dear experts
i recieved a G2 HERO unit from a freind,
he was palying with it and then it write on LCD,PLz login with ur google account to unlock screen.
this unit he bought second hand ,he donno any account, also no internet connection,
so, if i make hardrest and formated it, i think it will ask for registration as old dreamG1 phones
anyway to bypass it without have internt or data plan,
i already searched a lot , but not find anything help
best regards
thx in adavnce
I could tell you how to get round the pattern lock that is asking you for the Google account information (I presume this is what the issue is - the pattern of dots you need to draw on the screen)
But... If I write the instructions on clearing the pattern lock here, someone else could come along here in future and read the instructions on removing the lock and use it on a stolen phone.
I notice you have been a user on XDA for a while, so I trust you, but I don't really think it is responsible to tell anyone how to get round the pattern lock (being as you can then access all the messages/contacts on the phone), due to potential for mis-use by someone else in future.
Hope you understand.
PS. What I will say is that I am not aware of any need to activate the phone (I've got a G2 and didn't need to activate it at all. It did ask me for a Google account, but that was optional and only for syncing calendar, contacts & mail etc.
if you can operate google you can find the necessary information to bypass the lockscreen anyway. a hardreset is suggested, you want a clean phone, not the one your precessor customized for his needs, do you? so just reset it, and the lock will be gone with the reset... there is no need to have a google account, but keep in mind that you won't be able to use the market (and other minor stuff) without a google account...
Yeah. That's what I alluded to, but forgot to write- just do a hard wipe to get rid of it.
@kendon for some reason, people don't seem to know the method. The number of times I've seen it asked on other forums is ridiculous, yet it is sooooo easy to find out. Hint: Google is your friend.
hello
thx for ur replay and trust
i really appriacte
i will call freind to bring, its my turn to play now
best regards
thx in advance
anon2122 said:
Yeah. That's what I alluded to, but forgot to write- just do a hard wipe to get rid of it.
@kendon for some reason, people don't seem to know the method. The number of times I've seen it asked on other forums is ridiculous, yet it is sooooo easy to find out. Hint: Google is your friend.
Click to expand...
Click to collapse
yeah well, that is not only the problem with a locked phone... just saying "how can i root my phone", "is apps2sd working" and so on...
edit: right on cue: http://forum.xda-developers.com/showthread.php?t=612254
Oh god... It's not this bad on modaco though . Damn. Now I've mentioned the forum, I bet you we start getting this kind of thing over there (it never seems to be so bad over there, being as most are there for MCR so are competent in rooting etc.)
I'm pulser on modaco btw, but some no-posts user has taken my name. Might do what you did and go for pulser_g2 or something like that and start again...
Hi,
My job has an exchange policy which has crippled my phone - in the sense that I hate having to type in a password every time I want to use it.
Is there any way to circumvent this? I was thinking maybe setting up a small Exchange server with a policy that says PIN codes are *not* acceptable If not, are there other programs out there that can replace the lock?
Cheers!
I believe you can use another exchange email app that doesn't require this.
Or maybe a custom rom can do the trick? I'm looking for this my self at the moment, but I haven't rooted & flashed my phone yet (it seems a bit more tricky then on the Nexus One)
olavjunior said:
I believe you can use another exchange email app that doesn't require this.
Or maybe a custom rom can do the trick? I'm looking for this my self at the moment, but I haven't rooted & flashed my phone yet (it seems a bit more tricky then on the Nexus One)
Click to expand...
Click to collapse
Thanks, but I was hoping to do it without rooting. Last time I had a hell of a time installing the official patch from Samsung...
Okay I registered my note with Samsung and tried out the Samsung dive app, I tried the ring phone, track phone and so on, but after trying out the unlock screen feature, now everyone I check for software updates on my note, I get no updates available very quickly followed by a statusbar notification telling me my screen lock has been reset to default by Samsung dive. I have tried logging out of my Samsung account, I have even deleted the Samsung account app from my phone, I have unticked the remote feature in settings, but it still does the same thing when I check for updates, as I have the unlocked international version so therefore waiting for ics to be made available for my note.
Anyone else tried Samsung dive and having the same issues, or am I missing something to turn this off.
It is now becoming very annoying constantly doing this, but it does only seem to do this when checking for updates.
I don't want to do a factory reset as I don't know if that will even cure this, and then still have this notification but having to start over again setting up my phone when I have it just how I want it.
Any advice is most welcome.
Same issue here, I agree, It is annoying! Any help would be appreciated.
I installed AVG Antivirus Pro, which Samsung was giving away for free for a limited time in my country.
Works great.
Back on subject. Have you tried resetting the app via Applications in Settings? Might fix your issue. If not a factory rest will probably do it!
I'm having the exact same issue here. Does anyone have a solution to this?
I hopefully seemed to have solved the issue. I had the exact same issue. I logged onto the samsung dive website and chose the option to 'Lock My Mobile' and entered a pin. Now on the phone I unlocked my phone with the PIN previously set on the samsung dive website. After this the problem seems to have disappeared.
Hope this works for you all
GaryD007 said:
I hopefully seemed to have solved the issue. I had the exact same issue. I logged onto the samsung dive website and chose the option to 'Lock My Mobile' and entered a pin. Now on the phone I unlocked my phone with the PIN previously set on the samsung dive website. After this the problem seems to have disappeared.
Hope this works for you all
Click to expand...
Click to collapse
have the same issue after using samsungdive on my ics...
cant understand your English
Hi Meethere
what part of my instructions do you not understand?
worked great
thanks
I had the exact same issue. Just go to Settings>applications> and select software update and clear its data and reboot. It should be fine now.
ankydu said:
I had the exact same issue. Just go to Settings>applications> and select software update and clear its data and reboot. It should be fine now.
Click to expand...
Click to collapse
I can't believe it. I even called Samsung Customer Services regarding the issue and their response was that my mobile isn't compatible with my country (Canada). I did what you advised and I'm tracking my phone now on Samsung Dive!! Who thought it could be such a simple solution. THANK YOU!
Running Kingdroid v3 w/ SpeedMod K3-3.
I can't find the Samsung dive application... Any one knows where to get it? Or a link perhaps?
Sent from my GT-N7000 using XDA premium
shreeyashattal said:
I can't find the Samsung dive application... Any one knows where to get it? Or a link perhaps?
Sent from my GT-N7000 using XDA premium
Click to expand...
Click to collapse
Samsung Dive is a website. In the event you lose your phone you are able to track it. Just login to you samsung account on your phone under setting>accounts and after that you can go online to track your phone.
www.samsungdive.com
Sent from my GT-N7000 using Tapatalk 2
i had this same problem just open the Samsung Apps application on your phone and wait for update the Samsung SNS and Push service , this worked for me.
Sent from my GT-N7000 using XDA
works
GaryD007 said:
I hopefully seemed to have solved the issue. I had the exact same issue. I logged onto the samsung dive website and chose the option to 'Lock My Mobile' and entered a pin. Now on the phone I unlocked my phone with the PIN previously set on the samsung dive website. After this the problem seems to have disappeared.
Hope this works for you all
Click to expand...
Click to collapse
Hi,
Thank you very much for posting your finding. It also fixed it for me. :good:
This only effects stock / Touchwiz based ROMs using Samsung's stock Dialer a.k.a. contacts.apk . AOSP or AOKP based ROMs are NOT affected by this bug.
UPDATE XXLRT Not Affected. Earlier versions ARE affected.
trevmar said:
.
My Galaxy Note N7000 rooted, with GingerBread XXLA4 (thanks Dr Ketan) is vulnerable. But a pop-up first asks me if I want to send the call to GrooveIP or the Dialer. I am unlikely to ignore that pop-up now...
.
Click to expand...
Click to collapse
zylor said:
Tested on:
GT-N7000 4.0.4 XXLRT
GT-i9100 with PA 2.13 4.1.1
with:
Chrome
Dolphin
Dolphin Beta
Stock Browser
Float Browser
All applications in latest version!
None of them triggered the bug
Click to expand...
Click to collapse
via Android Central:
A major security vulnerability has been discovered in some TouchWiz-based Samsung smartphones, including the Galaxy S3. The bug was first demonstrated by security expert Ravi Borgaonkar at the Ekoparty security conference. It involves the use of a single line of code in a malicious web page, and immediately triggers a factory reset without prompting the user, and without allowing them a way to cancel the process. Even more serious is the possibility that this could be paired with a similar glitch that can render the user's SIM card inoperable. And as the malicious code is in URL form, it can also be delivered via NFC or QR code.
We've confirmed that the code, when used on a web page, does indeed trigger an immediate factory reset on our Verizon Galaxy S3 running Ice Cream Sandwich. Presumably, because the built-in browser is common to all S3 models, other versions will also be affected. Others have reported that the Galaxy S2, Galaxy Ace and Galaxy Beam are susceptible, too. As far as we can tell, though, the vulnerability does not seem to affect Samsung phones running stock Android, like the Galaxy Nexus. Similarly, Google Chrome on Samsung handsets is not susceptible to the bug, nor are other browsers we tested.
The vulnerability is the result of the way native the Samsung browser and dialer apps handle USSD codes and telephone links. USSD codes are special codes that can be entered in the keypad to perform certain functions, like enabling call forwarding, or accessing hidden menus on the device. On Samsung phones, there's also a USSD code for resetting the phone (and presumably another for nuking your SIM). That, combined with a glitch in the browser which allows phone numbers to be automatically dialed, results in a particularly nasty issue for anyone unfortunate enough to run by a malicious web page.
There are, of course, other applications of this glitch for vulnerability. The ability to automatically run numbers through the dialer could be used to call premium-rate phone numbers, for example.
But the fact that just visiting a web site could trigger your phone to factory reset itself, and nuke your SIM in the process, is a very serious issue. Until it's addressed, we'd recommend switching to Google Chrome immediately, and as an added precaution, disabling the built-in "Internet" app through Settings > Apps > All, if you're using an affected Samsung phone.
We've reached out to Samsung for comment on this issue, and we'll keep you updated with any information they provide.
Click to expand...
Click to collapse
Source:
http://www.androidcentral.com/major-security-vulnerability-samsung-phones-could-trigger-factory-reset-web-browser
The original article from Slashgear. They DO NOT mention the GT-N7000 specifically, but it shares so much with the GS2 that it is very likely to contain the same bug.
http://www.slashgear.com/samsung-galaxy-s-iii-remote-data-wipe-hack-discovered-25249061/
A single line of code can apparently trigger an unstoppable factory-reset of the Samsung Galaxy S III, security researchers have discovered, with the potential for malicious websites to wipe out users’ phones. The hack was detailed by Ravi Borgaonkar at the Ekoparty security conference, with a simple USSD code – that could be sent from a website, or pushed to the handset by NFC or triggered by a QR code – that can reset the Galaxy S III or indeed other Samsung handsets.
Although the phone user is able to see the process taking place, hitting back on the device will not stop the reset. For QR code readers that automatically load whatever website has been stored to each code, or indeed NFC readers that do the same with NFC tags, the user would have no warning – and no hope of stopping – their handset from running the malicious code.
Only Samsung devices running TouchWiz appear to be affected, with basic Android only showing the code in the dialer screen but not running it automatically, Pau Oliva reports. Samsung’s default, though, is to dial the code automatically.
Perhaps most concerning, it’s reportedly possible to double up on the attack, Borgaonkar says, including a USSD code that also kills the SIM card currently in the handset. That way, a single message could be used to wipe a Samsung phone and leave the user with a broken SIM too.
It’s also possible to push Samsung handsets straight to a website running the bad code using a WAP-push SMS message. For the moment, the advice is to deactivate automatic site-loading in whatever QR and/or NFC reader software you use, and be careful about clicking links that you don’t implicitly trust.
Update: The same code has been found to work on the Galaxy Beam, S Advance, Galaxy Ace, and Galaxy S II. However, the Samsung-made Galaxy Nexus, which runs stock Android, is not susceptible.
Update 2: Other Samsung device owners are claiming that the hack does not work on their device. We’re running our own tests and will update when we know more.
Update 3: Tweakers’ Arnoud Wokke has filmed a demo of the hack in action on a Galaxy S II.
Click to expand...
Click to collapse
And now some funny tweets
https://twitter.com/stuartgibson/status/250564113980338178
https://twitter.com/ceoStephenElop/status/250560153013846017
nickshertzer said:
https://twitter.com/stuartgibson/status/250564113980338178
https://twitter.com/ceoStephenElop/status/250560153013846017
Click to expand...
Click to collapse
I hope that doesn't work via tweeter, else we are screwed
It affects htc phones aswell, all the way back to the hero.
Sent from my GT-P3100 using xda premium
stoney73 said:
It affects htc phones aswell, all the way back to the hero.
Click to expand...
Click to collapse
Really? Source?
More info:
http://www.theverge.com/2012/9/25/3403928/samsung-touchwiz-reset-vulnerability
http://tweakers.net/nieuws/84578/regel-html-code-kan-galaxy-telefoons-resetten.html
The Galaxy Nexus and Galaxy Note are also not vulnerable to the problem.
Click to expand...
Click to collapse
That is a German translation, but per tweakers, the "Galaxy Note" with 4.0.4 update is not vulnerable. I believe it loads the code in your dialer, but does not automatically execute the command.
Again, CM9 / CM10 / AOKP / AOSP based ROMs are not affected. AFAIK, this deals with the way the Samsung Stock Browser handles malformed dialer links by automatically dialing them.
nickshertzer said:
Really? Source?
More info:
http://www.theverge.com/2012/9/25/3403928/samsung-touchwiz-reset-vulnerability
http://tweakers.net/nieuws/84578/regel-html-code-kan-galaxy-telefoons-resetten.html
That is a German translation, but per tweakers, the "Galaxy Note" with 4.0.4 update is not vulnerable. I believe it loads the code in your dialer, but does not automatically execute the command.
Again, CM9 / CM10 / AOKP / AOSP based ROMs are not affected. AFAIK, this deals with the way the Samsung Stock Browser handles malformed dialer links by automatically dialing them.
Click to expand...
Click to collapse
Im going by a tweet conversation between paul o brien and lennyuk. Apparently uptodate sammy firmwares are patched against it.
Sent from my GT-P3100 using xda premium
how about 3rd party browsers?
The xda thread on this on the SGS3 is here:
http://forum.xda-developers.com/showthread.php?t=1904629
It includes a link to test your own browser.
Sent from my GT-N7000 using xda premium
Best thing to take away from this:
DylanReeve said:
The issue has nothing to do with the browser. I've tested on ICS with Chrome, default browser and Dolphin - all behave the same way.
Test here: dylanreeve DOT com/phone.php (uses IMEI display USSD - it's totally safe).
The issue is with the stock dialer. If you can prevent that dialer from handling the tel: URL then you can either prevent or at least intervene in attack attempts. So the solution is... Install another dialer (probably any other dialer).
dylanreeve.posterous DOT com/remote-ussd-attack
(I can't post URLs yet)
Click to expand...
Click to collapse
However, again, it appears it is patched on latest Stock Note 4.0.4 ROMs. But, there is no confirmation that this is the case with older 4.0.3 or GB Stock ROMs.
And this (if you are still worried):
sts_fin said:
Easiest way to save yourself from this attack: set Chrome as your default browser, the TEL uri is not handled by chrome.
Just tested it on a SGS3 and Note... So just use chrome, and you are safe.
We have also contacted Samsung Finland about this.
Click to expand...
Click to collapse
nickshertzer said:
However, again, it appears it is patched on latest Stock Note 4.0.4 ROMs. But, there is no confirmation that this is the case with older 4.0.3 or GB Stock ROMs.
Click to expand...
Click to collapse
Yes when I clicked on a test link using the stock Samsung browser, all I got was the dialler pop up but nothing happened. I'm on the latest stock ICS 4.0.4 LRT ROM.
I sent the same link to a friend with an original Galaxy Tab which is running 2.3.6 Gingerbread and it made his device cough up his IMEI.
To my mind clearly his device was affected, but the stock browser on the LRT ROM at least appears safe.
Who want to try on Note just for fun
click on this from mobile, it will give you 'Link' press on it.
http://home.mattie-systems.nl/temp/telefoon.html
dont worry this have framed for *#06#, even it work then it will execute your IMEI but nothing
(ps:above posted link is third party link and doesn't exist on my Page or Page in my control, it may change from *#06# to other code without any notice, try at your own risk) though I can confirm on my Note 4.0.4 no codes executes ussd. Code directly)
If this execute your IMEI then OP said code will wipe data on note.
I have tested code one in OP too.
it has always bugged me that Samsung has so many dial codes. In the CDMA world you have enter the msl/spc, not so on GSM? But then getting the MSL can be rather trivial if the phone is rooted.
Sir i have overskreen,boat browser,stock browser.shud i delete them???
Sent from my GT-N7000 using xda app-developers app
A trivial workaround: install another dialer (for example, dialer one from the market). Now instead of directly dialing the dangerous code, you are asked which dialer to use.
How to escape if code get dialed accidentally -
This is just my experience (I don't claim it is safe)
This code first erases data on usb storage, so at first moment you see the screen, just remove battery, you may lose very small amount of data depending on how much time passed to remove battery, I have did this in past(yes on Note only) and I lost just 1-2 data folder, but phone memory was as it is.
Sent from my GT-N7000 using xda premium
MatanZ said:
A trivial workaround: install another dialer (for example, dialer one from the market). Now instead of directly dialing the dangerous code, you are asked which dialer to use.
Click to expand...
Click to collapse
Tested on stock 4.0.4 lri rom with the stock web-browers and none code is executed, even if the stock dialer is launched with the link provided by Dr Ketan.
With the app 'ex-dialer pro' this is not the same story, even if the option to auto-execute any ussd code is disabled, the code is executed, so, be carefull...
Specially if you have specified the other dialer as default app, not my case.
dr.ketan said:
How to escape if code get dialed accidentally -
This is just my experience
This code first erases data on usb storage, so at first moment you see the screen, just remove battery, you may lose very small amount of data depending on how much time passed to remove battery, I have did this in past(yes on Note only) and I lost just 1-2 data folder, but phone memory was as it is.
Sent from my GT-N7000 using xda premium
Click to expand...
Click to collapse
With all due respect, I don't think removing a battery during a format or delete operation is a wise thing to do.
I tested on LRG rooted stock rom and Stock browser. It shows the code in the dialer screen but you have to manually click on the call button.
I think if delete command issuing to sd card, it should not cause issue. Though you are right, I have added line on my post.
Sent from my GT-N7000 using xda premium
Another work around:
Install a program like 'Call confirm', which prompts you before doing the actual dial.
I love this program - I'm always accidentally hitting wrong names/etc with my fat fingers.
- Frank
As an "exercise in personal growth" (and also to let the rooting, rom, Knox, stuff shake out) I'm giving it a go staying stock.
It actually isn't half bad and I'm down to two last minor problems that I can't figure out and I'm hoping someone has some wisdom to impart.
1. How do I disable automatic contact linking? My business partner and my company got linked because they shared both an address and a phone number. I fixed that but I don't know what else has been auto-linked. (Even just within Google contacts... I'm not talking about Facebook/Google linking but I wouldn't want that either)
2. How can I get the weather to show on the Lock Screen? CyanogenMod it was "just there" (at least I don't remember having to add it)
Thanks in advance if anyone can help!
P.S. As I mentioned I'm trying to stay stock if possible. I realize I could probably do at least the weather with rooting and installing something and I am open to rooting if absolutely necessary.
Check out "Chronus - Home and Lock widget" - https://play.google.com/store/apps/details?id=com.dvtonder.chronus
Might not work if you have security on your lock screen though. Samsung in their infinite wisdom really messed up the vanilla Android lock screen.
Sent from my SM-N9005
dr.m0x said:
Might not work if you have security on your lock screen though. Samsung in their infinite wisdom really messed up the vanilla Android lock screen.
Click to expand...
Click to collapse
Yeah... I can't get it to work... At least not in any "obvious" way. (Long clicking, etc).
And I have to agree with you... I'm assuming that an S-View case isn't going to work with any security enabled either?
If so, it really sucks that "premier headlining" features don't work with security enabled.
!......