Jump to content
Reliance Jio & Reliance Mobile Discussion Forums

Leaderboard


Popular Content

Showing most liked content on 06/26/2014 in Posts

  1. 1 point
    Enjoy flat 20% discount on all transactions on ebay.in up to a maximum amount of Rs. 3,000. Promo code: HDFC20EBAY Offer valid from 26th June to 5th July, 2014 only on your HDFC Bank Credit Card. If you guys planning to buy anything from GEB utilize this. Sent from my Galaxy Nexus using Tapatalk
  2. 1 point
    It won't take more than 20min to full flash your phone, just follow the tutorial. Getstat will come after registration only. Sent by Moto G on Reliance CDMA
  3. 1 point
    @lokesh Are you sure , MEID is not registered ? As this 9 digit option comes only after reg is done. Other wise it says phone could not be activated. Check getstat for ur MEID or pm me your MEID Sent by Moto G on Reliance CDMA
  4. 1 point
  5. 1 point
    ^^^ Omh works ! Sent by Moto G on Reliance CDMA
  6. 1 point
    Guys, I got the data working on Reliance CDMA with my Q10. You need to do some modifications in E SCREEN to make the data running. How to access Escreen : http://crackberry.com/how-access-engineering-screen-blackberry-10 once you are in the Escreen windows. Go To General Radio Enabled Rat : CDMA!X+EVDO. Hybrid Preference : ON Hybrid Preference Status : CDMA+HDR. APN: vzwinternet Set Auto data : ON. This will help in getting the data up. You will see 3G and 1X.
  7. 1 point
    Hey all, just wanted to let the community know that the current 'tr.apk' download from Towelroot.com (filesize 103003 bytes, md5 of 59193b68a8a2a9a2e6fc898df81e491b) trips my ClamScan virus scanner. I got impatient trying to get it to download on my phone via Firefox, so I downloaded it via my desktop and emailed it to myself. I happen to run a virus scanner on all incoming mail, and it went crazy with this message: A virus was found: Andr.Exploit.Ratc Scanner detecting a virus: ClamAV-clamscan Content type: Virus Internal reference code for the message is 31908-19/qifk-moTWpxp First upstream SMTP client IP address: [173.160.x.x] 173-160-x-x-Washington.hfc.comcastbusiness.net According to a 'Received:' trace, the message apparently originated at: [173.160.x.x], laws-mbp.mydomain.lan 173-160-x-x-Washington.hfc.comcastbusiness.net [173.160.x.x] Return-Path: <law@mydomain.org> From: Lee Whalen <law@mydomain.org> Message-ID: <539DF04C.8000905@mydomain.org> Subject: tr The message has been quarantined as: q/virus-qifk-moTWpxp The message WAS NOT relayed to: <law@mydomain.org>: 250 2.7.0 Ok, discarded, id=31908-19 - INFECTED: Andr.Exploit.Ratc Virus scanner output: p008: OK p009: OK p006: OK p012: Andr.Exploit.Ratc FOUND p004: OK p011: OK p010: OK p005: OK p007: OK p001: OK Perhaps that's part of the exploit route, but I'm personally going to hold off on installing this APK until I learn more. If anyone could shed some light on this, that'd be super. I'm EXTREMELY eager to root my S5, and hope to get this straightened out soon! neednot worry excute . no virus
×