Tuesday, September 10, 2013
Universal Samsung / Android secret codes
One of the most popular practices amongst software developers is to leave ‘backdoors’ within the code, which essentially allow anyone with knowledge to get into the system at a much deeper level than you’d expect from an end-user. These backdoors aren’t always with a malicious intent; most of the time, they allow the OEM or programmer to get into the system for troubleshooting when other, usual modes of access have been blocked. They can be quite friendly and helpful if you know what you’re doing.
Smartphones have a good share of these as well, where they’re generally known as secret codes. Most of the time, these numeric/symbolic sequences allow you to access hidden menus, diagnostic tests, areas that could change some of the most basic parameters of your device and whatnot. These secret codes, in fact, have not been exclusive to smartphones, but have long been a part of the dumb-phones and then the feature-phones before most major OEMs joined the smartphone bandwagon. For those devices that run Android, certain codes are shared across the board, and hence, can be used on a variety of devices.
What follows is a collection of some of the secret codes common to the Android platform. All of these would be entered through the phone dialer (just punch in the sequence as shown). Since most hidden menus are manufacturer specific, there’s no guarantee that they’ll work across all Android smartphones, but you can try them out nevertheless on your Samsung, HTC, Motorola, Sony and other devices. Be advised, though, that some of these can cause serious changes to your device’s configuration, so don’t play with something that you don’t fully understand.
YOU'RE USING THESE CODES AT YOUR OWN RISK.
*#06# – IMEI number
*#*#4636#*#* - Phone Info (Wifi,Battery and Radio)
*#*#34971539#*#* – Detailed camera information
*#*#273282*255*663282*#*#* – Immediate backup of all media files
*2767*3855# - Format device to factory state (will delete everything on phone)
*#*#7780#*#* - Factory Reset
*#*#7594#*#* - Change End Call/Power Option
*#*#197328640#*#* - Service Mode 1
*#2263# - Service mode 2
*#*#273283*255*663282*#*#* - Backup media files
*#*#526#*#* - WLAN Test
*#*#232338#*#* - Shows WiFi MAC address
*#*#1472365#*#* - GPS Test 1
*#*#1575#*#* - GPS Test 2
*#*#232331#*#* - Bluetooth test
*#*#232337#*# - Bluetooth MAC
*#*#8255#*#* - GTalk Service Monitor
*#*#4986*2650468#*#* - PDA, Phone, H/W, RFCallDate
*#*#1234#*#* - PDA & Phone
*#*#1111#*#* - FTA software version (1234 in the same code will give PDA and firmware version)
*#*#2222#*#* - FTA HW Version
*#*#44336#*#* - PDA, Phone, CSC, Build Time, Changelist number
*#272*IMEI# - Reset user data + Change salescode
*#*0*# - General Test
*#7465625# – View phone lock status
*#12580*369# – Software and hardware info
*#301279# – HSDPA/HSUPA Control Menu
*#872564# – USB logging control
*#9900# – System dump mode
*#9090# – Diagnostic configuration
*#*#0283#*#* - Packet Loopback
*#*#3264#*#* - RAM version
*#*#0*#*#* - LCD test
*#*#0673#*#* - Sound Test
*#*#0842#*#* - Vibration and Backlight test
*#*#2663#*#* - Touch screen FW version
*#*#2664#*#* - Touch screen test
*#*#0588#*#* - Proximity sensor test
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment