Show Posts
|
Pages: [1]
|
yes Samsung C6112 - 2400$
|
|
|
Samsung C6112 phone contains three main functions: 1. protection of conversations and SMS from control via GSM operator, as well as through active, semi-active complexes of GSM interception, catcher 2. phone bridge mode, when the phone hides your location or Vice versa indicates what you need. 3. mode secure calls through a server with blood.
The phone has a mechanical mute. When the halves of the phone are shifted, the microphone is mechanically disconnected, if you push the halves of the phone apart, the microphone will be turned on. This feature will not allow you to remotely turn on the phone's microphone while it is complicated. Thus, there is no need to buy noise cases.
Talk protection mode: In this mode, the phone will detect any active and semi-active interception systems and ketchers. This is a very real threat recently, and it is connected with a significant drop in prices for equipment for GSM communication interception. None of the phones can see the operation of the interception systems, because the systems have become perfect, and the regular functions of the phone do not contain the ability to detect complexes. Even the output of an open lock when disabling encryption is now absent in phones. Our phone based on the analysis of many features detects interception complexes. Phone settings can be made manually ( for specialists) and automatically set to the recommended values by the manufacturer. When you change the SIM card and change the phone IMEI you go away from control through the operator.
Mode secure calls through a server with blood: Phone calls, working with service takeover, through the server set in England. Using the service will allow you to set the phone number that the subscriber will see on the screen of your phone to which you are calling. In this case, if this subscriber takes from the operator his printout of conversations, he will see the same number that he had displayed on the phone screen. And since you have set the number yourself, it can not be put on control, you can not know the history of conversations. You will be able to change your voice that your caller will hear. The service includes unlimited calls all over the world. The location of the phone cannot be detected. Made a very convenient use of this service, you can, how to dial a number on the screen or select it from your notebook, and make a regular call. Then the phone will do everything automatically.
Telephone bridge mode: This mode allows you to either hide your real location position or Vice versa, specify it where you want. For example, at a certain time you have to be in some place for those who control you. And you will be able to provide it, being at this time, for example, in another country. The operation of this mode does not require the Internet, and complex settings.
The hidden phone menu contains the following functions:
IMEI-automatic and manual change of IMEI, protection from the control of conversations through the operator LAC tracking - create a profile for a specific location Weak A5 - warning about lowering of encryption relative to A5.1 Detect call ping-detect silent calls; Detect SMS ping-detect all types of hidden SMS, and ban all types of SMS that may harm your phone Channel lock-phone operation from remote base stations Alerts - select alarm for events Show TIMSI display TIMSI on the phone screen Clear call log deletion of information about calls from the phone Fake SMS detection SMS spoofing rooms Block C2-phone ignores one of the parameters controlled by the operator complex to capture the phone Parameters - a set of parameters by which the phone detects the interception complex Parameters1 Parameters2 One channel Recording-automatic recording of conversations Master RF-on delay-delay of switching on one of the phone's halves relative to the other Substitution-setting the phone operation in mode 1. regular calls 2. calls in mode telephone bridge 3. calls with number substitution through the server Online test - the ability to quietly find out whether the subscriber is on the network Encrypting SMS-SMS encryption Event log view-log of the last 20 events Settings profiles - automatic configuration of parameters Reset settings-reset to recommended Information-display of the software version
If the phone detects one of the enabled events, an audio signal will be heard, and \ or a vibration signal, depending on the settings, the screen will display a message about what event happened, for which SIM card this event was, as well as this event will be recorded in the log file.txt.
|
|
|
And so - it is a copy of our phone with the program of a sample of 2007-2008. Then we had only just started and because there have been many shortcomings and mistakes. In consequence all legal copies to your clients we have updated. In this program, even in the function change IMEI is an error about which we did not know then. Your native email will be at the operator at each change of the SIM card. Later this glitch was eliminated. The new version of this buggy you'll be externally input in the settings menu EXTRA. In the new version this menu is not explicitly in the phone menu. And you can get to the Extra only by a combination of numbers * # XXXXXXXX# and then enter the password. The latest update on the Samsung G600 was made in the fall of 2014. More this model is not supported, and it was replaced by a new model Samsung C6112, which is much better than this and which will be supported for another 2-3 years. Buying a phone from crooks with strara program you will not only lose money but also put yourself at risk, because the phone does not perform as expected the stated functions.? it piratska copy but what is the difference from the original I carefully explain to their clients and bad reviews fiction ). - I'm sure that's not true, because I'm turning off up to a hundred phones a month around the world, remotely. Since you do not know what contains our old version I will write to you - still I was asked to do it normal sellers: because a lot of them were sold in England on the XCell website first about the holes in this version
What did the crooks do from Home / XCell Stealth Phones :
1. According to their website, they made their box.
2. Erased inscription Samsung on the glass and drew his traforata.
3. Instead of writing EXTRA written XCELL, this is done in 5 minutes, we did not attach importance that you can easily change the name, but as I see in vain.
4. Drew a picture in the format .gifs are moving pictures. And their picture does not make any changes in the functionality, just a picture.
5. Pasted stickers on chips with the statement that these chips they rewired and put their own, which is a blatant lie.
On Siemens, the same hole in the email, besides the first half of the numbers there does not change at all, we offered the buyer (bought the firmware) for some money to bring to mind but they did not agree, so vparivayut.
This is where their innovation ends!
Our policy on the contrary is that the phone is no different from the usual phone. Therefore, we have not engaged in such nonsense such as the pictures and inscriptions.
They constantly write that they have updated versions of what is a lie, because NOTHING to change in the program and even more so to correct or improve, they basically can not. Sellers are just crooks who deliberately deceive customers.
Holes and glitches in the copy version: 0. The phone did not see and did not react to the complexes that did not send a command to lower the encryption, these complexes simply do not support encryption. And such complexes now became very much, is done roughly speaking on two tubes of a Motorola, or freely sold receiver and transmission boards.
1. The function of changing the e-MAIL has a hole that neviliruet change the SIM card in the phone. Ie, having once native IMEY phone further change of SIM card do not make sense, if a person who controls you have access to the service provider. This is due to the fact that the EMAIL in the phone changes dynamically, and the operator when you change the SIM card has the ability to receive and actually receives the factory email stitched into the phone. We found out about this hole about two years after the version of our phone was copied. In all new versions we separately did a patch that would close this hole. The version that will be for sale in the Internet all contain this flaw. This drawback remained in all models of Siemens phone with IMEI change that we did.
2. The function of pings calls after 2007 (namely this version sold on the Internet) has been modified many times, because there were many false positives. Detection method perovich calls were radically reworked.
3. We changed the function of operator profiles by abandoning the profiles in principle and made it different, because users often forgot to create a profile for a new operator.
4. The fuction of work from remote base stations has been repeatedly improved, because when the signal was lost, the device reset this mode and went to the strongest channel, while the user did not see it because everything remained as before in the phone menu, as if nothing had happened. It is for this reason that we first did not see this glitch for a long time and then it was difficult to find the cause of its occurrence.
5. The icon of encryption decrease did not work, and the device did not see if there was a decrease during passive operation of the phone. This has been fixed by a separate item in our menu-Scan detector
6. when working with new base stations, the device was happily restarted at any time, either in conversation or on duty. The glitch appeared about 4 years ago.
7. Recording conversations did not always work. I myself have had a couple of cases when the phone did not record important conversations, it would be better he did not write sooner and these recorded. And it was a recording restriction for 30 minutes.
It was a lot smaller and not clearly visible patches.............
Differences from the final version of Samsung G600 made in the autumn of 2014:
1. Fixed a hole with sending native IMEI to the operator.
2. Made the most correct (it is recommended by the manufacturer when resetting) mode change IMEI - only in the case of changing the SIM card.
3. The extremely important functions related to the detection of active, semi-active complexes and ketchers have been improved, I do not even want to list what has been done, but the phone 2007 (copies) and 2014 are heaven and earth.
The phone contains the following functions:
IMEI - change IMEI, protection from the control of conversations through the operator A5 profiles-protection against active complexes Call ping-silent call detection SMS ping-detection of all types of hidden SMS, as well as SMS that can harm the phone. Scan detector - detection lowering it in a passive state phone Channels lock - protection against passive and active complexes with A5 processor.1 Alerts - select alarm for events Show TIMSI display TIMSI on the phone screen Clear call log deletion of information about calls from the phone One channel-determine if there is one channel in the network Bluetooth-low level Recording-automatic recording of conversations Reset settings-reset to recommended Information - shows the version of the software
About Motorola: in them except a glitch with an e-mail there is not correctness that the first 8 digits remain invariable, it is a serious binding. I used to ask the Englishman to rework Siemens for a fee, but he refused.
the price of the G600 is 40 000 rubles, the last update in autumn 2014. And here is a new model based on Samsung C6112-150 000 rubles. But this phone was not standing next to the G600 and this is a cool professional product.
ray-spyphones.com
|
|
|
|