Is it legal to hack

Is it legal to hack nokia mobile to get root access and also modding the original firmware for getting more speed and ram legal????
Please reply I want to show some websites that things they are doing are not legal.....
It is just nokia who is not saying anything to them...
Plz make me true...

Sure there are "jailbreaks" for Symbian but the Q is whether there is any point.
It is not like the Iphone/Ipad which, for any serious user, screams out to be jailbroken because even trivia like adding ringtones are convoluted, requiring several steps followed by using that virus called Itunes whose functionality is impenetrable and which is quite capable of deleting stuff from your phone if you do a sync with a PC which has been synced to a different Iphone (etc etc etc). Then you can use Iphone Explorer to fully explore the device, and avoid Itunes altogether.
With a Symbian phone, having root access would basically allow you to copy across paid-for apps, which in most cases you don't need to do because you can download paid-for (Nokia shop) apps to more than one phone anyway. You don't need to jailbreak a Symbian phone to get access to all data directories (folders), to copy media files to and from, etc. On an Iphone you cannot do this - except in a very restricted manner - unless you jailbreak.
What I would like is to be able to TOTALLY back up my phone (apps and all) so I could simply restore to a newly bought phone if I lost mine. This is not possible and never will be unless Nokia adopt the Apple IOS auto-update model which is not going to happen (for Symbian). Also, any implementation of such a "total backup" would involve a massive tightening up of the whole thing, Apple-DRM-style, which would be a backward step. But with a jailbreak you can do exactly that - a total backup. Except, that is, if you have any apps which are IMEI-locked... like some I had on the E51 and they got orphaned once the company went bust.

Similar Messages

  • How can I delete latest update and go back to old one

    I have had nothing but trouble with the new update to 3.1.3 and want it OFF my phone. I want to delete it and just go back to business as usual. Does any one know how to do it? I was told that if I just do a restore, it will reinstall the latest version of OS any way. I hate the new mess I have with latest update.
    HELP!!!

    Irchr wrote:
    sorry, but it just looked like this last update was not ready to release and has caused so much trouble that Apple would have a fix or allow us to revert to previous level.
    You are probably not well enough informed to decide whether an upgrade is 'ready to release'. Remember there are millions of iPhones upgraded and only a very small minority with issues - many of which pre-existed 3.1.3
    I haven't had phone for very long now, but it is very frustrating to have a defective OS and phone. I would have thought this would be the place to do things LEGALLY, not hack the phone like I see on GOOGLE
    Hacking the phone is the only way to revert unless you have backups. Hacking the phone is not something that is discussed in these forums.
    You haven't even posted your problems so perhaps start there ?

  • Mac was hacked on local network by roommate-how to re-install my files w/o reistalling command/terminal hack codes?

    I have a Mac Book Pro running latest version on Mountian Lion
    Processor  2.3 GHz Intel Core i7
    Graphics  Intel HD Graphics 4000 512 MB
    Memory  8 GB 1600 MHz DDR3
    Software  OS X 10.8.3 (12D78)
    My roommate hacked my Mac. I assume he did this via an old Mac he use to have access to, & then made changes via his PC & his Android phone (can tell by comparing Terminal to Access & Little Snitch) & since the codes I found all were as my User name & as Root Access... Thinking he started gaining access through the weak spot via Reboot Disk & Terminal access from there-though he denys it completely... (But I printed it all out) He accessed ALL my passwords & at the time I didn't know that as I kept trying to change things & lock things up... he was getting hidden files of EVERYTHING I WAS DOING & had remote access to my system, anything I did & camera on my mac.
    He hid files with sudo codes in Terminal & had constant any access via remote access, booting, starting or turning off as well as secretly deleting any files or notactions he wanted. He was ghost. 
    So now not only did he has complete access to my computer & camera... He would enter my room & take what he wants & then access my computer to delete EvoCam files/videos/pics.
    He also has been tracking everything I do on my computer and assume he has figured out how to hack my phone by now as well.
    He will be an EX-ROOMMATE as soon as I can legally get him out. But until then I am stuck. (Buying locks for all 3 of my bedroom & closet room access doors too!)
    I currently have him blocked off the local network & internet. But that won't last long.
    I jcopied over to my external hard drive all my important info, pics, files and just deleted the rest.
    It took many hours to get my mac to actually delete everything (I HOPE) & then finally let me re-load Mountain Lion. Now I am slowly adding back programs. I think he was also using the Windows interface & some Windows program to sneak past my firewall & all the stops I put up to block him off local.net.
    Changed ALL my passwords again-already. Hopefully by zeroing out my hard drive numerous times that it deleted his lines of codes.
    Tested in Terminal some of the lines of codes he used (Just lsof & ls -a, history, etc)
    SOOO MY QUESTIONS ARE:
    Is there a way to let him use the network without him being able to access my Mac??
    I have ALL ways I can find to turn off any file sharing, local or remote access... but I did that last time & he figured out a way around it!
    My Nework is on a NETGEAR Range Max N wireless router. I configured it this time via Ethernet instead of by Wireless-made my Mac only machine to make changes & only via Ethernet access. (Gave Ethernet & Wireless each their own IP address.)
    I also turned off the remote access again, locked in IP addresses to specific machines/phones/Pads... IE 192.168.1.2... on Router.
    I also installed Little Snitch, Have Tech Tools 6... Need a good virus protection... (did find some crap only in a couple of my emails when I used one I downloaded as a trial before the re-format... )
    Worried about installing Windows again.
    How do I block him from getting root access again?
    How do I keep him from hidding any codes?
    Thank you in advance for your help & suggestions!

    Well when he hacked it.. he took control of root & istalled a couple of programs from what I could tell-unforchantly don't have print outs of that.
    He added ARDAgent,  .user.sbin/aonotifyd lsoscript -e 'tell app ARDAgent diskutil list pdisk ls root ls local.com sudo ~/ .bsh.profile... was the part I started printing at...
    WHAT THE HECK IS: jbapps-
    then he went into mdworker, then added private screensharing.agent.launchd,
    then private event
    then private mdsDirectory.db
    then private messages mdsDirectory & se_SecurityMessages, & Private screensharing agent
    then accessed root access & got a list of every password that I had & used...
    Then installed Microsoft office \2011\Office\uniscribe.framework\Versions\12\Uniscribe
    the WLMUser.framework then accessed atcp:8254
    then core tools
    the path/to/file.txt
    then netbiosd
    then networksetup
    then newsyslog
    the defaults write com.apple.finder AppleShowAllFiles TRUE
    RSA_SecurID_getpasswd
    NetBootClientStatus
    diskmanagementd
    aosnotifyd
    asr
    automount
    avbdeviced
    PasswordService
    pboard
    ocspd
    ntptrace
    postalias
    pwd_mkdb
    racoon
    sercurityd
    slapd
    snmetadump
    systemkeychain
    systemsetup
    tcpdump
    universalaccessd
    autopen
    bootpd
    Microsoft SyncServicesAgent
    Code Signature & Resources
    osascript]remote management
    lastdate
    USER_IS_ADMIN=ADMIN
    hostname & domainname
    NetAuthAgent.app/Content?MacOS
    chflag hidden /mach_kernal
    sudo password root
    man sudo list
    finger lst User EventAgent launch User Event Plugins...
    and on & on & on...
    He got drunk...really drunk one night & told me that he saw something in my room... and then I found he had hidden the Facetime camera & an account had been setup which I never set up...
    A couple of programs got installed that I never install too. Plus when I went to reinstall my Mac there were four choices listed of places I could "istall Mountain Lion" to. One listd was my thumb drive-duh,, one was the hard drive, one was a PC Windows Drive??? the other was the partioned Reinstall part that Lion put on...
    Yeahhh... going to have to put the locks on all 3 doors.. the router is in my room as well as the old Mac & the cable modem. But the internet cable runs through his room to get to mine....
    I just have to get him out as soon as I can without cleaning me out first & setting it back up to where he has access to my machine or my phone.
    I wonder if he has hacked my phone... is there a way to tell?

  • Is it possible to get hacked by pressing on a link in a email that i got and am pretty sure was a hacker?

    got an email from what looked like it was pay pal telling me that my payment to such and such has gone thru only prob was i didn't buy anything .. so i clicked on the item description to see what it was thinking maybe my husband got something... turns out he hasn't so i checked my pay pal a/c which seems to be fine .. no such invoice exists... so my question is ... did i open myself to a hacker by opening the link ??? how can i check my iMac ??
    thanks

    Your iMac is pretty safe from Apple's Security as the experts here will tell you. However it is possible to get malware etc. but very unlikely. I have got similar e-mails from pay pal, UPS, Credit cards ( even got one from ez-paid tolls) etc. Be sure to never give them any personal information. Don't click on any attachment or open the emails for 100% security from these so call legal outfits. Always go direct to pay pal or others web site and sign in to check your account. These things are usually phishing for personal info and will not affect your iMac. If you had a Windows Machine you may very well get something from virus to malware. Of course we could all have troubles from the this stuff but your iMac is very safe. I have never gotten anything.

  • MacKeeper seems to be the biggest threat to Mac users. How is MacKeeper legally allowed to exist. How can we get rid of it?

    At least once a day I get a MacKeeper Pop-up that won's allow me to continue browsing unless I click close the MacKeeper page. Once I do that, a second window pops up that I need to verify that I want to leave the page. I cannot continue using safari unless I click this other window, which I am too worried to do, so I just quit safari, but this window is so intrusive, it stays open even after safari is closed! How is that even allowed to happen and how is that legal. I then have to force quit Safari and restart it. Then if I am looking to buy or download software, half the time the link to the software or the download icon is fake and simply redirects you to  MacKeeper's home page, which again they won't allow you to leave. I have also been told that MacKeeper has planted writers in forums and bloggers and proffesional reviewers all over. Then I hear that the package MacKeeper offers is all software that is available elsewhere for free and it has just been renamed, and the rest of the software is inoperable. How is this company allowed to exist. How could their practices possibly be considered legal?
    Is there anything legitamate they offer?mWhat can be done about them???

    i guess what i'm really asking is- has mackeeper compromised my computer? and how can i check?
    If you did not actually install MacKeeper, it can do nothing to your Mac. I'll assume that the only problems you're faced with have been the intrusive advertisements.
    First go to Safari's Preferences and block popup windows: Safari menu > Preferences > Security > select "Block popup windows".
    Then, make sure you don't have any Safari Extensions you don't want: Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Then, consider the possibility that your wireless router has been "hacked", a recent problem that has been growing in popularity:If the wireless router you are using is one that uses a web page for configuration, such as Linksys and Netgear products do, it is possible that its DNS settings have been maliciously tampered with. To fix it will require resetting your router using its hardware reset option, followed by configuring it again.
    When doing so, be sure to select the option to prevent setup over its WAN port. Different routers use different terminology for remote administration, so be sure to find the correct setting and disable that option. Use WPA / WPA2 encryption and a reasonably secure wireless network password.
    btw, it is not on pirate sights or xxx sites that i encounter mac keeper, but baseball blogs and stat sights, and the administrators DO say what you said they would... that they have a third party that pays them to do the advertisments. i know some of these guys personally, and none of them would allow this to happen if they could avoid it. they don't have the most traffic in the world, so they don't have the luxury of choosing where or how they get their revenue, they're just happy they can make a living.
    I understand that and I don't begrudge anyone legitimate means of earning a living. However, I strongly disagree with taking the easy way out, saying they have no control over the ads that appear on their site. Would they adopt that stance if their site hosted advertisements for child pørnography?
    Somewhere between that extreme (and illegal) example and having no advertisements whatsoever lies responsibility. Your friends should fire AdChoices or AdSense or whatever service is placing paid content on their web pages, and be abundantly clear about the reason. You don't see MacKeeper or CleanMyMac or similar ads for garbage products on many respectable websites. Unfortunately, they appear on enough of them to be the invasive problem it has become. Until enough site administrators stand up and say they're not willing to tolerate it, the scourge of garbage products will continue to result in lost time, money, irreplaceable data, or all three. MacKeeper alone has earned at least $18 million in revenue, by their own admission, and that was some time ago. If all that money does is to enrich one or two people, that's bad enough. How do they know the revenue is not being directed to fund more sinister purposes? How does anyone?
    What is the baseball site's URL? Post it here. I want to determine what cookies it drops on the system I'm using.

  • ~URGENT~ Hacked Skype Account ~URHENT~

    Hello, I am Micheal (poppopsea) on Mar 28, my account password was changed as seen here: http://prntscr.com/6xgzvf , I been trying to get the account back since. I have filled out the password recovery form about 20 times and each time I get an email for my ALT account "[Removed for privacy]" I am just about to lose my **bleep** Skype. I believe the same person/people who did this have just hacked my paypal and made payments on it to a fake email under my name. I contacted paypal support who proceeded to screw me over by saying there was no evidence considering the I.P. was private and the email the funds were trandfered to was under my name. These people have royally screwed me. They have stolen my skype, $756.57 from my paypal. And now you people are refusing to give me support. Support says they cant go off I.P. logs even though that should be proof enough that the password change was not me. I have contacted email support, live chat support, and neither have been able to help me. This is my last resort. If I cannot get my skype back I will take legal action, seeing as nothing was done towards a malicious attack. These people have completely **bleep**ed me over. I am sick of nothing being done about this. Help me out please. And I swear if I have to fill out that **bleep** password recovery forum one more time, I am going to go off.

    Sorry guys, I know it can be a bit unpleasant to fill out forms especially when time is of the essence in matters such as these. I can assure you that the Customner Support team which handles compromised accounts can help but are unable to without first getting all the information they need to proceed.
    The compromised account form is a bit different in that it would let the staff know there's an urgent issue and to lock the account at which point they would look into the account history and go from there. Before any of that can occur, they need to verify that the person filing the claim is the actual account holder and that the claim is an authentic one. If there's already a claim in progress, odds are they are already looking into things and is the best that can be done.
    I'm sorry for the delay as sometimes it takes time to process these things.

  • Changing identity of a legally purchesed used MacBook

    Hi folks.
    I have just returned to the Apple wprld after too many years in the Windows netherworlds. I am currently an English teacher in Bandung, West Java, Indonesia.
    I have purchased a used MacBook 2,1. It is running 10.4.11.
    It was a completely legal purchase with bill of sale. Unfortunately the original OS discs were damaged.
    I wish to change the name of the computer (when I bring up About this Mac and more info, the original owner’s name comes up.) Additionally, I’d like to change the registraton at Apple’s database.
    The OS and software are all working great so I am hesitant to reinstall everything and start from scratch. Can I change the identity entered on the original set up?
    Thanks for your tolerance if is a too frequently asked question.
    Bob White

    You should get a set of replacement install discs (Apple might replace the damaged ones for you for a small shipping fee), or a newer retail OS X install disc, and reinstall everything from scratch.
    When acquiring as used Mac, there's no way of knowing what kind of hacks, security holes, malware, pirated software, or any other junk that may have been left on it by any previous owners. That's why it is very important to wipe a used Mac clean and reinstall everything from scratch before using it. Otherwise you are taking a very high security risk. I wouldn't put any personal data on a used Mac, or even connect it to the internet, until a wipe and reinstall.

  • Email hacked, password reset and security details ...

    Hi All, just need some advice really.
    My primary email was hacked last week, and my password changed. I have taken all measures to try and regain control but have been unsuccesful. I have spoken to four different people today on the phone. First of all i was moved to a different department twice, thn I was told I had to speak with the security department as the security questions had the wrong answers! When I eventually got through,and after 30 minutes of being on the phone, I was told that I cannot be helped. I explained 5 times what the issue was and that I had been referred to this department becuas eof security question isssues, but that was not registered!!!
    i was then told to use the forgotten password option! As I had already said three times, I had tried this, but the answers had been changed! Thats why I was on the phone to sort this out. I was then told that my answers had been reste and to wait a little while. Five hours later I have come back to try and sort this out and I STIILL HAVE THE SAME ISSUE! I don't know what to do now, as the first time round took over an hour to try and get somewhere!!!!
    Can someone please refer me to someone who is actually going to LISTEN and help, rather than telling me that 'I can't help you madam'

    i am sorry to see that someone else is having this sort of problem
    the security and customer help in India cannot be trusted,
    they actually allowed somebody to have access to my e-mail and account details
    then despite my objections allowed someone to stop my phone calls and
    send them to a mycander mobile phone (ending238)
    then all sorts of pain followed.
    THE ONLY SOLUTIONS IS TO WRITE TO THE DIRECTORS OF BT AND SEEK HELP FROM THE CHAIRMANS
    SUPPORT TEAM. TRY SUE HALPIN. I THREATENED LEGAL ACTION AND WOULD/MAY CARRY OUT THAT THREAT.
    even she was confused and disturbed by the trouble she had getting things put right, is it to simple,
    get a new primary e-mail and anew logon to bt.com (your account)
    change your passwords and security questions, do not use the same for both
    all that fus about including a number or a capital is rubbish but you are t a degree stuck wth a number
    use something like 25sausagecaravanaxe. at least 14 letters no linking of the words like carrotsaladwatercress1
    just pure rubbish
    if you want the names and personal postboxes of the directors at newgate st london let me know
    i have had 2 months of pure pain and distress, keep in mind when speeking to some call centres
    you cannot educate pork, never give them admin rights and remote access.
    or beleive the latest from India   its all caused by Iphones and Ipads
    best of

  • Hacker issues/restore to be rid.

    Please excuse the fact that I dare say this is a repeat of another discussion. I have trawled and couldn't find what I needed. Please also excuse my ignorance in the matter to follow.
    I own a Mac Book Pro, iPad 2, iPhone 4s, 2 Sony Vaios and Compaq PC. I recently obtained through no desire of my own, a stalker/imposter/hacker. He hacked my Pc and Vaios, and that was dealt with (we found a keylogger and a virus that allowed the hacker to monitor my screen as I did). However, I was told that my Mac would be safe. It turns out, it's not. I was using my Mac to update my passwords, and found that my hacker instantly had access to my accounts again. I was told that I obviously have a keylogger on my Mac. Also, my camera and capture image keeps being used without my input. I went to my local Apple shop, only to be told the best way to deal with it all was to wipe and restore the machine.
    That's great, however I have a few issues with that. 1.. I need to find what exactly is on the machine, so I can keep a record for legal process I will initate once I have found said hacker (I have to issue court orders to social networking sites to obtain his IP - despite him trying to hide it on sites that I work on) I have no idea on what is best for Macs to find such things as keyloggers, as I was always led to believe that most anti-virsus don't pick them up.
    2. I have absoutely no idea on how to back up my itunes to my external hard drive, because every time I try too, I get a symbol stating I cannot! And finally, 3.. I have no idea on how to restore my laptop.
    I really am at a loss of what to do. Can anyone help, please?

    There have been conflicting reports on how iOS 8 works on the 4S. You can try getting rid of other by removing all content from your phone and by removing your music, etc. through a sync. Then sync that content back. A lot of other comes from problems with music syncing, issues with a lot of mail in an account, and data that does not fit in regular categories. However, the best method to clean the device the best you can is to restore.
    The way to get rid of "other" is not to update, it is to restore. However, if you restore and are not using the latest iOS for your device, then you will be updating, yes.

  • Where do I report an attempt  to hack my iTunes account via e-mail

    Just got an e-mail pretending to be from iTunes  saying my account has been suspended due to multiple failed attempts to access my account and to reactivate it I must go on line via a link. I thought this a little strange so I visited iTunes on my phone and bought a song , my account has not been suspended . Just wanted to know where to report this attempt to get my information / hack my account  and alert others to it .

    That is a Phishing attempt. Nothing to do with hacking at all.
    You can report Phishing attempts and submit the phishing email in question to: [email protected]
    https://www.apple.com/legal/more-resources/phishing/

  • Can I determine the IP of someone who has hacked into my wireless DSL?

    I had all my PCs shut down/unplugged recently to move them but noticed the wireless light on my Actiontec was still lit/flashing.  Could this be due to someone hacking into my DSL?  I removed the antenna and it stopped.  Replaced the antenna and it started again.  I have a password on the wireless part but I understand software is out there which allows someone to determine the password.  I have not changed the password yet until I ascertain if there is any way to determine the IP of the hacker.  Or will any records just show MY IP no matter who connects?  I am concerned with someone downloading illegal material or posting messages which will come back to my IP address.
    Should I report this to Verizon now in case some legal difficulty should come my way in the future?
    I'm not very smart on this stuff so please bear with me.  Thanks...

      The IP address in this case will be absolutely useless. Because he came in through your wireless access point, he will be assigned an IP address in the 192.168.1.x range. These are non-routable IP addresses, and just about router in the world assigns connected users an IP in that range. So it is absolutely useless.
    You may be able to obtain the MAC address from the Wireless router log/statistics, at least that is likely to be unique, but it doesn't tell you where or who the hacker is.
    As the other poster suggested, lock down your wireless network. WEP is probably the easiest to use, and will certainly deter the average hacker. MAC filtering also usually works well because very few users understand how to change the MAC address through software. Basically MAC filtering only allows the MAC addresses on your list to utilize the network. WPA may or may not be available on wireless access point. It is more secure than WEP, but probably exacts a small performance price.

  • Getting legal with Lightroom 4...

    I found out the software (Lightroom 4) that I have been using on my PC was installed by my son illegally from a bootleg copy he downloaded.  I just bought Lightroom 4 from Amazon.com this weekend and received it yesteday so that I can have a legal version.  I am not quite sure how to proceed though.  If I delete the bootleg copy and then install the new legal copy, I believe it should be straightforward to import my catalogues.  And I have all my images backed up.  However, I also have a SmugMug Pro account that I am using your "Publish Service" to connect to.  Are there any actions I should take to keep that service intact during the delete and install process?
    Thank you so very much!
    John

    With many bootlegs, what you have is authentic software with in authentic licensing. In this case, you likely have a regular version of Lightroom with a fake serial number. Some bootlegs are hacked so they don't need a serial number. So the best bet is to uninstall the bootleg and reinstall a legitmate version. The new install should automatically continue to work with your same catalog, images, and even your SmugMug account. The use of the SmugMug publish service is not tied to your serial number or lightroom really in any way. Instead, when you authenticate your account, basically a cookie is added to your system that Lightroom accesses. If there is an issue, simply remove the authentication and re-authenticate.

  • Anyone know of (legal) shareware to convert FLAC files to iTunes format?

    I have a lot of FLAC files which I wish to load into my ATV, but would not like to pay for the conversion software. Is there any LEGAL freeware that anyone is aware of that can do this conversion? I do not want to get involved in any hack software, though....

    canadianbluespower wrote:
    I have a lot of FLAC files which I wish to load into my ATV, but would not like to pay for the conversion software. Is there any LEGAL freeware that anyone is aware of that can do this conversion? I do not want to get involved in any hack software, though....
    In this case the shoe is firmly on the other foot, the Mac has an embarrassment of riches in terms of free tools to convert to/from FLAC and Apple Lossless, these include XLD, xAct, Max, and more.
    On the Windows side, I would agree with the recommendation to use WinAmp to convert from FLAC to WAV, and then use iTunes to convert from WAV to Apple Lossless. Unfortunately you are likely to need to re-tag the tracks since WAV effectively does not support meta-tags.
    The above is a completely free solution. Another approach which should be easier and more efficient is to use dbPowerAmp and addons. However while you can use the trial version, it strictly speaking is a commercial application. See this page for a good summary http://hddaudio.net/?p=343
    PS. You could always get a Mac

  • Preventing large-scale data hacks

    Just thinking about the Anthem data hack in the database context, in all the workload groups and resource groups and query governor variables, there's no setting on the database or account or connection level to throttle the total rows returned, is there?
    I guess an administrator-level password can always reset stuff, and audits can watch a lot of things, and someone can always remove a disk drive and run away with it, but right now even user-level, read-only logins can dump whole 80m row tables and joins.
    Would it make sense to parameterize legal output row counts?  Either put a hard limit on result sets, or a soft limit via increasing time delays for larger counts, etc?  And I mean at the database level, most apps are already built with something
    like these kinds of governors built-in.
    Thanks,
    Josh

    But it's a basic principle of security that it can always be beaten, what you do is make it more costly.  A single query and download that can be done in five minutes is different from needing to sit there for hours, and the hours provide time for
    monitors to see and alert operations.
    If there is anything hackers have plenty on their hands, it's time.
    The idea could possibly be useful if you want to avoid excessive resource consumption from a stupid user. But for stealing data worth billions of dollars? I think most people can accept a little overtime to make that fortune.
    Erland Sommarskog, SQL Server MVP, [email protected]

  • Is it legal to unlock an ipad with icloud lock

    I bought this iPad Air 16GB but it has an iCloud lock, I know a shop where the can unlock it but my question is:
    Is it legal to unlock it then use it as a new iPad?
    If not I might sell it as parts or spares.
    Thanks for looking and answering

    Note also that though hacking the iPad may be legal (though it depends on the laws in your country), and assuming that the shop can do what they claim - I've not seen anyone successfully remove the Activation Lock- it's quite possible that if you can't get the previous owner to remove the lock for you that the iPad has been stolen, and just the possession of stolen property is illegal in many countries.

Maybe you are looking for

  • Message- Print No pages from the document were selected to be printed

    I have had this application for some time, simply never used it.  Last night I tried converting a PDF file to word, unsuccessfully, I might add. Today, whilst printing a page, my printing settings appear to have been reset because when I selected Pri

  • Single line item for multiple open items in app

    we have three open items   to vendor x  100001000010000 But we are paying to vendor only 10000100005000 At the time of entry system showing Vendor account 25000              To    Bank account       20000              To    Bank account         5000(

  • Ink cartridges life span in Photosmart Pro B8850

    I have an HP Photosmart Pro B8850 Printer that we bought so I could print high quality pictures and also on 12x12 cardstock for scrapbooking.  We don't use our printer very often (maybe once a month), however the ink cartridges seem to run out really

  • You already have a schema opened on this file with another name: abc

    I am trying to create a model for an XML file, when I clicked on "Objects to Reverse" checkbox under "Selective Reverse" tab, I am getting the following error: java.sql.SQLException: You already have a schema opened on this file with another name: ab

  • Alignment issues

    I've been using iweb to build my site and I want to have a custom-made navigation bar at the top of the page that stays in the same place on every page. The problem I've been running into is when I publish my site to a folder my navigation bar shifts