HT5622 I never set up icloud and my ipad has been stolen is there any way i can find it still?

I never set up icloud on my ipad and it has been stolen is there any way i can still track it without it being turned on the device?

Nope.
What To Do If Your iDevice or Computer Is Lost Or Stolen
iPhone, iPod Touch, and iPad
If you activated Find My Phone before it was lost or stolen, you can track it only if Wi-Fi is enabled on the device. What you cannot do is track your device using a serial number or other identifying number. You cannot expect Apple or anyone else to find your device for you. You cannot recover your loss unless you insure your device for such loss. It is not covered by your warranty.
If your iPhone, iPod, iPod Touch, or iPad is lost or stolen what do you do? There are things you should have done in advance - before you lost it or it was stolen - and some things to do after the fact. Here are some suggestions:
This link, Re: Help! I misplaced / lost my iPhone 5 today morning in delta Chelsea hotel downtown an I am not able to track it. Please help!, has some good advice regarding your options when your iDevice is lost or stolen.
  1. Reporting a lost or stolen Apple product
  2. Find my lost iPod Touch
  3. AT&T. Sprint, and Verizon can block stolen phones/tablets
  4. What-To-Do-When-Iphone-Is-Stolen
  5. iCloud- Use Lost Mode
  6. What to do if your iOS device is lost or stolen
  7. 6 Ways to Track and Recover Your Lost/Stolen iPhone
  8. Find My iPhone
  9. Report Stolen iPad | Stolen Lost Found Online
It pays to be proactive by following the advice on using Find My Phone before you lose your device:
  1. Find My iPhone
  2. Setup your iDevice on iCloud
  3. OS X Lion/Mountain Lion- About Find My Mac
  4. How To Set Up Free Find Your iPhone (Even on Unsupported Devices)
Mac Computer
       Find My Mac can be used from Find My Phone at iCloud.com and via Find
       My Phone on your iDevice.
      The following is third-party anti-theft software:
           1.  STEM 2.1
           2.  MacPhoneHome 3.5
           3.  MacTrack 7.5.0
           4.  VUWER 1.7
           5.  Sneaky Bastar* 0.2.0
           6.  Undercover 5.1.1
           7.  LoJack for Laptops
           8. Hidden 2.0
           9. Prey 0.6.2

Similar Messages

Maybe you are looking for

  • Quiery for Financial Period

    Hi All I have some doubts which my client encountered. pls give your valauble suggestions on this. We have just closed our Dec08 a/c. Normally, we have to perform balance carry forward  and carry forward customer vendor balance before we start the 20

  • HREAP and Remote Office VLAN

    We have a corporate office which we have a 5508 WLC and 2 WiSMs (v7.0.116) and WCS (v7.0.172) and rolling out remote offices which will have 2 or 3 APs (1142N).  I setup the first remote office with wireless using HREAP and its working well. Configur

  • Dynamic WSDL address

    I have some web services being consumed by a flex app. The services were interfaced with using the Service wizard in Flash Builder. For different instances of the application I want to be able to point them to different end points. The problem being

  • Creating Authorization on queries, infocubes

    Hi All, Can any one help me by providing step by step procedure in creating authorization on queries, infocubes, infoarea etc. Thanks, Satya.

  • I installed adobe reader x but not every PDF downloads. Help. Have dell vista 64 bit and use interne

    Have downloaded adobe reader x but not all PDF docs download, particularly NYC forms Help I use internet explorer and have dell vista 64 bit Thanks