How do you know if someone who has stolen your ipod has restored it

I recently left my iPod at work, and my manager who found it looked after it and kept it in the office. When I asked another manager the next day where my iPod was she couldn't find it in the office. After a week of waiting both the original Manager who found my iPod didn't know where it was and they said it was misplaced somewhere in the office.
Today (over a month since I lost it) they said that someone could've possibly stolen it because they couldn't find it in the office.
For the first week or so my friends have tried iMessaging me and the messages haven't delivered, which was normal. It was as if I still had my iPod but not in wifi range.
Over a month later, I asked them to iMessage me again and see what it says and they were then prompted that it says "Message Delivery Failed"
Does this mean someone has restored my iPod? Or is this normal when an iPod hasn't been charged and used for over a month?

If you have already configured the iCloud Find My iPhone service on your iPhone, iPad, iPod touch, or Mac you can use it to locate your missing device, display a message on its screen, make it play a sound at full volume (even if on mute), remotely lock it, or remotely wipe (erase) it to protect your privacy. Requries iOS 6 to be trackable.
You can use the Find My iPhone app on a different iOS device (running iOS 5 or better)
You can use the Find My iPhone app on icloud.com
You device may NOT be tracked if:
Offline or Disconnectd
Location Service Turned Off
Restored by person who stolen it.
Battery Dead
Running below iOS 6 (ei. iOS 5.1.1)
Change passwords used on that iDevice. Report to the police.
Apple will do nothing without a court order.
Reporting a lost or stolen Apple product
iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number

Similar Messages

  • How do you know if someone is hacking into your internet services

    I found several websites that I have never been to under settings in safari advanced settings. How did these get here and what can I do to stop it.

    Answered in the other thread you posted in.

  • How do you facetime w someone who has iPhone?

    how do you facetime w someone who has iPhone?
    Obviously my iPod doesn't have a phone #...  So how do they "call" me? 

    Ok - so I used my gmail address.  Will that work? 
    My friend cannot call me and I cannot call her. 
    She has iPhone 4s.  I'm calling her using her iPhone #, and she isn't receiving the invite. 
    Her iPhone wants to connect to WiFi...  I am connected to WiFi. 
    Thanks for the above answer and if you can further help, I appreciate it.

  • How will you know if someone is using video chat?

    How will you know if someone is using video chat? Does the green camera indicator turns red?

    Hi,
    You Buddy List will show two types of AV icons.
    "Single" type which indicates the person can only do 1-1 Chats.
    "Stacked" icons indicating they can do Multi-way chats.
    Example pic
    If they appear feint or "greyed out",  so to speak, then they are Busy to someone else.
    (if they are chatting with you they will appear dark again once connected)
    9:01 PM      Tuesday; November 15, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb( 10.6.8)
     Mac OS X (10.6.8),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously

  • Can you have multiple Apple TV's in the same house and network? If so how do you know which one to pick from your Idevice?

    can you have multiple Apple TV's in the same house and network? If so how do you know which one to pick from your Idevice?

    Yes, there are even defaults for naming them, such as LivingRoom, Bedroom, etc, or you can even enter your own name with the remote for each AppleTV.

  • How do you know if someone else is attempting access to your wireless network? (WRT54G)

    I searched adn tried the Linksys FAQ to no avail to get an answer to the subject question.
    Is there any way to verify who is actually using or trying to attempt use of your wireless network, if so, where do I locate and view this information?
    I just set up a wireless system so my wife could get access from her wireless equipped laptop, but I really see no area to verify who is actually using the wireless network or if some other outside source/person is attempting to get access.
    Any info on where, how and what to do to view this type of info would be greatly appreciated and if it can't be, shouldn't there be something added to the system that would allow one to view all users accessing their wireless system?
    Thank you,
    Clay Fugitte

    Tracking down who is using your wireless system is usually difficult or impossible.  The router only knows the MAC address of the connecting computer.  MAC addresses can be faked.  Even if you knew the MAC address of the person connecting, what can you do with that info?  Go around the neighborhood asking people "Is this your MAC address?"
    Instead of worrying about who is connecting to your wireless, you should simply set up wireless security.  This will keep intruders off your wireless network.  Then you don't need to worry about who is connecting.
    It sounds like you are running an unsecured wireless router.  When you run an unsecured wireless router, anyone within range can login and use your Internet connection. At a minumum, this means that they will be using your bandwidth. At worst, they could be uploading copyrighted music, sending spam email, distributing viruses, or downloading child pornography --- all from an account with your name on it!   So my advice is --- secure your wireless network.
    To set up wireless security, do the following:
    First of all, to setup wireless security,  you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
    First, give your router a unique SSID. Don't use "linksys".
    Make sure "SSID Broadcast" is set to "enabled".
    Next, leave the router at its default settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK, or WPA with TKIP) - good
    WPA2 (sometimes called PSK2, or WPA with AES) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=893357 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

  • HT1338 how do you get ios 6.0.1 on your ipod

    how do you get ios 6.0.1 on your ipod

    Welcome to the Apple Support Communities
    http://support.apple.com/kb/HT4623

  • How do you know when items will fall off your credit reports?

    Can anyone tell me how you know what date items will fall off your credit report? Thanks

    Each individual type of adverse information has its own exclusion date.  They are all set forth in FCRA 605(a). DOFD applies only to a collection or charge-off, which have an exclusion date of no later than 7 years plus 180 days from the DOFD.Monthly account delinquencies are excluded no later than 7 years from their individual dates of occurence.BKs are exluded at 7 or 10 years, depending upon their type.Tax liens become excluded no later than 7 years from date paid.Judgments become excluded on the later of 7 years from date entered, or until the expiration of the statute of limitations on enforceability of the judgment. The credit report exclusion periods are imposed on the CRAs, and set forth the date after which they can no longer include that adverse item in credit reportes they issue.The CRAs are thus required to monitor the relevant date for each type of adverse item.  The consumer should no have to request exclusion or remind the CRA of the exclusion date, but it is possible that they could miss a date, so the consumer should monitor.

  • How do you know if snow is already on your computer?

    I just got my first mac today. I bought it from the best buy store in my area and they had to order it b/c it was not in stock, the model I wanted. I asked the gentleman if I would receive a disk since apple was giving every new mac user the free upgrade to snow and he said mine would already have snow installed. Much to my surprise when I opened the box there was a copy of snow leopard setting right at the top of the box. So how do I know?

    10.5.6 is Leopard. You will need to use the Snow Leopard DVD to install Snow Leopard. I would use my system for a while before installing Snow Leopard. You need more experience before doing installing Snow. And, when you are ready, come back here and ask for advice about installing Snow Leopard. There a great deal more to consider than what might mentioned in anything that came in your box.
    I would not update anything yet. Use your system for a while first. Post back when you are ready to update.
    Message was edited by: donv (The Ghost)

  • How can you tell if someone is spying on your iPad?

    Trying to determine if someone is spying on my iPad where they can see emails, apps, websites visited, get personal info.  THanks for the help.

    Tracking someone who's snooping on your iDevices is simple. Super simple. Simply clear everything you don't want seen. Web pages, browser history, texts, emails and phone call log. Then double click your home button. Turn off all of your background programs right before you lock or allow your device to auto lock and BOOM! The trap is set. If you suspect a nosy significant other of snooping this will catch them. When you get back to your device and double click your home button it will show you everything that they looked at. It's totally stealth and totally free.

  • How do you use more then one computer for your Ipod??

    One of my computers died and I want to still use iTunes to get more music but I don’t want to erase what I have on my iPod now. I need to use a different computer with out erasing all the music I have now?? HELP

    If your iPod is set to update automatically you need to take care connecting to a different iTunes. You can use a keyboard command to prevent your iPod auto-syncing with iTunes. While connecting the iPod to the computer on Windows with iTunes 7.3 or later installed hold down the Shift + Ctrl keys together. This will stop the iPod from auto-syncing with iTunes and the iPod will appear in the source list. Wait until you are sure the iPod has mounted, and that it will not auto sync and then you can let the keys go. This may take between 20 to 30 seconds depending on your computer: iTunes - Keyboard Shortcuts for Windows
    When your iPod appears in the iTunes source list change the update setting to manual. If you want to connect and use an iPod on more than one computer you need to change the update preference in the iPod Summary tab to "Manually manage music and videos" and click Apply. The content of iTunes and the iPod are not syncronised in this mode so the two can be different. You can directly access the content of the iPod and play it through iTunes and you can drag and drop whatever you want to the iPod from either library:
    Using iPod with Multiple computers
    Managing content manually on iPod
    Syncing Music to iPod
    Something else to be aware of when using an iPod in manual mode is that the "Do Not Disconnect" message will remain on the display until you physically eject the device: Safely Disconnect IPod

  • How do you transfer music from different computers to your ipod?

    I have two computers that are configured to my ipod. Because one is usually in the shop being fixed I have a problem when I purchase music on the secondary computer and want to transfer it to the main computer. It will transfer to my main computer through a cd but it requires that locate on the harddrive. It will play on the computer once I locate it but it won't tranfer to the ipod when syncing. Any suggestions?

    If the music you want to move from computer A to computer B is on your iPod the job is easy. There are free and shareware programs that transfer music from the iPod to your computer. Check out your favorite download site.

  • HT204380 how do you know if someone is online

    I just want to know how someone will know that I'm online and available to talk using Facetime please

    You can't see if a contact can use FaceTime because you don't need to login in FaceTime to call her/him. An iPhone, iPad, iPod touch or Mac is permanently logged in, so you can call it without issues

  • How do you know if someone blocked you?

    Ok so my friend and I have been texting and then we just stopped and it wouldn't let me send a iMessage it always says message failed but when i iMessage my other friends it works and i think he blocked me did he? And how do i tell because when i text him it sends help me!

    Green simply means that the message was sent as an SMS, not iMessage. It has nothing to do with being blocked. Either the recipient has turned off iMessage or one or both of you does not have an active data connection.
    There is no way to tell if you have been blocked, short of asking the person.

  • How do you know if someone sent as family and friends or services and goods??

    Someone sent me 0.75 CENTS and i need to vertify if he sent as family and friends because he can chargeback if he sent as goods

    gringoguitarista wrote:
    I was on a public network and may have logged into some websites using user/password.  I also left my machine unattended for a short time.
    There's a person that's very suspicious hanging around, but I managed to take a picture of them. 
    How do I go about finding out if they managed to snag my passwords and/or install some sort of key logger on my machine?
    Sorry but I think the suspicious person in your scenario is the person taking pictures of strangers.
    Change your passwords if you are concerned.

Maybe you are looking for