[REQUEST] Manager -- Free Accounting Software

"Manager" is a free accounting software. There is DEB package here > http://www.manager.io/download
Could some one who knows what they are doing please create AUR PKGBUILD for please ? Thank you.
Website: http://www.manager.io/
Last edited by TuxLyn (2013-10-15 20:56:51)

Solicitation: holding...
Reinstated.
Last edited by jasonwryan (2013-10-18 02:49:16)

Similar Messages

  • I received an erroneous "per request" downgrade email (saying I had downgraded to free account) but my account was charged $20.00!  I had never requested a downgrade!  Why?  And what has happened to my data in excess of 5 GB storage??

    I received an email from Apple about fifteen minutes ago saying that "per your request" I had downgraded to a free account for iCloud.  But I had made no such request!  In fact, I had expected Apple to charge me $20.00 for a full 15 GB of storage.  And Apple in fact did charge my bank card for that amount!  But when I check the Apple device, an iPod Touch (4th Gen) for my iCloud storage status, it states that I had "exceeded" my free 5 GB!  This is absurd, since Apple owes me a full 15 GB based on the fact that it has charged my bank card for the amount of $20.00 for that storage option.
    To make things worse, the device nevertheless contradictorily refuses to let me "upgrade" to the $20.00 option on the relevant screen (since obviously the truth is that I have a full 15 GB and the information on the screen recognizes this fact), even as it continues to state on an earlier screen that I had only 5 GB, not 15 GB, of storage (and had exceeded it).
    So the bottom line is that 1. Apple sent me an erroneous notice that I had "downgraded" to a free account when I had done no such thing; 2. My iPod now relates two contradictory stories about how much storage I really have (as noted in the second paragraph above); and 3. I'd like to know what happened to the data I already had in storage that had already exceeded 5 GB -- did it get erased?
    I've been charged $20.00 for a full 15 GB and yet still have nothing to show for it but the 5 GB  free account!  Worse yet, I may have lost data (as the storage used before all of this happened was a little over 6 GB already).
    Message was edited by: peaceandstrength

    I have the same problem. For about 1 month ago I extended my iCloud storage account (+20 GB) in order to maintain my backups for iPHONE and iPAD as my account would expire 14/10. In spite of this, I got an email 15/10, which said that iCloud was reduced to 5 GB. 2 hours later I received a new email with comfirmation on the purchase of +20 GB storage plan. However, I only have access to 5 GB on my iPad and iPhone. Called Apple Support but they couldn´t help me. Did you find any solution ?

  • Skype Manager for Free Accounts

    Can I manage a number of "free accounts" with Skype Manager (I understand they will not have the additional features of the "paying accounts") 
    Thanks!

    jmkeel wrote:
    Can I manage a number of "free accounts" with Skype Manager (I understand they will not have the additional features of the "paying accounts") 
    Thanks!
    All members work the same in Skype Manager, there is no difference in how a member is treated minus that you cannot add normal Skype names to the Skype Manager, if you are located in the U.S. anymore.
    Also, Skype has decided, that there will be no charge for using the Skype Manager, in the near future as well.
    About Me You can also use a IP Camera as your camera for Skype video Example Instructions

  • What is best free antivirus software

    what is the best free antivirus software for Macbook pro and IMac ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Help me configure Change request management !!!

    Dear friends,
    I am Going to Configure Change request Management, so just to ensure that the configuration is not erronous, i would need Expert advise..
    Just want to know Clear few things before i proceed..
    I am also refering SPRO and related notes
    Scenario :
    I have two SYSTEMS SAP ECC 6.0 with System id R03 and Soluiton manager with SYSTEM id SOL,
    R03 has 3 clients, 300 600 700..
    In R03 300 is the development client, 600 is quality client, 700 is the production client.
    SOL has 2 clients, 100, 200
    With 200 as the production client.
    Q.1) <b>Do i have to configure CHARM in both the client (100 and 200 of SOLMAN).</b>
    Q.2) Initially I had tried to set CHARM in client 100 of solman, but later on realized that it has to be set up in client 200.
    When i logon to client 200 and  Execute IMG activity Spro-> sap soltion manger->basic settings-> sap solution manager system->activate integration with change request management.
    Then by default it take the previous client ( client 100) as the change request management client.
    ( as we know there are three steps in the above activity ), the other activity are executed properly, only prblem being that the default client is always set to 100, which should not be the case).
    I do get the prompt saying ( "The change request clent is set to clent 100, do u want to change to client 200, on clicking yes, still it is always set the same client 100 as charm client ")
    <b>Plz let me know what do i do to set the change request client to 200??</b>
    Q.3) Regarding TMS, we have local domain controller in solman and local domain in R3.
    We are planing to establish domain links between the two systems( ie both the domain controllers) ??
    Is this the right strategy ??
    <b>Any other method that u can recommend  ??</b>
    Q.4)One of the IMG activity says, Generate Destinations to client 000 of all the domain controllers..
    Whenever i do this these, destinations are created with errors, i am not able to create trusted RFC destinations without errors.
    When i logon to satellite domain controler and excecute sm59 there are 2 destinations created Trusted and BACK.
    These destinations works well,
    but when i logon to Solman, got to sm59 , when i test the TMW and TRUSTED rfc destinations  i test these destinations using Remote Logon i get error,
    " no authorization to logon as trusted system"
    I went thru one note which recomended Kernel upgrades to solve the problem,
    I r3 my kernel relaese is 700 with patch level 56, the note recomends to apply patch 80, did u have these problems??
    <b>what is your kernel patch levels in sateliite and solman systems.</b>
    Q.5) TO be able to raise tickets from R3 to solman we create RFC destinations.
    We also create RFC destinations to client 000 of all the sateliite system,
    <b>dont u think these RFC destinations might interfere with each other??</b>
    Q.6) Is there anyone who has successfully configured CHARM. Can you plz share the  configuration documents with me..
    Please note :
    <b>All the contributors would be handesomely rewarded with points .</b>

    Hi,
    Check this
    Note 128447 - Trusted/Trusting Systems
    For your Q4.
    Q3.)
    Establishing Domain link - That's the right way. Go ahead.
    These are the steps.
    <b>1.Define Transport Routes for System Landscape</b>
    assign exactly one development system to a production system, and that these two systems are connected by exactly one unique transport track. If a development system and a production system are connected by more than one transport track, this may lead to inconsistencies within the transport distribution. This type of transport configuration cannot be supported by Change Request Management, and may cause inconsistencies within the tools involved.
    <b>2. Activate Extended Transport Control</b>
    The CTC parameter should be '1'
    <b>3.Configure Transport Strategy</b>
    Deactivate the QA Approval.
    <b>4. Activate Trusted Services.</b>
    5.Activate Domain Links.
    You have to activate domain link between systems.
    6. Generate RFC Destinations to Client 000
    Hope this helps.
    feel free to revert back.
    --Ragu

  • I have a problem syncing iCal on my Macbook air (10.7.5) and my iPhone 4s (5.1.1) over iCloud. The following server error message comes up "The request (CalDAVAccountRefreshQueueableOperation) for account "iCloud" failed." Been to Apple - no luck. Ideas?

    I have a problem syncing iCal on my Macbook air (10.7.5) and my iPhone 4s (5.1.1) over iCloud. The following server error message comes up "The request (CalDAVAccountRefreshQueueableOperation) for account “iCloud” failed." Been to Apple Store - no luck instore, or with Super genius over the phone when with genius in store, taking data in real time via ethernet!
    I had to do a full wipe of my system because of time machine back up issues 2 weeks ago, and the error has only occured at some point since then. I only did a drag and drop of my user account folders/files into an External HDD rather than a copy of my user account (advised by the staff in store at Apple to do this) and when reimported, the Mail folders are all present but each message is in a sub-sub-sub folder that is numerically named. I do not have a mirror image of the hard disk prior to the wipe, only a time machine back up from 2 weeks prior to it being done. I am uncertain if this reinstall has caused the issue. 
    I am not happy to upgrade the software in my iPhone until I have the calendars working. I have purchased Mountain Lion, but again am concerned about upgrading until the issues are sorted.
    I have tried the other solutions on here with no luck. HELP please.
    Many Thanks.

    Progress Update.
    I made a back of what existing phtos and Videos I had on my Iplhone.  I used Image capture to do this making an entire back up of photos and videoa that were still intact on the phone.
    Image capture is god for this purpose, as it does exactly what you ask it to do without applying any rules or squishing the files back into iphote (which might also be corupted) 
    Image capture wil do the basic function of retriving the contents of the phone and save them as native files on your hard drive.
    Once I did this I erased my iphone, and re intitialised it restoring an older back up from icloud.
    As the retore was happneing - I did retreive the missing files that cuased the intial beviour as above, and I could play the videos that were missing in the above scenerio.  The wierd ting was however that even though the source files were now back on the device, the thumbnail previews were missing. Where I ahd balck thumb nails for server portions of the resotred content.
    I then went to bed as the restore is a long process.  When I woke up the library had library had cleaned itself up.  Mysteriously the prcess had deleted the files missing the their thumbnails.
    This is very perculiar and bad behavior.
    I am now repeating the process, and will attempt to download the missing content as it is restored and prior to the phone trying to fix itself.
    Here are the lessons learned.
    DO NOT rely on Photo Stream to keep back ups and synchornise videos from you IOS device. IT DOES NOT SUPPORT THIS CAPBILITY
    DO NOT rely on iCloud Back Up alone - always fd an occassional iTunes back up or more reliably still always take a back up of photos and video files using Image Capture to be doubly sure that you a have backd up any content.
    DO THIS NOW - dont wait to loose your phone ofr have your phone repaired by replacement at the apple Store.  (I did both :-(

  • HOW TO CONFIGURE MANAGER or APPROVER USER IN ACCESS REQUEST MANAGEMENT TO APPROVE OR REJECT REQUEST

    hi sap gurus,
    i configured grc 10 system successfully. I created one user: GR_AR_APP001 and assign following roles:
    SAP_GRAC_ACCESS_APPROVER
    SAP_GRAC_ACCESS_REQUEST_ADMIN
    SAP_GRC_FN_BASE
    SAP_GRC_FN_NUSINESS_USER
    and I maintained GR_AR_APP001 in access control owners as "POINT OF CONTACT", "SECURITY LEAD" and "WORKFLOW ADMINISTRATOR"
    but when i am creating access request for new user and defining MANAGER under user details tab as GR_AR_APP001.
    the user GR_AR_APP001 is not receiving any request for APPROVE or REJECT in his WORK INBOX.
    can u please guide me how to configure APPROVER or MANAGER to approve or reject request.
    I will be very much thankful if you guide me successfully.

    Hi Colleen,
    thanks a lot for your time.
    PIC1: I created one user: GR_AR_APP001
    and assigned all the GRC ROLES.
    PIC2: I assigned owner type to GR_AR_APP001 user : POINT OF CONTACT, SECURITY LEAD and WORKFLOW ADMINISTRATOR in NWBC ACCESS CONTROL OWNERS
    PIC3: I created one EUP 980 (copied from default EUP)
    PIC4: I maintained default manager as GR_AR_APP001 user in 980 EUP
    PIC5: I selected SAP_GRAC_ACCESS_REQUEST process id
    PIC6: I created one agent id as ZGRAC_MANAGER11 in which I added approver user id: GR_AR_APP001
    PIC7: I saved agent id
    PIC8: I added agent id as ZGRAC_MANAGER11 in stage5 in manager stage.
    PIC9: I saved
    PIC10: I maintained EUP 980 (in which I configured manager as GR_AR_APP001 user) in stage 5 task settings
    PIC11: Maintain Route Mapping, I clicked on next
    PIC12 and PIC13: I saved and activated.
    After this process I created one request for new account and selected the manager as GR_AR_APP001 and one request is created with request no 9000000030.
    now I logged into system by user GR_AR_APP001 and checked, there is no request under his work inbox.
    please guide me at least one procedure, how to receive request in approver work inbox so that I can learn other procedures to configure approver as per our organization requirement.
    thanks for your support Colleen.

  • Help me Please.. I can log on to the Apple website to manage my account and all the information is correct, but I get "Your Apple ID has been disabled" when I try to get something from App Store on my iPad

    Help me Please.. I can log on to the Apple website to manage my account and all the information is correct, but I get “Your Apple ID has been disabled” when I try to get something from App Store on my iPad3
    I'm from poland.
    Thx
    Balbi

    Contact iTunes Customer Service and request assistance...
    Use this Link  >  Apple  Support  iTunes Store  Contact

  • I changed my AppleID/Password and now am locked out of iCloud. iCloud says maximum number of free accounts have been activated. tried Settings, Mail etc but iCloud does not appear. I was going to delete it and start again.

    Had to change Apple ID/Password recently now cannot access iCloud. In settings when tapping iC, log in screen appears with old ID and request for (old) password.
    In Settings  Mail, Contacts etc iCloud does not appear. I was going to delete account.
    Trying new ID/Password message appears "maximum no. of free accounts have been activated".
    Using old ID/Password message apperas "you can,t sign in because account was disabled for security reasons ......reset password at iforgot.apple.com which i did.
    Can anybody help please??

    Hi,
    I tried to log in to iCloud but a message appears telling me I "can't sign in because my account was disabled for security reasons....reset password at iforgot.apple.com". I don't know why this happened.
    I reset both my Apple ID and password.
    When I tap Settings iCloud is listed on the left side between General and Mail, Contacts etc.
    Tapping iCloud brings up a log in screen for iCloud which shows my old Apple ID and requests the password. If I put the password in I get the message as above.
    If I use the new Apple ID/Password I get the message "the maximum number of free accounts have been activated....
    In settings there is no option to "Delete Account"
    Any suggestions??

  • Says I've reached the maximum of free accounts for my device. It's a used iPhone 4s. Trying to activate find my iPhone. Please help!?

    We bought our son a used iPhone 4s almost 2 years ago. It was recently lost, but we were lucky enough to get it back. As a precaution in case it's lost or stolen again I'm trying to activate find my iPhone, but it tells me I have to have iCloud. But iCloud keeps telling me I have reached the maximum number of free accounts for this device. We have never had an iCloud account, so I'm assuming it was from the original owner. I have no way of contacting this person anymore because their eBay account is no longer active. The phone was factory reset when we bought it, and we reset it again today trying to see if that would fix it, but he lost all his stuff for nothing. We also updated the software. Is there anything we can do about this? Or at least maybe a different app that can track a phone that doesn't require iCloud? I don't know anything about Apple devices. Thanks so much!

    Welcome to the Apple community.
    Unfortunately once all the 3 iCloud accounts have been created on your mobile device, you cannot create any more regardless of what you do. You will need to re-use one of the accounts that you have already created or create your new account on another device or computer.

  • The maximum number of free accounts have been activated on this iPad

    We're using a number of iPad Minis in a lab environment to train students and volunteers.
    We're receiving the message "The maximum number of free accounts have been activated on this iPad" after three accounts have been created on an iPad.  Since we have a new group of students every 4 to 8 weeks, we need to find a way to allow free accounts, and we don't want to require students to provide credit cards.
    We've looked at the work around to go to iTunes, Quick Links and Redeem, but that's a little messy for hundreds of students a month.
    Is there a way to remove the association between the free accounts and the iPad serial number?
    A couple of notes:
    1. We can set them up under AppleID.apple.com, but as soon as we try to load a Free app (all the apps we use are free), it prompts for a credit card number and won't let them continue.
    2. There is not a "None" option on the credit cards, as least for the apps we're using.  Is this option app specific, or is this a feature that comes and goes, based on Apple's changing policies?
    3. The iPads are in DEP and are managed via Maas 360

    Why do the students need an account? Are they downloading apps?
    You should be downloading apps by Mass 360. That means apps will be owned by mass 360 not individual student ids.
    You may be in a bit of trouble.  You need to get the students to go into there apple id and detach the ipads.  Oh, well. Contact apple.
    Somehow you are not on the golden path.  Not sure how to advise you to get on it.  I'm not sure how you get rid of the current apple ids.
    Enterprise support:
    Call enterprise support  (866) 752-7753
    I suspect you will have to go through this process to get rid of the ids
    Undoing the Activation lock
    iCloud: Activation Lock
    Describes what the activation lock does:
    http://support.apple.com/kb/PH13695?viewlocale=en_US
    For how to remove, see Texas Mac Man post in
    https://discussions.apple.com/thread/6528124

  • Document for Change request Management in Solution Manager

    Hi,
    We are setting up Solution Manager. I know service desk configuration. But I need a document on how to configure change request management in Solution Manager.
    Also I need a steps or a document for monitoring of EP 6.0 from Solution Manager.
    Thanks a ton for help in advance.

    Hi,
    Check out these links
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/media/uuid/b4406827-0a01-0010-3da2-f56b36d88510
    BI and Portals 2006 [original link is broken]
    very good collection of eclasses. for making use of solution manager.
    Feel free to revert back.
    --ragu

  • What is the best account software for ox lion

    Please let me know what is the best accounting software for ox lion

    Money is very popular, but it's a personal bank account and financial manager app, not business accounting software. There's very few of those to pick from for the Mac that are worth buying.
    QuickBooks for Mac 2013
    MYOB AccountEdge
    Two versions of this one. Check the Pro and Basic features to see which one would suit your needs.
    MoneyWorks Gold for Mac
    They also have MoneyWorks Express for about half the cost of the Gold version. Depends on how many features you need.

  • Managed Service Accounts to run SQL Server Service

    Has anyone played around with using managed service accounts for running the SQL Server Service? I am on a forest functional level of 2008R2 and was thinking about how cool it would be to use those for SQL Server. Unfortunately, I hear that it's not supported
    by Microsoft and yet I've read about people doing that but would like to know if anyone has first hand experience. Otherwise, if not recommended, I'll stick to the old fashioned way of creating typical user accounts. Thanks in advance!

    Hi Scott hi Sean
    I see that my first answer was badly phrased.
    Let me try to make it more clear:
    Managed Service Accounts(MSA):
    Works with Kerberos including Delegation, but:
    NOT working with cluster nodes
    NOT working for load balancing using Kerberos
    More information:
    http://blogs.technet.com/b/askds/archive/2009/09/10/managed-service-accounts-understanding-implementing-best-practices-and-troubleshooting.aspx
    Group Managed Service Accounts (GMSA):
    Works with Kerberos including Delegation, but:
    NOT supported with Failover Clustered Instances
    Here is the connect item:
    http://connect.microsoft.com/SQLServer/feedback/details/767211/gmsa-for-sql-server-failover-clusters
    @all Please feel free to vote(!). I am waiting for this as well.
    This is the state of my information today. Feel free to correct me if you know of any changes.
    Andreas Wolter (Blog |
    Twitter)
    MCM - Microsoft Certified Master SQL Server 2008
    MCSM - Microsoft Certified Solutions Master Data Platform, SQL Server 2012
    www.andreas-wolter.com |
    www.SarpedonQualityLab.com

  • Standard Versus Managed User Accounts

    Simple question -
    What is the difference between a Standard and a Managed user account? Essentially, I would like to set up an user account that has all the functionality but does not have the ability to install software or applications - similar to how one can set up a Limited user account in Windows.

    No worries. Figured this one on my own. Setting Parental Controls created the "Managed" user account. Also, setting the options within the Parental Controls section allowed for me to prevent installation of applications since the Application folder cannot be modified.

Maybe you are looking for

  • Will 1.5Tb or 2Tb works on a Mac Pro

    Just out of curiosity, will the newest 1.5 and 2 Tbytes HD works on a Mac Pro ? The documentation talk about 1Tbyte disks, and up to 4 Tbytes total, but this may just be because that was the available disk size at the time the Mac Pro early 2009 came

  • How to remove only the last element of spreadsheet string

    I use path to string option to store image path into database and while retrieving the string is again converted into path but it gives out an error as the output of array to spreadsheet string gives out a tab at the end which is unable for the IMAQ

  • Smartform with PDF and TXT?

    Hi Everybody, does anyone know if it is possible to send a Mail as a PDF attachment + text in the mail where the pdf is attached to? Regards Abosi

  • Globale temporary table

    I've created a global temporary table as the following: Create global temporary table temp as select * from emp; Doesn't that mean it create temp table as the structure of table emp and inserted the same rows as emp's table rows? Because when I tried

  • Review mode crashes

    I have a problem with a client`s PC (Windows7 64bit). If he goes to review mode and wants to give a picture one or more stars by pressing a number, review mode closes and he`s back to filmstrip mode. And he can`t go back to review mode, because the m