I paid my iphone and it still isn´t mine becouse i can´t use it the way i want, why ? for example i can´t do nothing without iTunes ?

I paid my iphone and it still isn´t mine becouse i can´t use it the way i want, why ? for example i can´t do nothing without iTunes ?
this is so stone age and android is so futristic compared to iphone since android can be use the way anyone wants and you can share or send anything to anyone with just using wi-fi direct or BT not to talk about free apps and music and video downloads :S so i have paid for my iphone but still it isn´t mine since im limited in a use of it

Let's try to explain this:
iPhones operate on iOS, which has the highest level of safeguards against malware.  There have been ZERO reported & confirmed cases of a non-jailbroken iOS device suffering from malware.
Android's operate on an OS that actually ALLOWS significant modifications to the system, which, by definition, allows malware to easily infiltrate the device.  Does it happen to all Android users?  No.  But percentage wise,it's basically infinitely more likely for an Android user to suffer from malware than an iOS user.
79 percent of all mobile device malware targets the Android platform.  That's means an Android is 113 times more likely than even a jailbroken iOS device to suffrer from malware.
http://www.v3.co.uk/v3-uk/news/2291561/android-malware-makes-up-79-percent-of-to tal-threats-warns-us-department-of-homeland-security
Apple iOS and "other" operating systems were both listed as being the victims of 0.7 percent of all mobile malware.
The low number of threats targeting Apple iOS, despite the popularity of its iPhone and iPad devices, is largely due to the closed security model. This model forces developers to sell their wares on Apple's official App Store, which closely vets all applications before allowing them into the marketplace.

Similar Messages

Maybe you are looking for

  • Please make this a good experiance for my first post on any board.  READ ME

    Hi all. Well first off, let me start by saying that my whole life I've owned PC's. And I'm not hacker Elliet. But I've gotten to know them pretty well. All the way from Windows 3.1 that came out a long time ago (more than 10 years ago) So after a whi

  • Limit displayed users when creating substitution role in Portal-UWL

    Hi all! We are trying to customize the UWL in our Portal (NW7, SPS12) the following way: When users define a substitution role, they shell only be allowed to see (and chose) certain users. Any ideas? We already tried to solve this using "companies" i

  • Problems between a WCS and a Location 2710.

    I have a Location 2710 that was being seen by the WCS. It worked fine for almost a day. But strangely it started to being not seen by the WCS. I tried to associate again the 2700 with the WCS but I received a message from the WCS: No response from Lo

  • CIC0 font smaller in ECC 6.0 version as compared to previous version

    Hi folks, we have upraded the system to ECC 6.0 and the size of certains fields in CIC0 screen (for e.g rate category) are smaller as compared in the previous version. i investigated both the system and was able to make out that there is no differenc

  • SQL Server 2014 New T-SQL Features

    I have seen the following new T-SQL features: 1. In-memory OLTP tables. 2. Inline specification of CLUSTERED and NONCLUSTERED indexes is now allowed for disk-based tables. 3. The SELECT - INTO statement is improved and can now operate in parallel. An