According to Viber's manifest, there is activity "com.viber.voip.phone.PhoneActivity" that is responsible for action "com.viber.voip.action.CALL". In new version of Viber (4.2.1.1) this activity is marked by android:exported="false". As result, it's not possible anymore to start this activity from external applications...
There isnt yet any viber version for PC, i would like to run this on the home pc (evtl. using an android emulator), is this possible? since viber registration base on the phonenumber and the confermation is done by sending an smscode to the client phonenumber, how would an emulator handle this issue?
Hello, i have beem using viber for some time now and I was using my normal emojis every day but now i have updatet it to a new version 18.6.1.0 and now my emojis are so different. My friend has viber 18.4.1.0 and he has emojis from Android 11 even tho, he is using an old SAMSUNG that runs android 8. Is there a way to not use viber emoji or even tho chose, which emojis are beind used
I accidentally uninstalled viber but I reinstalled it again. Now I cannot setup the old account on the same device. The viber version used by me is 5.3-the latest version. I previously used viber on samsung galaxy tab 2 with os jeally bean -4.0.4. I send email to the viber forum but that did not solve my problem. I previously used the same version on my tablet. Every time I enter my phone number error message pops up. I was tninking of activating my viber account on another device and deactivate my account . And then using the same number and device I wish to setup the viber account once again. Will that help???
There is a new issue reported on Viber 4.1.1 version app that it is being identified as unknown-udp. Palo alto team is working on it. Packet captures of application traffic can be taken and shared to palo alto team through a case to better identify the app traffic as it was earlier before. There may be some changes on the way the viber traffic or ports usage and so on. Hence there may be a need to enhance the signature.
The files in the '/sdcard/viber/media' path are the profile photos (/User Photos/) of people in the user's contact list who use Viber, regardless of whether they have been added as friends in the app. Under the path images (/Viber Images/) and videos (/Viber Videos/) sent through the app are stored as well.
The database containing a meaningful part of communications is located in the 'viber_messages' file, which is located in a subdirectory named 'databases' or 'db' (the subdirectory's name depends on the Viber version).
You may not have to do anything that drastic. Try deleting the viber app, then restart your phone before adding it back. Just a normal restart or a forced restart (neither will result in any data loss)
You can open viber.db in C:\Users\USERNAME\AppData\Roaming\ViberPC\YourNumber with WordPad and somewhere in the beginning of the file you will find contacts phone numbers. Just enter them manually in your new phone and they will appear on you contacts list in Viber.
Or download command-line shell for accessing and modifying SQLite databases and copy sqlite3.exe , viber.db and data.db to C:\. Then in CMD(start -> run -> cmd.exe) position yourself on C:\ and enter sqlite3.exe viber.db
Then enter:
I just upgraded Viber to the latest version (5.2.1) on my Samsung Note 4 as it can save the history of Viber messages. Ironically, by doing that I lost all old conversation on Viber! Is there a way to recover deleted viber messages from Android phone?
If the device is already rooted, the malware silently tries to grant permissions to WRITE_SETTINGS, WRITE_SECURE_SETTINGS, REBOOT, MOUNT_FORMAT_FILESYSTEMS, MODIFY_PHONE_STATE, PACKAGE_USAGE_STATS, READ_PRIVILEGED_PHONE_STATE, to enable accessibility services, and to grant notification access. The StrongPity backdoor then tries to disable the SecurityLogAgent app (com.samsung.android.securitylogagent), which is an official system app that helps protect the security of Samsung devices, and disables all app notifications coming from the malware itself that might be displayed to the victim in the future in case of app errors, crashes, or warnings. The StrongPity backdoor does not itself try to root a device.
aa06259810