I need to lock my stolen i pad

i have my serial number and i need to lock it i dont want it to be used again is there any way i can do that  i have the serial number

Ony if you set it up for Find My iPad and successfully located it.
Otherwise, no.

Similar Messages

  • TS4006 i cloud wont let me in with my apple id i need to lock my stolen ipod

    i need help with freaking i cloud

    If you didnt know, The apple ID and the icloud ID are two different things. If you have already set up your ipod device with the icloud then the ID should start out with an address similiar to the apple ID but replaced with the key word [email protected] But if you havent created an icloud ID address then your apple ID adress should work instead. If not, make sure you put in your password correctly.
    I only know this because I tried this with my ipod and my husbands ipod. Unfortuantely, he lost his like for a week now. He didnt set his ipod up with icloud or the "Find my iphone app". So I signed into icloud with his regular apple id and password and I was able to set up a lock code on his ipod. It says that his ipod in now offline but when its online then the lock code will automatically show. Plus it even allow me to write a message to the ipod displaying that "This ipod is lost. If found please return it" They allow you to put your phone number for the founder to call.

  • HT201365 iPad has been stolen need to lock and erase content on ipad

    My iPad was stolen. I need to lock and erase content on my ipad

    Six years? Since the original iPad was released on April 3, 2010, which is less than four years in the past, your claim of six years is bogus.

  • HT5624 I have recently changed my screen lock on my I pad and have forgotten it , does anyone know how I can get into my I pad ?

    I have recently changed my screen lock on my I pad and have forgotten it , does anyone know how I can get into my I pad ?

    Locked Out, Forgot Lock or Restrictions Passcode, or Need to Restore Your Device
    1. iOS- Forgotten passcode or device disabled after entering wrong passcode
    2. iPhone, iPad, iPod touch: Wrong passcode results in red disabled screen
    3. Restoring iPod touch after forgotten passcode
    4. What to Do If You've Forgotten Your iPhone's Passcode
    5. iOS- Understanding passcodes
    6. iTunes 10 for Mac- Update and restore software on iPod, iPhone, or iPad
    Forgotten Restrictions Passcode Help
    You will need to restore your device as New to remove a Restrictions passcode. Go through the normal process to restore your device, but when you see the options to restore as New or from a backup, be sure to choose New.
    Also, see iTunes- Restoring iOS software.

  • We need application lock features on our phones!!!

    Why don't Verizon have application lock features on there new phones.  No not restriction, no not phone lock, no not keypad lock.  We need application lock which allows you to lock certain features and protecting your messages and pictures and contacts etc.....  we need to smash this forum down with complaints.

    rodney wrote:
    Please respond to this post we need it.  My phone got stolen and someone sent all my pic and messages to all my contacts and showed things that ruin me.  This can happen to you.  
    Most phones have a feature where you can require a number code (or on a touchscreen a swipe pattern) to be entered before you can do anything with the phone.
    On many smartphones, you can also get software that allows you to remotely lock and/or erase sensitive content when the phone is stolen.  Some software is free, and one such program is free for Android-based phones that are covered by Assurion, the insurance provider that Verizon partners with.
    There are also smartphone apps that allow you to have secret, password protected photo galleries, text messages, etc.
    Basically, these are features that are built into the phone or applications that you can load on the phone, so what you need to do is research your next phone purchase carefully and find one that has a security solution that meets your needs.

  • How come i can't remotely lock my stolen macbook air since last week?

    how come i can't remotely lock my stolen macbook air since last week?
    Is it possible for the thief to go arround this system?
    When it was stolen around the afternoon, i could only trie to locate it in the evening.
    They must have done already something to avoid the locate my iphone app, beceause it is
    already since 13th of june that it is trying to lock my mac, but it still didn't go online...
    Is there another way? can someone help me out?
    I would appreciate it a lot!!
    greetings,
    Fred.

    Hello:
    If you did not set it up like this beforehand, you cannot:
    http://support.apple.com/kb/TS4006
    Make a police report.
    Barry

  • Need for locking system for delta initialization (BW-R3-LO)

    Hello all,
    Could someone please help me with the following,
    Please be kind, don't get impatient for the lengthy post
    1. Do we need to lock the system (or posting-free the system) to do early delta initialization or not? If yes, please explain me how that work?
    2. Someone somewhere mentioned that early delta initialization is not preferable compared to normal delta initialization, even though early delta initialization is advantageous. Why is that so?
    3. Imagine, while scheduling Queued Delta Init or un-serialized V3 delta Init, if I choose certain end date and time (say, 10pm, 12-31-2007) for the records, then all the records till that point would be loaded to setup tables and all the records after that point of time will be moved to extraction queue or update tables. My question is, if this is true why would we ever need to lock the system during setup tables filling?
        If you say the records after that particular time and date (10pm, 12-31-2007) will not be collected in extraction queue and update tables, why don't we do the following
                 a). say, I do full load with end date and time (10pm 12-31-2007)
                 b). Next, I do delta init with start date and time (10pm 12-31-2007) (this time I lock the postings)
             If we do this way, we can actually reduce the down time of the system. Is my conclusion right?
             If you say it's not practicable as some transactions' saving time differs from time stamp and some transactions' delta is even measured by pointer.......if this is the case we can use Delta offset. What do you say about this?
    4. How this scenario differs to early delta initialization?
    Your responses would be greatly appreciated
    Thank you

    Hello,

    >
    curious maven wrote:
    > Do we need to lock the system (or posting-free the system) to do early delta initialization or not? If yes, please explain me how that work?
    No,you don't need to lock the Source System which is the advantage of Early Delta Init.
    With early delta initialization, you have the option of writing the data into the delta queue or into the delta tables for the application during the initialization request in the source system. This means that you are able to execute the initialization of the delta process (the init request), without having to stop the posting of data in the source system. The option of executing an early delta initialization is only available if the DataSource extractor called in the source system with this data request supports this.
    [Business Information Warehouse 3.0 Overview Presentation|https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/9a0e9990-0201-0010-629b-dc2735cb9c81]
    2
    >
    curious maven wrote:
    > 2. Someone somewhere mentioned that early delta initialization is not preferable compared to normal delta initialization, even though early delta initialization is advantageous. Why is that so?
    Early delta is not supported by all the extractors. See Lo Extraction
    3
    >
    curious maven wrote:
    Imagine, while scheduling Queued Delta Init or un-serialized V3 delta Init, if I choose certain end date and time (say, 10pm, 12-31-2007) for the records, then all the records till that point would be loaded to setup tables and all the records after that point of time will be moved to extraction queue or update tables. My question is, if this is true why would we ever need to lock the system during setup tables filling?
    >
    >     If you say the records after that particular time and date (10pm, 12-31-2007) will not be collected in extraction queue and update tables, why don't we do the following
    >            
    >              a). say, I do full load with end date and time (10pm 12-31-2007)
    >              b). Next, I do delta init with start date and time (10pm 12-31-2007) (this time I lock the postings)
    >
    >          If we do this way, we can actually reduce the down time of the system. Is my conclusion right?
    >
    >          If you say it's not practicable as some transactions' saving time differs from time stamp and some transactions' delta is even measured by pointer.......if this is the case we can use Delta offset. What do you say about this?
    This is applicable to Generic Delta where you can set the Safety Interval (Upper Limit and lower Limit) for the extractor based on ALE Pointer, or Time Stamp or Calendar day.
    If you excute a extractor with early delta init, during the setup table fill, the delta records will be directly written to the delta queue. The delta management handles these functionality.
    [How to Create Generic Delta|https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/84bf4d68-0601-0010-13b5-b062adbb3e33]
    [SAP BI Generic Extraction Using a Function Module|https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/a0f46157-e1c4-2910-27aa-e3f4a9c8df33]
    4
    >
    curious maven wrote:
    How this scenario differs to early delta initialization?
    If you do a Init without Early Delta init, then the user cannot post new documents and you have to either schedule in the weekend or request for a Source System downtime.
    But if you use Early delta , then you don't need the source system down time and the user can post new records during the init, which will be written to the delta queue directly.
    [How to Minimize Effects of Planned Downtime (NW7.0)|https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/901c5703-f197-2910-e290-a2851d1bf3bb]
    [How to Minimize Downtime for Delta Initialization (NW2004)|https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/5d51aa90-0201-0010-749e-d6b993c7a0d6]
    Thanks
    Chandran

  • Why does Livecycle Designer need to lock scripting on objects with children that are fragments??

    Can someone tell me why Livecycle need to lock scripting on objects with children that are fragments??
    I mean, just because I have a fragment (which you can't edit the script for), why does Livecycle need me to NOT edit say the initialise event on the Main form.
    Yes, I can remove my fragments, edit and reinsert.  Also if the event already has a script, I can edit the xml.  But neither of these are terribly convenient.
    Couldn't there be a better way?

    The purpose of the fragment is to create re-usable or standard components. In most cases the fragment is not created by the same person designing the form and they do not want the from designer to modify any part of the fragment (it is a separate XDP file). There may be code in that fragment that relies on the structure that exists. If you have the rights you can always edit the fragment and when your PDF is created the changes will be picked up.
    If you want to be able to modify the fragment while it is in Design mode sounds to me like you want to add a component to the object library. This will allow you to have a reusable piece of a form that you can modify on a form by form basis. To do this simply build the piece that you want. Lasso the entire form and drag it onto the Custom library. When you release it a dialog will pop up allowing you to name your component. Now on any form design you can drag your new component onto the canvas and all methods/properties and code will come with that component (allowing you to modify it for that form as you see fit).
    Note that you can create your own libraries to hold your components if you see fit. Also if you put your libraries on a shared drive, you can share components between Designers.
    Paul

  • Can we lock a stolen IPOD touch?

    can we lock a stolen IPOD touch from our other devices

    lost/stolen                                      
    No app on the iPod is required.                            
    - If you previously turned on FIndMyiPod on the iPod in Settings>iCloud and wifi is on and connected, on a computer browser go to iCloud: Find My iPhone, sign in and go to FIndMyiPhone. If the iPod has been restored it will never show up.
    - You can also wipe/erase the iPod and have the iPod play a sound via iCloud.
    - If not shown, then you will have to use the old fashioned way, like if you lost a wallet or purse.
    - Change the passwords for all accounts used on the iPod and report to police
    - There is no way to prevent someone from restoring the iPod (it erases it) using it unless you had iOS 7 on the device. With iOS 7, one has to enter the Apple ID and password to restore the device.
    - Apple will do nothing without a court order                                                        
    Reporting a lost or stolen Apple product                                               
    - iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number

  • Recommendation needed on: Locking Down BW Client / Object Changeability:

    Hello Experts,
    We recently had a problem on our production box and we found the need to lock down the environment with scc4.
    We further used object changeability to control the environment and it has been hell ever since. Users have had difficulties running queries, etc.
    In a typical BW production environment, what is the approach and what is the common practice?
    (Please for each recommended approach include any command you mention)
    For example, what transaction do we use to see various users and their authorizations, etc. Who made modification on which object, etc.
    Thanks.

    Hi Amanda,
    In SCC4, you should maintain following values.
    Under
    >Changes and transport for client specific objects
    no changes allowed
    under
    >Cross client object changes
    no changes to repository and cross client customizing 
    objects
    Under
    > Protection : Client copier and comparison tool
    Protection level 1: NO OVERWRITING
    Regards
    Sriram

  • TS4006 How do I lock my stolen iPod ?

    How do I disable or lock my stolen iPod!   I know who has is it, but they won't give it back so I want to some how make it unusable for now!

    If you have Find My iPhone enabled, and iCloud, you can log onto your iCloud account, open the Find My iPhone app, and lock if from there (if the iPod has an internet connection).
    If you do not have Find My iPhone set up, or if the iPod is not connected to the internet, there is nothing you can do short of reporting it to the police.
    Cheers,
    GB

  • What plugins, software do I need for Wacom STU-300 signature pad to sign pdf?

    What plugins, software do I need for Wacom STU-300 signature pad to sign a pdf?

    This isn't the correct forum for this topic, but I may be
    able to get you started...
    The licensing restrictions on gathering form data from PDFs
    is outlined in the EULA for Reader, I believe there is a limit of
    500 copies, but I could be wrong ... you should look at the EULA to
    be sure.
    Beyond that, try posting to the
    Acrobat
    Forums or contacting a sales rep at Adobe, they may be able to
    advise you further.

  • HT1420 I need to deauthorize a stolen ipod.  Will I need to deauthorize everything then re-establish the remaining devices again?

    I need to deauthorize a stolen ipod.  Will I need to deauthorize everything then re-establish the remaining devices again?

    Why would they care??
    Maybe to stop somebody from downloading a movie with a junk account, and distributing it on the net with the authorization information so it could be passed though thousands of computers in a week or two?
    And more to the point, why don’t they just give you a list of the computers and let me deauthorize the specific ones you need.
    Let's say I saw you log into your account, or just managed to hack your information somehow.  I could have all kinds of fun driving you crazy by deauthorizing your computer remotely, then you'd authorize it, and I'd deauthorize it again...  hence you can only deuthorize computers individually to which you have physical access.
    Note that it is in Apple's interest to make it as easy as possible for you to spend money buying things from them.  Likely it is the media companies who have told Apple that if they want to be able to sell their movies they have to use certain restrictions.

  • Can you guys lock my stolen iPod third generation touch

    How can lock my stolen iPod touch

    If you setup iCloud on it, you login at http://iCloud.com and lock it via the Find my iPhone icon.
    It will only work if the iPod is turned on, has an active Internet connection, and has not been restored.

  • Locked out of i-pad wi-fi

    I forgot my I-Pad Wi-Fi password, and now I'm locked out.  It will not connect to my wi-fi.  Please suggest how I can correct this issue. When it says to enter the password, it will not allow me to "join" the network.

    Hi If the ipad is on charge overnight you need to leave your Wifi on Ipad backs up to ICloud when on charge and it needs Wifi If you turn your Router of at night your service provider thinks theirs a fault So they reduce your speed. Cheers Brian

Maybe you are looking for

  • Can not refresh view data in STRUST

    I am using the JSP (STRUTS) for developing my App. I get a list of contact. In bellow it, I make a link for each contacts. When i view details of one contact. On click link below. My pages: listcontact.jsp contactdetails.jsp When i request a details

  • Adding days to a date object

    I am retreiving a date field from the database. i am retrieving that with getDate() method on the result set object. that is am retrieving as java.sql.Date object. on that date object i have to add 30 days and store it back in the database as a date

  • Manual For Indigo iBook

    Does anyone know how I might obtain a manual (online or physical) for an Indigo 366/iBook? The only original iBook manual I can find here is the one for the original blueberry and tangerine iBooks.

  • Balance sheet for different BDD

    Hi our organization is non profit organization,the requirement is consolidate balance sheet come at company level-A Business Development division-X BDD-Y BDD-Z these all BDDs and A use the same GL.For getting the balance sheet of these BDDs what kind

  • TRACE files path

    Hi, I have traced one program using st12 Tcode. I need to down load that trace file to my local syste. can anyone give the Trace files path. My SAP is working on AIX. Advace thanks Kishore