Facebook & Safari closing unprompted whilst still being used

We have two iPads and both are running on iOS 7. One iPad is an iPad 3 whilst the other is an iPad Air. Both have started closing unprompted Facebook and Safari. Both iPads return to the screen you get when opening the iPads showing all the Apps.
We have tried resetting but that doesn't make any difference. Any suggestiosn as to what we can do to rectify this probelm ? Thank you.

For Safari try clearing its cache and history via Settings > Safari
And try closing all apps via the iPad's multitasking bar : double-click the home button to open the taskbar, and then swipe or drag each app's 'screen' from there up and off the top of the screen to close them, and click the home button to close the taskbar.
After closing them you could also try another soft-reset before re-opening them, and see if you still have problems.

Similar Messages

  • TS3772 On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    Hello steveod2
    The main thing to do is to sign out all services on your iPhone, like iCloud, iTunes & App Store, iMessage and FaceTIme. Check out the article below for more information.
    iOS 7: If you're asked for the password to your previous Apple ID when signing out of iCloud
    http://support.apple.com/kb/ts5223
    Regards,
    -Norm G.

  • Error: The logical component X is still being used

    Hi,
    In Transaction SMSY, i want to delete a Logical Component. So, pre-condition is to check whether it is mapped to any Projects/Solutions. By right-clicking - Where used list , i have seen that it is mapped to a Project. So, in transaction SOLAR_PROJECT_ADMIN under tab System Landscape, i tried to delete the Logical Component but receiving the error message - The logical component X is still being used.
    Please help.
    Many Thanks,
    Mohan.

    Hello Mohan,
    You can also solve this by using the "Replace Logical Component" button in the system landscape within SOLAR_PROJECT_ADMIN.
    Thus you can replace all the occurances of the Z_ logical component by e.g. an existing standard SAP logical component.
    Afterwards you will be able to delete your Z_ logical component in SMSY (or in LMDB from 7.1 SP9 on).
    Best regards,
    Peter

  • Theft of phone and skype account still being used!...

    Hi.
    My wifes phone was stolen on th 19th of April during a camping trip.
    We reported the theft to the police.
    I have gone onto skype today, and the account is still being used.
    My wife said the only two places skype is installed is on her stolen phone and on her laptop, which isn't on at the moment as she is at work!!
    So whoever stole the phone is using the skype account right now!!!
    I need to find out the IP addresses that have been logged against the user [Redacted for privacy] since the 19th of April.
    I have tried to email support, but the contact form keeps giving an error, so please someone respond as soon as possible so I can relay info to the police please!!
    Kind regards,
    Glenn.

    Hi, Glenn, and welcome to the Community,
    These two commands, when entered into a chat window, may prove helpful:
    /remotelogout
    Sign out all other instances except the current one. This will also stop push notifications on all other instances.
    /showplaces
    Lists other instances where this Skype name is currently signed in.
    Important: Always make sure you are using the latest version of Skype. Some of these commands may not be supported in older versions.
    Here is a link to the original FAQ article:
    https://support.skype.com/en/faq/FA10042/what-are-chat-commands-and-roles?
    If your wife still has access to her account, she should consider signing on to her account details and removing any saved payment methods on file. 
    Skype does not release IP addresses except upon request from law enforcement agencies, who can file to receive this information via official channels.
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • Is code still being used

    We have a large database, with many stored procedures, packages, functions and views that have built up over such a long time that we no longer know which code is still being used.
    Is there any way of finding out if a procedure/package/view/function has recently been executed.
    The only way I could think of was to take away the privileges and see who shouts... but that's probably not the best idea.

    Find objects, that don't have other objects dependant on themDepending on how the database is used, this may or may not prove anything. Procedures that are called from SQL*Plus sessions or DBMS_JOBS wouldn't show up. Searching the text of your front-end application may be a chore as well.
    A similar caveat apllies to trawling the cache. You'd want to make sure you didn't drop procedures that are run once a month or once a quarter or once a year.
    In the absence of adequate documentation the only sound approach is to keep everything. Punishing your users - by removing their rights - for the incompetence of the support team is so wrong.
    Why do you want to get id of somne procedures? They are not like tables, they don't take up much space. Procedures that are not run don't have reported bugs, so they don't generate much additional work. The only issue I can see is when you have to do global work e.g. upgrading the database or applying some generic fix. That is additional work, I agree, but that's the price you have to pay for not having properly documented applications.
    We all do this (or rather don't do this) and we all end up having to do work we suspect is unnecessary but can't prove that's the case. Do we learn? Heck, no.
    Good luck, APC

  • HT4203 I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this.  Thanks.

    I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this. 

    I assume you are including the STIX font as part of your epub files?     
    Perhaps the folks who do this blog might be able to help -- they have done some work with font embedding:
    http://www.pigsgourdsandwikis.com/2011/04/embedding-fonts-in-epub-ipad-iphone-an d.html

  • HT1391 Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    No.
    Contact yoru carrier. They may be able to blacklist it.

  • My iPad says that she is busy and is unable to accept my request even when everything is closed and nothing is being used. What might be the problem here?

    My iPad says that she is busy and is unable to accept my request even when everything is closed and nothing is being used. What might be the problem here?  3 times my iPad has crashed while nothing was open or running and a small loading wheel would be moving signifying that the thing was loading something without permission.  Even when the dang thing was on my personal wireless service that I pay for.

    similar to what is happening to me....the difference is, after restoring itunes detect ipod and ask to restore again and again....
    I know it may look kinda stupid but: just leave the ipod there for about 2 minutes, that's about the time my itunes is taking to detect my ipod...if it doesn't work, try connecting ur ipod to other computer with itunes (no need to sync, just to check if itunes will recognize) to check if the problem is with the ipod or with the itunes and/or computer.

  • My iPad continues to crash frequently despite closing app's not being used?

    My iPad continues to crash frequently despite closing app's not being used?

    Have you got a lot of memory that's being taken up or a lot of iCloud services taking place? It might be something to do with the iOS, have you tried a system restore? If you do remember to back up all your files!

  • Reintalled OS, but disk space is still being used from old files?

    I tried reinstalling the OS after my macbook would freeze when i tried to log in. I first tried to archive and install and then it said it couldn't complete that.I then put in the 2nd OS disc and it created a new user profile and my computer is working fine. The only thing is that a few alias are still being picked up from the old users and there is only 60 GB of space left on the hard drive. None of the information on the old user files is totally important so I can do without it, but I would like all my hard drive space back

    if you don't need the old user go to system preferences->accounts and delete the old user. also, check to see if you have a Previous System,s folder at the top level of the hard drive. delete that too and empty trash.

  • Why is WPA2 still being used??

    This a message I wrote recently in a forum that brought up my idea from a couple of years and every year I see new products/WIFI being released, but not changes so here it is again....and hopefully someone who works with the WIFI alliance can bring this to the table.
    I think WPA 3 or 4 needs to come out...I have written on this in different areas and attempted to contact the Wifi Alliance (Austin Texas) with no luck because I can't afford a $15,000 membership... Also linked a stack exchange post I made talking about the SIMPLE change/additions and the post was deleted....SO here it goes
    Current PSK formula is
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid, 4096, 256)
    What this means is it uses HMAC-SHA1 with your passphrase/ssid, 4096 iterations, and produces a 256 bit key
    So for the past 10+ years people have been able to create databases/rainbow tables, etc because your only solving for 1 piece of the formula.
    First thing that needs to change is the number of iterations, 10+ years ago hardware could only bruteforce 100-300 passwords a second. The number of iterations needs to be increased in order to bring that change back in effect. Currently with GPU's this number reaches the 10's of thousands (actually more).
    The next thing would be to change the salt to include the mac of the ***router or client/both so that each router brute forced would require starting from scratch
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router mac***, 4096000, 256) *iterations are 100 times current..not sure if hardware can take this, again it would have to be tested, the number shown is just for illustration purposes.
    Next we need to take the HUMAN element out of the Equation.
    1) a password of 12 or more needs to be implemented
    2) if not already present in the password entered, the router would then GIVE the user a couple of permutations that include at least TWO upper/TWO lower/TWO special characters/TWO numbers and make them choose one. In other words the router would not allow anything less than a more "sophisticated" password.
    Another option would be that after the first formula is used and the client connects successfully the FIRST TIME.... the router then "remembers" that mac address and now the formula changes to
    DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, RND, 256)
    Where RND is a random number generated by the router 6-8 digits long for the iterations. Unless a "Hacker" just happened to catch the first handshake and then ran through the set standard 500,000 iteration formula and happened to find the password (being able to decrypt the aes256 exchange of RND), from that point on the formula would be different. This could be the same for the router, or even more secure, for each client connected. So the router would keep a table of Client macs and RND so when the client says "HELLO I want to connect" it would be done using the RND value/formula. If someone was to find how the RND value was saved on the client (physical access to the client) then it would be different for each client. After X many days/X many hours this could be re-set/established again using the first formula and AES256 as an option.
    So this is just some Ideas, with todays technology/hardware it shouldn't be that hard to do. WPA2 is old and getting easier to crack. Many wordlists have been created that easily go up to 10 if not more... "hackers" have been generating wordlists for YEARS. Making the first formula iterations high enough to slow down the brute force attack, and then making the hacker start from scratch with the combination of SSID + Router Mac, PLUS add the fact that after the client is first set up/connected to that router making the number of iterations RND (6-8+ digits)........this just makes it VERY VERY VERY difficult for a wardriver to accomplish finding the password.
    One last thing to add would be to encrypt the DEAUTH packets.. Currently a "wardriver" can deauth the client and when the connection is regained it captures the 4 way handshake...prevent this and again it would be a little more difficult to capture that handshake. Also even if it is captured and its not the FIRST time... it would be a RND value so the "wardriver" wouldn't know where to start, but from scratch. This time with every combination of a 12 character min password, and for each RND 6-8* digit of iterations...
    Honestly with something like this implemented (which isn't too far fetched, especially the simple formula change adding router mac***), and possibly the Random Iterations, wardriving would almost become worthless. Currently a wardriver knows the formula and nothing changes so there is SOME hope that the user used a really easy password, but with the option above even trying the correct password wouldn't work (unless was the first time or a re-authentication time). Even still it would be with a new formula that uses 12 min password/more iterations.
    Hopefully I don't get trashed on this post, all criticisms/ideas/opinions are open.

    thank you for your reply..
    Hopefully it will change... back when this idea was originally thought of (when attempting to vb.net a PSK just for fun), I took into account costs...thats why the changes are pretty simple depending on hardware.  I remember when WPA, WPA 2 first came out it, it was just the cost of a router/new devices (back then lots of money, now routers/hardware is less expensive), depending on the current hardware a simple coding could just be updated (firmware)...example the new WIFI Passport system could be implemented on older hardware once tested/certified...at least according to WiFi alliance.
    The other reason for the change again is the 10+ years of using the same system, i understand it "secure" but with all the computer breaches/security breaches this is just one method to prevent it.  I would definitely upgrade if a newer secure encryption came out...however this really isn't a new encryption, same scheme, basically same formula with a different implementation, which is why I think a simple upgrade would be great...
    so a real world example of the implementation..
    Client says "Hello"
    Router uses DK1 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 24576, 256) to encrypt a random number between 15000-30000 and uses it to send its message AES(16745 & message authentication, DK1).
    Client uses DK1 to reverse it to get 16745/message authentication and now uses DK2 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 16745, 256) to AES(original message, DK2) in order to show the router that I have the original key/and have recived the new iterations.
    The router now stores 16745 and the client stores 16745 from that point on when wanting to communicate with that mac address.  makes it totally random except the first formula.
    anyway just a concept.. thanks for your reply again.

  • Ram still being used after quitting

    hi, I know Mavericks handles Ram in a more effective way but why is it that I have programmes still running in the activity Monitor even though I have quit them?

    If an applications appears in the Activity Monitor then it is still running. This would indicate one of two things: 1) the program isn't responding. Usually programs that have stopped responding will have a message next to their name indicating that and/or appear in red text. 2) You closed all the windows of the program which, in Windows, would quit the application. But this is not typical Mac behavior. To quit a program on the Mac you must select Quit from the Application menu or use command Q.

  • Memory still being used but no songs playlists being shown

    I went to charge my I-pod, using the adapter, and when I went back later to start playing songs, it showed that all the songs were gone (or not being shown) and no playlists!
    But the weird thing is, my I-pod is still using the same amount of memory. I did the manual reset and still it's the same!
    Anyone can explain this or help me out?
    Cheers!

    First thing to check is if the songs show up when you connect your iPod to you computer and open iTunes.
    If they do not, you will need to Restore your iPod using the iPod Updater. NOTE: this WILL ERASE all music on your iPod.
    The disappearance of your music is usually caused by corrupt iPod software. The restore will fix things.

  • I have downloaded version 4.0 but my current 3.16 version is still being used .how do i switch to the new version on my mac10.6

    i have a mac 10.6 and use firefox 3.16. i have just downloaded an updated version 4.0 which is in the down load folder but the version i am still using is the previous one . how do i use the latest version. i am a new user of apple mac.

    https://support.mozilla.com/en-US/kb/Installing+Firefox+on+Mac

  • Cloud icon doesn't appear; space still being used on ipad (or is it on my computer? I'm confused!)

    What is the main selling poiint of iTunes Match? I subscribed because I'm loading my cds onto my new ipod, and I have more cds than it will hold. But the gb space didn't go to zero. Do we have to manually delete every song?

    KeithJenner is correct - if you have music on your iPad and you sign up for iTunes Match, the locally stored music is not automatically removed.  You have to do that yourself as he described.  After you have removed the music from your ipad, if those songs were also on the computer you used to sign up for iTunes match, you will still see them in the music list on your iPad.  If you click to play a song it will download a copy.  There are other ways to download music too, such as from a button at the bottom of an album track list or from a playlist.
    The headline of your post said "cloud icon doesn't appear."  If you tell us where you are looking for a cloud icon and what you want to do with that cloud icon., we might be able to help you.  cloud icons of one sort or another are used in many places in iTunes Match.
    You also asked what the main selling point is for iTunes Match.  While every person has their reason for using the service, in general it is looked at as a way to have access to all of your music on all of your devices, without having to keep all of your music locally stored on them all.  It lets people with different music on more than one computer add it all to a central location too.  You can read more about it at the link below.  There is a link to a video at the top of the page that you might find helpful
    http://www.apple.com/itunes/itunes-match/
    Message was edited by: JiminMissouri

Maybe you are looking for

  • Problems moving library from pc to mac via external drive

    Hi, I have searched hi&lo for an answer to my problem, and now I'm having another problem. I have just got a macbook and had all my music on an external drive in WMA format. I dragged my library into itunes on a pc to transfer it all to mp3 format so

  • How to undelete icloud on my macbook.

    hi, all my contact is gone on my adress book from my mac. And when i ask to synchonize with my iphone or ipad,... he says already synchonizeby icloud. how can i undelete this function. thanks

  • Special

    hi can any body tell me the scenario and concept of Special G/L Transaction, Statistical Posting,Alternative reconcilation account.and downpayment

  • Logo in Apex PDF report

    Hi Folks, I have created a classic report in Apex. Have enabled the print PDF link on the report for the business users to download it in a PDF format. Is is possible to put a logo in a downloaded PDF from the report? Thanks Harry

  • I made a new apple account and signed in on my ipod. But now I can't buy any in-app purchases.

    It says 'Your purchase could not be completed' And then 'Failed to connect to itunes store' What should I do? I have tried re installing the app and restarting the  ipod. Syncing it with the right itunes account. Everything. Considering a restore but