Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Leaderboard


Popular Content

Showing most liked content on 02/07/2012 in all areas

  1. 12 points
    You reading this post because you have an imported/foreign CDMA handset with you and its ESN/MEID is registered in Reliance database. If ESN/MEID is not registered then you can check this topic. Now you want this handset to be working on India's Largest and RIMweb's beloved CDMA network! Though this area is little tricky for n00b's, past knowledge of CDMA development plays a key role. But if you don't have anyone this post will help you (hopefully); fingers crossed! PLEASE NOTE THIS PROCESS CAN GET YOU VERY EXPENSIVE AND ULTRA MODERN PAPERWEIGHT. SO YOU SHOULD KNOW WHAT YOU DOING. IF YOU DON'T WANT THAT TO HAPPEN THEN GET IT DONE WITH THE HELP SOMEONE AS MENTIONED IN THE FAQ TOPIC. Prerequisites 1) CDMA 800 Mhz handset (Which ofcourse you have) with its data cable. 2) CDMA workshop v 2.7 (though there are more softwares to do it, this is used commonly) - Use Google to find 2a) There is a possibility that your handset isn't supported by CDMA Workshop v 2.7. In that case you need QPST - Use Google to find 3) Knowledge of how to put your particular handset in DIAGNOSTIC mode along with its driver. You can Google that out. 3a) Though I have personally done 100's of different handset models, keeping track of each handset model is difficult. So I am mentioning the most common DIAG mode enabler below: HTC Handsets: ##3424# or ##3424+Call button. Palm/HP: ##8727277# Samsung: ##8778# and select modem. BlackBerry DIAG behaves on virtual port created by installing BlackBerry DM. This list will be huge if i keep writing. So I'll suggest if your handset isn't mentioned in this list then please ask on this topic and I will try to reply with your enabling DIAG solution. 4) Diagnostic Driver for your device. (There are so many handsets and usually there are different drivers for each devices, so this is something you have to request here, commonly used DIAG Drivers - Google for it) 5) Windows PC with XP or Win 7 32 bit. (Its very difficult to find 64 bit drivers so I'll keep and support this tutorial for 32 bit only) 6) Carrier specific NAM PRL or Preferred Roaming list file. (Check the pinned topics in Technical forum) 7) A-key or Authorization key. (will be provided by ESN/MEID Registrar or handset seller) 8) Your handset's SPC (check your handset cover box or ask your handset seller). How to / Step by Step: Note - There are many handsets/models and each time process is little different. But basic changes to latch your phone to Reliance network is mentioned here. I am using HTC DEVICE to do it for Tutorial. 1) Pick your phone and enable Diagnostic mode in it. ( I am using HTC HERO and so i punch: ##3424#). Please find your phone DIAG enabler in prerequisites above. 2) Connect your Phone to PC using Data cable and let the Driver search process begin. (mostly Driver installation failed and you have to do it manually) See pic or video. 3) Now open CDMA workshop (You might have to disable your antivirus, as the crack for CDMA workshop uses Trojan pattern) 4) Open Device manager and expand Ports (COM & LPT) there u see which COM PORT assigned for your device. In my case its Com PORT 7 5) Select that comport on CDMA workshop and press connect. and press read. 6) Go to security Tab and enter SPC and press SEND button. return message should be SPC COrrect Phone unlocked See pic. 7) Now go to Nam Tab and press load and select Reliance.nam and press write. 8) Go to CAVE and enter your akey and press write. (You might have to calculate akey, see pic for details on calculation) 9) Go to Other tab and press write under PRL select Reliance.PRL file return message should be success. 10) Now your phone is flashed on Reliance CDMA network. :thumbup: :thumbup: Note - Now after this process you need to visit Reliance webworld to transfer ur number from existing handset/RUIM to this phone. U can also use HCC (Handset Change Card) if its available and work in ur city/state. Hope you enjoy flashing your phone. Thanks. EVDO Activation & Configuration For questions related to generating the NV dump file with EVDO parameters and submitting EVDO activation request, please check the FAQ topic. If you have the NV dump file from your handset seller or MEID/ESN registrar, you can follow these steps to upload the NV dump file to start using EVDO: 1) Go to "Security" tab in CDMA Workshop and Send the SPC as explained earlier in this topic. 2) Once it showed that the phone has been unlocked, go to the "Memory" tab and click "Write" under "NV Items" 3) Clik OK when it shows that you have to send the SPC and then you will be able to select the NV dump file. Browse and select the file. Sample file name is like "MEIDnumber@hrpd.rcom.co.in-net-NVItem-Script-PPP-HDR-27.txt" 4) Submit the file and it will show that the NV items have been written successfully. Now restart the handset and EVDO should work fine if the EVDO activation has been done already at Reliance.
  2. 5 points
    Its funny to discover that alot of paid apps and one of which I stumbled upon is Editor's Choice on Market can be acquired through GetJar. Just download their free app and look into Gold App category. They have shortlisted selected apps which are the best ones according to them. For e.g. You can get Beautiful Widgets which is Rs.127/- in market but free here and Trial X game again for free. Jump onto it before they remove or change the apps.
  3. 3 points
    ^ ^ ^ I also posted deals from TIMTARA earlier but after investigation realised that, It regularly comes up with such 1,000, 2,000, 3,500 Off on various categories to lure people. It is the worst Online Selling site in India. Search and see hundreds and thousands frustated customer stories It delivers products very LATE. Most of the time beyond a month. Your money is stuck + STRESS of whether you'll get it at ALL is a bonus. During this time, there is NO Customer Support. Expect none of your mails, calls to be answered. If you calculate their discounted prices with other good deals from reputed sites, usually there won't be a huge difference. All the hassle is not worth for a few hundred bucks IMHO. Have a look at their irate customer comments on their Facebook Page >> http://www.facebook.com/timtara?sk=wall Just wanted everyone to be aware before taking the RISK.
  4. 1 point
    Guys with photon (or any other phone) I would really recommend you take a backup of your phone so that if something goes wrong we can restore back to point were things were good It never hurts to take a backup and is best for people who do a lot of experimenting with their phones as it is always better to be prepared than being sorry! You can now flash the bootstrap ClockworkMod Recovery package on the Motorola Photon 4G. You of course have to have your Photon rooted (if you need to root it still you can go to this article). Along with root access you will need an AC adapter with the USB charging cable. Photon 4G ClockworkMod Recovery Installation Instructions: Download the recovery file (Download Link) Connect your Photon to the computer via USB Put the .apk you downloaded on your phone Unplug your phone from the computer find and install “Bootstrap_signed.apk” (the file you just put on the phone) After install is done run the application Click “Install Recovery” Accept the Superuser request After completed, plug your Photon 4G into the wall to charge Verify that your phone is charging from the wall Press “Recovery Boot” Your device will now reboot into CWM Recovery (be patient it is slow) Source I have also attached the recovery apk incase we are unable to download it at a later date. Bootstrap_signed.apk
  5. 1 point
    Eunuchs in India Eunuchs in India are a very secretive community, highly shrouded in mystery. There are almost 19 lakh eunuchs or ‘hijras’ who live marginalised lives as outcastes, abused and disliked by one and all. Even the government has not been able to provide any assistance, since their problems have not been properly represented. Most Indians do not even consider hijras as human beings. For them, they are ‘diabolical creatures’, a source of eternal disgust and perennial fear. There are a lot of questions about them that beg an answer, such as: Who are eunuchs? Are they born or made? How are they different from the rest of us? Where and how does this highly secretive community live? What are their customs and rituals? How are they cremated/buried upon death? Are they really sexual deviants as is commonly believed? Are they really a ‘criminal’ community? Can they be surgically transformed into a normal male or female? What is it like to be a eunuch? For the first time, the answers to all these questions and many more are available in the form of a thoroughly researched and well-documented book, ‘Life Of A Eunuch’. The book consists of 540 pages, packed with never before published material about eunuchs, including exclusive photographs of the anatomy of eunuchs. Life of a Eunuch. Download Full Book From Here >> http://www.sooe.org.in/book/Life-Of-A-Eunuch-All-Pages.pdf Critically Acclaimed Docudrama, ‘…Aur Neha Nahin Bik Payee’, featuring actual events and a cast of real eunuchs, for the first time in the history of Indian cinema. Watch it on YouTube The movie and the book have been subsidised by Salvation Of Oppressed Eunuchs (SOOE), a registered Non-Profit Organisation working for the betterment and welfare of eunuchs >> http://www.sooe.org.in/index.html
  6. 1 point
    10 threats to The Golden Age of the Internet Source By Alan Norton February 3, 2012, 6:58 AM PST Takeaway: Have we been taking the Internet for granted? See why we might soon find ourselves reminiscing about the days of unfettered use and free access. I have always been fascinated with the phrase “The Golden Age of Science Fiction,” primarily because my favorite science fiction author, Isaac Asimov, was a central figure during that period. It is generally believed that the golden age of science fiction occurred between 1930 and 1950, when authors like Heinlein, Clarke, and Asimov were pioneering the way. What fascinates me most was whether the authors and readers of science fiction at that time knew they were living in the prime of the genre. And that brings me to the topic at hand: the Internet. We are living in the best of times, when an Internet connection can be found almost everywhere, when the majority of the population participates, and when the governments of the world have, for the most part, maintained a hands-off policy. For many reasons, WWW could more appropriately stand for the Wild Wild West and not the World Wide Web. However, threats seem to lurk around every corner. I will list 10 of the biggest here. 1: Government regulations Once again, Internet regulation is in the news, with the SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) legislation proposed in the U.S. Congress. Of all the changes to the Internet that could be detrimental, I fear red tape and government regulations the most. SOPA and PIPA appear to be dead for now, but it’s only a matter of time before the next threat rears its ugly head. There are plenty of existing laws to address the lawless amongst us, but legislators seem bent on enacting Internet-specific laws. Never underestimate the power of governments to destroy what they try to protect as they attempt to bring law and order to the Internet. 2: Censorship You would think that most people would consider censorship of the Internet a bad thing. However, a BBC World Service poll showed that only 53% of the respondents felt “the Internet should never be regulated by any level of government anywhere.” And those are scary statistics if you want your Internet to remain free of censorship. All you have to do is look at countries like China to realize how government intervention can screw up a good thing. The fact is that censorship currently exists in many countries, including the United States, where some school and public library computers are filtered. And it’s not just governments that can and do censor the Internet. Take a close look at your ISP’s terms of use and you may find that it toocensors what it deems to be “objectionable.” Fortunately, the chances are good that your home Internet connection is still free from the heavy hand of the censor. But “as good as it gets” means that Internet censorship can only get worse, as freedom of speech on the Internet is slowly chipped away over time. 3: Taxes Legislators solve the dilemma of allowing the use of “sinful” products like tobacco and alcohol by taxing them — a lot. How long can it be before a “sin tax” is placed on the viewing of pornography, online betting, and other “sinful” activities? Currently, few U.S. residents realize that most must pay a use tax for items purchased over the Internet from another state. Fewer still actually pay those taxes. States are quite cognizant of this loss of revenue and have begun to seek ways to collect their monies owed. New York and other states’ laws require vendors with an affiliate nexus relationship in their state to collect taxes on business done in their state. As I discuss in another article, “The New York legislation essentially ties all employees, salespersons, independent contractors, agents, or other representatives and affiliates to the vendor. The nexus of any of these entities in the state of New York forces the vendor to collect taxes on all transactions from New York residents even if that vendor has no direct physical presence there.” Similar Internet tax legislation may be proposed in more states in 2012. One thing seems certain: The tax man cometh and he’s loaded for bear. Disclaimer: I am not a lawyer or CPA. The content of this article is for informational purposes only and is not meant as legal advice. Tax laws are complex and you should contact your lawyer and/or tax adviser for specific advice. 4: Bandwidth limitations I must admit that before doing the research for this article, I thought that the majority of ISPs were not limiting bandwidth usage. But as Table A shows, the broadband police have already arrived for most in the U.S., although unlimited bandwidth can be found in other countries. As you might expect, the limits are even more restrictive in the mobile Internet space — except for Virgin Mobile, which offers an affordable unlimited plan. Table A: Broadband bandwidth caps for major U.S. ISPs *Except for CenturyLink, bandwidth limits combine upload and download bandwidth. Please note that terms are subject to change. If your ISP is not listed and you are unsure if there is a bandwidth limitation, it is a good idea to check. Additional information: Google TV, Apple TV, & Roku’s Biggest Enemy: A lack of Internet Bandwidth — ZDNet Time Warner Cable Installing Metering Technology, CEO Claims Company Not Sure If It Will Use It: Stop the Cap! 5: Access charges Internet access is broader than ever for Wi-Fi and cellular networks. Free Wi-Fi can be found at large chain stores like Starbucks and McDonald’s, though you might be surprised to learn that these are recent developments — January 2010 for McDonald’s and July 2010 for Starbucks. Even your local café is getting in on the act. I recently took a trip and found free Wi-Fi heaven at the Tucson International Airport. There were Internet stations “with a view” overlooking the tarmac, where you could plug in and recharge your mobile device. It was a different story at the George Bush Intercontinental Airport in Houston. I could get Internet access for a “mere” $4.95 per hour or $7.95 per day via Boingo and plug in at a not-nearly-as-nice free Samsung recharging station. And it is the latter example that has me worried that the free days of Wi-Fi access may be a short experiment. 6: Internet money What if everyone had an Internet account containing Internet “chits” that could be used to pay for Internet products and services? Web sites could begin requiring some of those chits to watch a video, read an article, or download a file. Requiring .005 chits here and .100 chits there doesn’t sound like much, but multiplied by hundreds of page views, it would add up quickly. Fortunately for the browsing public, such a way to get into your pockets hasn’t yet been implemented. But I am sure that services like Google Wallet and PayPal would like to become the model that rules the Web. This one is a double-edged sword. It can solve some problems and create new ones. 7: Subscription-based income model Some of you might remember years ago after the dot-com bust when the advertising-based model of income generation for Web sites was threatened with a fee-based subscription model. Pundits opined that this would become the wave of the future. It never happened. Fortunately for those of us enamored with free, this concept has morphed into both free and premium content. The advertising-based income model is alive and well. And it will probably stay like this for most Web sites as long as free market competition and a multitude of alternatives exist. But the threat is still lurking in the background. The pundits are still saying that the subscription-based model is coming. Don’t be too surprised if you see content providers try this model in the upcoming years — especially those streaming digital content. 8: The end of free services like Skype If you had told someone in the ’70s that you would one day be able to talk to anyone in the world for free, they would think you were destined for the proverbial padded room. Assuming you have a device that connects to the Internet, a fast Internet connection, and a webcam, you can not only talk to someone living on another continent in real time, you can also see a live video feed of them and instant message them. Anybody remember the AT&T Picturephone that was going to be the next greatest thing in telecommunications? That went nowhere. But the concept lives today asSkype and other similar services. Although basic services are free when you contact other members online today, some are worried that Microsoft’s purchase of Skype can only mean that those days are numbered. 9: Copyrighted material You might not like it, but piracy of copyrighted materials on the Internet is a problem that needs to be addressed. Artists should be paid for their work. It may take years for this issue to be worked out, but free access to copyrighted material won’t be reality forever. A simple way needs to be developed for ethical users to pay for copyrighted content. Call me naive, but I can’t see how another law will solve this problem. It could be resolved if content providers like YouTube charged for content like full-length HD movies with part of the proceeds going to the copyright holder. The threat here is that a bad solution like SOPA/PIPA will one daybe implemented. 10: Privacy abuse Your privacy is under assault. Governments publish your “public information,” search engines collect your search terms and IP address, cookies track your browsing activity, hackers steal your personal information, and keystroke loggers track your every keystroke. Privacy policies, ironically, explain the ways that your privacy will not be protected. You may not be aware of another privacy offender, Local Shared Objects, aka flash cookies. Flash cookies are used by the Adobe Flash Player and are not removed by the normal methods of cookie removal. It is the information age. So it’s not too surprising that the people who use information technology, and those who abuse it, want to collect as much information about you as possible. It’s how they put food on their table and toys in their garage. In the name of security, some legislators are asking for the Department of Homeland Security and other U.S. intelligence agencies to increase the monitoring of social site data. EINSTEIN is a system originally designed to monitor Internet traffic moving to and from U.S. federal government networks. Einstein 3 may be deployed to critical private networks. These trends point to a further assault on privacy in the future. Count your blessings Without a doubt, the Internet as it exists in 2012 is a good thing. It would be sad if we didn’t realize how good we have it. Fortunately, important players like Wikipedia do “get it,” as evidenced by their response to the SOPA/PIPA acts. And that is heartening, since the single greatest threat to the Internet is apathy. The Golden Age of the Internet: 1995 –? How long the Internet remains golden is anybody’s guess. It wouldn’t be too surprising to find ourselves just a few short years from now reminiscing about the good old days of the Internet, longing for the free days of Skype, and the many freedoms that now exist. “Too good to be true” can’t last forever, can it? It is possible that most of it will last if we fight to keep it that way. But if that doesn’t work out, enjoy the Golden Age while it lasts.
  7. 1 point
    Internet as we know it has been in existence for close to two decades and it is no surprising that governments the world over are slowly realising the importance of this medium. Mass opinions can make or break policies, something which was not happening till quite recently. The growth of social networking sites like Orkut, Facebook and Google +, to name a few, have only hastened this process. It is something similar to television. When it was first introduced, people were quite skeptical over it and even predicated that the phenomenon would not be able to sustain. Today television is treated seriously as is evident from the heavy weight politicians who are willing to spend time defending their policies rather than merely ignoring a political debate. However, what we would have to realise is that, unlike traditional form of media, the internet has always been largely unfettered and unregulated and actually asking for some kind of policing to be undertaken would be an arduous, if not impossible task. Traditional media gets bound by physical and geographical boundaries, something that the virtual world does not have to contend with. It would not take too long for an "offending" website to completely shift operations from a country where they find it inconvenient to operate to a more "friendly" environment. As has been proved with viruses and trojans, people can keep coming out with solutions but there is always another virus waiting to happen! All said and done, let us hope that we continue to have a completely independent and unregulated internet, where people can be free to express themselves without fear or favour and the only regulation is self imposed!
  8. 1 point
    New pack details... *97 is now 90 INR with 2 gb data valid for 30 days *147 changed to 140 with 6 gb data valid for 30 days.... Mods pls update the first post with this details... If u like my post pls click on the green icon below my post.... Sent from my SCH-I559 using Tapatalk
  9. 1 point
    GO SMS with Motorola Photon BLUR = BAD CHOICE By the way SMS is sent or downloaded by Android Core Telephony Framework, and once SMS is received Core Tekephony just raise the "SMS RECEIVE INTENT" which is then Processed by all SMS apps and whats app have Notofication on will alert you GO SMS is just SMS Manager niether it send SMS or Receive
  10. 1 point
    Please see the attachment. I got data as in http://forum.xda-developers.com/showthread.php?t=1473324. Just create two files in /system/etc/ppp/ ( for creating these files, you have remount /system directory for write mode) pap-secrets & chap-secrets with the content of * * ' ' Then chmod to 0500 of these files & reboot
  11. 1 point
    Think that you solved it yourself, others please check http://forum.xda-dev...d.php?t=1473324 for the data issue. Yes I already Solved it. & posted solution here & xda. But somehow my post here missed. Thanks for mentioning it.
  12. 1 point
    Think that you solved it yourself, others please check http://forum.xda-developers.com/showthread.php?t=1473324 for the data issue.
  13. 1 point
    list of all the IPSW (roms) for i-phones / pads till 9-12-11 1.0.0: iPhone1,1_1.0_1A543a_Restore.ipsw 1.0.1: iPhone1,1_1.0.1_1C25_Restore.ipsw 1.0.2: iPhone1,1_1.0.2_1C28_Restore.ipsw 1.1.1: iPhone1,1_1.1.1_3A109a_Restore.ipsw 1.1.2: iPhone1,1_1.1.2_3B48b_Restore.ipsw 1.1.3: iPhone1,1_1.1.3_4A93_Restore.ipsw 1.1.4: iPhone1,1_1.1.4_4A102_Restore.ipsw 2.0.0 (2G): iPhone1,1_2.0_5A347_Restore.ipsw 2.0.0 (3G): iPhone1,2_2.0_5A347_Restore.ipsw 2.0.1 (2G): iPhone1,1_2.0.1_5B108_Restore.ipsw 2.0.1 (3G): iPhone1,2_2.0.1_5B108_Restore.ipsw 2.0.2 (2G): iPhone1,1_2.0.2_5C1_Restore.ipsw 2.0.2 (3G): iPhone1,2_2.0.2_5C1_Restore.ipsw 2.1.0 (2G): iPhone1,1_2.1_5F136_Restore.ipsw 2.1.0 (3G): iPhone1,2_2.1_5F136_Restore.ipsw 2.2.0 (2G): iPhone1,1_2.2_5G77_Restore.ipsw 2.2.0 (3G): iPhone1,2_2.2_5G77_Restore.ipsw 2.2.1 (2G): iPhone1,1_2.2.1_5H1_Restore.ipsw 2.2.1 (3G): iPhone1,2_2.2.1_5H11_Restore.ipsw 3.0.0 (2G): iPhone1,1_3.0_7A341_Restore.ipsw 3.0.0 (3G): iPhone1,2_3.0_7A341_Restore.ipsw 3.0.0 (3GS): iPhone2,1_3.0_7A341_Restore.ipsw 3.0.1 (2G): iPhone1,1_3.0.1_7A400_Restore.ipsw 3.0.1 (3G): iPhone1,2_3.0.1_7A400_Restore.ipsw 3.0.1 (3GS): iPhone2,1_3.0.1_7A400_Restore.ipsw 3.1.0 (2G): iPhone1,1_3.1_7C144_Restore.ipsw 3.1.0 (3G): iPhone1,2_3.1_7C144_Restore.ipsw 3.1.0 (3GS): iPhone2,1_3.1_7C144_Restore.ipsw 3.1.2 (2G): iPhone1,1_3.1.2_7D11_Restore.ipsw 3.1.2 (3G): iPhone1,2_3.1.2_7D11_Restore.ipsw 3.1.2 (3GS): iPhone2,1_3.1.2_7D11_Restore.ipsw 3.1.3 (2G): iPhone1,1_3.1.3_7E18_Restore.ipsw 3.1.3 (3G): iPhone1,2_3.1.3_7E18_Restore.ipsw 3.1.3 (3GS): iPhone2,1_3.1.3_7E18_Restore.ipsw 4.0.0 (3G): iPhone1,2_4.0_8A293_Restore.ipsw 4.0.0 (3GS): iPhone2,1_4.0_8A293_Restore.ipsw 4.0.0 (4): iPhone3,1_4.0_8A293_Restore.ipsw 4.0.1 (3G): iPhone1,2_4.0.1_8A306_Restore.ipsw 4.0.1 (3GS): iPhone2,1_4.0.1_8A306_Restore.ipsw 4.0.1 (4): iPhone3,1_4.0.1_8A306_Restore.ipsw 4.0.2 (3G): iPhone1,2_4.0.2_8A400_Restore.ipsw 4.0.2 (3GS): iPhone2,1_4.0.2_8A400_Restore.ipsw 4.0.2 (4): iPhone3,1_4.0.2_8A400_Restore.ipsw 4.1.0 (3G): iPhone1,2_4.1_8B117_Restore.ipsw 4.1.0 (3GS): iPhone2,1_4.1_8B117_Restore.ipsw 4.1.0 (4): iPhone3,1_4.1_8B117_Restore.ipsw 4.2.1 (3G): iPhone1,2_4.2.1_8C148_Restore.ipsw 4.2.1 (3GS): iPhone2,1_4.2.1_8C148a_Restore.ipsw 4.2.1 (4): iPhone3,1_4.2.1_8C148_Restore.ipsw 4.2.6 (4 CDMA): iPhone3,3_4.2.10_8E600_Restore.ipsw 4.3.0 (3GS): iPhone2,1_4.3_8F190_Restore.ipsw 4.3.0 (4 GSM): iPhone3,1_4.3_8F190_Restore.ipsw 4.3.1 (3GS): iPhone2,1_4.3.1_8G4_Restore.ipsw 4.3.1 (4 GSM): iPhone3,1_4.3.1_8G4_Restore.ipsw 4.3.2 (3GS): iPhone2,1_4.3.2_8H7_Restore.ipsw 4.3.2 (4 GSM): iPhone3,1_4.3.2_8H7_Restore.ipsw 4.2.7 (4 CDMA): iPhone3,3_4.2.7_8E303_Restore.ipsw 4.2.8 (4 CDMA): iPhone3,3_4.2.8_8E401_Restore.ipsw 4.3.3 (3GS): iPhone2,1_4.3.3_8J2_Restore.ipsw 4.3.3 (4 GSM): iPhone3,1_4.3.3_8J2_Restore.ipsw 4.2.9 (4 CDMA): iPhone3,3_4.2.9_8E501_Restore.ipsw 4.3.4 (3GS): iPhone2,1_4.3.4_8K2_Restore.ipsw 4.3.4 (4 GSM): iPhone3,1_4.3.4_8K2_Restore.ipsw 4.2.10 (4 CDMA): iPhone3,3_4.2.10_8E600_Restore.ipsw 4.3.5 (3GS): iPhone2,1_4.3.5_8L1_Restore.ipsw 4.3.5 (4 GSM): iPhone3,1_4.3.5_8L1_Restore.ipsw 5.0 (3GS): iPhone2,1_5.0_9A334_Restore.ipsw 5.0 (4 GSM): iPhone3,1_5.0_9A334_Restore.ipsw 5.0 (4 CDMA): iPhone3,3_5.0_9A334_Restore.ipsw 5.0 (4S): iPhone4,1_5.0_9A334_Restore.ipsw 5.0.1 (3GS): iPhone2,1_5.0.1_9A405_Restore.ipsw 5.0.1 (4 GSM): iPhone3,1_5.0.1_9A405_Restore.ipsw 5.0.1 (4 CDMA): iPhone3,3_5.0.1_9A405_Restore.ipsw 5.0.1 (4S): iPhone4,1_5.0.1_9A405_Restore.ipsw Update: 5.1.0 (3GS): iPhone2,1_5.1_9B176_Restore.ipsw 5.1.0 (4 GSM): iPhone3,1_5.1_9B176_Restore.ipsw 5.1.0 (4 CDMA): iPhone3,3_5.1_9B176_Restore.ipsw 5.1.0 (4S): iPhone4,1_5.1_9B179_Restore.ipsw 5.1.1 (3GS): iPhone2,1_5.1.1_9B206_Restore.ipsw 5.1.1 (4 GSM): iPhone3,1_5.1.1_9B206_Restore.ipsw 5.1.1 (4 GSM Build 9B208): iPhone3,1_5.1.1_9B208_Restore.ipsw 5.1.1 (4 CDMA): iPhone3,3_5.1.1_9B206_Restore.ipsw 5.1.1 (4S): iPhone4,1_5.1.1_9B206_Restore.ipsw Ipad: 3.2.0: iPad1,1_3.2_7B367_Restore.ipsw 3.2.1: iPad1,1_3.2.1_7B405_Restore.ipsw 3.2.2: iPad1,1_3.2.2_7B500_Restore.ipsw 4.2.1: iPad1,1_4.2.1_8C148_Restore.ipsw 4.3.0 (iPad 1): iPad1,1_4.3_8F190_Restore.ipsw 4.3.0 (iPad 2 Wi-Fi): iPad2,1_4.3_8F191_Restore.ipsw 4.3.0 (iPad 2 GSM): iPad2,2_4.3_8F191_Restore.ipsw 4.3.0 (iPad 2 CDMA): iPad2,3_4.3_8F191_Restore.ipsw 4.3.1 (iPad 1): iPad1,1_4.3.1_8G4_Restore.ipsw 4.3.1 (iPad 2 Wi-Fi): iPad2,1_4.3.1_8G4_Restore.ipsw 4.3.1 (iPad 2 GSM): iPad2,2_4.3.1_8G4_Restore.ipsw 4.3.1 (iPad 2 CDMA): iPad2,3_4.3.1_8G4_Restore.ipsw 4.3.2 (iPad 1): iPad1,1_4.3.2_8H7_Restore.ipsw 4.3.2 (iPad 2 Wi-Fi): iPad2,1_4.3.2_8H7_Restore.ipsw 4.3.2 (iPad 2 GSM): iPad2,2_4.3.2_8H7_Restore.ipsw 4.3.2 (iPad 2 CDMA): iPad2,3_4.3.2_8H8_Restore.ipsw 4.3.3 (iPad 1): iPad1,1_4.3.3_8J3_Restore.ipsw 4.3.3 (iPad 2 Wi-Fi): iPad2,1_4.3.3_8J2_Restore.ipsw 4.3.3 (iPad 2 GSM): iPad2,2_4.3.3_8J2_Restore.ipsw 4.3.3 (iPad 2 CDMA): iPad2,3_4.3.3_8J2_Restore.ipsw 4.3.4 (iPad 1): iPad1,1_4.3.4_8K2_Restore.ipsw 4.3.4 (iPad 2 Wi-Fi): iPad2,1_4.3.4_8K2_Restore.ipsw 4.3.4 (iPad 2 GSM): iPad2,2_4.3.4_8K2_Restore.ipsw 4.3.4 (iPad 2 CDMA): iPad2,3_4.3.4_8K2_Restore.ipsw 4.3.5 (iPad 1): iPad1,1_4.3.5_8L1_Restore.ipsw 4.3.5 (iPad 2 Wi-Fi): iPad2,1_4.3.5_8L1_Restore.ipsw 4.3.5 (iPad 2 GSM): iPad2,2_4.3.5_8L1_Restore.ipsw 4.3.5 (iPad 2 CDMA): iPad2,3_4.3.5_8L1_Restore.ipsw 5.0 (iPad 1): iPad1,1_5.0_9A334_Restore.ipsw 5.0 (iPad 2 Wi-Fi): Pad2,1_5.0_9A334_Restore.ipsw 5.0 (iPad 2 GSM): iPad2,2_5.0_9A334_Restore.ipsw 5.0 (iPad 2 CDMA): iPad2,3_5.0_9A334_Restore.ipsw 5.0.1 (iPad 1): iPad1,1_5.0.1_9A405_Restore.ipsw 5.0.1 (iPad 2 Wi-Fi): iPad2,1_5.0.1_9A405_Restore.ipsw 5.0.1 (iPad 2 GSM): iPad2,2_5.0.1_9A405_Restore.ipsw 5.0.1 (iPad 2 CDMA): iPad2,3_5.0.1_9A405_Restore.ipsw Update: 5.1.0 (iPad 1): iPad1,1_5.1_9B176_Restore.ipsw 5.1.0 (iPad 2 Wi-Fi): iPad2,1_5.1_9B176_Restore.ipsw 5.1.0 (iPad 2 GSM): iPad2,2_5.1_9B176_Restore.ipsw 5.1.0 (iPad 2 CDMA): iPad2,3_5.1_9B176_Restore.ipsw 5.1.0 (iPad 2 Unknown): iPad2,4_5.1_9B176_Restore.ipsw 5.1.0 (iPad 3 Wi-Fi): iPad3,1_5.1_9B176_Restore.ipsw 5.1.0 (iPad 3 CDMA): iPad3,2_5.1_9B176_Restore.ipsw 5.1.0 (iPad 3 GSM): iPad3,3_5.1_9B176_Restore.ipsw 5.1.1 (iPad 1): iPad1,1_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 2 Wi-Fi): iPad2,1_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 2 GSM): iPad2,2_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 2 CDMA): iPad2,3_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 2 New): iPad2,4_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 3 Wi-Fi): iPad3,1_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 3 CDMA): iPad3,2_5.1.1_9B206_Restore.ipsw 5.1.1 (iPad 3 GSM): iPad3,3_5.1.1_9B206_Restore.ipsw iPod 1.1: iPod1,1_1.1_3A101a_Restore.ipsw 1.1.1: iPod1,1_1.1.1_3A110a_Restore.ipsw 1.1.2: iPod1,1_1.1.2_3B48b_Restore.ipsw 1.1.3: iPod1,1_1.1.3_4A93_Restore.ipsw 1.1.4: iPod1,1_1.1.4_4A102_Restore.ipsw 1.1.5: iPod1,1_1.1.5_4B1_Restore.ipsw 2.0.0: iPod1,1_2.0_5A347_Restore.ipsw (Must purchase through iTunes) 2.0.1: iPod1,1_2.0.1_5B108_Restore.ipsw 2.2.0 (1G): iPod1,1_2.2_5G77_Restore.ipsw 2.2.0 (2G): iPod2,1_2.2_5G77a_Restore.ipsw 2.2.1 (2G): iPod2,1_2.2.1_5H11a_Restore.ipsw 3.1.2 (3G): iPod3,1_3.1.2_7D11_Restore.ipsw 3.1.3 (3G): iPod3,1_3.1.3_7E18_Restore.ipsw 4.0.0 (2G): iPod2,1_4.0_8A293_Restore.ipsw 4.0.0 (3G): iPod3,1_4.0_8A293_Restore.ipsw 4.0.2 (2G): iPod2,1_4.0.2_8A400_Restore.ipsw 4.0.2 (3G): iPod3,1_4.0.2_8A400_Restore.ipsw 4.1.0 (2G): iPod2,1_4.1_8B117_Restore.ipsw 4.1.0 (3G): iPod3,1_4.1_8B117_Restore.ipsw 4.1.0 (4G): iPod4,1_4.1_8B117_Restore.ipsw 4.2.1 (2G): iPod2,1_4.2.1_8C148_Restore.ipsw 4.2.1 (3G): iPod3,1_4.2.1_8C148_Restore.ipsw 4.2.1 (4G): iPod4,1_4.2.1_8C148_Restore.ipsw 4.3.0 (3G): iPod3,1_4.3_8F190_Restore.ipsw 4.3.0 (4G): iPod4,1_4.3_8F190_Restore.ipsw 4.3.1 (3G): iPod3,1_4.3.1_8G4_Restore.ipsw 4.3.1 (4G): iPod4,1_4.3.1_8G4_Restore.ipsw 4.3.2 (3G): iPod3,1_4.3.2_8H7_Restore.ipsw 4.3.2 (4G): iPod4,1_4.3.2_8H7_Restore.ipsw 4.3.3 (3G): iPod3,1_4.3.3_8J2_Restore.ipsw 4.3.3 (4G): iPod4,1_4.3.3_8J2_Restore.ipsw 4.3.4 (3G): iPod3,1_4.3.4_8K2_Restore.ipsw 4.3.4 (4G): iPod4,1_4.3.4_8K2_Restore.ipsw 4.3.5 (3G): iPod3,1_4.3.5_8L1_Restore.ipsw 4.3.5 (4G): iPod4,1_4.3.5_8L1_Restore.ipsw 5.0 (3G): iPod3,1_5.0_9A334_Restore.ipsw 5.0 (4G): iPod4,1_5.0_9A334_Restore.ipsw 5.0.1 (3G): iPod3,1_5.0.1_9A405_Restore.ipsw 5.0.1 (4G): iPod4,1_5.0.1_9A405_Restore.ipsw Update: 5.1.0 (3G): iPod3,1_5.1_9B176_Restore.ipsw 5.1.0 (4G): iPod4,1_5.1_9B176_Restore.ipsw 5.1.1 (3G): iPod3,1_5.1.1_9B206_Restore.ipsw 5.1.1 (4G): iPod4,1_5.1.1_9B206_Restore.ipsw
×