[Guide] OTA & ROOT GUIDE

Status
Not open for further replies.

nfmweb

New member
Aug 25, 2013
2
1
0
Just a bit of a warning note here.

If you go to the links OP provided on d-h.st to download the .tar files you may get a drive by download attack.

I tried to get the mje modem file today and was attacked by the pop-under that d-h.st/eaD throws when you click the download button. The tar file download started fine. The attack came from the site loaded in the pop-under window.

I also did a search for odin download and the top google result was for odindownload.com. On this site there is supposedly a file for 3.10.7 but this file contains a malware called Outbrowse (42/55 on Virustotal). The 3.09 file on same site was fine.
 
  • Like
Reactions: pizza_pablo

DutchDogg54

Retired Forum Moderator
Aug 16, 2011
2,472
2,866
0
Des Moines, IA
Just a bit of a warning note here.

If you go to the links OP provided on d-h.st to download the .tar files you may get a drive by download attack.

I tried to get the mje modem file today and was attacked by the pop-under that d-h.st/eaD throws when you click the download button. The tar file download started fine. The attack came from the site loaded in the pop-under window.

I also did a search for odin download and the top google result was for odindownload.com. On this site there is supposedly a file for 3.10.7 but this file contains a malware called Outbrowse (42/55 on Virustotal). The 3.09 file on same site was fine.
Thanks for the heads up - I forgot my files were on Dev host. I'll re-upload on my android file host account as I have time. You can get the files from the current links without viruses or any other problems, you just have to navigate the stupid download button mimicking ads they have let be a part of their site now at Dev host... Shame that they've dipped so low.
 

donc113

Senior Member
Jul 27, 2009
875
201
73
Just a bit of a warning note here.

If you go to the links OP provided on d-h.st to download the .tar files you may get a drive by download attack.

I tried to get the mje modem file today and was attacked by the pop-under that d-h.st/eaD throws when you click the download button. The tar file download started fine. The attack came from the site loaded in the pop-under window.

I also did a search for odin download and the top google result was for odindownload.com. On this site there is supposedly a file for 3.10.7 but this file contains a malware called Outbrowse (42/55 on Virustotal). The 3.09 file on same site was fine.
Always get firmware from sammobile.com you have to "join" to get the downloads, but joining is free.



Sent from my Note 3 via Tapatalk
 

DutchDogg54

Retired Forum Moderator
Aug 16, 2011
2,472
2,866
0
Des Moines, IA
Welp, it appears that the files on Dev Host can't be reached, even when clicking the appropriate download button, without seeing a giant warning screen from Chrome. I, myself, don't even want to pass this page, so I don't want anyone else to be put in that position.

Since I do not have these files in any other location, and I can't download them from dev host, I'm forced to close the thread and remove the links. This is happening now and will remain effective forever. Unfortunately, I may have the only link to some of these files, but you don't want that file anyway, since it could be corrupt or you'd be forced to pass through a corrupt/dangerous environment to get to the file.

I value your experience on the web and your privacy and safety much more than your ease of access to these files, so I hope you can understand. I really enjoyed supporting the Note 3 when I was a user and for some time after I was no longer using the device. But all good things come to an end, and that time is now for this thread. I will leave the thread up since it's got good info throughout, but the links & posting will be closed.

Thank you & happy developing!
 
Status
Not open for further replies.
Our Apps
Get our official app!
The best way to access XDA on your phone
Nav Gestures
Add swipe gestures to any Android
One Handed Mode
Eases uses one hand with your phone