Try: Login and Login to the micro-credit account, failed! Change to a new account login, failed
Deduce the principle: the micro-letter this is actually not for account, because the micro-letter does not, now. And for the terminal, what does the terminal mean? This is the micro-letter of this mobile phone, it detected the red envelope tool, so gave a lock, prohibit the robbery red envelopes seven days.
Then the method is coming: Since it is terminal, then I direct a little bit, uninstall! (Pay attention to backup small video and important photos in advance, avoid missing important things)
Open the micro-letter, landing
Notice the way: Choose a landing method, before many people are QQ landing, can not find the entrance, only to say that you are too careless!!
Success can continue to rob red envelopes, or suggest that we do not use to rob Red envelopes supporting software, honest, happy heart Rob Red envelopes. Good luck to everyone, red envelopes rolling!
Attached: Tencent crackdown on red envelopes software
In response to the growing variety of red envelopes for the micro-letter Rob Red Envelopes The activities of the fairness of the destruction, Tencent announced in the days to crackdown. It is reported that after the investigation of Tencent has found dozens of kinds of ticket to seize the artifact, and do the publicity, small series in the following attached part, we have seen the need to increase vigilance. At the same time, Tencent also found a lot of users of the plug-in, and the plot is more serious 48,079 related account accounts were processed. Of course, this is only handled, also do not know how many still deep hidden.
In addition, Tencent stated that these plug-ins, and do not have the ability to control the amount of money arbitrarily. However, it is likely to create a threat to the user's personal property, may carry a variety of Trojan virus, secretly steal the user's personal privacy information, resulting in the user's property loss. Therefore, Tencent also stated that the purpose of the action is to consider the security of users, and to the further violation of the launch of in-depth attack, so if someone still want to use the red envelope artifact, or consider the consequences first.