have a bad reputation, I remember there was a technician who
256
they called him Rafa trap or a business they called 'the workshop catches everything that doesn't'
fix it, it's broken.
12. Humility
In this world, I always come across many who call themselves masters, the
genius, the best of America, the best of Colombia, the best of Mexico, the best of
Peru, the best of Venezuela, but there are many good people in this world and who
They very rarely show what they know, we must be careful because
we could end up looking ridiculous, as we are going to want to stand out and be better than the
there will always be someone who knows more than us and makes us look bad
bad.
257
15. Investment
Tools don't make you a better Technician, but they help you make things easier.
Your work is meticulous; invest in tools and you will be able to offer a quality service. The
investment in professional tools and machines, when customers see that
take the screens with a clothes iron and stick them with silicone and solidify them with
a soldering iron that they sell where the Chinese are, do you think the customer is going to stay in your
business, try to make your clients see that you have quality tools
that will help you do a quality job.
258
Coding for technicians
Many of the technicians ask me why the technicians talk about formula or
codes.
F = Factor or Formula
Account Unlocking (FRP)
F1= Screen Unlock (Pattern, Password, Etc.)
F2= Flasheo
F3= Liberation or opening of bands
F4= IMEI Repair
CF = Final Customer
IT= Intermediario
TH= Hardware Technician
AP= Aprendiz
TNT = Technician who is never going to be a technician
238
What can happen if I root and do not unlock the bootloader?
260
9) If a phone does not turn on, how can you tell if it is a software failure?
261
13) What is the test point used for?
262
18) What driver is needed to flash an MTK?
20) What needs to be done after unlocking the bands on a phone for
that I get internet?
263
23) What to do when a phone has insufficient memory?
24) What relationship does the Google account have with OEM locking?
264
29) Name three ways to flash a Huawei?
30) What are the names of 6 boxes and which phones do they work for?
33) What is the first thing we should check if a phone has no signal?
265
34) Which driver corresponds to USB debugging and fastboot?
What is a bootloop?
266
41) How to unlock the phone bands brought from the United States?
42) How many files does Samsung software include and what does each one mean?
46) If a phone is flashed and does not change or stays stuck on the logo, what do you think?
What is it due to?
267
48) What are the various ways to install applications?
50) What is the only phone brand that does not have a recovery?
268
What is Miui?
58) Which phones could be repaired by the server without connecting to the PC?
269
59) Name two boxes without boxes?
270