Current location - Quotes Website - Signature design - What are the advantages and disadvantages of cracking S60 V3 certificate?
What are the advantages and disadvantages of cracking S60 V3 certificate?
S60 The third certification body was officially cracked. Illustration! All the required files have been downloaded!

Finally officially cracked the permissions of the third edition of the mobile phone. First of all, I would like to thank the technical adults who struggled in the front line of XX authority, the authority cracking of FCA00000 and the replacement of the big root certificate of Leftup, and their achievements. NM$e Ws R/V

At the same time, bugb's computer-side cracking software greatly simplifies the cracking process, making the cracking process more convenient. Ab5L【A7? /o

This paper summarizes the rearrangement of shadowD drawing course. If you need to reprint, please indicate the source. (_L0o@-^

First of all, let's talk about the effect of cracking the permissions of the third edition of the mobile phone, that is, you can enter the system folders such as Sys and private through resource managers such as X-plore and Activefile to operate, and you can also get the highest permissions of the self-signed A4 input method with low permissions (in fact, this is also the most practical use), which can be used in JAVA, calendars and notebooks. The replacement of root certificate can make us no longer need to make a special certificate matching our serial number to sign, just sign a general certificate to install the software, and most of the general certificates have the authority of 20 years, not to mention the expiration of the certificate. I hope everyone will read the above carefully before deciding to crack it, and users should also be responsible for any adverse consequences caused by cracking the mobile phone. g|QE5ER.iz

1. Download Freepack.sisx and HelloCarbide.exe in the following attachments, install Freepack.sisx on the mobile phone, and then put the HelloCarbide.exe file in the root directory of the C drive of the mobile phone, which is C: \ hellocarbide.exe.

7i4nk"^wd*f^ 58565[/attach]& amp; b & ampH 1O}*{:mIs8uW

Second, connect the mobile phone and the computer with a data cable. When connecting, select PC Suite, and then find the newly installed TRK in the phone menu and run it. When it is turned on, you will be asked whether to turn on Bluetooth. Select no to enter options-> settings. Then, change the first option connection to USB, return to the main interface without operation, and then select options-> connection. The connection status on the screen indicates that the connection is successful. J_O:【! ~ j

[Additional ]58566[/ Additional]

& Li! Ldzg III。 Right-click my COMputer, select Properties, then select Device Manager in Hardware Options, and then click the ports (com and LPT) columns. At this time, you will see your mobile phone and the port number (COM*) behind it, and write down this COM port number.

* pTw @ of IO+RWD

OQ3s9WJ four. Download the computer-side cracking software hacks60.exe given below. After running, first choose your mobile phone model and the COM port you just wrote down. Finally, click the XX program to start the cracking operation. When a dialog box prompts that your mobile phone has successfully cracked the permissions, congratulations. Now, you can use the X-plore and Activefile software on your mobile phone to enter the system sensitive folder for operation at will (you must choose to show the hidden system folder in the manager software before you can see it).

\ tu8i+s nV。 However, the above cracking operations will be returned to the original shape after restarting the phone. In order to keep the cracked state at any time in future use, please download the following CapsON.sisx and CapsOff.sisx, and then download CProfDriver_SISX.ldd, and copy this file to the folder c:\sys\bin in your mobile phone (please crack these operations in the fourth part above). Every time you restart in the future, just run CapsOff in the menu table to make the phone enter the state of cracking permission, and run CapsON to return to the normal state. _@ED)W7rr7{b

[attach]58567[/attach]% J:Oc0krp(zI

At this point, we have completely restricted the authority of the system, but at this time we still need a certificate to install the software, so we have to take a crucial step: replace the certificate! Pn w | 5J & amp\"Hqt

4]w pD rA D t

Sixth, import certificates, so that your mobile phone is no longer restricted by certificates!

#? V | x 'aud @ w 1。 Download and unzip the root certificate patch package. Rar "to get two softwares:" updater.sisx "and" updater.sisx ".

js4m & ampb5F)cT{ [attach]58568[/attach]

7s+@' e-F6Ox2。 If your mobile phone is a non-FP 1 model, install updater.sisx, otherwise, install updater.sisx6C9 @ 7hk @ f3E8k.

3. If your mobile phone is a non-FP 1 mobile phone, install updater.sisx and run SwiCertStoreUpdater, as shown in the figure.

JB(Fy Z @[attach]58569[/attach]8pZ * MRE 9? Pop music show host

4. If your mobile phone is FP 1 model, install updaterD.sisx and restart it. There is no system icon after the installation of updaterD.sisx, but it doesn't matter, it will run automatically after you restart the installation [&; LWp#MJ_ Q

5. After that, enter Settings-Security Settings-Certificate Management in the mobile phone, and confirm that there is a certificate signed by OPDA000 1 OPDA, and the import is successful.

Dw 'm5b & Forward %mI

9D%mWo`[ @"K Congratulations, you have cracked the permission check, verified the certificate, and your mobile phone system has become very open, so you don't have to worry about the lack of software permission to get the certificate in the future!

Lg) An IH-E1P HelloCarbide.exe mentioned in the first step, remember to put it in the root directory of drive C [attach] 58570 [/attach] LGC% LR8W9R.

The Freepack.sisx mentioned in step 1 can see the TRK icon after installation, and [attach]5857 1[/attach] can be deleted after all the cracking processes are successfully completed.

Step 5: 5a4q {1\ dl ~) r cprofdriver _ sisx.ldd. . If you don't put this file away, but you can't keep cracking it, remember that you can only enter EVM 6] v: do% _ # l: ja.

N77,6290,N76,N95(8G),5700,6 1 10N,6 120c,E5 1,N8 1,N82,E90

3TlYl! o[attach]58572[/attach]PM; W6E:_t%}

These are CapsON and CapsOff for FP 1 models.

xLe A%xx$x! K the specific model is as follows: qc8dr(d | &;; L

N77,6290,N76,N95(8G),5700,6 1 10N,6 120c,E5 1,N8 1,N82,E90

9o'B~rj! J[ Add ]58573[/ Add] [Add ]58574[/ Add]

. X5? ~ 6Av & ampD4t0G6}5OYq? k % W ' z Q4 '

Hacks60.exe, computer-side cracking software, because it is relatively large, it is divided into two files @

Generally speaking, the probability of virus infection after cracking is higher, but many functions are really much easier. You can also change the root certificate and break through the system forever!