My laptop was stolen and the only copy of the songs I own is on my ipod

with a fresh install of Itunes, do I just sync them back to my new computer?

There are a number of third party utilities that you can use to retrieve the files from your iPod, this is just a selection. Have a look at the web pages and documentation for these, they are generally quite straightforward.
iPod Access Mac and Windows Versions
YamiPod Mac and Windows Versions
PodUtil Mac and Windows Versions
iPodCopy Mac and Windows Versions
PodPlayer Windows Only
iGadget Windows Only
There is also a manual method of accessing the iPod's hard drive on Windows posted in this thread: MacMuse - iPod to iTunes
This message stolen from Zevoneer

Similar Messages

Maybe you are looking for

  • Apex ORA-07445 using db links

    Have installed apex OK and working well. When using forms based on source from database links regularly crashes with the above exception. Please see fragments of trace and alert_xe.log. Current SQL is always COMMIT Any suggestions would be great. Tha

  • SQL Loader Truncate and SQL TRUNCATE difference

    Could any one let me know what is difference between truncate used by control file of the SQL Loader and TRUNCATE command used by SQL? Is there any impact or difference of these both over the data files. Thanks

  • Abstract Class Problem

    HI, I have 4 classes and the hierarchy of those classes is as follows: DBCachedRecord | ServiceHeader | ServiceHeader22, ServiceHeader25 I made ServiceHeader abstract and ServiceHeader22 and ServiceHeader25 need to call constructors of DBCachedRecord

  • TRIM Support for AMD sb850

    Hi all, I've just bought an OCZ Octane 128GB SSD, formatted nad created an ext4 partition to host my root filesystem. When I try to enable TRIM support for root filesystem (putting the discard in mount options) I get the following errors in dmesg fai

  • Monitoring IP ISDN  status on main routers

    Dear all I would need to test the ISDN (backup) connection of peripheral routers (Cisco) to their respective main routers on a regular basis. At present this is done manually. That is the operator gets on the peripheral router through its loopback IP