Skip to main content

How to unlock Android Phone Lock without loosing data

How to unlock Android Phone Lock without loosing data.

Steps

- Download Aroma file manager.

- Now move “Aroma File Manager” into an SD Card.

- Insert SD Card into your android device which is locked.

- Open Stock Recovery Mode by rebooting your android  device by holding power and volume up key.

- Sometimes you may have different keys, just google it to open stock recovery mode.

- After entering into recovery mode use volume buttons to scroll and to select use power button.

- Click on “instll zip” from SD card and navigate to aroma file manager and click install.

- Now it will open in recovery mode.

- From aroma file manager just navigate to setting and click on Automount all devices on start and click exit.

- Now repeat 7 again (click on install zip and navigate aroma)

- And now just navigate to data folder > system folder and find “gesture.key” or “password.key”.

- Just delete any one of them and exit Aroma and reboot your device.

- Now just type any random password or draw any pattern.

- And its unlocked.

Congratulation!

If Having any query or want more content like this comment down below.

Comments

Post a Comment

Comment Down Suggestions And which topics you want future articles on.

Popular posts from this blog

Top 5 ways to Host Your Website for Free

  Now a days web hosting is getting very expensive. Here is the solution to get free web hosting platform.  1.  GITHUB PAGES Websites for you and your projects, hosted directly from your GitHub repository. Just edit, push, and your changes are live. 2.  NETLIFY Deploy morden static websites with Netlify. Get CDN, Contineous development,  1-click HTTPS, and all the services you need. Get started for free. 3.  GOOGLE CLOUD Meet your business challenges hesd on with cloud computing services from Google, including data management, hybrid & multi-cloud, and AI & ML. 4.  AWS S3 Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. 5.  VERCEL Host your web projects with zero configuration,    automatic SSL, and global CDN. If Having any query or want more content like this comment down below.

CROSS BORDERS CYBER SECURITY POWER PANELS SERIES, 2020 !!!

CROSS BORDERS CYBER SECURITY POWER PANELS SERIES, 2020 An Indonesian CIO Network initiated and designed Webinar meant for public but especially suitable for senior mgrs/CXOs whom need to understand cyber security in simple language. Indian standard timing - (12:30 - 3:30 PM  ) It is our inaugural year 2020 for this vision of ICION reaching across border to our counter part CXOs in Malaysia and we are expecting a combined key two countries audience for 300 to 500 views on actual day. 12:30 pm : Keynote from David Siah SVP CSCIS APJ 12:40pm : Keynote from Dato Assoc Professor Husin SVP Serba Dinamik Group 12:45 Panel 1 : Cyber Security for Boardroom 1:35 Panel 2 : Cross Country Hybrid Cloud 2.20 : Panel 3 : Ensuring a Safer Cross Country Cyber Space 3.05 : Q&A Close off time is targeted at 3:30pm, and max at 3.50pm - Above webinar is sponsored by ENTRUST, FORTINET and BITGLASS as GOLD SPONSORS Join us via the below links in ICION Follow us for our exclusive & tai...

Best Hacking Android Apps

1. AndroRAT AndroRAT is a contraction of Android and RAT (Remote Access Tool), which is a piece of malware that has been seen a lot lately. At first it was created as a proof of concept, but this malware has gradually become more evolved over the years. AndroRAT allows a remote attacker the control over the victim. Usually the RATs have a user-friendly control panel that makes it possible to control the victims. AndroRAT can control the infected device by making phone calls and sending SMS messages as well as getting its GPS coordinates, accessing the files stored on the handset and activating and using the microphone and the camera. 2. cSploit cSploit  is a free and open-source security professional toolkit that comes with built-in Metasploit framework and an easy-to-use user interface. Out of the box cSploit can map the local network, forge TCP or UDP packets, detect open ports, fingerprints of hosts operating systems, perform MITM (Man in the Middle) attacks, etc. Since the app ...