Password changed for security purposes

Hello,
My password has been changed for security purposes...however the email address that is linked to my account has been deleted (college account). They only way i can access my new changed password is for it being sent through email. How can i change the email address if i cant get into my account to change it? Make sense?
Any help would be appreciated!
Thanks,
Lauren

    Hello Lauren,
I know how important it is to be able to unlock your device with the correct password.  I want to ensure you’re able to do this.
Have been able to retrieve or reset your password?  If not, I’d like to provide you a link with support for Apple ID here:  http://bit.ly/aQs8MT  Let us know how this works out for you.
Thanks,
AnthonyTa_VZW
VZW Support
Follow us on Twitter @VZWSupport

Similar Messages

  • Is it better to set the admin account to other than myself on a new computer for security purposes?

    Hi all
    On a new computer is it better to set the admin account to other than myself for security purposes? I am sure that I read some years ago that this was the best route to go down. What I am suggesting is that I will still administer the account but not as myself the user in my own name and also will it have any ramifications further down the line.
    Will be using a new Macbook Pro running Lion (when it arrives)
    With thanks in advance for any help and advice on this issue
    Best regards
    Dingoh

    when you get a new mac and set up an account, that account is designated as the admin account automatically.  Creating a second user account without admin privileges is fine to do, if you are afraid that you might accidentally do something harmful that requires admin access.  Make sure it is a second user account and not a guest account, as with a guest account, everything during a session under a guest account gets deleted after the session ends.

  • The password changed for the network how do I change it on my appletv

    The password changed for the network how do I change it on my appletv

    I work in the maintenance facility at a school district and we have 3 flat screens in different areas all with Apple TV, the I.T department changed the way we log in to the wifi, we use a user name and password now. I have a user name and pass word that I can use for all 3 sets but not sure how to set it up. I could go to our I.T. guys but they are not Apple friendly guys. 

  • TS2446 Apple ID locked for security purposes

    Hi, my Apple ID said "locked for security reasons" so I went to the iforgot site and reset it. I went to sign in again and it STILL says "Locked for security purposes" any idea what I should do?

    Contact Apple for assistance by going to https://expresslane.apple.com, then click More Products and Services>Apple ID>Other Apple ID Topics>Apple ID account Security.

  • What range TCP/IP Port should be give to default or named instance of sql server for security purpose to sql server ?

    Hi
    i am following technet article for Configure SQL Server security for SharePoint 2013 environments
    https://technet.microsoft.com/en-us/library/ff607733?f=255&MSPPError=-2147217396
    i want to change default TCPIP port from 1433 to which ports to change is securable for sql server
    i mean in what range 
    for example can i change to 1500 or 2000 or 1450 etc .
    if i assign like these portnos it will not affect to other ports in windows server 2012?
    adil

    I agree with Erland. (Always a good idea.) Changing the port doesn't help much to prevent attacks. If you decide to do that see Configure a Server to Listen on a Specific TCP Port (SQL Server Configuration Manager)
    http://msdn.microsoft.com/library/ms177440.aspx. Note
    "When selecting a port number, consult
    http://www.iana.org/assignments/port-numbers for a list of port numbers that are assigned to specific applications."
    It's important that you pick a number that isn't used by some other application. 
    Rick Byham, Microsoft, SQL Server Books Online, Implies no warranty

  • How to monitor user password changes for users in a database.

    hi All,
    can someone please help me.
    I need to audit the user password changes in a database. Ive check the auditing but audit " alter user " doesnt audit the changes in password and ive also checked the select * from sys.user_history$; view but didnt find anything useful. So is there a way to trace who changed the password and when ?
    Thanks for the help.

    You need something along the lines of http://www.morganslibrary.org/reference/ddl_trigger.html
    or you need to disallow ALTER USER to everyone and write your own PL/SQL and instrument logging the changes.
    Sybrand Bakker
    Senior Oracle DBA

  • Mass password change for selective User id's ?

    Hi,
        Thanks to answer for my last question, really appreciated your help.
    My new question: 
    1.   If I create Mass User Id's by using SU10, pwd's are generated automatically. Is there a way to pick a pwd e.g  initpass for all ?
    2.   Is there any program available which can be used to reset pwd's for several User Id's as   initpass or something like that ?
    Please help. thnx in advance.
    Syd.

    You can also create an ABAP program which can be used to mass change users passwords.
    Here are the functions that will do what you need
    SUSR_GENERATE_PASSWORD - Generates a Password
    BAPI_USER_CHANGE - You can use this BAPI to change just the password of a user
    Here is an example of some abap code. There may be some syntax errors and possible other issues. I just typed this out and didnt check it. Hope this helps
    constants: con_comma TYPE c VALUE ','.
    data: it_tab TYPE filetable,
            gd_subrc TYPE i,
            v_filename_string TYPE string,
            p_npass like XU400-NEWCODE.
    DATA: BEGIN OF itab OCCURS 0,
              dLine(40) type c,
          END OF itab.
    DATA: begin of it_Users occurs 0,
              UserID like BAPIBNAME-BAPIBNAME,
              Password Like XUBCODE,
          end of it_Users.
    parameters: p_file like rlgrap-filename default 'c:\users.txt' LOWER CASE.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR p_file.
    *&                   FILE_OPEN_DIALOG METHOD                           *
        CALL METHOD cl_gui_frontend_services=>file_open_dialog
            EXPORTING
              window_title     = 'Select File'
              default_filename = '*.txt'
              multiselection   = ' '
            CHANGING
              file_table       = it_tab
              rc               = gd_subrc.
            LOOP AT it_tab INTO p_file.
            ENDLOOP.
            v_filename_string = p_file.
    START-OF-SELECTION.
    *&                   GUI_UPLOAD function                               *
       Upload file to internal table
          CALL FUNCTION 'GUI_UPLOAD'
            EXPORTING
              FILENAME                      = v_filename_string
              FILETYPE                      = 'ASC'
              HAS_FIELD_SEPARATOR           = 'X'
            TABLES
              DATA_TAB                      = ITAB
           EXCEPTIONS
             FILE_OPEN_ERROR               = 1
             FILE_READ_ERROR               = 2
             NO_BATCH                      = 3
             GUI_REFUSE_FILETRANSFER       = 4
             INVALID_TYPE                  = 5
             NO_AUTHORITY                  = 6
             UNKNOWN_ERROR                 = 7
             BAD_DATA_FORMAT               = 8
             HEADER_NOT_ALLOWED            = 9
             SEPARATOR_NOT_ALLOWED         = 10
             HEADER_TOO_LONG               = 11
             UNKNOWN_DP_ERROR              = 12
             ACCESS_DENIED                 = 13
             DP_OUT_OF_MEMORY              = 14
             DISK_FULL                     = 15
             DP_TIMEOUT                    = 16
             OTHERS                        = 17.
          IF SY-SUBRC <> 0.
           MESSAGE ID SY-MSGID TYPE SY-MSGTY NUMBER SY-MSGNO
                   WITH SY-MSGV1 SY-MSGV2 SY-MSGV3 SY-MSGV4.
          ENDIF.
    Loop through internal table and split the comma delimited file
      LOOP AT ITAB.
          SPLIT ITAB-dLINE AT con_comma INTO it_Users-UserID
                                           it_Users-Password.
          APPEND it_Users.
      ENDLOOP.
    LOOP AT it_Users.
         if it_users-Password is initial.
            CALL FUNCTION 'SUSR_GENERATE_PASSWORD'
                 IMPORTING
                     PASSWORD = p_npass
         endif.
         CALL FUNCTION 'BAPI_USER_CHANGE'
                   EXPORTING
                     USERNAME                = it_users-userid
                     PASSWORD                = p_npass
                     PASSWORDX               = 'X'
                   TABLES
                     RETURN                  = it_ret2.
                  Loop at it_ret2.
                    if it_ret2-number = 039.
                      write: / 'password changed'.
                    else.
                      write: / it_ret2-message.
                    endif.
                  endloop.
                  Write: / ''.
                  refresh it_ret2.
    ENDLOOP.

  • Can Photoshop Elements 13 and Premier Elements 13 be installed/configured/patched standalone for security purposes (not linked to cloud, mobile, Microsoft, Adobe, etc)?

    We have installed a trial version of Photoshop Elements and plan to do so for Premier Elements. However, for security reasons, it is of no use to us unless we can install and use it standalone (not linked to cloud, mobile, Microsoft, Adobe, etc.). Can Photoshop Elements 13 and Premier Elements 13 be installed/configured/patched standalone as described above? If so, what do we need to do regarding installation/configuration/patching to test this?  Thanks in advance.

    Hi,
    Can you please share the logs?
    You can use the Adobe  Log Collector tool (Log Collector Tool) and share the corresponding zip file @ [email protected]
    Thanks,
    Shikha

  • Do I need MacKeeper for security purposes?

    I purchased a MacBook Pro laptop. Do I need to purchase the MacKeeper for security to keep it safe?

    THANK YOU SO MUCH! I truly appreciate your answer.
    Merry Christmas & Happy New Year!

  • Are parts of a pdf document in Adobe Acrobat Pro able to be secured so that once the recipient fills out a specific section, signs it, and submits it to the original sender, that information filled out is locked from editing for security purposes? If so,

    I have an application I'm submitting to our school website for potential students to fill out. There are sections for the student(s) to fill out as well as sections for staff to fill out. For the sake of security for the student filling out the form, I'd like to set it up so that once the student has filled out the proper sections and submits the information, any information filled out and signed by the student is locked from editing on my part. I only need to read what the student filled out and signed, then add my notes to Staff sections.  Is this possible? If so, how?  I need details!

    You can create a script that will lock the fields before signing. But when you edit the document after the student signs, the signature will no longer be valid and the document will show that it has been changed after signing. Adobe restricts the number of files you can collect information on with forms that can be saved and emailed. The restriction used to be 500 files unless you purchased the appropriate LiveCycle product to enable the pdf files for saving.
    Why in the world are you requiring potential students to sign forms. Many students will not know how to sign pdf files. Just have a button that will submit the information to a website for you to extract or to send you the information in an FDF file and import the information form. You can have a button that will lock the fields they fill out. This will ensure you do not have to worry about the 500 file limit.
    Understanding reader extensions licensing | Adobe LiveCycle Blog

  • Password encrpytion for security

    Hi
    I am using the below code to encrpyt and decrpyt my password.
    Could you please let me know how to use the hash algotithm here to protect password more secure?
    Abd also please let me know how to keep safe the key?
    Thanks
    DECLARE
       input_string       VARCHAR2 (200) :=  'Secret';
       output_string      VARCHAR2 (200);
       encrypted_raw      RAW (2000);             -- stores encrypted binary text
       decrypted_raw      RAW (2000);             -- stores decrypted binary text
       num_key_bytes      NUMBER := 256/8;        -- key length 256 bits (32 bytes)
       key_bytes_raw      RAW (32);               -- stores 256-bit encryption key
       encryption_type    PLS_INTEGER :=          -- total encryption type
                                DBMS_CRYPTO.ENCRYPT_AES256
                              + DBMS_CRYPTO.CHAIN_CBC
                              + DBMS_CRYPTO.PAD_PKCS5;
    BEGIN
       DBMS_OUTPUT.PUT_LINE ( 'Original string: ' || input_string);
       key_bytes_raw := DBMS_CRYPTO.RANDOMBYTES (num_key_bytes);
       encrypted_raw := DBMS_CRYPTO.ENCRYPT
             src => UTL_I18N.STRING_TO_RAW (input_string,  'AL32UTF8'),
             typ => encryption_type,
             key => key_bytes_raw
        -- The encrypted value "encrypted_raw" can be used here
    DBMS_OUTPUT.PUT_LINE ( 'key_bytes_raw: ' || key_bytes_raw);
    DBMS_OUTPUT.PUT_LINE ( 'encryption_type: ' || encryption_type);
    DBMS_OUTPUT.PUT_LINE ( 'encrypted_raw: ' || encrypted_raw);
       decrypted_raw := DBMS_CRYPTO.DECRYPT
             src => encrypted_raw,
             typ => encryption_type,
             key => key_bytes_raw
       DBMS_OUTPUT.PUT_LINE ( 'decrypted_raw: ' || decrypted_raw);
       output_string := UTL_I18N.RAW_TO_CHAR (decrypted_raw, 'AL32UTF8');
       DBMS_OUTPUT.PUT_LINE ('Decrypted string: ' || output_string);
    END;Edited by: user212310 on Feb 4, 2011 12:46 AM

    Wow that is really overkill unless it is important for you to be able to fetch the password back in plain text.
    Like others have said most times you store the users password as a hash. When they come back, you hash whatever they give you as a password then compare the two hashes.
    When considering encryption one has to decide on strength. In other words how long would it take to decrypt a string without knowing its key.
    What is the data you are protecting worth? Are you just trying to keep your average hacker out or are you defending against dedicated break in attempts?
    One of the simplest solutions to defeat a dedicated break in attempt is to simply put a "three strikes" and you out rule in place so the account is locked after 3 attempts with an incorrect password. Or you can simply limit the number of attempts in a given amount of time, or after three attempts you lock the account for n minutes.
    There are lots of simple cyphers that can be implemented as a stored procedure that would do exactly what you want. The complex the cypher the harder it is to implement.
    As to your code. It works fine on my system in pl/sql and I am on Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 linux client and server.
    As to keeping your encryption key safe you can hide it in any number of tables call the column just about anything, so use your imagination.
    I think your question has been answered.

  • How to disable password change for you logon first time.

    hi,
    When i change the password of any user or when i create new user and login with the same user it ask to change the password again can sap have provided to disable this feature where in user won't be ask to change password again.
    thanks,
    - John

    Hi,
    I'm not quite sure, but you can try with some of these profile parameters.
    Initial Password: Limited Validity
    <i>login/password_max_new_valid</i>   -  Validity period for the passwords of newly created users
    <i>login/password_max_reset_valid</i> - Validity period for reset passwords
    Svetlin

  • ADF View Objects and Recording changes for Auditing Purposes

    Hello,
    I am a new to the JDeveloper paradigm and currently working on a J2EE web pilot project. I was wondering if I could get some some ideas on how I could implement auditing in an application. Basically when a user modifies some entries on the screen, I would like to make a note of what the record was like before commiting to the database. An administrator could then see, what changes the record has been through over a period of time.
    I was thinking of using XMLTypes with the database. Does Jdeveloper handle oracle XMLType fields, or would I be looking at something along the lines of a CLOB? At this point, I would rather not implement this functionality using database triggers. Any alternate suggestions would be appreciated.
    Regards
    Anora April…
    Jdeveloper 10.1.2 (1811)
    Oracle DB 10g 10.1.2

    Hi,
    I am also interested in a best-practice note from oracle.
    Currently we store history in seperate history tables for columns that changed. All this implemented in our BaseEoImpl overriding the EntityImpl.prepareForDML().
    Thanks

  • How to block opening a file for security purposes

    There is a chance my MacBook may need repairs for case issues. I have some personal information on my computer that I want to protect from prying eyes.
    How would I do this?
    Thank you!

    Hi the musigal
    You could create a disk image and encrypt it with a password. Move the files into that and delete the originals. On return, copy them back from the disk image to their original locations.
    To create a disk image:
    Open Disk Utility.
    Select New Image
    Give it a name, select a size and choose Enrcryption
    Click Create
    Enter a chosen password twice (make it different to your normal one)
    The newly created disk image will appear mounted on the Desktop, if that is the location you chose for it.
    Move your sensitive files into it.
    Unmount it (eject it)
    Test it by double clicking on it, supply your password.
    Once opened (mounted), check your files are in there and work correctly.
    Again eject it. It can remain on your computer as it can't be opened except by you.
    Delete the original files.
    regards roam

  • T-code deletion urgent.. for security purpose

    Dear Gurus..
    I hav deleted the t-code in role but still it is showing in executable transactions.. how to remove tht transaction completely pls help our version is MySAP ERP ECC 6
    thanks in advance
    Sreeni

    Hi,
    I did not get your question where you deleted the T-code
    if you are deleted fro the role , then you need to regenerate the authorizations for that role again.
    and again perform the user comparison so that the change will effect.
    Regards,
    Ravi

Maybe you are looking for