HT1918 What is the security answer?

What is the security answer?

We are fellow users here on these forums, we won't know what you set them to.
From http://support.apple.com/kb/HT5665 :
If you have three security questions and a rescue email address, sign in to My Apple ID and select the “Password and Security” tab to send an email to your rescue email address to reset your security questions and answers.
If you have one security question and you know your Apple ID password, sign in to My Apple ID and select the “Password and Security” tab to reset your security question.
If you have one security question, but don't remember your Apple ID password, contact Apple Support for assistance. Learn more about creating a temporary support PIN to help Apple confirm your identity when you contact Apple Support.
If you can’t reset them via the above instructions (you won't be able to add a rescue email address until you can answer your questions) then you will need to contact Support in the country where you and your iTunes account are to get the questions reset.
Contacting Apple about account security : http://support.apple.com/kb/HT5699
When they've been reset (and if you don't already have a rescue email address) you can then use steps 1 to 7 half-way down this page to add a rescue email address for potential future use : http://support.apple.com/kb/HT5312

Similar Messages

  • HT1918 what is the security code?

    what is the security code??????

    All credit and debit cards have a Security code on the back, or front. it is a three, or four, digit number that sets your card apart. the reason the Security code is important is so that identity thieves cannot hack your card info with just the 16 digit card number on the front and it also allows you to purchase things without swiping and putting in a pin such as for online items from iTunes and other sites. Visa, mastercard, and Discover card are the brands that have a 3 digit number on the back right hand side by the end of the signature line. American Express (AmEx) is the only card company that uses a 4 digit number located on the front above the 16 digit card number.

  • HT1918 what is the security code we have to type while using visa card......it was declined several times...if you are not able to done the transactions please update this type of payment that we will make direct payments through our bankings...

    Skip navigation
    Apple
    Support
    Mac
    iPod
    iPhone
    iPad
    iTunes
    Support
    Apple Support Communities
    Welcome, kvasu88(Sign out)
    NewYour StuffHistoryBrowse
    Search for:  Search
    Apple Support Communities > Discussions
    HT1918: iTunes Store: Changing account information
    Learn about iTunes Store: Changing account information
    Start a New Discussion in iTunes Store
    You can not post a blank message. Please type your message and try again.
    Subject:
       Mark this discussion as a Question      - this encourages people to answer for points and helps you track answers.
    Product     
    Operating System
    Other Details
    Add to Profile
    Tags   (use spaces to separate multiple tags, use an underscore to combine two words)
    Popular Tags: Below is a list of frequently used tags in this community.
    apple  can't  change  games  gift  hd  help  ios  it  list  me  music  my  one  password  paypal  please  purchases  questions  redeem  refund  security  songs  why  with 
    This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.
    Home>Support>Apple Support CommunitiesShop the Apple Online Store (1-800-MY-APPLE), visit an Apple Retail Store, or find a reseller.Apple InfoSite MapHot NewsRSS FeedsContact Us
    Copyright © 2013 Apple Inc. All rights reserved.
    Terms of UsePrivacy PolicyUse of Cookies United States (English)

    The security code is the 3 or 4 digit code on your credit card : http://support.apple.com/kb/HT3541
    If it's a debit card that you are trying to use then I don't think that they are still accepted as a valid payment method - they are not listed on this page and there have been a number of posts recently about them being declined
    If it's a credit card then is it registered to exactly the same name and address (including format and spacing etc) that you have on your iTunes account, it was issued by a bank in your country and you are currently in that country ? If it is then you could check with the card issuer to see if it's them that are declining it, and if not then try contacting iTunes support and see if they know why it's being declined : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page

  • HT1918 What is the security code I can't access

    What is security code in payment information? Before i can access my account but now it needs security code before I can purchase.

    It usually refers to the 3 or 4 digit code on your credit card, which is quite often on the back of the card on the signature strip, though on some cards it's on the front : credit card security code.

  • I have my ID and password but can not remmember the security answers  What can I do ??

    I have my ID and password but can not remmember the security answers  What can I do ??

    Security Questions and Rescue Mail
    There are various ways to resolve this matter, amongst them are ...
    An email to … Apple - Support - iTunes Store - Contact Us.
    Or
    you can follow instructions here … Rescue email address and how to reset Apple ID security question
    Or
    you could call your national Apple support number and ask for Customer Service or their Security section.  The phone numbers are here … Contact Apple support.

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What are the security risks for opening port 80 on workstations?

    Hello all,
    in our environment, there is an application which open port 80 on workstations when installed, but it is not allowed on preimeter FW
    could you please advise what are the security risks for leaving port 80 opened on the workstations? or it is considered secure unless it is not allowed on the preimeter FW?
    thanks alot & regards

    Hi R.Naguib.
    The 80 port is open by default through the firewall on Windows system, it is used by a http protocol by a browser.
    As for the network or hardware Firewall settings, I suggest to turn to the network administrator for details.
    Regards
    Wade Liu
    TechNet Community Support

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • WHAT IS THE SECURITY CODE I'M LOST

    what is the security code i'm really lost

    Secret code for what?  Do you mean forgotten passcode?  If so you need to restore with the computer and iTunes you used to back it up, so the restore will remove the passcode.

  • What is the security slot?  What is it for?

    What is the security slot?  What is it for?

    Primarily for a retail store or business to anchor the device using a locking mechanism....so the AirPort won't fly away.

  • What are the security post refresh procedures in general?

    Hi,
    Can anyone list me out What are the security post refresh procedures in general?
    Thanks and Regards,
    Damanaidu J

    >
    Damanaidu jawaharlal wrote:
    > Hi,
    >
    > Can you cite with respect to CUA.
    >
    > Thanks and Regards,
    > Damanaidu J
    CUA
    ====
    CUA behaves differently during a system/client copy and this is the approach we took and it was successful.  The goal is to take a backup of the source before CUA deletion then restore. Do not delete CUA and just attempt to rebuild it, all the roles will be gone.  Backup and restore will be the approach I recommend.
    a1.  Take a snap shot of your QA user and role assignments before copy.
    1.  (Basis) First make a backup of the source system.  This is important before step 2.
    2.  After successful backup delete the CUA from the source system. 
    3.  After successful copy to target system, restore backup to source system.
    4.  Depending how the copy was done, users and passwords should be in the target system but all the role assignments will be gone. 
    5.  Start assigning roles base on your requirements.  If you need to restore the old QA settings that is captured in a1.
    Perhaps others can add in other steps I might have missed.
    Good Luck!

  • HT1620 What is the security code?

    What is the security code to install the latest iPhone update?

    The iOS upgrade is seeking whatever code you use to unlock your iPhone or iPad device; your device passcode or PIN or password you're using to secure your device.
    This to avoid somebody random poking buttons and unexpectedly upgrading your temporarily-unlocked device.
    If you've forgotten the PIN or password that you had originally configured to unlock your phone, there is a reset sequence.

  • What is the security code

    Can someone tell me what is the security code asked for on Apple TV pror to renting movies. Thanks

    This is a link to the Wikipedia Page that tells you where the code is located.
    http://en.wikipedia.org/wiki/Card_Verification_Value
    You can also get this info on the Payment Page by hovering your mouse cursor over the blue and white question mark in the Payment section.
    I hope this helps?

  • TS1424 What is the security code on billing account?

    What is the security code on billing account?

    See this Discussion...
    https://discussions.apple.com/message/18877777#18877777
    From the  More Like This  on the right.

Maybe you are looking for

  • Looking to buy MacBook Pro or iMac-but which?

    I currently have a MacBook, which I bought Feb 2010-- have since added/replaced RAM with generic 2x2GB (so now 4GB ram v. 2GB),-- 2.26GHz Duo Core 350GB drive. I do LOTS of scrapbooks and movie stuff (have even considered making it more than just a h

  • How to add image as radio button label instead of text

    In a pure AS3 project, is there a way to add use an image placed in the library/ Flex/AIR SDK compiler path instead of text as a radio button label? I've tried substituting character may unicode like: rb1.label = String.fromCharCode("0x2592"); But ho

  • Error message when I setup any application

    hello everyone . i am new with blackberry and i tryied many time to setup any app by connect blackberry to my computer and i always find this error message App World Web Plugin Error An error has occurred communicating with the BlackBerry App World W

  • What is the other space on macbook pro?

    I keep getting a notification saying that my startup disk is almost full. I checked storage and it has over 273GB worth of "other" memory storage. I rarely download movies, or music. I've erased all my documents that I don't use. What could be this h

  • Color calibrate on two VDU's after lion upgrade

    Hi, I have just upgraded my Mac Pro from Snow Lepeord to Lion. All seems to have gone well after the 33min upgrade process completed. Just noticed that my two identical BenQ HDMI attached monitors are showing different colours (colors) / apprearance.