10/02/2016

Unlocking the Motorola Bootloader

In this blog post, we'll explore the Motorola bootloader on recent Qualcomm Snapdragon devices. Our goal will be to unlock the bootloader of a Moto X (2nd Gen), by using the TrustZone kernel code execution vulnerability from the previous blog posts. Note that although we will show the complete unlocking process for this specific device, it should be general enough to work at-least for most modern Motorola devices.

Why Motorola?


After reporting the previous TrustZone kernel privilege escalation to Qualcomm, I was gifted a shiny new Moto X. However... There was one little snag - they accidentally sent me a locked device. This was a completely honest mistake, and they did offer many times to unlock the device - but where's the fun in that? So without further ado, let's dive into the Motorola bootloader and see what it takes to unlock it.



Setting the Stage


Before we start our research, let's begin with a short introduction to the boot process - starting right at the point at which a device is powered on.

First - the PBL (Primary Boot Loader), also known as the "BootROM" is executed. Since the PBL is stored within an internal mask ROM, it cannot be modified or provisioned, and is therefore an intrinsic part of the device. As such, it only serves the very minimal purpose of allowing the device to boot, and authenticating and loading the next part of the boot-chain.

Then, two secondary bootloaders are loaded, SBL1 (Secondary Boot Loader), followed by SBL2. Their main responsibility is to boot up the various processors on the SoC and configure them so that they're ready to operate.

Next up in the boot-chain, the third and last secondary bootloader, SBL3, is loaded. This bootloader, among other tasks, verifies and loads the Android Bootloader - "aboot".

Now this is where we get to the part relevant for our unlocking endeavours; the Android Bootloader is the piece of software whose responsibility is, as its name suggests, to load the Android operating system and trigger its execution.

This is also the piece of boot-chain that OEMs tend to customize the most, mainly because while the first part of the boot-chain is written by Qualcomm and deals with SoC specifics, the Android bootloader can be used to configure the way the Android OS is loaded.

Among the features controlled by aboot is the "bootloader lock" - in other words, aboot is the first piece of the boot-chain which can opt to break the chain of trust (in which each bootloader stage verifies the next) and load an unsigned operating system.

For devices with an unlockable bootloader, the unlocking process is usually performed by rebooting the device into a special ("bootloader") mode, and issuing the relevant fastboot command. However, as we will later see, this interface is also handled by aboot. This means that not only does aboot query the lock status during the regular boot process, but it also houses the code responsible for the actual unlocking process.

As you may know, different OEMs take different stances on this issue. In short, "Nexus" devices always ship with an "unlockable" bootloader. In contrast, Samsung doesn't allow bootloader unlocking for most of its devices. Other OEMs, Motorola included, ship their devices locked, but certain devices deemed "eligible" can be unlocked using a "magic" (signed) token supplied by the OEM (although this also voids the warranty for most devices).

So... it's all very complex, but also irrelevant. That's because we're going to do the whole process manually - if aboot can control the lock status of the device, this means we should probably be able to do so as well, given an elevated enough set of privileges.

Getting Started


Now that we have a general grasp of the components involved and of our goal, the next stage is to analyse the actual aboot code.

Since the binaries for all stages of the boot-chain are contained within the factory firmware image, that would naturally be a good place to start. There are several download links available - here are a few. In case you would like to follow along with me, I'm going to refer to the symbols in the version "ATT_XT1097_4.4.4_KXE21.187-38".

After downloading the firmware image, we are faced with our first challenge - the images are all packed using a proprietary format, in a file called "motoboot.img". However, opening the file up in a hex-editor reveals it has a pretty simple format we can deduce:


As you can see above, the sought-after aboot image is stored within this file, along with the TrustZone image, and various stages of the boot-chain. Good.

After analysing the structure above, I've written a python script which can be used to unpack all the images from a given Motorola bootloader image, you can find it here.

Much ado aboot nothing


We'll start by inspecting the aboot image. Discouragingly, it is 1MB large, so going over it all would be a waste of time. However, as we've mentioned above, when booting the device into the special "bootloader" mode, the actual interaction with the user is provided by aboot itself. This means that we can start by searching for the strings which are displayed when the unlocking process is performed - and continue from there.

A short search for the "unlock..." string which is printed after starting the unlock process brings us straight to the function (@0xFF4B874) which deals with the unlocking logic:


That was pretty fast!

As you can see, after printing the string to the console, three functions are called consecutively, and if all three of them succeed, the device is considered unlocked.

Going over the last two functions reveals their purpose is to erase the user's data partitions (which is always performed after the bootloader is unlocked, in order to protect the device owner's privacy). In any case, this means they are irrelevant to the unlocking process itself and are simply side-effects.

This leaves us with a single function which, when called, should unlock the bootloader.

So does this mean we're done already? Can we just call this function and unlock the device?

Actually, not yet. Although the TrustZone exploit allows us to achieve code-execution within the TrustZone kernel, this is only done after the operating system is loaded, at which point, executing aboot code directly could cause all sorts of side-effects (since, for example, the code might assume that there is no operating system/the MMU could be disabled, etc.). And even if it were that simple, perhaps there is something interesting to be learned by fully understanding the locking mechanism itself.

Regardless, if we can understand the logic behind the code, we can simply emulate it ourselves, and perform the meaningful parts of it from our TrustZone exploit. Analysing the unlocking function reveals a surprisingly simple high-level logic:


Unfortunately, these two functions wreak havoc within IDA (which fails to even display a meaningful call-graph for them).

Manually analysing the functions reveals that they are in fact quite similar to one another. They both don't contain much logic of their own, but instead they prepare arguments and call the following function:


This is a little surprising - instead of handling the logic itself, this function issues an an SMC (Supervisor Mode Call) in order to invoke a TrustZone system-call from aboot itself! (as we've discussed in previous blog posts). In this case, both functions issue an SMC with the request code 0x3F801. Here is the relevant pseudo-code for each of them:


At this point we've gleaned all the information we need from aboot, now lets switch over to the TrustZone kernel to find out what this SMC call does.

Enter Stage Left, TrustZone


Now that we've established that an SMC call is made with the command-code 0x3F801, we are left with the task of finding this command within the TrustZone kernel.

Going over the TrustZone kernel system calls, we arrive at the following entry:


This is a huge function which performs widely different tasks based on the first argument supplied, which we'll call the "command code" from now on.

It should be noted an additional flag is passed into this system-call indicating whether or not it was called from a "secure" context. This means that if we try invoking it from the Android OS itself, an argument will be passed marking our invocation is insecure, and will prevent us from performing these operations ourselves. Of course, we can get around this limitation using our TrustZone exploit, but we'll go into that later!

As we've seen above, this SMC call is triggered twice, using the command codes #1 and #2 (I've annotated the functions below to improve readability):


In short, we can see both commands are used to read and write (respectively) values from something called a "QFuse".

QFuses


Much like a real-life fuse, a QFuse is a hardware component which facilitates a "one-time-writeable" piece of memory. Each fuse represents a single bit; fuses which are in-tact represent the bit zero, and "blown" fuses represent the bit one. However, as the name suggests, this operation is irreversible - once a fuse is blown it cannot be "un-blown".

Each SoC has it's own arrangement of QFuses, each with it's own unique purpose. Some fuses are already blown when a device is shipped, but others can be blown depending on the user's actions in order to change the way a specific device feature operates.

Unfortunately, the information regarding the role of each fuse is not public, and we are therefore left with the single option of reversing the various software components to try and deduce their role.

In our case, we call a specific function in order to decide which fuse we are going to read and write:


Since we call this function with the second syscall argument, in our case "4", this means we will operate on the fuse at address 0xFC4B86E8.

Putting it all together


Now that we understand the aboot and the TrustZone logic, we can put them together to get the full flow:

  • First, aboot calls SMC 0x3F801 with command-code #1
    • This causes the TrustZone kernel to read and return the QFuse at address 0xFC4B86E8
  • Then, iff the first bit in the QFuse is disabled, aboot calls SMC 0x3F801 once more, this time with command-code #2
    • This causes the TrustZone kernel to write the value 1 to the LSB of the aforementioned QFuse.
Turns out to be very simple after all - we just need to set a single bit in a single QFuse, and the bootloader will be considered unlocked.

But how can QFuses be written?

DIY QFuses


Luckily the TrustZone kernel exposes a pair of system-call which allow us to read and write a restricted set of QFuses - tzbsp_qfprom_read_row and tzbsp_qfprom_write_row, respectively. If we can lift those restrictions using our TrustZone exploit, we should be able to use this API in order to blow the wanted QFuse.

Lets take a look at these restrictions within the tzbsp_qfprom_write_row system-call:


So first, there's a DWORD at 0xFE823D5C which must be set to zero in order for the function's logic to continue. Normally this flag is in fact set to one, thus preventing the usage of the QFuse calls, but we can easily enough overwrite the flag using the TrustZone exploit.

Then, there's an additional function called, which is used to make sure that the ranges of fuses being written are "allowed":

As we can see, this function goes over a static list of pairs, each denoting the start and end address of the allowed QFuses. This means that in order to pass this check, we can overwrite this static list to include all QFuses (setting the start address to zero and the end address to the maximal QFuse relative address - 0xFFFF).

Trying it out

Now that we have everything figured out, it's time to try it out ourselves! I've written some code which does the following:
  • Achieves code-execution within TrustZone
  • Disables the QFuse protections
  • Writes the LSB QFuse in QFuse 0xFC4B86E8
I encourage you to check out the code here: https://github.com/laginimaineb/Alohamora



Have fun!

Final Thoughts

In this blog post we went over the flow controlled by a single QFuse. But, as you can probably guess, there are many different interesting QFuses out there, waiting to be discovered.

On the one hand, blowing a fuse is really "dangerous" - making one small mistake can permanently brick you device. On the other hand, some fuses might facilitate a special set of features that we would like to enable.

One such example is the "engineering" fuse; this fuse is mentioned throughout the aboot image, and can be used to enable an amazing range of capabilities such as skipping secure boot, loading unsigned peripheral images, having an unsigned GPT, and much more.



However, this fuse is blown in all consumer devices, marking the device as a "non-engineer" device, and disabling these features. But who knows, maybe there are other fuses which are just as important, which have not yet been discovered...

652 comments:

  1. Lol, love the warning message. Injury to users!?

    ReplyDelete
    Replies
    1. Those allergic to excessive warning messages, maybe?

      Delete
    2. Does this work for Motorola Droid maxx/Ultra/Mini

      Delete
    3. This comment has been removed by the author.

      Delete
  2. Hold Up! Did you really just do this

    ReplyDelete
    Replies
    1. On the first day , the burning of clay huts are seen in Barpeta and lower Assam which signifies the legends of Holika . On the second day of it , Holi is celebrated with colour powders . Happy Holi images

      Bangladeshis have celebrated international mother language day and visit Shaheed Minar wallpaper, a memorial to the martyrs and their replicas to express their deep sorrow, respect and gratitude.

      The resolution was proposed by Rafiqul Islam, a Bengali living The day originated in Bangladesh, which had celebrated its own language in 1952 with a language movement day. Ekushe February Images

      In the day of 26 march people visit Shahid minar and remembering the martyrs of our pride sons sacrifice. Check out the HD 26 march wallpaper

      Love is an amazing feeling, and the proposed day is the day when you have to show these hidden feelings to your special one. Happy Propose Day 2020 greetings and quotes

      There are many places in Bangladesh where you can visit in your vacation. It is quite tough for us to pick the best places in Bangladesh among the all places. Most of the places attract you with their natural beauty.

      Find out the best leap year gift ideas 2020 for your beloved person.

      Our respective gives their sacrifices for the sake of mother language. Worldwide people remember them and respect their sacrifices. In this day, people remember them and motive people by sending inspirational mother language day quotes

      Do you know which day is the Independence day of Bangladesh? We 26 march is known as independence day of Bangladesh.

      Do you know what is the recent mobile price in BD? We check that out all brand mobile price thorough mobiledokan website.

      Delete
  3. Hi, I'm wondering how did you did the trustzone exploit on this device. As I can remember your trustzone exploit needed a modified kernel (or can I load it as a kernel module?) And if the device is bootloader locked how did you get the custom kernel to run?
    Thank you for the research :D If this is double on by loading a kernel module. I'm going to try adjust this to my Fire Phone(It'll probably brick :P But I'm going to do it anyway)

    ReplyDelete
    Replies
    1. This wouldnt apply to the firephone, iirc the boot unlock mechanism on that is a signed blob, not a qfuse.

      Delete
    2. Hi Madushan,

      I read your question and got a little curious, so I downloaded the Fire Phone aboot and had a look at it.

      As Justin said, the bootloader lock there is facilitated by using a signed blob. Here is the unlocking code: http://imgur.com/OZeTqNC

      That said, it might still be possible to craft a blob that'll cause the verification to pass, ultimately depends on how the verification is done (let me know if you take a look at it!).

      Anyway, as for the unlocking code I provided - you're right, this version of the code depends on my modified kernel. I also have another version, written in C, which uses a kernel exploit to directly execute code in the kernel and issue SMCs from there. I'll publish that as well (just need to clean it up a little).

      Gal.

      Delete
    3. UPDATE: Dug a little bit deeper; seems like a 2048-bit RSA signature. I carved out the certificate: http://imgur.com/1a2TY0P

      So unless there's some kind of bug in the verification itself or an alternative unlocking flow, seems like a no-go.

      Delete
    4. UPDATE2: So the code actually calls RSA_public_decrypt (with PKCS1 padding) on the given token, then makes sure that the content in it is 0x[SOME_WORD][SOME_DWORD][zero_pad_to_length_256]. I'm still thinking about this a little... I don't know what these DWORDs are (could try and find out), but if they can be changed, then you could modify them to fit any given signed token (for any other phone).

      Delete
    5. UPDATE3: Okay - a lot of the code there is borrowed from LK (https://www.codeaurora.org/cgit/external/gigabyte/qrd-gb-dsds-7225/plain/bootable/bootloader/lk/platform/msm_shared/mmc.c) which makes following the flow easier.

      Anyway, these DWORDs are read in from the MMC - in the version of aboot that I analysed (http://forum.xda-developers.com/attachment.php?attachmentid=3437011&d=1439413035), they are fetched in from: (byte)0xF967AA4+0x4A4, (DWORD)0xF967AA4+0x4B8.

      If you want to play around with the TrustZone exploit and read those addresses, we can try and figure out what they are. In any case, we can always call the MMC flashing code to overwrite them, and then supply *any* signed token to unlock.

      Just so you know, though, this is quite dangerous - if anything else depends on these values we may brick the device.

      Delete
    6. Wow, There I was waiting for a reply in this comment and I've forgotten to turn on the email notifications! Sorry for the *very* late reply. I just saw this.
      A while back I started this thread (http://forum.xda-developers.com/fire-phone/general/dev-bootloader-unlock-development-t3183330) on XDA to discuss about probable fire phone bootloader unlocks (I've meantioned some blog posts here in it :) ).

      So the version of the aboot you inspected is from fireos 3.x.x version. It has your trustzone exploit. But in the newer version of the fireos (4.6.3 which sadly I have in my phone :/ ) seems to have fixed the bug. I'm not sure though. I'm not very good with reversing stuff. I can upload the newest version of the aboot to somewhere if you are interested.

      Anyway this means people with older fireos versions will be able to run your exploit without a kernel modification right? (kernel module is ok too. I can load unsigned kernel modules without a problem). I can try this too on my phone if you release the code.

      What you are proposing is something like overwriting the public key on the MMC right?

      Thank you for taking the time to look at my device, which amazon has forgotten. :)

      Delete
    7. BTW, there was some person(or two) over XDA who was willing to donate a firephone to whoever is trying to unlock it. Checkout this thread (http://forum.xda-developers.com/fire-phone/general/bounty-pledge-to-unlock-fire-phone-t3204176)

      Delete
    8. Hi Madushan,

      I didn't forget my promise, I will definitely release the C version of my exploit (once I get a little bit of free time). Bear in mind that I'm releasing a whole new TrustZone exploit chain, which I'm pretty sure is relevant for the FirePhone as well - so that should work for you.

      If you're willing to experiment, feel free to use it to follow the instructions in the blog posts. I'll do my best to help you out, but I'm pretty busy so I can't promise anything.

      Gal.

      Delete
    9. Hi Gal,
      Am I correcting assuming the exploit you mention here is the FuzzZone explicit that was fixed after 30.10.14? If that so, New releases of the fire os had it fixed. :/ Older ones would work though.
      I'm looking forward to you release to start experimenting. Thank you for all the work. :)

      Delete
    10. For the C version, I was referring to the previous exploit, yes. I'll do my best to release the new ones as soon as time permits.

      Delete
  4. This is impressive :) I'm tempted to puck up a cheap Moto E LTE just to try and see if it works there too!

    ReplyDelete
    Replies
    1. Where are you finding a Moto E using MSM8974/SD810?

      --beaups

      Delete
  5. Thanks for the interesting articles!

    Got a small question - what do you use to get comments with ARM opcodes description?

    ReplyDelete
    Replies
    1. Thanks for reading!

      The comments are a builtin feature in IDA (Options->General->Disassembly->Comments).

      P.S - I usually don't use this (as I find the clutter a little annoying), but for the purpose of the blog posts I enable it so that it'll be easier for people without an ARM background to read.

      Delete
  6. Why would your C exploit need cleaned up, I can do it in 4 lines of code :P Nice writeup, as always.

    --beaups

    ReplyDelete
    Replies
    1. Right now I have a C file with all my TZ experiments and *lots* of irrelevant code, I wouldn't wish it on anyone to try and figure out what's going on there ;)

      Delete
  7. Is there an easy way to remap ram over the qfuse range for experimentation purposes?
    Or alternately a central place to patch a read-qfuse function?
    To make it less dangerous to explore the different fuse settings...

    ReplyDelete
    Replies
    1. You can overwrite the read-QFuse function by setting the DACR and overwriting the TrustZone function I detailed above, such as tzbsp_qfprom_read_row (see the TrustZone exploit post for more info), but this won't be of much help...

      Since a lot of these QFuses are checked during the boot process by components which are loaded way before the HLOS is executed (such as aboot, SBL and PBL), hooking this function won't let you observe the behaviours which would be exhibited by those components.

      That said, there may be an option to overwrite the function and then attempt to jump directly into the SBL3 or aboot - I've never tried to do this, but in practice there should be some support for a "warm boot", which means this might work. Of course, in practice this is probably a lot harder, since SBL3/aboot may depend a lot on the current state which should be set by previous stages of the boot-chain, and directly handing over control to them might have unpredictable results.

      Delete
  8. So what are the exact steps do i have to carried out to unlock the bootloader for mine xt1254...I cant afford the sunshine since dont have visa card...Will i be able to unlock it for free like other devices do...

    ReplyDelete
  9. i wonder if this can be done on the BlackBerry Priv that is now says that is the most secure device of Android device...
    http://forum.xda-developers.com/blackberry-priv/general/blackberry-priv-autoloader-qc8992-aac826-t3250462

    all files there and no need is spacial unpacking just unzip.

    ReplyDelete
  10. is there any chance you could give us a tutorial on how to use your unpack script as i am having trouble getting it to point to motoboot.img

    ReplyDelete
  11. AMAZING!!! Is there any possibility to port it to MOTO MAXX XT 1225, trust me... lots of guys here in brazil will be your slave after this work's includind ME!!!!

    ReplyDelete
  12. How to use it and where is the files..Can we use it on stock xt907 183.46.15 locked bootloader

    ReplyDelete
  13. I'm getting a syntax error on line 45 of exploit.py. Anybody know what I'm missing?

    ReplyDelete
    Replies
    1. File "exploit.py", line 45
      print current_dword.encode("hex")
      ^
      SyntaxError: invalid syntax

      I'm using python 3.5, do I need to use python 2?

      Delete
    2. Yeah the exploit script was written in pythons older format so you will get Syntax errors or you can replace the errors with the update syntax format in Python 3.5 which is what I did and it's pretty straight forward:)

      Delete
    3. The scripts are for python 2.x

      Delete
  14. I'm confused how to use the codes to unlock the bootloader. I'm a little familiar with Python codes and yada yada but never actually payed attention how to execute them. Please give me a little tutorial on this.

    ReplyDelete
  15. can somebody help me?, i don't know how to do it

    ReplyDelete
  16. How did you get FuzzZone onto the locked device in the first place? Did you use an existing Android Exploit to patch kernel memory?

    In order to use FuzzZone you would have needed to edit the kernel?

    ReplyDelete
    Replies
    1. I actually used a native version that injects code into the kernel using a kernel exploit. I cleaned the original code up and posted it on my github, here: https://github.com/laginimaineb/standalone_msm8974

      Delete
  17. Amazing work.

    Would the same symbols in your provided exploit work for another device(2nd gen 4g Moto E in my case)?

    If not would you mind telling me if there is an easy way to get the correct addresses without redoing a TrustZone exploit ground up?

    Thank you.

    ReplyDelete
    Replies
    1. In order to use the exploit you'll have to find the symbols for your version. However, this isn't really all that hard - you can just download the firmware image for the device I used, and match the symbols up with your own firmware.

      Delete
  18. This comment has been removed by the author.

    ReplyDelete
  19. Hello and great work can you guide me to the right direction if possible and how to unlock bootloader of the lg gflex 2 wich uses snapdragon 810? If its not possible right now do you have plans for future

    ReplyDelete
    Replies
    1. Sorry, haven't had a look at that bootloader. No plans to do so right now, but perhaps I'll take a look at an LG bootloader in the future.

      Delete
  20. Who ever this poster is he clearly copied all your work created from this site and repost on this site. No credit given to you. https://rstforums.com/forum/topic/100469-unlocking-the-motorola-bootloader/

    ReplyDelete
    Replies
    1. Ah, that's too bad... Thanks for letting me know.

      Delete
  21. How did you reverse the bootloader to get such a clear idea of what and where is the unlock function?
    I'm trying to reverse the g4 bootloader and I can't fugire that out...

    ReplyDelete
    Replies
    1. Just work your way backwards from the relevant strings, I think that's easiest. (For example, I started by looking for the string "Unlock").

      Delete
    2. This comment has been removed by the author.

      Delete
    3. Pretty sure the magic happens here.. but.. I think I messed up the reversing.. (I hope I messed it up)

      http://pastebin.com/bUWnMGgn

      Delete
  22. how did you read the aboot image? I have IDA Pro but don't know how to use it :(

    ReplyDelete
  23. can you write one for unlocking the moto droid maxx 2 verizon

    ReplyDelete
  24. What is your view on exploiting TrustZone on droid turbo (xt1254 , SnapDragon805 ) running latest Marshmallow MCG24.251-5 in order to achieve BL unlock?. I'm looking into it but really need help from more experienced. After SU4TL (Lollipop) , exploit has been obviously patched, but my noob logic tells me the principle should be simillar with finding functions that trigger qfuse which is responsible for BL unlock? Or "unlock" itself has been completely patched ,and it doesn't "exist" anymore at all in aboot? Would really appreciate if somebody could shed some light in here..Checking with IDA , aboot looks the same to me..
    -Marko

    ReplyDelete
  25. Work your magic for the SM-G935V I am sure thousands would consider you aneed android God if you were able to be successful.

    ReplyDelete
  26. Looks like you're not the first to look into this: http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html

    ReplyDelete
  27. Have you had a look at the Maxx 2? It's my understanding that the TrustZone exploit was patched. Do you know of any bootloader exploits for the more recent Motorola Devices?

    ReplyDelete
  28. Think you ?can you help me unlock MSM8937 ?
    https://forum.xda-developers.com/showpost.php?p=72066067&postcount=4

    ReplyDelete
  29. There seems to be an error when running the python scripts:
    line 17, in execute_register_scm
    return int(re.search("^IOCTL RES: (\d+)", resp_str, re.MULTILINE).group(1))
    AttributeError: 'NoneType' object has no attribute 'group'

    Any fix?

    ReplyDelete
    Replies
    1. It is said that Saint Valentine was persecuted as a Christian and personally interrogated by Emperor Claudius II. Claudius was impressed by Valentine and talked to him to transfer him to Roman paganism to save his life. It is said that he performed a miracle before the execution, healing Julia, the blind daughter of her supervisor Asterius. Happy Valentine's Day 2020 wishes

      Valentin von Terni became bishop of Interamna and reportedly suffered martyrdom during the persecution under Emperor Aurelian in 273.He was buried on Via Flaminia, but in a different place than Valentin in Rome. His relics are in the Basilica of St.Valentine in Terni (Basilica di San Valentino). History of Valentine Day

      The year 2019 will be very exciting for Google, as there are already many good smartphones on the market that from the company's world phone.All smartphone brands and mobile operators around the world are trying to bring the first 5G smartphones to the market, as are networks based on the latest connectivity standard that will go online in 2019.Here we dive into the list of upcoming mobile phones 2019 that arrive in the first and second half of the year.

      The cameras of the current Oneplus 7 T Pro are above average, but not excellent. Since OnePlus has now become a premium player, they will try to improve the camera game in the upcoming Pro version. Currently mobile price in Bangladesh

      The exam is usually published in May by all education authorities in Bangladesh.The date of publication of the SSC result 2020 is very important for the candidates who take the SSC, Dakhil and professional exam.According to the announcement from the Ministry of Education in Bangladesh, the SSC exam results with marksheet 2020  will be released on May 6, 2020.

      "Holi celebrations start on the night before Holi with a Holika Dahan where people gather, perform religious rituals in front of the bonfire, and pray that their internal evil be destroyed the way Holika, the sister of the demon king Hiranyakashipu , was killed in the fire . Happy Holi 2020 wishes

      Delete
  30. Hi, i find these commands in samsung aboot
    C:\Users\Home\Documents\Strings\sblapp.bin: init frp lock flag 0x%x and OEM unlo
    ck flag 0x%x
    C:\Users\Home\Documents\Strings\sblapp.bin: Can't lock and unlock in the same de
    sc
    C:\Users\Home\Documents\Strings\sblapp.bin: Device unlocked: %s
    C:\Users\Home\Documents\Strings\sblapp.bin: Device critical unlocked: %s
    C:\Users\Home\Documents\Strings\sblapp.bin: get_unlock_ability: %d
    C:\Users\Home\Documents\Strings\sblapp.bin: Device is unlocked! Skipping verific
    ation...
    C:\Users\Home\Documents\Strings\sblapp.bin: unlocked!
    C:\Users\Home\Documents\Strings\sblapp.bin: oem unlock is not allowed
    C:\Users\Home\Documents\Strings\sblapp.bin: Need wipe userdata. Do 'fastboot oem
    unlock-go'
    C:\Users\Home\Documents\Strings\sblapp.bin: frp-unlock
    C:\Users\Home\Documents\Strings\sblapp.bin: use_signed_kernel=%d, is_unlocked=%d
    , is_tampered=%d.
    C:\Users\Home\Documents\Strings\sblapp.bin: oem unlock
    C:\Users\Home\Documents\Strings\sblapp.bin: flashing unlock
    C:\Users\Home\Documents\Strings\sblapp.bin: flashing unlock_critical
    C:\Users\Home\Documents\Strings\sblapp.bin: flashing get_unlock_ability
    C:\Users\Home\Documents\Strings\sblapp.bin: SM5703_REG_PARAM_CTRL || SM5703_FG_P
    ARAM_UNLOCK_CODE
    C:\Users\Home\Documents\Strings\sblapp.bin: fuel_gauge_unlock

    ReplyDelete
  31. Very interesting & fabulous post, I really enjoy the article that you share, Thank you very much.
    Know How to Remove Ytmp3 virus?

    ReplyDelete
  32. Thanks for writing this blog. Great information is sharing.
    If you need Hotmail customer support number then you can visit us for help.

    ReplyDelete
  33. This comment has been removed by the author.

    ReplyDelete
  34. The blog is written very creatively thanks for sharing your views with us.

    Hygiene Products Near Me

    ReplyDelete
  35. Thanks for all the tips mentioned in this article! it’s always good to read things you have looking for antivirus security for your PC and any other digital devices than. Visit@: my sites :- www.office.com/setup | office.com/setup | McAfee.com/ActivateDell

    ReplyDelete
  36. This is Very very nice article. Everyone should read. Thanks for sharing. Don't miss WORLD'S BEST CarGamesDownload

    ReplyDelete
  37. Canada’s new Program for workers and who are wiling to live there so here is a new way for them to go there by AIPP canada

    https://worldimmigrations.blogspot.com/2019/05/how-to-apply-atlantic-immigration-pilot.html

    ReplyDelete
  38. Great, Thank you for sharing this information about unlocking the boot Loader. Nowadays many people have faced this problem but with their phone. My little brother was stuck in the problem while changing the network carrier of the SIM. His phone got locked and he didn't have any idea about unlocking the phone. Then I recommend him to use unlock codes for the fast unlocking phone. Just simply he shared the IMEI number of the phone with country and operator to the unlocking company by dialing *#06#. Followed this Phone unlocking method He unlocked his phone instantly.

    ReplyDelete
  39. SHAREit is a free file sharing tool that transfers files between two devices where the transfer speed is higher than Bluetooth and sends more than 20 MB/sec per file.
    https://www.shareit.kim
    https://shareit.kim
    SHAREit
    SHAREit Apk

    ReplyDelete
  40. This comment has been removed by the author.

    ReplyDelete
  41. There are many freight forwarder china to usa. if you are looking for freight forwarder china to Canada, check out Topshipping. What is the cheapest freight forwarder china to Europe? what is the fastet shipping from china to canada? which sea freight from usa to china is the best in china?

    ReplyDelete
  42. You could definitely see your skills in the article you write. The world hopes for even more passionate writers like you who aren’t afraid to say how they believe. All the time go after your heart.
    Dell c1760nw wireless setup

    ReplyDelete
  43. The article has actually peaks my interest. I am going to bokmarks your web site and maintain checking for brand new information.
    Dell printers troubleshooting

    ReplyDelete
  44. www.mcafee.com/activate Find easy steps for downloading, installing and activating McAfee, Enter your 25 digit activation code at www mcafee com activate.

    www.norton.com/setup - Simple steps to download and install Norton setup. Just enter www norton com setup Product key and get started with Norton.com/setup.

    ReplyDelete
  45. Norton security program can secure either one device or up to ten devices and keep the whole network safe from malware such as worms, spyware, rootkits, etc. For getting Norton Setup, visit [url=http://notronnorton.com/]norton.com/setup[/url] , [url=http://pagenorton.com/]norton.com/setup[/url]
    .
    MS Office is used by a lot of people on a variety of devices like Android, Mac, PC, laptops, and iOS. This Office setup is specially programmed and adapted to do an array of tasks. Microsoft Office provides a list of helpful and dynamic features to accomplish the majority of tasks. To get this amazing setup for any devices, visit [url=http://redeem-office.com/]office.com/setup[/url].

    McAfee antivirus offers end to end protection from malware, fastest security against viruses on the computer files and folders, useful and accurate anti-spam security, and secures your browsing data on the internet. Visit the website [url=http://enmcafee.com/]mcafee.com/activate[/url] to download, install and activate McAfee setup on your device.

    ReplyDelete
  46. All hitches and concerns trouble users quite a lot, so in that aspect users can connect with our professionals of Dell to attain fixed support and service. All hitches can be eliminated as soon as possible via call support and remote accessibility. Dell Customer Service Number will assist users in attaining immediate help through simplest and perfect manner. One can get all services done in limited time without any trouble or worry.

    Dell Support Phone Number
    Dell Customer Service

    ReplyDelete
  47. If we are working in an organization it is lots of situation that we have to go with. We must be adjustable to cope up with any kind of situation. We can call it as an illusion of control. Thank you for describing more on that hereJogos 2019
    friv free online Games
    free online friv Games

    ReplyDelete
  48. HP Printer Support help you resolve all your HP Printer related concerns. Experts are available round the clock at HP Printer Support to deal with all printer queries and issues.

    ReplyDelete
  49. Thanks for the sharing such an useful information with me

    Website : Ask2bro

    ReplyDelete
  50. The Brother printer support is a team of reliable experts who offer round the clock service with great enthusiasm just to provide you enhanced services.

    Brother printer Support Number | Brother Printer Support

    ReplyDelete
  51. Mcafee.com/activate is the best when it comes to trust. It has been in the market since 1991. McAfee has the reputation of providing the security to your computer, iOS, Android devices, etc. Against the dreadful viruses, spyware & malware, ensuring the smooth running of your device. It has a number of security products & services like McAfee Antivirus, McAfee security deluxe etc. McAfee also has a special product for Mobile phones i.e McAfee Mobile Security. https://mcafee-activatenow.uk/

    ReplyDelete
  52. Mcafee.com/activate is the best when it comes to trust. It has been in the market since 1991. McAfee has the reputation of providing the security to your computer, iOS, Android devices, etc. Against the dreadful viruses, spyware & malware, ensuring the smooth running of your device. It has a number of security products & services like McAfee Antivirus, McAfee security deluxe etc. McAfee also has a special product for Mobile phones i.e McAfee Mobile Security. www.McAfee.com Activate Card

    ReplyDelete
  53. Thanks for providing the information with this post. Post is very nice! By the way, I want to share with you information about the best.
    HP Printer Technical Support Number
    HP Printer Tech Support Number

    ReplyDelete
  54. This comment has been removed by the author.

    ReplyDelete
  55. ترجمه حرفه ای و تخصصی خود را به سایت ترجمه آنلاین بسپارید. طرح برنز شامل ترجمه عمومی مناسب برای دانشجویان که بودجه کمی دارند و متن و محتوای وبسایت است. همچنین سه روز ضمانت دارد. طرح نقره ای شامل هفتاد درصد ترجمه متون تخصصی می باشد به علاوه بازخوانی مناسب برای ترجمه رشته های تخصصی و پروژه های دانشگاهی .

    ReplyDelete
  56. Download, Install or activate the Latest Office setup & Norton setup Protection. For more data about setup method check the my Products.

    Press on the official site of ...

    www.norton.com/setup | office.com/setup | www.norton.com/setup

    ReplyDelete
  57. Awesome article. It is so detailed and well formatted that i enjoyed reading it as well as get some new information too.
    Best fitness tracker
    Best DSLR Camera for Beginners
    DSLR Camera
    Best DSLR camera under 35000

    ReplyDelete
  58. Get the best assignment help and Assignment help from qualified experts at affordable prices. Quality solution, delivery before deadline.

    ReplyDelete
  59. Here we provide the services for office/setup and Hp Customer Service. you can download the setups of office by clicking below and if you have any issue regarding apple product if you need any feel free to call our toll free HP Customer Service +1-800-382-3046
    www.office.com/setup | HP CUSTOMER SERVICE

    ReplyDelete
  60. If you need assistance for dealing with McAfee logIn issues then, in that case, contact the experts at +44-800-368-9198. The experts are available for Help and Toll-Free 24*7
    McAfee Helpline Number UK
    McAfee issues with a Wireless Printer:
    McAfee Pop-Up Blocker?

    ReplyDelete
  61. The mechanism of McAfee software provides you both the online mode and offline mode of security. From providing you a safer platform for browsing,
    McAfee internet security
    also protects your personal data and files in the computer.

    ReplyDelete
  62. Our hp printer customer service team always assist its users' with reliable and extraordinary services. Having a customer support team is like HP is always a blessing for HP printer users. The team of certified and highly-qualified professionals are user-friendly and offers services within no time and at cost-efficient prices .

    ReplyDelete
  63. Get 24/7 service by calling on Canon printer support toll-free phone number and troubleshoot all sorts ofn Canon printer related issues.

    Canon Printer Support

    ReplyDelete

  64. Once you locate the correct ASUS username and password, you should be able to enter the admin panel visit
    how to access asus router

    ReplyDelete

  65. It’s very easy to find out any matter on net as compared to textbooks, as I found this article at this site.
    How to connect brother hl-2270dw printer to wifi

    ReplyDelete
  66. Do not get worried if you are unable to install the device, feel free to call at Xerox Printer Support Number, where our technical experts will guide you with step by step instructions and also fix hardware or software Xerox printer related issues by taking the remote access. Be assured that your Xerox printer will work smoothly without any hassle.

    ReplyDelete
  67. Get one-stop solutions for Kodak printer issues via Kodak printer support customer service. Get comprehensive solutions in one platform right on the place.

    Kodak Printer Support Number

    ReplyDelete
  68. This is the best platform which ever talk about the latest news and posts about the trending news like prizes in economics. You have described very well and really love your article.
    Reset Microsoft Account password

    ReplyDelete
  69. Quicken applications are built to run on Windows, Mac, Smartphone devices so that customers could always keep their financial goals on. On calling Quicken Support Number , you will be redirected to the desired department for instant help.

    ReplyDelete
  70. PcSupremo is available 27x7 for customer support for norton antivirus, resolve norton antivirus error, Norton antivirus Uk, & troubleshoot all your problems for Norton security UK.
    Norton Antivirus Support uk

    ReplyDelete
  71. I'm very thankful to you to give us this amazing information. I appreciate your intelligence and knowledge. And if you are not able to change the default password on Brother Printer then visit our website and solve this problem in no time by following the simple steps given by our printer experts.

    ReplyDelete
  72. we are canon help desk 24/7 . if any queries visit our link
    below

    Canon printer support allows you to interact your any technical issues about canon printers, with us. if any kind of queries visit our website. link given in the discription

    canon printer support number
    canon printer helpline number
    canon printer tech support
    canon printer technical support number
    canon printer toll free number

    ReplyDelete
  73. Effective way to rectify HP Printer error 79

    Are you having in fixing error code 79 on your HP Printer? If yes, then you can call our trained experts to get precise guidance to resolve this common problem. HP Printer error 79 is not a unique technical problem and its main cause when the PostScript documents failed to performed legitimately. Of course, it sounds pretty vague, so we recommend you to not to conduct any troubleshooting process and avail the help from HP Printer Live Service for quick restoration.

    ReplyDelete
  74. https://www.fitdiettrends.com/ultra-cbd-extract-au/
    http://fit-diet-trends.over-blog.com/2019/10/ultra-cbd-extract
    https://www.youtube.com/watch?v=Qf0mC2BZ_Pc
    https://sites.google.com/site/fitdiettrends/ultra-cbd-extract
    https://soundcloud.com/fit-diet-trends/ultra-cbd-extract
    https://fitdiettrends.tumblr.com/post/188336395083/ultra-cbd-extract
    https://fitdiettrends.wordpress.com/2019/10/14/ultra-cbd-extract/

    ReplyDelete
  75. Go through easy steps in the blog to fix hp printer says its offline issue. You can reach advanced printer experts at HP to fix the issue if still have no clue about the same.

    ReplyDelete
  76. How to fix AOL not receiving emails is one of the most common problem for nowdays. whenever you are unable to access the aol mail. visit downreporter to fix the problem.

    ReplyDelete
  77. I was extremely satisfied to discover this site.I needed to thank you for this incredible read!! I certainly getting a charge out of each and every piece of it and I have you bookmarked to look at new stuff you post.
    free avg antivirus for android

    ReplyDelete
  78. Thanks for sharing an article like this. The information which you have provided is better than another blog.
    download fortnite for linux


    ReplyDelete
  79. Great. Constantly i used to read smaller content that also clear their motive, and that is also happening with this article which I am reading here
    trend micro download
    norton.com/setup
    geek squad tech support
    webroot geek squad downlaod

    ReplyDelete
  80. Hey, I have read your blog. This is really great. I like your work. I am also a blogger. Please read my blog and let me know your feedback on the same. Brother Printer Support

    ReplyDelete
  81. norton.com/setup - Get protection after downloading, installing and activating Norton setup. Enter the product key at norton.com/setup.
    Go for more instructions:
    norton.com/setup |
    norton.com/setup |norton.com/setup |
    norton.com/setup

    ReplyDelete
  82. Thanks for sharing the detailed guide. Especially, I live the way, you made the graphic design with a boot and smartphone. As a beginner, I am also trying to create such awesome designs with some free graphic design software that works in 2019. Hopefully, very soon, I will achieve this goal. Yes, graphic designing is my passion but I started from free graphic design software at this stage.

    ReplyDelete
  83. If it is about upgrading to the 2020 version of Bitdefender then in that case the user needs to open the Bitdefender official website from there one can easily get the latest version of the software downloaded. If in case you still need more information or help then ask for it from the team of certified and skilled experts.

    Bitdefender Help Number UK

    ReplyDelete
  84. Earlier, Windows 7 was the most popular choice for laptops and desktops amongst the users globally. If you want to reinstall Windows 7 on your system, you need perform some reinstalling steps to make the PC run smoothly and hassle-free with the latest updates. You can reinstall Windows 7 from a recovery image provided by your computer manufacturer.
    reinstall windows 7 |
    Reset Windows 7 |
    Reset Password Windows 7 |
    reinstall windows 10 |
    Update Windows 7 |
    Update Windows 10 |

    ReplyDelete
  85. Let's get Started with HP printer online support as we are here to get you the easiest way to Setup HP Printer support. Feel free to contact us if you need any help.
    HP Printer Support Number |
    HP Printer Setup |
    HP Print and scan doctor |
    HP Printer Support Not printing |
    HP Printer Assistant download |
    HP Support Assistant download |

    ReplyDelete
  86. Acupuncture in London - Book your appointment with London's Best Acupuncture Clinic opened by the Prince of Wales in 1988.
    Acupuncture in London
    |London Acupuncture Therapy
    |Colonic Irrigation London
    |Colon Hydrotherapy
    |Hyperbaric Oxygen Therapy London
    |Hypnotherapy

    ReplyDelete
  87. Thank you so much for sharing such superb information's with us. Download the Microsoft Office setup on your Windows or Mac computer. Make sure that the Office product key is already copied for the activation procedure. office.com/setup | office.com/setup

    ReplyDelete
  88. Let's get Started with HP printer online support as we are here to get you the easiest way to Setup HP Printer assistant. Feel free to contact us if you need any help. Get step by step procedure for the HP Printer support or call us our customer HP printer assistant
    HP Printer Assistant download |
    HP Support Assistant download |

    ReplyDelete
  89. www.norton.com/setup Wow, Great article I have ever read, After read your article I thought I should write my first comment here. I don,t know what to say but I really enjoy to read your blog. Thank you so much for sharing this article with us and all the best for your next blog.

    ReplyDelete
  90. Office Helpline Number

    office.com/setup

    office.com/setup

    office.com/setup


    office.com/setup




    office.com/setup is a product of office setup. Get Support if you face problem to activate www.office.com/setup activate install Microsoft Office product.


    For Downloading, Installing and activating the Office product, visit http://www.office.com/setup and Get Started with Office. office.com/setup


    ReplyDelete
  91. Get simple ways for downloading, installing, activating, and re-installing the Microsoft Office Suite. Get assistance from the expert, you can visit here Office.com/setup.
    http://www-officecom.us/

    ReplyDelete
  92. Router Tech Support Phone Number +1-844-456-4180. access
    asus router
    as a company was the first in its field to launch a wireless router to share a single
    internet connection with multiple devices.

    ReplyDelete
  93. This comment has been removed by the author.

    ReplyDelete


  94. Get simple ways for downloading, installing, activating, and re-installing the Microsoft Office Suite. Get assistance from the expert, you can visit here.
    Office.com/setup

    ReplyDelete
  95. Awesome post to unlock motorola bootloader.. appreciated for sharing knowledge. also get some cool ideas for your business at one place

    Thanks guys

    ReplyDelete
  96. TurboTax allows its users to file annual tax returns easily without getting any major issues. Some of its users are facing difficulties in order to get a copy of their tax return after filing their return through TurboTax. If you are having such an issue, you must get Our TurboTax customer support as soon as possible.

    ReplyDelete
  97. Outlook is one of the popular email client that enables its users to access Microsoft Exchange Server email. It is known to be a software program through which users are able to send and receive emails on their PC. However, some of its avid users are getting an Outlook error code 0x800ccc0e while operating through their account. This error usually occurs while conflicting between SMTP (Simple Mail Transfer Protocol) – servers when users try to send emails during account configuration. If you are having such an error issue, you must try calling one of our Outlook experts immediately. Our technical professionals are available 24/7 to resolve all kinds of issues related to Outlook.

    ReplyDelete
  98. Groupon, is one of the top deals & offers aggregators in Middle east for Food & drinks, entertainment. Health & beauty, local deals etc. You can save up to 85% on your deals by using Groupon Promo code. Select your coupon and save money:)

    ReplyDelete
  99. Groupon, is one of the top deals & offers aggregators in Middle east for Food & drinks, entertainment. Health & beauty, local deals etc. You can save up to 85% on your deals by using Groupon UAE Discount code. Select your coupon and save money:)

    ReplyDelete
  100. If you need to renew your Norton antivirus then in that case it is advisable that you start up your Norton application then in the main window search for the renewal section further select the renew button and further follow the instructions for safe check out. If you are still stuck somewhere then for help and support ask at Norton Support Number UK.

    ReplyDelete
  101. One stop for all you diving and Spearfishing Gear Equipment that is Florida Freedivers.

    ReplyDelete
  102. You Blog is so interesting! I do not believe I’ve truly read anything like this before. So good to discover somebody with a few unique thoughts on this subject matter. Really.. thank you for starting this up. This site is one thing that is required on the internet, someone with a little originality! free crunchyroll premium account

    ReplyDelete
  103. Have you ever come across the technical issues while receiving email on your Yahoo mail? Is your yahoo mail not receiving emails even under a stable internet connection? Call our technical support technicians today via toll-free number to handle this problem. This way you can restore the email issues in no times.

    ReplyDelete
  104. Visit office.com/setup to create Microsoft account and get Microsoft Office software package on your system, with complete steps wise instructions for downloading, installing and activating with the 25-digit product key.

    www.norton.com/setup - To activate norton setup you need to visit www.norton.com/setup. Sign in, create new account, enter product key, buy norton and get support.

    Mcafee.com/activate - Get started with McAfee Security. Step 1. Enter your code Step 2. Log in; Get protected Step 3. Enter your 25-digit activation code.

    ReplyDelete
  105. The temporary issue like Gmail Error 502 occurs when the server encounters the high load situation. Also, it might trigger when the server received multiple request in a particular time frame. Users who are unable to fix this error code can avail our services at any point in time. Gmail customer care has a prominent presence in the customer support business and it is accessible throughout the day.

    ReplyDelete
  106. Buy the best spearfishing gear from our site and other diving equipment's.

    ReplyDelete
  107. Do you recently get a message- PayPal annual error resolution notice via email account? Perhaps you are dealing with the spam message right now? Avoid clicking that sort of link, as they can easily upload on your system and steal your private information. For instant expert’s help, call PayPal customer service.

    ReplyDelete
  108. How to fix TurboTax Error 42015?

    Practically, there are two ways through which you can fix TurboTax Error Code 42015. Either you need to deactivate the proxy server or conduct the manual update for TurboTax software to promptly fix this error code. If none of these works then feel free to inform our experts at TurboTax customer care.

    ReplyDelete
  109. AVG Customer Service is a team of technical specialists handle your all antivirus related issues. For help call AVG Customer Service Phone Number. We are available 24/7.

    ReplyDelete
  110. Complete the Manual setup of Roku Streaming Device and once you complete the process go for the given steps on your system or mobile.
    Steps to be done on the system
    Now, open the system and click on the browser of your choice
    Navigate to the Roku.com/link
    You will find the space to type the code
    Subsequently, type the alphanumeric code on the space and hit on the submit overlay
    This should activate your Roku device
    For any further queries on Roku com link Activation, feel free to contact our active customer care team, working round the clock at the toll-free number.

    ReplyDelete
  111. Complete the Manual setup of Roku Streaming Device and once you complete the process go for the given steps on your system or mobile.
    Steps to be done on the system
    Now, open the system and click on the browser of your choice
    Navigate to the Roku.com/link
    You will find the space to type the code
    Subsequently, type the alphanumeric code on the space and hit on the submit overlay
    This should activate your Roku device
    For any further queries on Roku com link Activation, feel free to contact our active customer care team, working round the clock at the toll-free number.

    ReplyDelete
  112. You Blog is so interesting! I do not believe I’ve truly read anything like this before. So good to discover somebody with a few unique thoughts on this subject matter. Really.. thank you for starting this up. This site is one thing that is required on the internet, someone with a little originality! free crunchyroll premium accounts

    ReplyDelete
  113. How to install windows 10?

    Windows 10 OS is one of the popular OS that effortlessly rectifies the shortcoming of the iteration that occurs before. Some User doesn’t know How to install windows 10? So, for them our exerts are there who can provide the proper guidelines to install the windows.

    ReplyDelete
  114. How to install windows 10?

    Windows 10 OS is one of the popular OS that effortlessly rectifies the shortcoming of the iteration that occurs before. Some User doesn’t know How to install windows 10? So, for them our exerts are there who can provide the proper guidelines to install the windows.

    ReplyDelete
  115. Enter Key Norton Setup, after purchasing Norton from visit norton.com/setup, sign in to your Norton account then enter product key for Norton Install.
    Norton.com/setup

    ReplyDelete
  116. Visit office.com/setup to Install, Reinstall, Enter Product Key, Activate and renew office setup. Get apps Excel, PowerPoint, Word, OneNote, Access.
    office.com/setup

    ReplyDelete
  117. How to Fix Yahoo Not Receiving Emails?

    Yahoo mail is one of the well-known email clients though in sending and receiving emails, yet most of its users are complaining about the issue of their Yahoo not receiving emails into their inbox. If you are encountering the same issue, call directly our Yahoo executive without any delay.

    ReplyDelete
  118. it is a little more complicated than ever. There are 2 categories of pieces of information that you share in your online life which requires safety-Personally-Identifying Information (PII) – The information includes your name, birthday, address and Medicare number or many other details related to your personal life.
    mcafee.com/activate

    ReplyDelete
  119. I use the best water. Because the provides soft water. You can choose Best Water softener.

    ReplyDelete
  120. How to Resolve Adobe Photoshop error 16?

    Adobe is one of the best software service like Photoshop, reader, acrobat, and much more. Adobe photoshop error 16 is familiar issue. This issue occurs may be due to PSD file corrupted or many reasons. Still you are facing the same issue. You need to call Adobe support.

    ReplyDelete
  121. At Lufthansa Phone Number have with us team of researchers in air travels and experts in air ticket bookings that searches down great deals for you. If have our own set of sources and which is why we get deals that aren’t anywhere else. The deals we find for you are generally unpublished this is why we proudly say that we offer unmatchable deals.

    ReplyDelete
  122. Anybody who wishes to explore the places across the world is generally in search of a place that can deliver reliable assistance on services provided by the airlines. But you do not get it easily. This is why you need us. We at British Airways Contact Number deliver the most reliable assistance services and has the ability to answer your queries efficiently. Call us and we can assist you with all services provided by the airlines that will make travel easy and affordable for you.

    ReplyDelete
  123. We are assisting our customers for quite a long time. We are providing our services to make your journey worthwhile. You can anytime book our services through Southwest Customer Care. Following are the services we are giving to our customers.

    ReplyDelete
  124. Nice Blog. If you are having the problems with Google chrome on your PC? Multiple reasons may be behind it. Still it is not resolved then you should call to experts and highly skills experts are available for your help.

    ReplyDelete
  125. We support the ultimate service for all these annoying or notorious issues. If you have some other problem that is not listed in the above list, chat with us directly or contact HP Customer Service phone number in the comfort zone. You will be helped in a cost-effective manner and with satisfaction. The support team not only solve the software issue but also resolve all your hardware issue but in order to resolve the issue you need to visit our website http://webslivesupport.com/printer-customer-support/
    HP Printer customer service number
    HP Printer customer service phone number
    HP Printer customer support number

    ReplyDelete