Many people restore their old phones to factory settings before selling them, thinking that everything will be fine. However, restoring the phone to factory settings only clears the data in the phone's memory. If someone else uses "data recovery software" to restore the data, personal privacy information may be leaked. So, what should we do? How to deal with old mobile phones to avoid mobile phone data leakage? In fact, the method is very simple. We only need to complete the following two steps on the old mobile phone to completely avoid this kind of thing from happening. Here we take Huawei mobile phone as an example, and the operations for other mobile phones are similar. Step 1: Double clear your phone. In the past, when upgrading the mobile phone system, if there were any problems, such as freezing, fast power loss, etc., we could solve them by "double clearing". So how to "double clear"? In fact, it is very simple. First, turn off the phone. Then use your fingers to long press the "volume + key" and "power key" at the same time. Wait until the phone's logo appears on the phone screen before we release our fingers. Then, the phone will slowly enter the "Double Clear" interface (as shown below). Click the “Clear Data” button and you will be taken to the interface shown below. Click "Restore Factory Settings", then enter "yes", and then click "Restore Factory Settings" to restore the phone to its original system settings. Then click the "Format Cache Partition" button to format the cache partition of the phone. After completing the two steps of "Restore Factory Settings" and "Format Cache Partition", click the "Back" button to return to the home page, and then click "Restart Device" and the phone will start to restart. After the phone restarts, it will slowly return to its original state, which takes about ten minutes. After restarting, the phone will be like a new one, and we need to perform the most original settings on it, such as: activating the phone, connecting to a Huawei account, setting up a WIFI connection, etc., and then we can enter the phone system. Step 2: Rewrite a large amount of data into the phone’s memory to overwrite it. After the first step, the original data of the phone has been cleared, such as: address book, chat history, installed software applications, etc. However, the phone still has the risk of privacy leakage at this time, and others still have a chance to recover the phone data through "data recovery" software. Therefore, the second step is very critical. We rewrite a large amount of data into the phone's memory and perform a "write overwrite" operation on the original memory area. The more data written, the better. Then, even if others use "data recovery" software, they will not be able to recover the original data of the phone. We can connect the mobile phone to the computer and copy the large files in the computer to the mobile phone memory, such as movies and TV series. A high-definition TV series is tens of GB in size, so a lot of the mobile phone memory can be quickly covered. If you don't have a computer, how can you write a large amount of data? You can turn on the camera of your mobile phone to record for a long time. When recording, set the pixel to the highest (4K). In this way, if you record a video for one hour, the size of the video will be more than ten GB, or even dozens of GB. In this way, it can also cover most of the mobile phone's memory. By following the above two steps, we can completely block the channels for the data in old mobile phones to be leaked. Others will no longer be able to obtain our personal privacy information from our old mobile phones. Then, we can safely dispose of our old mobile phones. |
>>: Google will shut down account login for Android 2.3.7 and earlier versions
[[120974]] CocoaChina: How did you get involved i...
With the continuous development of informatization...
The essence of user recall strategy is to awaken ...
I believe that when we surf the Internet, we will...
Last year, I thought that after working in brand ...
Today we will talk about three aspects: what is a...
Many webmasters have encountered situations where...
15 practical compulsory courses for illustrator wi...
Yesterday I shared with you some hidden money-mak...
With the rapid development of the mobile Internet...
Training course content: It covers every aspect o...
Let me share with you the methodologies summarize...
For me, WeChat not only meets my daily communicat...
The following is an outline of the content of thi...
1. New promotion Path: Promotion – Information fl...