Current location: home page > Industry trends >Text content

A simple and practical Google lock cracking method you may never see

Dazzle Yi Two years ago (2020-02-13) seven thousand seven hundred and twenty-four nine

 1.jpeg

    Recently, the epidemic situation is so serious that I'm really bored to stay at home. Every day, I see all kinds of packages recommended. So I started itching and my addiction to brush the machine came back. So I immediately downloaded a package of pixel experience (this package was transplanted by pixel4, an unofficial PE, but the method is fully applicable). After that, I started the backup and started the machine at one go, but there was a problem, I forgot to return my Google account last time when I used to brush the class. As a result, a beautiful little lock [masochistic] appeared in the upper left corner. So I planned to use the method I found out a year ago to untie the lock. Now I will share it with you. Multi picture warning! You can watch it quickly.

Note: this method must log in to your Google account before you are locked. If you forget the account, it may be a bit troublesome!


  As you can see, now we come to the welcome interface. There is a small lock in the upper left corner. Remember the emergency call in the lower left corner

 2.jpg

  Now let's start by connecting to a WiFi

 3.jpg

  After connecting, we will return to the welcome interface again, click the emergency call in the lower left corner, and then it will be like this

 4.jpg

  Then we click the first aid information twice, and then we click on the red pen circled in the picture

 5.jpg

  And then it's like this

 6.jpg

  We click on the portrait, and then click to select the image to go to the file management. Click the three points in the upper left corner to display this interface. After that, we long press the part of the photo album in the picture, which has been marked with a red circle

 7.jpg

  Then we enter the application information of the album

 8.jpg

  Click permissions

 9.jpg

  Click location information

 10.jpg

  Click to see all the apps for this permission, and then it goes like this

 11.jpg

  Click chrome, and then click to view all permissions for chrome

 12.jpg

  Next, we click on the chrome icon, which has been circled

 13.jpg

  We will come to the chrome settings interface. Click open to download a scientific Internet app from the browser. We suggest that you backup it to an app before swiping it, and then install it directly in chrome and open the link. I originally sent him to QQ friends, and then I downloaded and installed QQ. After entering his chat window, there are still sending records, I will directly download the installation link, according to your specific situation to do, here omitted

 14.jpg

  After we open and connect, we all the way click the return arrow in the navigation bar to return to the unfinished welcome interface, and then we can complete the setting of the welcome interface according to the prompt. We can see that the old checking update has become installing the update, because we can now connect to Google and the upper right corner of the status bar

 15.jpg

  This place doesn't have to wait a long time, about a minute. Finally, I'll attach some pictures later

 16.jpg

PS: you don't have to enter the location information permission. You can also enter other permissions, but after all, the location permission covers a wide range of applications, so I chose the location permission. You can click three points in the upper right corner of the interface to view the permissions of all applications, and then click display system Application, enter the system's own file app installation, the premise is that you must first transfer a scientific Internet installation package in the third-party rec, or you can only go to the browser to find it


Pro test havoc OS this method is not applicable, because when you enter the page of emergency contact function, you will be prompted to complete the mobile phone settings before you can use the emergency contact function. You will not be able to edit the contact's Avatar. This method is normally used on pe10, 9 should be the same, and other classes have not tried


Related articles

 How to crack the latest version of [Android] wizard 1.60

How to crack the latest version of [Android] wizard 1.60

  After decompiled with Android kill, locate the code by looking up the registration failure information   Comment out the registration code judgment code in the red box   Back compile, input any registration code to register   Then there is no, as for the software, download it yourself

 QQ has been spreading a complaint virus in recent days

QQ has been spreading a complaint virus in recent days

The website address is http://ecozw.nktqg.review/Xxn1j/wfidu.shtml , input fake QQ and password is really unable to enter.      In fact, the judgment is quite simple == That is to say, as long as you type something casually and log in twice, you can go in without any network verification, and then you will jump to the normal security center page. Only this webpage is fake. You can change the data. Time to a number larger than 2 in the console, and then enter a set of accounts that meet the rules

 On the NSA blackmail virus prevention measures - Chihiro blog share

On the NSA blackmail virus prevention measures - Chihiro blog share

  Since May 12, 2017, worm malicious code that attacks and spreads based on windows network sharing protocol has been found in domestic and foreign networks. This is a network attack event initiated by criminals through the "eternal blue" attack program in NSA hacker weapon library leaked before transformation.          At present, the worm will scan the windows machine with open 445 file sharing port. Without any user operation, as long as you turn on the Internet, the criminals can implant

 Bitcoin blackmail virus is conquered - free recovery office tool with infection data!

Bitcoin blackmail virus is conquered - free recovery office tool with infection data!

  [heavyweight! Eternal blue "blackmail virus has been successfully conquered by a network security company in Sichuan, and the exclusive tool for free recovery of infection data has been released!] according to an article published by zuineijiang0832, the official wechat of the Information Office of Neijiang Municipal People's government, the" eternal blue "that has ravaged the Internet recently has been reported Blackmail virus has been a network security company in Sichuan - efficiency source information security technology company to successfully conquer! And released data recovery free products. Bitcoin ransomware. Rar size: 2.5m has been tested by security software. Please feel free to download

 LETV cloud disk, which once had unlimited space, announced that it would close its service on June 30

LETV cloud disk, which once had unlimited space, announced that it would close its service on June 30

  At one time, the unlimited space of LETV cloud disk made many users store things in it crazily. Now I tell you an unfortunate news: on June 30, 2017, LETV cloud disk was closed.   After announcing the suspension of video upload service in May last year, LETV cloud disk issued a notice on its official microblog on the evening of June 6, saying that due to some illegal elements using the cloud disk to store and disseminate pirated, obscene, pornographic and other illegal documents, LETV cloud disk decided to stop personal cloud disk service and asked users to back up their data before June 30, 2017.   LETV cloud disk once claimed that

 [WP] WordPress erphpdown9.0.2 paid download Plug-in

[WP] WordPress erphpdown9.0.2 paid download Plug-in

The function introduction has integrated Alipay (guarantee transaction / dual function interface / instant payment), UnionPay, PayPal, TenPay, wechat payment integrated mycred integral plug-in (additional payment function) recharge card in the program (administrator background generates the card number and password of the recharge card, which can be sold on the third-party automatic card issuing platform, and then purchase and use the card code to recharge the website) (additional payment function) Alipay transfer payment (suitable for users without Alipay interface) supports the setting of member withdrawal service charge ratio, security mode (making Alipay guarantee transaction unable to recharge successfully, instant account can be recharged successfully), Alipay asynchronous

Comment list

 Chrysanthemum man
Three weeks ago (11-09)

Cow!

 Jiangsu netizens
Two months ago (10-14)

It's a success. Thank you very much!

 666 big brother
Two months ago (10-02)

The best

 visitor
A year ago (2020-10-08)

Lao Ge Niu PI plus

 visitor
A year ago (2020-10-08)

Lao Ge Niu PI plus

 visitor
A year ago (2020-10-05)

It's saved!

 visitor
A year ago (2020-06-27)

fierce!!!! Really useful! thank!!!

 visitor
A year ago (2020-06-27)

fierce!!!! Really useful! thank!!!

 visitor
Two years ago (2020-04-07)

6666, it worked

Comment

 visitor

Welcome to participate in the discussion. Please express your opinions and opinions here.