Demo Purposes Only and Undeletable Internet Shortcuts

alwright1980

Member
Jan 21, 2011
6
0
I have 4 tablets 2 of which are 7" China Generic epads of apparently the same model One of those shows the Flytouch logo on boot up. Both of thes display the "Demo purposes only" messages in red in upper right hand corner. They both run Android 1.6 version 1.7.2.

Problems with fly touch :

Has 4-5 undeletable internet shortcuts for Chinese websites.

Has problems connecting wi-fi now where it didn't before; WIll say unable to scan.
Although it'll connect thru ethernet.

When left idle will sometimes reboot repeatedly even with full battery.

will not play youtube videos or avi's


problem with other 7":
My desire:

to be able to get my wi-fi working again.

likeit to show all installed apps and be able to direct download path to the tablet

I'd like to know how to restore to factory settings and how to load a more recent version of the Android OS assuming it'd be compatible with hardware.

Id like to know how to get rid of "demo purposes only"

I'd also like to know how to delete internet shortcuts.


"demo purposes only" as above

will not play youtube videos or avi's

My third 7" model: runs 1.6 v1.7.4

won't play you tube videos either.

Can anyone help. I mainly just wanna install most recent compatible version of os and correct some of the afore mentioned problems
 
You have to just test the Gome Flytouch ROMs yourself. There is a compatible low quality Youtube for the device. It is really a $50 tablet, so don't expect much out of it.

If you have wifi problems, you have on your hands a lemon.
 
@xaueious
How do I test the roms or reload Android 1.6.

I did get duped but the wi-fi used to work, but I was wanting to clear some space off my tablet. I b elieve that I deleted some vital protocols or programming necessary to networking. Any suggestions??
 
Ah yea demo mode...

problem is in libui.so:

int __fastcall _wmtcpro_get_systemid(char *a1);
int __fastcall _wmtcpro_calc_serialnum_maybe(char *a1);
int __fastcall _wmtcpro_fetch_url(const char *a1, int a2, int a3, int a4);
int __fastcall _wmtcpro_write_serialnum_sysparam();
int __fastcall _wmtcpro_check_serialnum(const char *a1);
int __fastcall _wmtcpro_phone_home();

extern _UNKNOWN _wmtcpro_got_serialnum; // weak
extern _UNKNOWN unk_5D5BC; // weak
extern _UNKNOWN _wmtcpro_system_id; // weak
extern unsigned __int8 byte_5D7C9[3]; // idb
extern _UNKNOWN drawn_demo_message; // weak
extern _UNKNOWN _wmtcpro_decoded_custkey; // weak
extern _DWORD *dword_5D9D0; // idb
extern int dword_5D9D4; // idb
extern _UNKNOWN unk_5D9D8; // weak
extern _UNKNOWN unk_5D9DC; // weak
extern _UNKNOWN unk_5D9E0; // weak
extern _UNKNOWN unk_5D9E4; // weak
extern _UNKNOWN unk_5D9FC; // weak
extern int (__fastcall *android__BpRefBase__onFirstRef)(_DWORD); // weak
extern int (__fastcall *android__VectorImpl__clear)(_DWORD, _DWORD, _DWORD, _DWORD); // weak

int __fastcall _wmtcpro_draw_demo_message_first_time();
char *__fastcall _wmtcpro_draw_demo_message(const char *a1);
int __fastcall _wmtcpro_draw_demo_message_debug(int a1, int a2, int a3);
unsigned int __fastcall _wmtcpro_sleep_outer(signed int a1);
int __fastcall _wmtcpro_get_systemid(char *a1);
int __fastcall _wmtcpro_calc_serialnum_maybe(char *a1);
int __fastcall _wmtcpro_fetch_url(const char *a1, int a2, int a3, int a4);
int __fastcall _wmtcpro_write_serialnum_sysparam();
int __fastcall _wmtcpro_check_serialnum(const char *a1);
int __fastcall _wmtcpro_phone_home();
int __fastcall _wmtcpro_new_thread(unsigned int a1);
int __fastcall sub_2CCB4(int result, int a2);

... (read full post @ TechKnow)

So the tablet tries to verify it's code at a company called aiteer... (http://www.aiteer.com).

2 solutions!
1. flash a hacked firmware (anyone of the ROMs I did for example)
2. ask me a reg code (yes... I generate them myself)
 
Back
Top