Official Android 4.1.2 VJMS3 Jelly Bean Firmware on Samsung Galaxy S2 GT-I9100

  1. Firstlydownload the official firmware file from here and save it to your PC
  2. Secondly,Download ODIN 3.07 from here on your PC and save the same to PC. 
  3. Now, extract the downloaded firmware zip file to your PC, preferable on the desktop and make sure that you will obtain a .tar.md5 file and some files in some cases.
  4. Next, extract Odin zip file and make sure you’ll get Odin3 v3.07.exe plus other additional files.
  5. Now, turn off the smartphone and completely (wait for confirm the shut-down task the vibration approximately 6 seconds).
  6. Boot the S2 device into Download Mode. (For doing that press and keep holding the Volume Down + Home + Power buttons simultaneous until an Android icon like a robot is displayed and in this moment press the Volume UP button, the Download Mode will appear.
  7. Now, open the ODIN app by launching the ODIN v3.07.exe file that you have already extracted above.
  8. While the smartphone is connected in Download Mode, connect it to PC using the USB cable.
  9. Now, look on the ODIN interface and when the smartphone is recognized successfully, a notification message will say “Added!” and additionally the ID: COM together with a port number box will be colored yellow
  10. Note: In case the ODIN doesn’t display the added message, change the USB port to the PC and reinstall the suitable USB drivers once again on the PC.
  11. Now, chose and load the necessary files for install the new firmware as below:
    • From ODIN app select the PDA checkbox and then browse and load the ‘.tar.md5′ file
    • Now, select the Phone checkbox and then browse and load the file that contain the modem word in its name.
    • Click on the CSC checkbox and select the file that named ‘CSC
    • From the ODIN app click the PIT checkbox and load the ‘.pit’file.
    Note: Ignore the steps b, c and d if there is no such file.
  12. Important: In ODIN app, make sure that the Auto Reboot and F. Reset Time  options are enabled by selecting the checkboxes, but the Re-Partition checkbox must be unselected, select the Re-Partition checkbox only id a .pit file was loaded into ODIN in the above corresponded step.
  13. When all the steps are correctly followed, press START button from ODIN to start the installation firmware process.
  14. Now wait until the firmware flashing process is done and the smartphone will reboot automatically.
  15. The flashing process is completely done when a PASS message with a green background will be displayed in ODIN interface (Left-most box at the very top of the ODIN app).
  16. Now you can disconnect the USB cable from the PC
That’s it; you successfully learned how manually update the S2 GT-I9100 with the latest stock Android 4.1.2 I9100VJMS3 Jelly Bean OTA firmware.
Verify the firmware version that is running of the phone by navigating to: Settings > About Phone:
Troubleshooting – In case the smartphone is stuck or is entering on a boot loop at the boot sequence after the last reboot you have to do :
  • Boot the smartphone into Recovery Mode by pressing and keeping hold the Volume UP + Home + Power buttons simultaneous.
  • Now, from the Recovery Mode perform a Wipe data/Factory Reset as well as Wipe Cache Partition.
  • When the wipe process is done, return on the Recovery Mode main menu and from there choose the reboot system option.
 Note 1: For navigating between Recovery Mode options use Volume Keys and for selecting an option in recovery use Power Key.
Note 2:  When a wipe task is applied all the device’s internal memory data will be erased, not the data on the SD card memory.

How to Remove Ransomware

Ransomware is malicious software that restricts access to a computer until a ransom is paid. It displays a fake warning message and asks you pay a fee to unblock the computer. It will frequently disguise itself as the police or FBI. Ransomware can be difficult to remove; however, it is not impossible. This guide provides two methods for removing ransomware.


Contents

Method 1 - Start in Windows Safe Mode
Method 2 - Use HitmanPro Kickstart



Method 1 - Start in Windows Safe Mode

Certain types of ransomware won't run in safe mode. To start in safe mode, restart your computer and press and hold the F8 key while your computer starts up. You must press F8 before Windows begins to load. You will see a black screen with several options. Use the arrow keys to select Safe Mode with Networking and press the Enter key.
 



Method 2 - Use HitmanPro Kickstart

Note: You will need a USB flash drive to use this method.

On another computer, download and open HitmanPro: Download here (32-bit), (64-bit) - Homepage

When HitmanPro opens, click the kick icon at the bottom of the screen. 

Now, insert the USB flash drive into a USB port on the computer. Then follow the on-screen instructions to install Kickstart. Once the installation is complete, remove the flash drive and insert it into the infected computer. Then follow these steps to boot the computer from the flash drive:


1. Restart or turn on the infected computer (make sure the USB drive is plugged in).

2. Go to the boot menu of the computer. To access the boot menu, you need to press a specific key while the computer starts up. Different computers have different ways of accessing the boot menu. The boot menu keys are listed below.
  • Dell: F12 
  • HP: ESC (boot device options)
  • Other: F12
Note:
  • You must press the key before Windows begins to load. 
  • If your computer doesn’t have a one-time boot menu, you will have to change the boot order in the BIOS. 
3. You will see a boot menu that is similar to the one below. From there, look for one of the following options: USB Device, Removable Devices, USB brand name (e.g. SanDisk, Kingston). Use the arrow keys to select the appropriate option and then press the enter key. 


4. Follow the on-screen instructions. It may take several seconds for HitmanPro to open. When HitmanPro opens, click the Next button. Select the box that says No, I want to perform a one-time scan, and then click Next. Once the scan is complete, click Next. Click Activate free license, and then click Next to remove the ransomware. Restart the computer and remove the USB flash drive. 


  Common Ransomware Threats

Many computer users encounter the following threats:

- FBI MoneyPak ransomware (Citadel Reveton)
- EUROPOL virus
- U.S. Cyber Security ransomware
- West Yorkshire Police Ukash
- Internet Complaint Center (locks computer)

Best Free Security Software for Windows

The security software listed on this page is reputable and trustworthy. Additionally, the software will work on all versions of Windows operating system. You will also find links to up-to-date reviews.
Contents

              - Antivirus Software
              - Firewall Software
              - HIPS Software
              - Password Managers
              - Encryption Software
              - Virus/Malware Removal Tools
              - Keep Your Software Updated
              - Browser Protection Tools
              - Other Security Software


Free Antivirus Software

An antivirus program is designed to protect a computer from malicious software. It uses an on-access scanner that provides constant real-time protection. You should only have one antivirus program running on each computer.




Free Firewall Software

A software firewall allows you to control outgoing Internet traffic. If an unknown program tries to make a connection, the software firewall will alert you, give you the name of the program, and ask if you want to block it from the Internet. When choosing a software firewall, you need to be careful to pick the type that meets your needs.




Free HIPS Software

A Host Intrusion Prevention System (HIPS) provides additional protection. Unlike an antivirus, a HIPS doesn't require constant updates to stay ahead of the latest malware threats. Note: A HIPS should only be used by advanced computer users. 




Free Password Managers

Password managers make it easy for you to organize and secure your passwords.




Free Encryption Software

Encryption is the process of encoding information so that it cannot be read or accessed by anyone except someone who knows how to decrypt it. Encryption is commonly used to protect sensitive data such as documents, passwords, and credit card information.




Free Virus/Malware Removal Tools

Malware removal tools are designed to detect and remove malicious software from a computer. They only run when you tell them to, and they do not conflict with your antivirus program.


Keep Your Software Updated

Using outdated software is risky because of vulnerabilities. A critical vulnerability makes it possible for any user to make changes to the system and acquire more rights, so that malware can install completely without your knowledge. 



Free Browser Protection Tools


Additional Security



Malware Removal Guide for Windows

This guide will help you remove malicious software from your computer. If you think your computer might be infected with a virus or trojan, you may want to use this guide. It provides step-by-step instructions on how to remove malware from Windows operating system. It highlights free malware removal tools and resources that are necessary to clean your computer. You will quickly learn how to remove a virus, a rootkit, spyware, and other malware.
 
Disclaimer: This malware removal guide is intended to be used as a self-help guide. It is not a substitute for professional malware removal. 

I recommend that you back up all your important data before attempting to perform the malware removal process. In the event of a system failure, you will be able to restore your data. Do not back up any system files, programs (.exe), or screensavers (.scr) because they may be infected with malware. 

Notes:
  1. In some cases, the only way to remove malware is to reformat and reinstall Windows. 
  2. Save or bookmark this page so you can easily refer to it if needed. Add bookmark = Ctlr + D
Preparation for Removal
Note: If you are having problems downloading files, download the files in this guide on another computer, and then transfer them to the infected computer with a CD or USB flash drive.

1. Can't Open Programs / Can't Connect to the Internet
2. Fix Internet Connection Problems

Certain types of malware will turn on an Internet proxy server and hijack Windows DNS cache, which can prevent you from accessing the Internet or downloading tools required for malware removal. Follow these instructions to fix this problem:

Fix Internet Connection Problems

Certain types of malware will turn on an Internet proxy server and hijack Windows DNS cache, which can prevent you from accessing the Internet or downloading tools required for malware removal. Follow these instructions to fix this problem:

 
Download and open MiniToolBox - Download here - Homepage

Select the following boxes: Flush DNS, Reset IE Proxy Settings, Reset FF Proxy Settings If you have Firefox open, close it before you click Go. It will open a log with the results. You can close the log.


Removal Process

Note: If you experience any problems after removing the malware, skip down to Fix Post-Disinfection Problems.

Step 1 - Scan for and Remove Rootkits

A rootkit is malware that hides itself from detection of antivirus software. Most rootkits will install other malware, redirect Google search results, or prevent files from opening. 

Kaspersky TDSSKiller is an effective rootkit removal tool that is easy to use. The scan takes less than a minute to complete.


Download and open TDSSKiller - Download here or here - Homepage  It requires no installation.

Follow these instructions to use TDSSKiller:

When TDSSKiller opens, click Start scan. If the scan finds nothing, click Close to exit. If malware or suspicious objects are found, just click Continue. Don't change any settings. It may ask you to reboot the computer to complete the rootkit removal process (save or bookmark this page).

Note: If TDSSKiller won't open, download and run FixTDSS from Symantec. If FixTDSS won't open, After you complete the steps, try opening TDSSKiller again.

Step 2 - Scan for and Remove Malware

Many malware removal tools will scan for and remove different types of malware, but unfortunately none of them are capable of detecting 100% of malware. Therefore, it's important to use more than one tool to find and remove all the malware.

The free tools listed below are highly recommended for removing all types of malicious software. They do an excellent job at detecting threats and completely removing them. The scans for each tool should take only 5 to 10 minutes, but it may be longer or shorter. The scan time depends on your computer and the number of files you have on it.

Important notes:
  • Make sure the malware scanners are up to date before you scan with them. 
  • Do not use your computer for anything else during the scan.
  • Do not run more than one scan at a time.
  • You may need to restart your computer to complete the malware removal process (save or bookmark this page).

Download and install Malwarebytes Anti-Malware - Download here or here - Homepage

Unselect the box that says, "Enable free trial," and then click Finish. Perform a quick scan. Once the scan is complete, click Remove Selected to remove the malware from your computer (see image below). Make sure that everything is selected. 
Note: If Malwarebytes won't update, download and run the offline database installer.


 Download and open HitmanPro - Download here (32-bit), (64-bit) - Homepage  It requires no installation. 

When HitmanPro opens, click the Next button. Select the second option that says "No, I want to perform...," and then click Next. Once the scan is complete, click Next. Click Activate free license, and then click Next to remove the malware. 
Note: HitmanPro requires Internet access to detect malware. If you can't connect to the Internet, scan with Dr.Web CureIt.

Step 3 - Scan for and Remove Adware

Adware is software designed to show you advertisements. Although most adware is harmless, it can also be used for malicious purposes. Adware can hijack your web browser and redirect you to websites. It will typically change your Internet homepage and install a web browser toolbar.

AdwCleaner is an effective adware removal tool that is easy to use. 


Download and open AdwCleaner Download here - Homepage

When AdwCleaner opens, click the delete button. Restart your computer.


Common adware threats:  searchnu, babylon toolbar, claro search, mywebsearch, conduit search, incredibar, bProtector


After the Removal Process

Note: If you are in Windows safe mode, you can start the computer back to normal mode.


1. Remove Temporary Files

By removing your temporary files, you will delete any remaining malicious files from Windows temp folders. It will also free up hard disk space, which will help to speed up your computer.

Note: If your desktop icons are missing, skip this step and go on to Fix Post-Disinfection Problems.


Download and install CCleaner - Download here 

Once installed, simply click the Run Cleaner button at the bottom right. You are warned that CCleaner is about to permanently remove files from the system. Click OK to proceed.


2. Change All Passwords

Certain types of malware will steal your personal data such as passwords, emails, and banking information. Change all your passwords immediately, especially if you do any banking or other financial transactions on the computer. Password Strength Checker


3. Clean up System Restore

Your system "restore points" may contain malware. The only way to remove the malware is to delete the restore points. To delete the restore points.

Note: If you're not experiencing any problems that are listed below, skip down to the Conclusion.


Fix Post-Disinfection Problems

After the malware is removed, you may experience problems with your computer, such as problems with Windows Firewall, system performance, and Internet connectivity. Fortunately, there are simple ways to fix these problems.


1. Can't Connect to the Internet
2. Fix Windows Update and Firewall



Download and install Windows Repair (All In One) - Download here 

When Windows Repair opens, click the Start Repairs tab. Click Start. Unselect all the boxes except for the following five:
  • Reset Registry Permissions
  • Reset File Permissions
  • Repair WMI
  • Repair Windows Firewall 
  • Repair Windows Updates
Then click Start. Once it's finished, restart your computer.


3. Programs and Files Won't Open
4. Bing/Google Search Redirects (Random Websites/Ads)

First, clear your Java cache. Malware remnants will frequently hide in the Java cache. 
If clearing the Java cache doesn't work, uninstall and reinstall your web browser. If that doesn't fix the problem, your computer is likely still infected with malware. Follow the instructions below in the Get Expert Analysis section.
5. Desktop Icons are Missing

Certain types of malware will hide all the icons on your computer. To unhide your icons, download Unhide

Once downloaded, double-click on Unhide and allow it to run. It will remove the hidden attribute on all icons and attempt to restore the Start menu items to their correct location.
6. Slow Computer
7. Other Problems

Visit the following websites for more information:

Get Expert Analysis

If you want to be certain that your computer is completely cleaned or just want a second opinion, you can create a topic at one of the forums listed below and ask for help. These forums have people who are well trained and experienced in removing malware. Be sure to mention in your topic that you followed this guide. Please note that it may take a couple of days to receive a reply, so be patient. Note: You will need to register for a forum account to create a topic.

Free support forums: Bleeping Computer, Geeks to Go, What the Tech, Tech Support, MalWare Removal, TnT


Windows Won't Start

If Windows won't start or if the computer won't start in safe mode, I recommend using an antivirus rescue CDAn antivirus rescue CD allows you to scan an infected computer without having to start Windows. Many antivirus companies provide free rescue CDs. They are extremely effective at removing malware from a computer.

Below are three highly recommended antivirus rescue CDs. I recommend using Kaspersky Rescue Disk.

 Kaspersky Rescue Disk (270 MB) - How to create and use Kaspersky Rescue Disk
 Avira Rescue CD (250 MB) - How to create and use Avira Rescue CD 
 Dr.Web LiveCD (230 MB) - How to create and use Dr.Web Live CD
  1. Burn the antivirus ISO file onto a CD using CD burning software.
  2. Insert the CD into the infected computer's CD-ROM drive.
  3. Go to the computer's BIOS, set it to boot from the CD, and restart the computer. 
  4. Scan for and remove malware using the rescue CD.
If the rescue CD doesn't work, follow the instructions mentioned above in the Expert Analysis section.


Conclusion

Your computer should be completely cleaned of all malware after following this guide. If you believe your computer is still infected, seek professional help to remove the malware. 


Common Malware Threats

Many computer users encounter the following malware threats:

- Fake antivirus: Win 7 Defender, Win 7 Antivirus Pro, File Restore, System Progressive Protection
- ZeroAccess rootkit (Google redirect virus) Removal tools: Yorkyt by Panda or FixZeroAccess by Symantec
- TDSS rootkit (aka Tidserv, Alureon)
- FBI MoneyPak ransomware (Citadel reveton)