Solved

unlock code for motorola i335

Posted on 2009-04-04
6
3,108 Views
Last Modified: 2013-11-28
I have a motorola i335 that Ive been trying to get unlocked.  I asked motorola and they say talk to my provider.  I call my current provider and they say talk to the provider  the phone from.  So that leads me to Sprint.  As usual there idiots and no one knows what the other one is doing even up to manager level so I recite the legal proceeding from the law case won that demands them to provide unlock codes and of course I get more run arrounds.  Making people cooperate these days just isnt enough.  You have to make them cooperate and then spell every detail out in black or white so they will not find some loop hole to keep you running around in circles.  Anyways with that said if anyone can tell me how to unlock this phone and get it to work on a tmobile network I would be gratful and willing to award 500pts.

Thx

G
0
Comment
Question by:Glenn_E
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 24067300
"Google is your Friend"
;-)

http://www.google.com/search?hl=en&q=unlock+i335&aq=f&oq=

;-)

Jeff
0
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 24067336
But ultimately you need to talk to whoever the new provider will be.

At least they will have a vested interest in getting the phone activated.

Offering anything more would cross the line of "Hacking", which is not allowed on this site.

;-)

JeffCoachman
0
 

Author Comment

by:Glenn_E
ID: 24068872
Hi Jeff,

     Thanks for the links however Ive seen those before.  There all asking for money to give me the code to get into my phone?  Thats like calling a lock smith to get into my own house?  Im hoping someone out there has the key or solution so that I can bypass any expenditures.  And I do have one question about that hacking comment.  Why can I find soutions on how to by pass windows log in screens and bios log ins when hacking is not allowed on here? Just a theoretical question?

Thanks,

G
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 24069103
Some of these types of questions either:
1. Slip through the system and are not noticed
2. Or are on the edge of what would be considerd a "Hack".

In your case we have no idea if this phone is rightfully yours.
?
I have never had this issue with any phone that I have owned.

Can I ask how you phone came to be "Locked"?

Did you contact your new provider?
Again, if anyone can legally unlock the phone, it will be them.

JeffCoachman
0
 

Accepted Solution

by:
Glenn_E earned 0 total points
ID: 24069154
Perhaps if you would refer to my first post and read it in its entirety most of your questions would be answered.  And whos to say when you give someone a windows hack that there pc is rightfully theres?  I suppose debating symantecs with you will get us nowhere however if anyone has a real solution to this problem I would love to hear it.

Thanks again,

G
0
 

Author Comment

by:Glenn_E
ID: 25442317
submit
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction This article is the second of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers the basic installation and configuration of the test automation tools used by…
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
With Microsoft Access, learn how to start a database in different ways and produce different start-up actions allowing you to use a single database to perform multiple tasks. Specify a start-up form through options: Specify an Autoexec macro: Us…
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question