GPS help - Galaxy 3 General

guys i need a favour
here are settings for gpssetup2 on i5800 but i have recently changed it but didnt save original settings...and now i want to compare it...can somebody please write original settings?
here is what i have done:
1. Open stock dialer
2. Type: *#3214789650#
3. This should open GPSSetup2
4. Settings:
> Parameter
> Address
Server type: UMTS SLP
Address type: URL
Address: supl.google.com:7276
> Start mode
Start mode: Hot start
> SSL
Enable SSL: Disabled
> Position mode:
Position mode: option3
[v] Standalone
[ ] UP MS Based
[ ] UP MS Assisted
[v] 2G CP MS Based
[v] 2G CP MS Assisted
[v] 3G CP UE Based
[v] 3G CP UE Assisted
> Fix Request Settings:
> Session type: New Position
> Sessip operation: MS-Based
> Number of fixes: 999999999
> Time between fixes: 2000
> Session timeout: 10
> Accuracy: 50
> Server option: local
5. GPSOne XTRA: Enabled
o if you want you can try it yourself...see if that improves your gps...tnx

Related

ATT8525 reg hack add 802.1x Idenity and Domain

On the ATT 8525, there is no way via the GUI to add:
802.1x Identity
802.1x Domain
This needs to be added to make the device work with a Server Cert and a Cisco Device, this is verified by:
I have a Symbol device that has the fully enabled network configuration application "Wireless Companion". With it's Wireless Configuration Editor the options exist to set:
Profile ID:
Name:
ESSID:
Operating Mode:
Infastructure
Country:
Allow Any Country
Authentication:
PEAP
Tunneled Auth:
MS CHAP v2
[ ] user Certificate
Installed Server Certs
corpcert
[ ] Validate Server Cert (this can be hacked in the reg)
Prompt for Login at:
[ ] At Connect
[ ] On Resume
[ ] At Time
Username:
whatever
Domain:
corpdomainname_without_dot_com
Password:
***
[ check] Advanced ID (THIS IS THE REG DATA I NEED BELOW)
802.1x Identity:
need to enter ssid here
Domain:
need to enter corpdomainname_without_dot_com
-----------------
Any Ideas?
Where did you get the application. I am trying to be able to browse my home network from my device and also view my device on my home network. In order to do that I need ot part of the domain.

Make a verizon pda work on nextel and sprint

need verizon phone key sequence not not computer code. Generic over the phone support instructions that are givin to any one that calls to upgrade a used phone or add a new line. that you manual enter when changing a line to a new phone
something like #623# but i need the exact one customer support gives you when you call to add a new headset.
I will then give you the solution for sprint and nextel
I want to have i700 verizon phone on by midnight so could one of you geniuses help me get the ability to change the pre-programed phone number io did it 2 times for but i have no memory.
I have 30 lines with nextel and i believe we can wrap this issue up for the boys over at the treo academy pocketpcgeeks.com,
I will stick this like candy just need some participation
thank you
<<SAMSUNG>>​ Samsung sph-n240, n400, a460, a500, etc Nam Programming :
Nam Set: ##Spc
Test Mode: 47*869#1235
Debug Menu: ##33284,ok
Service Menu: Menu+8+0 (#889)
Reset (Life time, Clear Memory, etc): ##786,ok
A-key: ##2539,ok
Label Selection: ##3882,ok
Label(Home, Work, etc) : **523,ok
NGG Setting (Gateway, etc.): ##2769737,ok
Vocoder: ##8626337,ok
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Samsung a530, a610, a620, a660, a670, etc Nam Programming :
Nam Set: Menu, 6, *
Nam Set: ##3238, ok
Nam Set: ##SPC (##000000), ok
Service Menu: Menu, 9, *
Test Mode: 47*68#13580
Test Mode: 47*869#1235
Samsung X, E, V, S-series (korean models), e250, v420, s350, etc Nam Programming :
Nam Set: 6548#0**4#6
Nam Set: 47*869#08#9
Nam Set: 74153697193
Test Mode: 5809540*45680 (88 - EFS reset)
Debug Menu: Menu(hold 2sec)+0, 6725 or 9720 or 1973 or 0415
Debug Menu: Menu+0(hold 2sec), 6725 or 9720 or 1973 or 0415
Debug Menu: Home(top of keypad)+0, 6725 or 9720 or 1973 or 0415
Samsung sch-411, 611, n105, a100, a300, a2000, etc Nam Programming :
Nam Set: 47*869#08#9
Nam Set: Menu+60
Test Mode: *759#813580
Test Mode: 5809540*45680
A-key: Menu+0, 25##
External Audio: Menu+0, ####
Debug Menu: Menu+8, 0415 or Spc
Debug Menu: Menu+9, 0415 or Spc
Brief NAM Programing: Menu+40,626 (not all version)
LCD Contrast: Menu+45 (not all version)
SIO Mode: Menu+49
SIO Mode: Menu+69
Samsung N356 (India version) Nam Programming :
Test Mode: Menu, 5, down arrow, *
Test Mode: **00## (in some flashes)
Samsung i700, etc Nam Programming :
Nam Set: Go to start and select "PHONE" from the drop down menu, dial #83587
Samsung i300, etc Nam Programming :
1. Tap on the Phone Icon with stylus
2. Press #907*9#0 ENTER LOCK should appear on screen
3. Enter OTKSL
4. SVC MENU will appear press 1
5. Enter 10 digit MIN and then press SAVE
6. Press SAVE again
7. Press 3 and then press SAVE 6 times
8. Enter the HOME SID and press SAVE once
9. Press END key twice
TEST MODE COMMANDS:
n105_test_mode.txt
a500_test_mode.txt
a530_test_mode.txt
<<KYOCERA>>​ Kyocera 2345, 3035, 5135, 6035, Se47, KX, KE - series, etc Nam Programming :
Nam Set: 111111+Jog Dial(Ok)
CAI Change: ##7738,ok
Enable TTY: ##889,ok
Life Timer: ##786,ok
A-key: ##2539,ok
Tips:
On some kyocera handsets the factory service module has not been disabled
and the phone can be programmed without the Spc by inputting:
Nam Set: ##333333 menu (service)
Qualcomm qcp-800 Nam Pogramming :
Nam Set: Menu+3+0+Spc
Field Test: Menu+7+0+Fsc
<<SANYO>>​ Sanyo 4900, 5150, 5300, 8100, etc Nam Programming :
Nam Set: ##Spc+Ok+Key Down+Ok
Advanced Setup: ##3282+Ok+Key Down+Ok+Msl
A-key: ##2539+Ok+Key Down+Ok
Version: ##**837+Ok+Key Down+Ok
Debug Menu: ##FSC+Ok+Key Down+Ok
Airtime menu: ##8463+Ok+Key Down+Ok
Change CAI: ##7738+Ok+Key Down+Ok
Vocoder: ##8626337+Ok+Key Down+Ok
Reverse Logistic: ##786+Ok+Key Down+Ok
Set IP Address: ##2769737+Ok+Key Down+Ok
TTY On/Off: ##889+Ok+Key Down+Ok
Ready Link: ##4636+Ok+Key Down+Ok
Browser Init On/Off: ##4682+Ok+Key Down+Ok
Picture Token: ##25327+Ok+Key Down+Ok
Unknown Code: ##5282277+Ok+Key Down+Ok
(SPC=000000, FSC=040793)
Sanyo scp-A011, smp-A017, etc Nam Programming :
Nam Set: F9(3 beep) + 0*72696#767
<<AUDIOVOX / UTSTARCOM>>​ Audiovox 4000, 9000, 9100, 9155, 9500, etc Nam Programming :
Power the phone ON and wait until the little light on top goes out, then press:
Nam Set: 289,Fcn, #,1
Service menu: Fcn,0,0, FSC
Power the phone ON and press:
Test Mode: Hold (2,*,Rcl) + Power
Test Mode Commands:
99 - download - flash phone
124 - inam data write
125 - version
126 - get ESN
127 - get SPC
128 - get User lock
129 - is WFTV data write
137 - get FSC code
138 - NPcode (nam program code)
139 - dscode
141 - restart
218 - Read_Addr
000 - is cdma mode
001 - is fm mode
002 - is pcs mode
008 - is reg read addr
020 - is lna_range
Audiovox (Hyundai) cdm-100, 130, 135, 8300, 8500, 8600, etc Nam Programming :
Nam Set: ##20022002, end
Read user lock: #5625*, end
DM baud rate: ##2283, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Misc. Test: ##27752345, end
S/W Test1: ##27732726, end
S/W Test2: ##2240, end
Debug screen: ##2773, end
Clear MRU: ##6782, end
Rfnu_Contents: ##2250, end
?????: ##1133, end
?????: ##1144, end
P_Rev: ##7738, end
GPS Test: ##4771, end
A-Key: 2538**
SMS Eng: ##767364, end
Battery_adc: ##2768, end
Tests: ##1122, end
Audiovox 8610, 8910, etc Nam programming :
Name Set: ##847446, end, 111111
Audiovox pcx-3500xl Nam Programming :
Nam Set: ##2726+Send+1998+1+Spc+1
Audiovox-107 Nam Programming :
Nam Set: 45680*47*869#1
Audiovox CMP-3 Nam Programming :
Nam Set: 45680*47*869#1
Dm Mode: Menu, 6, 6
Audiovox 9950 Nam Programming :
Nam Set: ##3282
Audiovox Z800 (Audiovox 7900, Sharp) Nam Programming :
Nam Set: m + # + envelope key + * + 1
Audiovox Thera (Toshiba 2032) Nam Programming :
Thera Nam Programming User Manual - nam_thera.pdf
Audiovox (UTStarcom) PPC 6600, 6700, etc Nam Programming :
Nam Set: ##SPC + Send
Nam Set: #*#SPC + Send
Nam Set: ##SPC#
DM mode: ##3424 + Send
DM mode: #*#3424 + Send
DM mode: ##3424#
Programming User Manual - programming_instructions.pdf
<<MOTOROLA>>​ Motorola 7760, 7860, 2260, 8160, etc Nam Programming :
Nam Set: Fcn,0000000000000, Rcl
Nam Set: 74663#, Fcn, Fcn
Test Mode: Fcn, 00**83786633, Sto
Motorola v60c, v120c etc Nam Programming :
Nam Set: 74663#, Menu, Menu, Spc
Nam Set: Menu, 073887, * (type quickly)
Test Mode: Menu, 073887*, Spc
Debug Mode: ##33284
Force the phone into DIGITAL ONLY mode:
1) ##33284 (Debug)
2) RIGHT Softkey (Next) Twice
3) Down arrow 10 times to "PrefMod"
4) RIGHT Softkey (Change) until you see "DigOnly"
5) LEFT softkey (Exit)
6) MENU then LEFT Softkey return to idle screen
7) ##33284 (The last 4 will not display if you have done it correctly)
Motorola Razr V3C Nam Programming:
Nam Set: 74663 # clr clr
Nam Set: #073887* , then SPC
Motorola Q Nam Programming:
Nam Set: [Send] + 074663 + [Send] + [Send], Selecct NAM#
Motorola t182, c210, etc Nam Programming :
Nam Set: ##298645665, end
Short Nam: ##073887, sto
Debug Menu: ##1111, end
Service Menu: ##2222, end
Sound NS/EC on/off switch: ##1113, end
Motorola v710, v730, v740, ms150, etc Nam Programming :
Nam Set: 8378*# + press 3 times NATE (spc - 071082)
Test Mode: Menu, 073887*, Spc
Service Menu: #758353266#646#
Motorola StarTac 2004 Nam Programming :
Nam Set: 5759789*#, press "Rec" button 3 times, (spc - 915037)
Motorola ms200, ms400, ms800, etc Nam Programming :
Nam Set: 5759789*#, press "Camera" button 3 times, (spc - 915037)
Nam Set: 246791538*#, press "Camera" button 3 times, (spc - 915037)
Motorola v6060 Nam Programming :
Nam Set:147*369#456*0#
MOTOROLA TEST MODE :
v60, c120, c331, etc:
1) Turn on the phone. Press MENU 0 7 3 8 8 7 *
2) The phone will require you to "Enter a Security Code", press 000000, OK
3) Scroll down to "Test mode" choose SELECT. Scroll down to "Enable"
choose SELECT. Your phone is now in test mode.
4) Signal strength is the 3_rd number down on the left hand side of the screen.
5) To toggle between regular mode and test mode: Press MODE then
quickly press the BUTTON DIRECTLY TO THE LEFT OF MENU.
6) To turn off the test mode the phone must be in regular mode, then follow
the above sequence and scroll down to where it says "DISABLE" instead of
"ENABLE" and choose select.
Motorola Bible (old models) - bible.txt
<<NOKIA>>​ Nokia 3280, 3285, 3580, 3585, 5185, 6185, 8280, etc Nam Programming :
Nam Set: *3001#12345#
Software Version: *#837#
Software Version: *#9999#
Esn Number: *#92772689#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#8378#
Esn/Data/Timer: *#92772689#
SID: *#743#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
51xx, 61xx, 71xx, 3285, 63xx, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 0 0 and then choose OK.
3360, 6360, etc :
1) Turn on the phone. Press *3001#12345#
2) Scroll up to where it says "Field Test" and choose SELECT
3) Highlight "Enable" and choose OK. Turn the phone off then back on.
4) If the test mode screen does not show up press MENU and scroll
down to "Field Test" choose SELECT. Press 2 1 0 1 then choose OK.
5) Lower left or upper left number is the signal strength.
6) To turn off the test mode press MENU and scroll down to where it says
"Field Test" choose SELECT. Press 2 1 0 0 and then choose OK.
<<LG>>​ Lg LX,VX-series, VX4400, VX6000, etc Nam Programming :
Nam Set: ##Spc(#)
Nam Set: Menu, 0
Advanced Settings: ##2342(#)
Vocoder: ##8626337,ok(#)
CAI Change: ##7738,ok(#)
Enable TTY: ##889,ok(#)
A-key: ##2539,ok(#)
Reset (Life time, Clear Memory, etc): ##786,ok(#)
lgc-300, etc Nam Programming :
Nam Set: Menu, 9, Spc
A-key: Press "Sto" 3sec, 2539**
lgc-330w, etc Nam Programming :
Nam Set: Menu, 4, 0, Spc
A-key: 2539**
lgc-510, v111, etc Nam Programming :
Nam Set: Menu, 3, 0, Spc
A-key: 2539**
lgc-500, 800w, etc Nam Programming :
Nam Set: Menu, 9 , 0, Spc
Debug Mode: Menu, 7, 0, Fsc
Debug Mode: Menu, 8, 0, Fsc
A-key: 2539**
<<ERICSSON / SONY-ERICSSON>>​ SonyEricsson T608, etc Nam Programming :
Nam Set: 923885, joystick >, 111111
Nam Set shot: 987, joystick >, 111111
Nam Set long: 222652, joystick >, 111111
Vocoder: ##8626337, joystick >, 111111
Debug screen: ##33284, joystick >
Life Timer: ##786, joystick >
SW ver: 9#4#3#, joystick >
Edit Profile: ##3282, joystick >
Service menu: *#06*
Ericsson A1228c, T61, etc Nam Programming :
Short NAM: 987+Menu
Long NAM: 923885+Menu+Spc
CDMA Mode: 904093+Menu
Analog Mode: 904095+Menu
QNC: 904097+Menu
Debug Screen: 904090+Menu
DM Mode: 904050+Menu
<<EPSILON / COMPAL>>​ Epsilon vc-5x, Compal 1100, etc Nam Programming :
Nam Set:: **321456987##
Short Nam: **147258963##
Service Menu 1: **1232580##
Service Menu 2: **078987##
Service Menu 3: **1234756##
Show SPC: **3214569871472365##
Version: **1470963##
Debug: **000000##
A-key: 2539**
Reset: **14789##
<<SK TELETECH>>​ Sky All Models Nam Programming :
Nam Set: #7583538324#626#
Nam Set: *759#364*7388464#
Min simple mode: #758353266#646#
Irm simple mode #758353266#476#
Voice memo: #8767#277#
Test Mode: #7583538324#8378#
A-key: #758353266#2539#
Service Menu: Menu+4+0+Spc
Service Menu: Menu+5+0+Spc
<<WITHUS / MODOTTEL>>​ Withus wce-100, 200, 300, etc Nam Programming :
Nam Set: ##948487+Save
Nam Set: ##948482+Save
ESN write: ##66835+Save (wce200 only)
SMS Settings: ##76766
NVM Rebuild: ##777464
<<GTRAN>>​ Gtran gcp-2000 Nam Programming :
Nam Set: 01#737+Spc
Debug Menu: 01#324+Spc
Debug Mode: 01#727
Test Mode: 01#764+Spc
System Test Mode: 01#768+Spc
Gtran gcp-5000 Nam Programming :
Debug Mode: 01#727+Spc
Test Mode: 01#765
<<HYUNDAI>>​ Hyundai hwp-110 Nam Programming :
Nam Set: #86904**89397#
DM Mode: ##2740*
(Open phone, inter code, close phone)
Hyundai hgc-120, 130, 200 Nam Programming :
Nam Set: #86904**89397#
Hyundai hgc-310, 600, 610 Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
Hyundai Curitel h100, 150, hx510b, 520, etc Nam Programming :
Nam Set: ##20022002, end, 1, Spc Code
Field Test: ##20022002, end, 1, Master Code
A-key: 2539**
Debug Menu: ##27732726, end
Sar Test: ##27752345, end
Baud Rate: ##36**, end
DM mode enable: **1004, end
DS mode enable: **1005, end
Test Bell/Voice/Led/Dot: ##1122, end
RF Mode: ##2240, end
Ras Ram: ##2774, end
Cmux1: **0481, end
Cmux2: **0482, end
RX Mode Fax: **0492, end
RX Mode Data: **0491, end
RX Mode Reset: **0490, end
<<HUAWEI>>​ Huawei ETS-668, 678, 688, etc Nam Programming :
Debug Mode: ##44+Menu
Debug Screen: ##33+Menu
CDG2 Test enable: ##234+Menu
CDG2 Test disable: ##432+Menu
China Lang Select: ##123+Menu
Blocking Debug Code: ###888+Menu
Home System Only On: ##461+Menu
Home System Only Off: ##460+Menu
Master Code for all Huawei models is - 309296
<<PANTECH / CURITEL>>​ Pantech hx-525b, 550, 570, 575, etc Nam Programming:
Nam Set: ##13*92*#62* + Pwr
Debug Mode: ##*193*762534#* + Pwr (R-UIM mode disable)
Debug Mode: ##27732726 (R-UIM mode enable)
DM Mode Enable: ***18*#826*
Full Reset: ##03*934#9367*192#397#7412569746 + Pwr
MultiTest: ##22635*262* + Pwr
Cmux1: ***12*#811# + Pwr
Cmux1: ***37*#922* + Pwr
RX Mode Data: ***83*#247 + Pwr
RX Mode Reset: ***64*#133# + Pwr
DS Mode On: ***12045#*# + Pwr
RF NV Init: ##0*#*63861829372# + Pwr
RAS_RAM: ##3*13091#1279#* + Pwr
<<TREO>>​ Palm One Treo 600, 650, 700, etc Nam Programming :
Nam Set: ##SPC + Send
Nam Set: #*#SPC + Send
Nam Set: ##SPC#
DM mode: ##3424 + Send
DM mode: #*#3424 + Send
DM mode: ##3424#
Debug: ##33284
Programming User Manual - programming_instructions.pdf
Resetting Treo - resetting_treo650.doc
<<AXESSTEL>>​ P800, T800, P1900, T1900, etc Nam Programming :
Nam Set: 47*68#47*869#
DM mode: ##9* + Send
Data cable select: menu + 7 + 1 + #
Data Manager: **##11
Data (Internet): **##13
Data USB: **##32
<<VK MOBILE>>​ VK-100C, 110C, 200C, etc Nam Programming :
Nam Set: 153147539741593
Test Mode: 153147539123258 (88 - clear efs)
<<GIGA TELECOM>>​ Z510, Z710i(gcd-456) Nam Programming :
Nam Set: Menu+0+Spc
<<AnyDATA>>​ AMC450 Nam Programming :
Nam Set: *74269#*748#96148063+SEL
<<ZTE>>​ ZTE C150, C160, C170, C180, C220, etc Nam Programming:
Nam Set: *983*3641# (R-UIM mode)
Nam Set: #1463*389*
ZTE C201 Nam Programming:
Nam Set: *983*7358#
<<UBIQUAM>>​ U100, U105, U200, U300, etc Nam Programming :
Nam Set: ##3435871
BREW Set Menu: ##8242739
System Test: ##33582
Handset Test: ##3435873
Handset Test: ##3435875
Factory Test Mode: ##3435874
<<SYNERTEK>>​ Synertek S200 Nam Programming :
Nam Set: Menu+0+Spc
A-Key: 2539**+Save
Test vibro/rx/tx: ##5555+Save
Debug Screen: ##33+Save
Debug Screen: ##523+Save
RF Test: ####+Save
LCD type: ##325+Save
Synertek S500 Nam Programming :
SAR Test Strife test: *#0000#
Debug screen: *#8378#
Clear LCD: *#848378#
Debug menu: *#443336# (R-UIM mode)
CDG , Service option: *#234#
Function Test, LCD Contrast: *#878#
<<SONY>>​ Sony CM-M1300, 3300, Z200 Nam Programming :
Nam Set: 111111+Ok(Jog Dial)+Select+Programming+Ok+Spc

[REF][INFO][R&D] "Secret Codes" and other hidden features

"Secret Codes" and Hidden Features
Hacking for "Secret Codes" and other hidden phone features.
Skill Level: Easy
Posting
==================================================
Do NOT post general questions/requests on how to do
this or that, they will not be answered, simply
because we don't know yet. Rather try to find out
by yourself and share your results.
==================================================
Purpose
To find all "Secret Codes", special properties and other hidden phone features
and settings, used in the GT-I9300. The secret codes are not so secret, but
are often used to activate and manipulate many settings, such as debug modes,
network connections, factory test modes etc. It is an unfortunate choice of
words but we will stick to this definition nonetheless for simplicity, since
it is also used in the source code by Samsung and AOS. Do not confuse secret
codes with VSC (Vertical Service Codes), USSD (Unstructured Supplementary
Service Data) or other MMI (Man Machine Interface) codes.
Although there are many "standard" codes common to many Samsung phones, they
do vary to some extent. This is because their functionality often depend on
the particular hardware, in particular the baseband processor (aka radio, DSP,
BP or CP) and the multiplexer chips that switches the various internal USB
paths, for example between MHL, BP and AP.
This is an informative reference thread on these features. If you have
relevant additional information you'd like to share, please post it here.
Background
From the Samsung Galaxy S2 experience we have gained the following
understanding when it come to the Factory/Service Mode menus and the
PhoneUtils applications. We are still to work out if this is still true for
the SGS3.
But first it is worth to note, that due to the more complicated, but better
organized phone applications in ICS, the way to enter secret codes have
changed from GB versions. Now all secret codes have to be prefixed with
"*#*#", followed by <code> and post fixed with "#*#*". [Note-1] However,
according to the GT-I9300 Service Manual, there are two codes that should work
without post- and pre-fixes. They are *#1234# (version) and *2767*3855#
(Factory reset! It will wipe your phone instantly, NO warnings, no going back,
no way to cancel.) [Note-2]
==================================================
Newbie Practice Box
Go to your phone dialer and "dial" the following string:
*#*#197328640#*#*
This will trigger the Service Menu.
==================================================​This same effect can be accomplished directly on the command line, with a
direct URI broadcast call to the application receiver via:
Code:
[SIZE=2]am broadcast -a android.provider.Telephony.SECRET_CODE -d android_secret_code://1111[/SIZE]
Second, it is essential to know that the actual program code (read
assembly/machine code) for the Engineering / Service Mode menu, is actually
located in the baseband processor firmware. What you actually see when you
enter this menu, is just a java based wrapper application, that make direct
function calls through various entry points, in the baseband kernel/firmware.
What does it mean? When you enter a specific "secret code", the wrapper
application (e.g. ServiceMenu.App) deciphers the code to a particular menu
entry in the baseband processor, where it is executed and whose result is
output to the wrapper application.
Third. Apart from hardware differences, because of the baseband firmware
dependance, the set of working secret codes will differ somewhat from your
location, depending on:
Your Modem firmware
Your AOS version (ICS 4.0.1, 4.0.4 etc.)
Your CSC version (Regional codes)
Special Notes
[Note-1] This can be seen in the handleSecretCode() function in the SpecialCh****quenceMgr.java code.
[Note-2] These need testing and confirmation since they clearly contradict [Note-1].
[Note-3] Apparently the Samsung Galaxy S3 will come in at least two versions:
The GT-I9300 (FCC-ID: A3LGTI9300 )
The SCH-I939 (FCC-ID: A3LSCHI939 ) [Possibly the LTE version]
References
[1] "[GUIDE] Noobs guide to extract Galaxy S3 stock firmware(.img)"
[2] "[All Stock Firmwares] I9300XXALE8 (4.0.4) - Kenya (OJV) [19-05-12]"
[3] "[HOW TO][Windows]Extract Deodex Sign and Zipalign an official ROM"
[4] "[GUIDE] dsixda's Android Kitchen - Now with SGS2 support (Windows/Linux/Mac)"
[5] "[REF] Unpacking and repacking stock rom .img files"
[6] "[Tool] Yaffey - Utility for reading, editing and writing YAFFS2 images" (code is here)
[7] "[TOOL] Auto Bloat Remover Tool For GS III!"
[8] "[GUIDE][TOOL] Guide To Create You're Own De-Bloat Tool/APK Installer/For Any Device"
Keywords: Secret, Codes, Hidden, Service, Factory, UART​
HOW TO (find new stuff)
So how do you find new codes?
Well Google it! Then consider getting the following tools:
Get jd-gui (Often crashes)
Get jad (doesn't crash, but is cmdline based)
Get sgs2toext4 (and here)
Get Disk Internals Linux Reader
Get a disk image with deodexed Apps (see below)
Then what to do?
The brief version. (For full version, see "References" in OP above.)
Download all the tools shown above.
Download the deodexed firmware images (see post#3)
(If in Windows) Double click the sgs2toext4.
Drag and drop the system.img file to the sgs2toext4 "drop window".
You will now have a system.img.ext4 file, open this file with the LinuxReader tool.
Save entire filesystem (from 5) in a new folder. Close.
Go to the folder containing the *.apk(s) of interest.
Make sure dex2jar.bat (win) is in your path and run it on your interesting.apk like this, for example:
Code:
./path/to/dex2jar.bat Samsungservice.apk
This produces a new file: Samsungservice_dex2jar.jar
Extract (7zip) this file in a new folder.
Go to that folder in command line and enter the appropriate "jad" commands. For example, to decompile all class files globbed by Phone*.class and put the decompiled sources in the "src" sub-directory, do:
Code:
jad -o -r -sjava -dsrc Phone*.class
Go to the source directory (../src) you just created.
Enjoy your *.java files!
Alternatively you can deodex on your own...but don't ask me how to do it.
A few other Tools
http://www.sable.mcgill.ca/soot/
http://jdec.sourceforge.net/
http://stackoverflow.com/questions/647116/how-to-decompile-a-whole-jar-file
http://askubuntu.com/questions/129305/how-can-i-open-binary-image-files-img​
The Secret Codes
The information for this post was obtained by decompiling the
deodexed system image of the firmware shown below.
I9300XXALE8
Base Firmware: I9300XXALE8 (4.0.4)
Modem: XXLE8
CSC: OJVALE7
The latest GT-I9300 Stock Firmwares can be found here.
Here are the codes as found in:
serviceModeApp.apk: ServiceModeApp.class
Code:
[SIZE=2]
Code Description JavaCall
----------------------------------------------------------------------------------------------------------------------
197328640 || 2684 Start Service Mode / Enter SM Main Menu SendData('\001', '\001', '\000', '\000', '\000');
1111 FTA SW Version SendData('\001', '\001', '\u1002', '\000', '\000');[/SIZE] [SIZE=2]
2222 FTA HW Version SendData('\001', '\001', '\u1003', '\000', '\000');
8888 SendData('\001', '\001', '\u1003', '\000', '\000');
2886 SendData('\001', '\001', ' ', '\000', '\000');
6984125* SendData('\001', '\001', ' ', '\000', '\000');
2767*2878 ? Factory reset (complete erase & format) SendData('\001', '\001', '!', '\000', '\000');
0228 ADC Reading SendData('\001', '\001', '\005', '\000', '\000');[/SIZE] [SIZE=2]
0599 SendData('\001', '\001', '\024', '\000', '\000');
1575 SendData('\001', '\001', '\025', '\000', '\000');
2263 RF Band Selection SendData('\001', '\001', '\026', '\000', '\000');
2580 SendData('\001', '\001', '\007', '\000', '\000');
301279 || 279301 SendData('\001', '\001', '\024', '\000', '\000');
32489 Ciphering Info SendData('\001', '\001', '\006', '\000', '\000');
4238378 SendData('\001', '\001', '\027', '\000', '\000');
4387264636 SendData('\001', '\001', '\037', '\000', '\000');
7284 PhoneUtil: USB/UART I2C Mode Control SendData('\001', '\001', '\023', '\000', '\000');
738767633 SendData('\001', '\001', '\034', '\000', '\000');
73876766 SendData('\001', '\001', '\033', '\000', '\000');
7387677763 SendData('\001', '\001', '\036', '\000', '\000');
7387678378 SendData('\001', '\001', '\035', '\000', '\000');
9090 Diagnostic Configuration SendData('\001', '\001', '\023', '\000', '\000');
0011 SendData('\001', '\004', '\000', '\000', '\000');[/SIZE] [SIZE=2]
123456 SendData('\001', '\004', '\001', '\000', '\000');
<na> End Service Mode 1 () SendData('\002', '\004', '\000', '\000', '\000');
<na> End Service Mode 2 () SendData('\002', '\001', '\000', '\000', '\000');
[/SIZE]
NOTE: In the table above, I have replaced printed UTF-8 (U+NNNN) characters with '\uNNNN'.
As you can see in the table above, most of the hidden codes are just shortcuts
into various sub-menus (third parameter) of Service Mode application. However,
this does not exclude the use of other hidden codes, that can be used or detected
in other applications.
From a different file we have a some additional codes.
(Not including already covered or overlapping codes.)
serviceModeApp.apk: SecKeystringBroadcastReceiver.class
Code:
[SIZE=2]0000
147852 TestApnSettings: putExtra("testBed", "Suwon");[/SIZE] [SIZE=2]
1478963 TestApnSettings: putExtra("testBed", "Open_market");
22558463 Reset Total Call Time
232331
232332
232337
3214789650
369852 TestApnSettings: putExtra("testBed", "Gumi");
3698741 TestApnSettings: putExtra("testBed", "Delete_DB");
-------------------------------------------------------------------------------
03 NAND Flash S/N (NandFlashHeaderRead)
745 RIL Dump Menu
746 Debug Dump Menu
0228 Battery Status
1111 IF SalesCode="CTC" THEN: TerminalMode
2222 IF SalesCode="CTC" THEN: TerminalMode
2263
8888
9900 || 0514 System Dump
279301
301279
3214789 GCF Mode Settings
5337632 NFC Test
22553767 Call Drop Log View
6335623
TESTMODE
[/SIZE]
These may not always work, since some of them depend on certain "Sales Codes"
or factory IMSI numbers, through statements like:
Code:
if ((mSalesCode.equals("CHM")) && (str.equals("827828868378")))
But these were only codes found in two files.
So there are probably many more codes to be found!
Other Stuff
Here are some unknown functions from: TerminalMode.class
Code:
[SIZE=2]DEBUG_SCR SendData('\001', '\004', '\000', 0, '\000');
EI_DEBUG_SCR SendData('\001', '\006', '\000', 0, '\000');
DATA_ADV SendData('\001', '\003', '\003', 0, '\000');
NAMBASIC SendData('\001', '\003', '\001', 0, '\000');
TESTMODE SendData('\001', '\001', '\000', 0, '\000');
NAMSIMPLE SendData('\001', '\003', '\002', 0, '\000');
TEST_CALL SendData('\004', '\007', c, 0, '\000');
[/SIZE]
Here is a list of all the OEM Commands used in the Service Mode App.
Code:
[SIZE=2]-------------------------------------------------------------------------------
private class OemCommands (ServiceModeApp) value hex
-------------------------------------------------------------------------------
char OEM_SERVM_FUNCTAG = '\001';
OEM_SM_ACTION = '\000'; 00
OEM_SM_DUMMY = '\000'; 00
OEM_SM_END_MODE_MESSAGE = '\002'; 02
OEM_SM_ENTER_MODE_MESSAGE = '\001'; 01
OEM_SM_GET_DISPLAY_DATA_MESSAGE = '\004'; 04
OEM_SM_PROCESS_KEY_MESSAGE = '\003'; 03
OEM_SM_QUERY = '\001'; 01
OEM_SM_TYPE_MONITOR = '\004'; 04
OEM_SM_TYPE_MONITOR_SKT = '\001'; 01
OEM_SM_TYPE_NAM_EDIT = '\003'; 03
OEM_SM_TYPE_PHONE_TEST = '\005'; 05
OEM_SM_TYPE_SUB_ALL_VERSION_ENTER = '\004'; 04
OEM_SM_TYPE_SUB_BAND_SEL_ENTER = '\026'; 16
OEM_SM_TYPE_SUB_BATTERY_INFO_ENTER = '\005'; 05
OEM_SM_TYPE_SUB_BLUETOOTH_TEST_ENTER = '\t'; 09
OEM_SM_TYPE_SUB_CIPHERING_PROTECTION_ENTER = '\006'; 06
OEM_SM_TYPE_SUB_ENTER = '\000'; 00
OEM_SM_TYPE_SUB_FACTORY_PRECONFIG_ENTER = '\016'; 0e
OEM_SM_TYPE_SUB_FACTORY_RESET_ENTER = '\r'; od
OEM_SM_TYPE_SUB_FACTORY_VF_TEST_ENTER = '\031'; 19
OEM_SM_TYPE_SUB_FTA_HW_VERSION_ENTER = '\003'; 03
OEM_SM_TYPE_SUB_FTA_SW_VERSION_ENTER = '\002'; 02
OEM_SM_TYPE_SUB_GCF_TESTMODE_ENTER = '\027'; 17
OEM_SM_TYPE_SUB_GET_SELLOUT_SMS_INFO_ENTER = '\037'; 1f
OEM_SM_TYPE_SUB_GPSONE_SS_TEST_ENTER = '\025'; 15
OEM_SM_TYPE_SUB_GSM_FACTORY_AUDIO_LB_ENTER = '\030'; 18
OEM_SM_TYPE_SUB_IMEI_READ_ENTER = '\b'; 08
OEM_SM_TYPE_SUB_INTEGRITY_PROTECTION_ENTER = '\007'; 07
OEM_SM_TYPE_SUB_MELODY_TEST_ENTER = '\013'; 0b
OEM_SM_TYPE_SUB_MP3_TEST_ENTER = '\f'; oc
OEM_SM_TYPE_SUB_RRC_VERSION_ENTER = '\024'; 14
OEM_SM_TYPE_SUB_RSC_FILE_VERSION_ENTER = '\021'; 11
OEM_SM_TYPE_SUB_SELLOUT_SMS_DISABLE_ENTER = '\034'; 1c
OEM_SM_TYPE_SUB_SELLOUT_SMS_ENABLE_ENTER = '\033'; 1b
OEM_SM_TYPE_SUB_SELLOUT_SMS_PRODUCT_MODE_ON = '\036'; 1e
OEM_SM_TYPE_SUB_SELLOUT_SMS_TEST_MODE_ON = '\035'; 1d
OEM_SM_TYPE_SUB_SW_VERSION_ENTER = '\001'; 01
OEM_SM_TYPE_SUB_TFS4_EXPLORE_ENTER = '\017'; 0f
OEM_SM_TYPE_SUB_TOTAL_CALL_TIME_INFO_ENTER = '\032'; 1a
OEM_SM_TYPE_SUB_TST_AUTO_ANSWER_ENTER = ' '; 20
OEM_SM_TYPE_SUB_TST_FTA_HW_VERSION_ENTER = ----> # UTF-8: U+1003: e1 80 83 MYANMAR LETTER GHA
OEM_SM_TYPE_SUB_TST_FTA_SW_VERSION_ENTER = ----> # UTF-8: U+1002: e1 80 82 MYANMAR LETTER GA
OEM_SM_TYPE_SUB_TST_NV_RESET_ENTER = '!'; 21
OEM_SM_TYPE_SUB_USB_DRIVER_ENTER = '\022'; 12
OEM_SM_TYPE_SUB_USB_UART_DIAG_CONTROL_ENTER = '\023'; 13
OEM_SM_TYPE_SUB_VIBRATOR_TEST_ENTER = '\n'; 0a
OEM_SM_TYPE_TEST_AUTO = '\002'; 02
OEM_SM_TYPE_TEST_MANUAL = '\001'; 01
-------------------------------------------------------------------------------
private class OemCommands (TerminalMode)
-------------------------------------------------------------------------------
OEM_HIDDEN_FUNCTAG = 'Q';
OEM_HM_END_TEST_CALL_MESSAGE = '\t';
OEM_HM_TEST_CALL_MESSAGE = '\004';
OEM_HM_TYPE_TEST_CALL = '\007';
OEM_SERVM_FUNCTAG = '\001';
-------------------------------------------------------------------------------
private class OemCommands (SysDump:)
-------------------------------------------------------------------------------
OEM_DBG_STATE_GET = 6;
OEM_DEL_RIL_LOG = 13;
OEM_DPRAM_DUMP = 14;
OEM_DUMPSTATE = 3;
OEM_DUMPSTATE_ALL = 20;
OEM_ENABLE_LOG = 7;
OEM_GCF_MODE_GET = 15;
OEM_GCF_MODE_SET = 16;
OEM_IPC_DUMP_BIN = 9;
OEM_IPC_DUMP_LOG = 8;
OEM_KERNEL_LOG = 4;
OEM_LOGCAT_CLEAR = 5;
OEM_LOGCAT_MAIN = 1;
OEM_LOGCAT_RADIO = 2;
OEM_MODEM_FORCE_CRASH_EXIT = 23;
OEM_MODEM_LOG = 18;
OEM_NV_DATA_BACKUP = 17;
OEM_OEM_DUMPSTATE_MODEM_LOG_AUTO_START = 19;
OEM_RAMDUMP_MODE = 10;
OEM_RAMDUMP_STATE_GET = 11;
OEM_START_RIL_LOG = 12;
OEM_SYSDUMP_FUNCTAG = 7;
OEM_TCPDUMP_START = 21;
OEM_TCPDUMP_STOP = 22;
-------------------------------------------------------------------------------
[/SIZE]
Enjoy!​
Special Properties
Next we'll have a look at some interesting (or not?) system "properties".
For now, I'll just list some of those I found more interesting and potentially useful.
Code:
[SIZE=2]Property Setting/String Source Description[/SIZE]
[SIZE=2]----------------------------------------------------------------------------------------------------------------------[/SIZE]
[SIZE=2]dev.silentlog.on On SysDump: [/SIZE]
[SIZE=2]gsm.operator.numeric 45001 Sec_Ril_Dump: [RIL::FD] Samsung Testbed[/SIZE]
[SIZE=2]gsm.default.sidmode ? UART[/SIZE]
[SIZE=2]net.tcpdumping On SysDump: ?[/SIZE]
[SIZE=2]nfc.trace.mode On Enable NFC Trace Mode [/SIZE]
[SIZE=2]ril.FTM_MODE ? "FTM_MODE_KEY"[/SIZE]
[SIZE=2]ril.FS true PhoneUtils: updateRAFT() Activates RAFT (???) updates[/SIZE]
[SIZE=2]ril.OTPAuth SysDump: OTP Authentication [/SIZE]
[SIZE=2]ril.cdma.inecmmode true Is phone in ECM mode?[/SIZE]
[SIZE=2]ril.unique_number The RIL Unique Number (UN)[/SIZE]
[SIZE=2]ril.sms.gcf-mode On ? SMS "GCF" mode[/SIZE]
[SIZE=2]persist.log.seclevel On Switchable Log level?[/SIZE]
[SIZE=2]persist.sys.country [/SIZE]
[SIZE=2]ro.build.type eng SysDump: [/SIZE]
[SIZE=2]ro.debuggable On Enable Debug / DBG_ENG / Engineering Mode??[/SIZE]
[SIZE=2]----------------------------------------------------------------------------------------------------------------------[/SIZE]
[SIZE=2]Country/Region Specific[/SIZE]
[SIZE=2]----------------------------------------------------------------------------------------------------------------------[/SIZE]
[SIZE=2]ro.board.platform [/SIZE]
[SIZE=2]ro.build.characteristics [/SIZE]
[SIZE=2]ro.csc.sales_code SKT | KIT | LGT PhoneFeature: makeFeatureForKor() [/SIZE]
[SIZE=2]ro.product.name espressorf | espresso10rf PhoneFeature: checkDBGLevel() [/SIZE]
[SIZE=2] aegis2vzw PhoneFeature: makeFeatureForKor() [/SIZE]
[SIZE=2] jaguars | jaguark | jaguarl [/SIZE]
A particularly fun string is the following, found in the featureForKor() function:
Code:
[SIZE=2]mFeatureList.put("emergency_for_cyber_terror", boolean2);[/SIZE]
I'd really like to know what this does!
Special Files
As we know from other Samsung Galaxy class phones, there are a number
of files that can be created or modified in order to activate certain
functions. Here we list those found to date. Please post if you know
of other ones!
Apparently setting the "SubscriberID" (IMSI) to "999999999999999" also
activates certain test features. A sim with this IMSI is also known as
a "Factory SIM". However, if the SIM IMSI starts with either "45001" or
"00101" it is a "Test SIM".
[See: ServiceModeApp.apkhoneUtils.java:isFactoryMode() or
FactoryTest.apk:ModuleCommon.java:isFactorySim()]
Code:
[SIZE=2]File FileContent Description[/SIZE]
[SIZE=2]-------------------------------------------------------------------------------[/SIZE]
[SIZE=2]/efs/FactoryApp/factorymode ON Enable Factory Mode[/SIZE]
[SIZE=2]/efs/FactoryApp/keystr ON Blocked (hidden code?) Key String(s)[/SIZE]
[SIZE=2]/efs/imei/mps_code.dat ? ?[/SIZE]
[SIZE=2]/efs/root/ERR ? Error Log[/SIZE]
[SIZE=2]/data/.psm.info ? WiFi Power Save Mode [/SIZE]
[SIZE=2]---------------------------------------[/SIZE]
[SIZE=2]Various Log Files:[/SIZE]
[SIZE=2]---------------------------------------[/SIZE]
[SIZE=2]/data/log/CallDropInfoLog.txt ? Dropped Calls Log[/SIZE]
[SIZE=2]/data/log/lucky_ril.log ? ?[/SIZE]
[SIZE=2]/data/log/dumpState_*.log ? ? System Dump Log[/SIZE]
[SIZE=2]/data/log/main_*.log ? ? [/SIZE]
[SIZE=2]/data/anr/traces.txt ? ? [/SIZE]
[SIZE=2]/data/log/err ? ? Error Log[/SIZE]
[SIZE=2]/data/log/err/AENEAS_TRACE_###.bin RF Aeneas Trace Log[/SIZE]
[SIZE=2]/data/log/err/MA_TRACE_###.bin RF MA Trace Log[/SIZE]
[SIZE=2]/mnt/sdcard/log ? ?[/SIZE]
[SIZE=2]---------------------------------------[/SIZE]
[SIZE=2]System Files [/SIZE]
[SIZE=2]---------------------------------------[/SIZE]
[SIZE=2]/sys/class/sec/switch/adc [/SIZE]
(Note: Some of these paths need to be verified, as they may be relative...)
Finally, we have two NVpasswords, that is used for uploading or dumping NVram, AFAIK. They are:
873283
3352225
and they can be found in Sec_Ril_Dump.class.
DISCALIMER:
As I do not have access to a GT-I9300, I have not been able to verify
any of the information in this thread! I apologize if there is any erroneous
information here. Please let me know and post new information here as
it become available. Also make sure you make a complete backup, before
attempting any of the codes or other trickery above! ​
Great post Buddy. But..........
But I didn't Understand Anything, lol better to say Nothing......... Too complicate for my simple mind.
This is some list! Great job!
Very good info there .. how about programming the sim with that IMSI will it have any effect.
Sent from my GT-I9300
tids2k said:
Very good info there .. how about programming the sim with that IMSI will it have any effect.
Click to expand...
Click to collapse
It certainly will, but you will have to find a SIM that is programmable!
You can buy programmable SIM cards from the Sysmocom website, but you need the tools to do so. Sysmocom is ran by some of the GSM security researchers and open source baseband developers...
Here is tutorial on how to clone a SIM card. However, this may be highly illegal in some countries, even for your own! Check your local laws.
(In addition it is a border-line topic on what we are allowed to post here on XDA.)
But Apple proposed, (and here) already some years ago, to have programmable SIM cards built into their devices. This would make perfect sense, since the whole idea about using SIM cards have been neglected and forgotten in the first place. (The original idea, was that it should be extremely easy to switch SIM cards, so that you could easily just borrow someone else's phone, put you card in and make a phone call. Even on designated SIM-holder enabled pay-phones! This has become forgotten and circumvented and damn hard to do with embedded sim cards deep inside your phone.) In addition most cellular providers have lobbied against it...
Definately would look at it. Here is the link for the time being ...
http://www.jaycar.com.au/productView.asp?ID=KC5361
I remember when Dejan found the binary hack way back in 2006 for BB5 Nokia phones, he posted files on his website on how to clone a simcard. But those times only 16bit chips were used.
Here is the scheme tics for the reader if any one interested.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
via Flying Daggers
tids2k said:
how about programming the sim with that IMSI will it have any effect.
Click to expand...
Click to collapse
No need to program a sim, there is a service code (*#46744674#) which will set your IMSI to 9999..., well it does on the SGS2 anyway.
Does it look like there are any menus where you can disable Fast Dormancy? *#9900# does not allow you to do this on the S3
Code:
Samsung Galaxy S3 .. Secret Codes found by tids2k
Thanks to E:V:A for his information and knowledge
HOW TO RUN THESE COMMANDS :
Connect your phone into debug mode .. Settings -> USB Debugging [] Enable it.
Then in MS-DOS C:\ type
am broadcast -a android.provider.Telephony.SECRET_CODE -d android_secret_code://****
where **** is the secret code :-) So let us begin
Secret Codes **** Function
2684 or 197328640 DEBUG MENU
0000 CSC SPECIFIC
827828868378 CSC SPECIFIC
2684 SERVICE MODE ( WATCHDOG/DUMPS/LOGS OPTIONS)
0011 CONNECTION STATUS
123456 CONNECTION STATUS
22558463 RESETS TOTAL TALK TIME
32489 CIPHERING INFO
2580 NON-SUPPORT
232337 BLUETOOTH ADAPTER ADDRESS
232331 BLUETOOTH RF TEST
232332 ??
9090 DIAG CONFIG (MODEM)
73876766 SELLOUT SMS ENABBLE
738767633 SELLOUT SMS DISABLE
7387678378 SELLOUT SELF SET TEST MODE
7387677763 SELLOUT SMS SET PRODUCT MODE
4238378 GCF SETTINGS
4387264636 SELLOUT SMS MAIN
1575 GPS SETTINGS
6984125 ????
2886 ??
2767*2878 ??
745 RIL COMMANDS ( NICE ONE )
746 ANOTHER DUMP TOOL ( NICE ONE )
9900 or 0514 SYSDUMP
1111 FTA SW VERSION
2222 or 8888 FTA HW VERSION
301279 or 279301 RRC ( HSPA ) CONTROL
2263 BAND SELECTION
5337632 SOME KIND OF SOUND
0228 BATTERY STATUS
03 NAND FLASH UNIQUE NO.
3214789 GCF MODE ENABLE/DISABLE
6335623 WIFI HIDDEN MENU
NOW FACTORY SETTINGS
06 IMEI
0589 LIGHT SENSOR TEST
80 TOUCH NOISE TEST
251 WAKELOCK ON
250 WAKELOCK OFF
350 REBOOT
5238973 LCD TYPE
4327 HDCP INFO
22235 ACCELEROMETER SENSOR INFO
0782 RCT CLOCK
86824 TOUCH KEY SENSTIVITY
0842 VIBRATION TEST
0673 SPEAKER/HEADPHONE/HEADSET TEST
0289 MELODY TEST
2663 TOUCH FIRMWARE UPDATE
2664 POINTER LOCATION
0588 PROXIMITY TEST
3264 RAM CHECK
7780 MASTER RESET
7769 PROXIMITY SENSOR TEST
87976633 FACTORY RESET
9999*3288 QWERTY COUNTER
767*2878 QWERTY COUNTER RESET
0283 LOOPBACK TEST
7328735824 LOT ID
three new tablets in work ... lol
if ((str1.startsWith("GT-P31")) || (str1.startsWith("GT-P51")) || (str1.startsWith("SCH-i705")));
tids2k said:
Code:
Samsung Galaxy S3 .. Secret Codes found by tids2k
Thanks to E:V:A for his information and knowledge
HOW TO RUN THESE COMMANDS :
Connect your phone into debug mode .. Settings -> USB Debugging [] Enable it.
Then in MS-DOS C:\ type
am broadcast -a android.provider.Telephony.SECRET_CODE -d android_secret_code://****
where **** is the secret code :-) So let us begin
Secret Codes **** Function
2684 or 197328640 DEBUG MENU
0000 CSC SPECIFIC
827828868378 CSC SPECIFIC
2684 SERVICE MODE ( WATCHDOG/DUMPS/LOGS OPTIONS)
0011 CONNECTION STATUS
123456 CONNECTION STATUS
22558463 RESETS TOTAL TALK TIME
32489 CIPHERING INFO
2580 NON-SUPPORT
232337 BLUETOOTH ADAPTER ADDRESS
232331 BLUETOOTH RF TEST
232332 ??
9090 DIAG CONFIG (MODEM)
73876766 SELLOUT SMS ENABBLE
738767633 SELLOUT SMS DISABLE
7387678378 SELLOUT SELF SET TEST MODE
7387677763 SELLOUT SMS SET PRODUCT MODE
4238378 GCF SETTINGS
4387264636 SELLOUT SMS MAIN
1575 GPS SETTINGS
6984125 ????
2886 ??
2767*2878 ??
745 RIL COMMANDS ( NICE ONE )
746 ANOTHER DUMP TOOL ( NICE ONE )
9900 or 0514 SYSDUMP
1111 FTA SW VERSION
2222 or 8888 FTA HW VERSION
301279 or 279301 RRC ( HSPA ) CONTROL
2263 BAND SELECTION
5337632 SOME KIND OF SOUND
0228 BATTERY STATUS
03 NAND FLASH UNIQUE NO.
3214789 GCF MODE ENABLE/DISABLE
6335623 WIFI HIDDEN MENU
NOW FACTORY SETTINGS
06 IMEI
0589 LIGHT SENSOR TEST
80 TOUCH NOISE TEST
251 WAKELOCK ON
250 WAKELOCK OFF
350 REBOOT
5238973 LCD TYPE
4327 HDCP INFO
22235 ACCELEROMETER SENSOR INFO
0782 RCT CLOCK
86824 TOUCH KEY SENSTIVITY
0842 VIBRATION TEST
0673 SPEAKER/HEADPHONE/HEADSET TEST
0289 MELODY TEST
2663 TOUCH FIRMWARE UPDATE
2664 POINTER LOCATION
0588 PROXIMITY TEST
3264 RAM CHECK
7780 MASTER RESET
7769 PROXIMITY SENSOR TEST
87976633 FACTORY RESET
9999*3288 QWERTY COUNTER
767*2878 QWERTY COUNTER RESET
0283 LOOPBACK TEST
7328735824 LOT ID
Click to expand...
Click to collapse
Untested, here; nevertheless - thanks for this info guys!!
Sent from my GT-I9300 using xda premium
This should all work. Didnt had much time to look for other commands, will do in a day or so.
Sent from my GT-I9300 using XDA Premium HD app
Odia said:
No need to program a sim, there is a service code (*#46744674#) which will set your IMSI to 9999..., well it does on the SGS2 anyway.
Click to expand...
Click to collapse
Thanks! Probably very useful, but
1) Is that temporary? (How to get back original after having use this code?)
2) Where is it located? (What App + class files?)
Odia said:
No need to program a sim, there is a service code (*#46744674#) which will set your IMSI to 9999..., well it does on the SGS2 anyway.
Click to expand...
Click to collapse
doesnt work on sgs III
Hi all,
a couple of month ago I build an app with shortcuts for the "secret" dialer codes within the galaxy S2, because I could not remember them all ...This app is special tailored for the galaxy S2, but should work on all SAMSUNG devices with TOUCHWIZ ... Not all codes will work on all devices, but a lot these codes work on other samsung touchwiz devices.
I tested the App with my GS3 and a lot of these codes still working ....
You could also add your own codes and ussd codes to an app internal database ... and some users even uses this database as hidden phone book
Check it out: https://play.google.com/store/apps/details?id=com.widgapp.HiddenFeaturesFREE
(Important: These codes will NOT work on most custom roms, Nexus S, Galaxy Nexus, HTC, Sony, Motorolla etc. ...I´m a little bit annoyed by comments like: Not working on my HTC, Sony, Nexus S, Samsung XYZ with custom rom zyx .... ...without Touchwiz, there is no possibility to use touchwiz firmware functions!)
SAMSUNG GALAXY S3 CODES SECRETS
*#06# Show IMEI number
*#0*# LCD Test Menu
*#*#4636#*#* user statistics and Phone Info
*#0011# Displays status information for the GSM
*#1234# View SW Version PDA, CSC, MODEM
*#12580*369# SW & HW Info
*#197328640# Service Mode
*#0228# ADC Reading
*#32489# (Ciphering Info)
*#232337# Bluetooth Address
*#232331# Bluetooth Test Mode
*#232338# WLAN MAC Address
*#232339# WLAN Test Mode
*#0842# Vibra Motor Test Mode
*#0782# Real Time Clock Test
*#0673# Audio Test Mode
*#0*# General Test Mode
*#2263# RF Band Selection
*#9090# Diagnostic ConfiguratioN
*#7284# USB I2C Mode Control
*#872564# USB Logging Control
*#4238378# GCF Configuration
*#0283# Audio Loopback Control
*#1575# GPS Control Menu
*#3214789650# LBS Test Mode
*#745# RIL Dump Menu
*#746# Debug Dump Menu
*#9900# System Dump Mode
*#44336# Sofware Version Info
*#7780# Factory Reset
*2767*3855# Full Factory Reset
*#0289# Melody Test Mode
*#2663# TSP / TSK firmware update
*#03# NAND Flash S/N
*#0589# Light Sensor Test Mode
*#0588# Proximity Sensor Test Mode
*#273283*255*3282*# Data Create Menu
*#273283*255*663282*# Data Create SD Card
*#3282*727336*# Data Usage Status
*#7594# Remap Shutdown to End Call TSK
*#34971539# Camera Firmware Update
*#526# WLAN Engineering Mode
*#528# WLAN Engineering Mode
*#7412365# Camera Firmware Menu
*#07# Test History
*#3214789# GCF Mode Status
*#272886# Auto Answer Selection
*#8736364# OTA Update Menu
*#301279# HSDPA/HSUPA Control Menu
*#7353# Quick Test Menu
*2767*4387264636# Sellout SMS / PCODE view
*#7465625# View Phone Lock Status
*7465625*638*# Configure Network Lock MCC/MNC
#7465625*638*# Insert Network Lock Keycode
*7465625*782*# Configure Network Lock NSP
#7465625*782*# Insert Partitial Network Lock Keycode
*7465625*77*# Insert Network Lock Keycode SP
#7465625*77*# Insert Operator Lock Keycode
*7465625*27*# Insert Network Lock Keycode NSP/CP
#7465625*27*# Insert Content Provider Keycode
*#272*IMEI# then we will get buyer code (For samsung galaxy sIII csc code)
*#*#7780#*#* Factory data reset - Clears Google-account data, system and program settings and installed programs. system will not be deleted, and OEM programs, as well as My Documents (pictures, music, videos)
ascsa said:
I tested the App with my GS3 and a lot of these codes still working ....
Click to expand...
Click to collapse
Hi! Thanks for your effort, but your post risk confusing people and corrupting this thread, because the red application functions (as shown in your table) only show that your app is not able to use those codes, and not that they do not work with SGS3.
TO ALL:
DO not post new codes here, unless you have either:
a) personally tested the codes on a GT-I9300
b) found and documented references in the source code, that can be independently verified.
Thanks!

Email from phone is converted to gibberish

Anybody have any experience with this little issue? When people receive emails from me using the stock email app from my att.net email address it looks like below. It seems to happen often. I've had more issues with my Note 4 (not the phone itself, but the software) than I ever had with my HTC One M7. In fact, I never had any issues with it, this is my second major issue. My Outlook email STILL won't push, and now this. Anyway, any thoughts?
Date: Thu, 6 Nov 2014 20:11:20 -0600
> Subject: Fwd: RE: Bethesda Basketball Team
> From: [email protected]
> To: xxxxxxxx
>
> >
> MIME-Version: 1.0
> Content-Type: multipart/alternative; boundary="--_com.android.email_3427126572587350"
>
> ----_com.android.email_3427126572587350
> Content-Type: text/plain; charset=utf-8
> Content-Transfer-Encoding: base64
>
> VGFrZSAyLiBMZXQgbWUga25vdyBpZiB5b3UgZ2V0IGl0LsKgCgoKU2VudCBmcm9tIG15IFZlcml6
> b24gV2lyZWxlc3MgNEcgTFRFIHNtYXJ0cGhvbmUKCgotLS0tLS0tLSBPcmlnaW5hbCBtZXNzYWdl
> IC0tLS0tLS0tCkZyb206IEJyYWQgVGhvbXBzb24gPHZvbGdvbGZlckBhdHQubmV0PiAKRGF0ZTog
> MTEvMDQvMjAxNCAgNTo0MCBQTSAgKEdNVC0wNjowMCkgClRvOiBKYWNraWUgQWRhbXMgPGphY2tp
> ZWFkYW1zQGxpdmUuY29tCgo+IApTdWJqZWN0OiBGd2Q6IFJFOiBCZXRoZXNkYSBCYXNrZXRiYWxs
> IFRlYW0gCgpKYWNraWUsIAoKSGVyZSBhcmUgdGhlIHR3byBlbWFpbHMgSSBoYXZlIHNlbnQgb3V0
> IHNvIGZhci4gCgoKU2VudCBmcm9tIG15IFZlcml6b24gV2lyZWxlc3MgNEcgTFRFIHNtYXJ0cGhv
> bmUK
>
> ----_com.android.email_3427126572587350
> Content-Type: text/html; charset=utf-8
> Content-Transfer-Encoding: base64
>
> PGh0bWw+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0
> L2h0bWw7IGNoYXJzZXQ9VVRGLTgiPjwvaGVhZD48Ym9keSA+PGRpdj5UYWtlIDIuIExldCBtZSBr
> bm93IGlmIHlvdSBnZXQgaXQuJm5ic3A7PC9kaXY+PGRpdj48YnI+PC9kaXY+PGRpdj48YnI+PC9k
> aXY+PGRpdj48ZGl2IHN0eWxlPSJmb250LXNpemU6OXB4O2NvbG9yOiM1NzU3NTciPlNlbnQgZnJv
> bSBteSBWZXJpem9uIFdpcmVsZXNzIDRHIExURSBzbWFydHBob25lPC9kaXY+PC9kaXY+PGRpdj48
> L2Rpdj48YnI+PGJyPi0tLS0tLS0tIE9yaWdpbmFsIG1lc3NhZ2UgLS0tLS0tLS08YnI+RnJvbTog
> QnJhZCBUaG9tcHNvbiAmbHQ7dm9sZ29sZmVyQGF0dC5uZXQmZ3Q7IDxicj5EYXRlOiAxMS8wNC8y
> MDE0ICA1OjQwIFBNICAoR01ULTA2OjAwKSA8YnI+VG86IEphY2tpZSBBZGFtcyAmbHQ7amFja2ll
> YWRhbXNAbGl2ZS5jb20KCiZndDsgPGJyPlN1YmplY3Q6IEZ3ZDogUkU6IEJldGhlc2RhIEJhc2tl
> dGJhbGwgVGVhbSA8YnI+PGJyPjxkaXY+SmFja2llLCZuYnNwOzwvZGl2PjxkaXY+PGJyPjwvZGl2
> PjxkaXY+SGVyZSBhcmUgdGhlIHR3byBlbWFpbHMgSSBoYXZlIHNlbnQgb3V0IHNvIGZhci4mbmJz
> cDs8L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PjxkaXYgc3R5bGU9ImZv
> bnQtc2l6ZTo5cHg7Y29sb3I6IzU3NTc1NyI+U2VudCBmcm9tIG15IFZlcml6b24gV2lyZWxlc3Mg
> NEcgTFRFIHNtYXJ0cGhvbmU8L2Rpdj48L2Rpdj48ZGl2PjwvZGl2PjwvYm9keT4=
>
> ----_com.android.email_3427126572587350--
>
Anybody?
Strange it happened to me yesterday... The main body was copied in each email. Using stock email on pain hotmail acct re exchange.
Strange?

Porting Debian Buster to Samsung Galaxy S8+ (SM-G955F) Exynos

Hi there, I'm new to XDA so please bear with me.
I'm trying to port Debian Buster to the SM-G955F Exynos8955 model of the S8+ and I am currently testing in a chroot environment within TWRP terminal, but I can't get the WiFi working. My current configuration is:
/etc/network/interfaces
> auto wlan0
> iface wlan0 inet dhcp
> wpa-driver wext
> wpa-ssid [SSID]
> wpa-scan 1 # visible network
> wpa-proto RSN # WPA2
> wpa-pairwise CCMP # WPA2
> wpa-group CCMP # WPA2
> wpa-key-mgmt WPA-PSK
> wpa-psk $( wpa_passphrase [SSID] [KEY] | cut -d '=' -f2 | tr '\n' ';' | cut -d ';' -f4 ) # to get HEX value, not in actual config
EOF
# ifup wlan0
or
# ip link set wlan0 up
# dhclient
Neither commands are connecting the WiFi like it should, but I know that the drivers are loaded and that the interface is up.
Any ideas on what to check?
Cheers in advance.
HezuKame

Categories

Resources