Stolen Itouch and password protection

My Itouch was stolen today. I had it password protected. Can the thief access it any other way? I hope not. At least I get the satisfaction of knowing they can't use it!

If you were accessing email on the iPT, I would change the password to that account immediately.
Sorry to pop your bubble, but even though the thief can't access the iPT in its current state, they could restore it to factory settings...

Similar Messages

  • I have created a PDF and password protected it for view. However, when reading the PDF in Adobe Reader app on the iPad the commenting and annotation options are not available. Is there a way to allow commenting and annotation in the app while password pro

    I have created a PDF and password protected it for view. However, when reading the PDF in Adobe Reader app on the iPad the commenting and annotation options are not available. Is there a way to allow commenting and annotation in the app while password protecting the document?

    Is there a setting that needs to be set to allow the annotation features?  I set password protection to open and then password for editing and set it to Any except page extraction, but it still did not give the annotation option

  • How do i personalize it and password protect it?

    My internet works, I was trying to set up my new airport extreme and my computer froze in the process and now it works but the light blinks amber and its an open network connection that anyone can connect to.  I tried a factory reset, but it won't go back to the easy setup process like the first time.  It just opens and my computer connects.  Any thoughts for how to rename the network and password protect it?

    To rename the Network Name: AirPort Utility > Select the AirPort Extreme Base Station (AEBS) > Manual Setup > AirPort > Wireless tab > Wireless Network Name
    To enable wireless security: AirPort Utility > Select the AEBS > Manual Setup > AirPort > Wireless tab > Wireless Security. I would recommend using "WPA2 Personal" for the security type.

  • Create and Password protect a pdf using VBA?

    Hi,
    I have a requirement to generate and password protect a pdf using a Microsoft access application (version 2007).
    I have seen plenty of code examples for generating the pdf, but is it possible to password protect the pdf programmitically?
    Thanks!

    is it possible to password protect the pdf programmitically?
    Yes, you can write a plugin for Acrobat.

  • Is it possible to lock a layer within a document and password protect that specific layer?

    Is it possible to lock a layer within a document and password protect that specific layer?

    As stated, no way to do exactly what you want, but an option might be to turn OFF Visibility for that Layer, if you do not want it seen, and then Flatten, and do a Save_As.
    If you do want that Layer seen, but not able to be edited, then Flatten, with Visibility ON, and Save_As.
    The question is, do you want the recipient to see that Layer, or not?
    Next, Do they need to be able to edit all other Layers, but just not that one?
    Last, what type of Layer is it?
    Good luck,
    Hunt

  • Stolen iPad is off and password protected.

    My iPad was stolen and is password protected. Is there a way I can remotely turn it on. Find my iPad won't work if it is not connected to a wifi or 3G network. I figure someone out there has figured this out.  If you can remotely turn it off, someone must have figured out how to remotely turn it on.

    Yes, it can easily be restored without someone knowing the screenlock passcode.
    Sorry, but there is no way to turn on an iPad remotely. If it's just asleep, you can if you have access to another iOS device such as an iPhone try sending an email, iMessage or Facetime request and perhaps you could hear the announcement of the message and locate it that way. But if it's off, or not connected to a WiFi 3G network, there's nothing you can do.
    Regards.

  • DELETING FILES PERMAMNENTLY FROM HARD DRIVE AND PASSWORD PROTECTING

    DOES ANYONE KNOW HOW TO PERMANENTLY DELETE FILES FROM THE HARD DRIVE? ALSO, WHAT ARE THE STEPS TO ADD A PASSWORD TO A FOLDER?
    THANKS!

    #1) Please check your caps lock key which seems to be on and many perceive as shouting your questions.
    #2) Use secure empty trash when you want secure deleting.
    #3) There isn't a folder password feature. There's a utility which will let you hide folders with a password, but that is easily circumvented. Then there's making password protected, encrypted image files. The second is very secure but it isn't a folder, it appears as a new volume on your desktop.

  • IWeb Url Username and Password protection problem

    After renewing a GoDaddy site and re-forwarding an already created iWeb site, I now get a .Mac required User Name and Password. What happened.? I just re-forwarded the url string that was already there on my .mac server.

    Hi Robert
    I am no expert but I just did a web site as well. If you want to protect it in IWEB click on your welcome page and at the bottom of the page you have a menu selection click on the icon for the inspector. looks like an italizised I then click over the menu option at the top of that that says password. you should be able to do it that way. good luck marty

  • Wifi and Password Protected Hot Spots

    I'm one of the many who will be buying an iPod Touch!! But I just wanted to know if you will be able to access Wifi in places where you need a password to access the Internet, such as in universities. I saw the unveiling of the new iPods and I'm pretty sure he mentioned something about him not liking the fact that you need a password to access the Internet in certain places. So did he say that you will be able to use Wifi on the iPod touch even without a password? Thanks!!

    IsaacR312 wrote:
    So then why did Steve Jobs even mention him not liking having to have a password to access Wifi networks if he wasn't even going to fix the problem?
    Go back an listen to what Steve said again, because you did not listen carefully.
    He said that many devices that use the internet have issues because you need to enter passwords to access hotspots and because these devices don't have a full internet browser you can't enter the details. What the iPod touch provides is a full internet browser (Safari) and that allows you to enter the login details for internet hot spots. See the difference?
    So you can use password protected hot spots, you need to enter the password and the iPod touch using Safari allows you to do that.
    Simple!

  • IPod Touch Frozen and password protected

    I charged it just last night on a wall outlet extension, unplugged it and it is stuck on the iTunes connection with the USB cord picture. I tried restarting it, that doesn't do a thing, and I can not restore it or connect it to iTunes because of the password protection.

    Okay...have you tried a reset of the iPod?
    You may need to reset. Note: Only reset your iPhone or iPod touch if it is no longer responding.
    To reset
    Press and hold the Sleep/Wake button and the Home button at the same time for at least ten seconds, until the Apple logo appears.
    Doc

  • Mavericks and password protected WiFi

    I upgraded to Mavericks on early 2011 MacBook Pro 13 inch.  My basic WPA(2) is working fine.
    However I tried to connect to password protected WiFi on inflight GoGo internet and the hotel internet and neither would bring up the webpage to login.
    The WiFi in the menu bar showed it was connected and NO ! mark so no apparent problem. I tried Safari, Chrome and Firefox.  I had not previously tried to connect to GoGo but had previously used the hotel WiFi

    IsaacR312 wrote:
    So then why did Steve Jobs even mention him not liking having to have a password to access Wifi networks if he wasn't even going to fix the problem?
    Go back an listen to what Steve said again, because you did not listen carefully.
    He said that many devices that use the internet have issues because you need to enter passwords to access hotspots and because these devices don't have a full internet browser you can't enter the details. What the iPod touch provides is a full internet browser (Safari) and that allows you to enter the login details for internet hot spots. See the difference?
    So you can use password protected hot spots, you need to enter the password and the iPod touch using Safari allows you to do that.
    Simple!

  • Make Adobe form not editable and Password protected

    Hi All,
    Want to add a button on adobe form , when user clicks the button then the form shouldn't allow to edit fields anymore.
    I think this can be coded under script editor.
    Please anybody specify the syntax to make adobe form not editable.
    And my another issue is whether we can handle adobe forms password protected through SAP. kindly specify any approach.
    Thanks in advance.
    Regards,
    Ashweeni.

    Hi Ashweenip,
    PASSWORD PROTECTED PDF FORMS:
    Go through these Threads
    [Password protected PDF file|Re: Password protected PDF file]
    [pdf with password encryption|pdf with password encryption;
    Regards
    Pradeep Goli
    Edited by: Pradeep Goli on Feb 4, 2010 11:13 AM

  • Xserve, Windows 7 and password protected files

    I have a Late 2006 Xserve running Sever OS 10.4.11 and I'm having a heck of a time connecting to any password protected files. For example, I can go "Map Network Drive", add the "Users" (\\xserve\Users\) folder and then access any unprotected folders within that directory (lets call them Bob and Tom), but not any of the password protected files (lets call that user Mike)
    If I click on the Bob or Tom folders (under "Users") it lets me in, no problem.
    If I click on the Mike folder (also mapped under "Users"), it says I don't have the correct access privileges. It's a straight up denial, no prompt for alternative login info.
    My first thought was this; go "Map Network Drive" and map the Mike folder directly (\\xserver\Users\Mike), but use the correct login info (username/pass). It prompts me for the username and password. HERES WHERE I'M STUCK! No matter what I put for the username and password, it denies me. I've tried resetting the password (through the server interface), then sucesfully logged in using my MacBook Pro (using the exact same username/password I had been trying with Win-doze)
    Again, I can connect to most of server files and folders from the Windows 7 machine (after following the "Set value to 'Send LM & NTLM' " procedure suggested by Vocal Jazz Fan on these forums. BIG THANK YOU!)
    So, is this impossible to fix? Is it just the nature of the beast running Windows machines on a Mac server? Why is it only these protected files that I can't access? That seems so strange to me.
    For a background, we had previously used Windows XP and logged into these folders with no problems.
    Note: this server is at a community center and thus has very limited funds and computer expertise, hence the reason we're two full OS's behind. If we cannot get this to work, we're prepared to hire some server jockeys to completely overhaul our server (run Windows on our Xserve hardware), which will take 2-3 days at about $120 an hour. Please help!

    I'd spend a few of those US$120 per hour hours with a Snow Leopard Server upgrade, as the software has matured substantially from Tiger Server to Leopard Server to Snow Leopard Server.
    [Here are my crib notes for getting Windows to work with Mac OS X Server (Snow Leopard Server)|http://labs.hoffmanlabs.com/node/1590], which might be useful as a starting point.
    With those Windows registry keys as search targets, there are a number of discussions of getting Samba password-protected shares to work with Windows and Windows 7 boxes posted around the network, both at Microsoft and via the Samba mailing lists.
    These cases sometimes get as far as running Wireshark and dumping the network traffic, too.

  • How do I send/email Documents with high security and password protected

    I want to send Documents securely to my clients. What product do I need and how do I send/email with password protection? I recently purchased Adobe Send but not sure this was the right product needed to send my documents securely?

    In Acrobat you can create a Portfolio in which your documents (any types) will be placed as attachments and encrypt the whole portfolio. You can also create a small PDF, possibly with explanation what is in it, attach your files to it, and encrypt this PDF. In this case you can encrypt attachments only, so that the user can open the shell PDF but to extract the files would need to know the password.

  • Stolen laptop, if password protected, can they ever get my files?

    Someone broke into my car and stole my Macbook Pro (among other expensive things in the trunk), if it is password protected on both the OS X and Vista sides, can they ever get to my files?
    I think they'd wipe the drive, right?
    I'm so not lucky...
    MacBook Pro 17"   Mac OS X (10.4.8)   dual boot Vista Ultimate

    http://www.samspublishing.com/library/content.asp?b=MacOS_XUnleashed&seqNum=104&rl=1
    Enabling the root Account
    As mentioned earlier, the administrator account is a powerful account. But the most powerful account on a Unix machine is the account called root. People also refer to root as the super user, but the account name itself is root. On most Unix systems, the first available account is the root account. In OS X, however, the root account is disabled by default as a security precaution.
    At some time, however, you might find it necessary to enable the root account. The root account can modify system settings, modify files it does not own, modify files that are not writable by default, modify a user's password, install software, become another user without having to know the password of that account, and so on. In other words, root can do anything anywhere, making the power of root immense. Because root has so much power, the only users who can become root are users with administrative privileges. Because a user with administrative privileges can become the root user, you should assign these capabilities to only completely trusted individuals.
    If you choose to enable the root account, please remember to use it with caution. Although the root account might provide some extra utility, you could accidentally wipe out your system if you do not pay careful attention to what you type. In addition, the root password you choose should be difficult to guess. Finally, become the root user only as long as necessary to complete the task at hand.
    With the presence of an administrative user, it might be a long time, if ever, before you discover a need for enabling the root user. There are many approaches that you can take for dealing with the root user, from ways to use root without enabling the root account to actually enabling the root account.
    Let's take a look at four different ways to gain root access to your system. Although you can choose whichever method you like, it's useful to understand that even though some of these methods appear to work magic, they all accomplish very much the same thing.
    The root user is disabled because it does not have a valid password set. Because there are a number of ways to set a password, there are also several ways to enable root, including one method (the first we'll look at), that was designed specifically for assigning the root account password and only the root password. In addition, you'll see how the sudo command can provide root-level access even when the root password is disabled. We recommend that users access the root account only when absolutely necessary.
    Using the NetInfo Manager Utility
    There are a couple of graphical ways to enable the root account using the NetInfo Manager utility. Do not worry if you do not understand what the NetInfo Manager utility is at this time. We will take an in-depth look at the NetInfo Manager utility in Chapter 23.
    NetInfo Manager: Method One
    Click on Applications in the Finder window toolbar. Open the Utilities folder and then open the NetInfo Manager utility.
    If nothing appears automatically when you open the NetInfo Manager, under the Domain menu, select Open; then select the default domain, which will be /.
    Click on the lock button in the bottom-left side of the window to enable a mode that allows making changes. Enter the name and password of an administrative user; then click OK.
    Under the Domain menu, select Security. Then choose Enable Root User from the submenu. Unless you have previously set a root password, a message appears with a NetInfo Error, indicating that the password is blank. Click OK.
    Enter the root password you want to use, and then click Set. Remember that the root password should not be easily guessable.
    Enter the password again for verification, and then click Verify.
    Under the Domain menu, select Save. A request to Confirm Modification appears. Click on Update this copy.
    Under the Options menu, select Restart All NetInfo Domains on Local Host. An alert asking whether you really want to restart the machine's NetInfo servers appears. Click Yes.
    Click on the lock button again to prevent any further changes. Then close the NetInfo Manager.
    You might find it sufficient just to click on the lock button again to save your changes. Figure 11.5 shows an example of what an enabled root account looks like in the NetInfo Manager. Note that the password field no longer has an * in it.
    Figure 11.5 The root account has been enabled on this machine. Note the * that was in the password field has been replaced with an encrypted password.
    NetInfo Manager: Method Two
    You could try this alternative NetInfo Manager utility method if the first one does not work for you. The danger to this method is that it copies the password of another user to the root user.
    Click on Applications in the Finder window toolbar. Open the Utilities folder; then open the NetInfo Manager utility. If nothing appears automatically when you first open the NetInfo Manager, from the Domain menu, select Open and then select the default domain, which will be /.
    Click on the lock button in the bottom-left side of the window to enable a mode that allows making changes. Enter the name and password of an administrative user. Then click OK.
    Click on Users in the second list, and then click on a user you created whose password you know.
    Double-click on the value across from passwd in the bottom section of the window and copy it. What you are looking at is an encoded copy of the user's password.
    Click on root in the users list. Note that the default value for the password for root is *, which means that no one can log in as root right now. Using * in the passwd field is a way to lock a user from the machine.
    Double-click in the field with the *; then paste in the encoded password from the previous user to replace the *. The * should no longer be present when you are done.
    Select Save from the Domain menu. A request to Confirm Modification appears. Click Update This Copy.
    Select Restart All NetInfo Domains on Local Host under the Options menu. An alert asking whether you really want to restart the machine's NetInfo servers appears. Click Yes.
    Click the lock button again to prevent any further changes; then close the NetInfo Manager.
    Again, note that you might find it sufficient to just click on the lock button again to save your changes.
    Using the OS X Installation CD
    Because the OS X installation CD comes with an option to reset a user's password, you could use the installation CD itself to enable the root user.
    To enable the root account using the OS X installation CD, do the following:
    Insert the OS X CD.
    With the CD in the CD-ROM drive, reboot the machine. Hold the C key while the machine reboots.
    Wait for the Installer to appear and then select the Reset Password option under the Installer menu.
    Select the OS X disk that contains the root account you want to enable. If you notice a spinning CD icon appear after you have chosen the Reset Password option, don't wait for the spinning to end to select your OS X disk. The System Administrator (root) user appears as the default user.
    Enter a new password and then re-enter the password for verification. Click Save. Click OK when the Password Saved box appears.
    Quit the Password Reset application, quit the Installer, and click Restart.
    Using sudo at the Command Line
    Although we won't start looking at the command-line utilities in depth until Chapter 15, "Command-Line Applications," we take this opportunity to demonstrate some ways to accomplish tasks that root might do by using the sudo command-line utility. It is all right if you do not feel comfortable with trying anything you see in this section at this time. When you are more familiar with working with the command line, you can return to this section. If you do want to try anything in this section, you can run the commands in a terminal window. Just open the Terminal application in the Utilities folder in the Applications folder.
    Using sudo to Run Commands as root
    sudo is a command-line utility that allows use of the root account without necessarily enabling root.
    For example, in a terminal window, you could use sudo to reboot the machine now:
    [localhost:~] joray% sudo shutdown -r now
    The most common way to use sudo is to preface each command that you want root to do with the sudo utility. If you are asked for a password, use the password of the user who is executing the sudo command. If the user is not eligible to execute sudo, the command is not executed.
    If you need to execute a few commands in a row as root, you could try a couple alternative uses of sudo. When you are done with the tasks for root, type exit at the end of your session.
    In this example, your shell is elevated to that of root until you exit the session:
    [localhost:~] joray% sudo -s
    We trust you have received the usual lecture from the local System
    Administrator. It usually boils down to these two things:
    #1) Respect the privacy of others.
    #2) Think before you type.
    Password:
    [localhost:~] root#
    Notice that the prompt changes to include root#, as a reminder that you now have the power of root.
    In this example, sudo is used to run su to become root until you exit the session. When root is enabled, su can be used to switch to the root user. When using su by itself, the password you enter to become root is that of root, rather than yours, as you do with sudo.
    [localhost:~] joray% sudo su
    Password:
    [localhost:/Users/joray] root#
    Notice that in this example, the prompt also includes root# as a reminder of your power as root. Remember, to return to the status of a regular user, type exit when you are done with your root session.
    Using sudo to Enable the root Account
    Recall that the sudo command is used to execute a command that root might execute. A way to enable the root account is to use sudo to execute passwd, which is a command used to change passwords.
    Here is an example:
    [localhost:~] joray% sudo passwd root
    Password:
    Changing password for root.
    New password:
    Retype new password:
    [localhost:~] joray%
    The password that you initially enter is your password. Then you supply a password for root, and re-enter it for verification. If you mistype the password, you will be prompted again, as shown in this example:
    [localhost:~] joray% sudo passwd root
    Password:
    Changing password for root.
    New password:
    Retype new password:
    Mismatch; try again, EOF to quit.
    New password:
    Retype new password:
    [localhost:~] joray%

Maybe you are looking for

  • [SOLVED] phpMyAdmin - #2002 ( The server is not responding .. )

    Does anybody know why I can't login and keep getting this error message ? The tutorial I was following is http://wiki.archlinux.org/index.php/PhpMyAdmin. /etc/hosts # /etc/hosts: static lookup table for host names #<ip-address> <hostname.domain.org>

  • Subscript beyond count

    Hello. I have a problem querying cube data in BI Answer and I need urgent help. I use OWB 10r2 to create cube, but when I deploy cube I receive this error: ORA-06533:Subscript beyond count ORA-06512:at "OLAPSYS.DBMS_ODM" Please help me.

  • Incomplete/Inaccurate Functional Table of Contents

    I created my new template based on Apple's 'Contemporary' iba template. By doing so, I must have deleted some formating: My E-book has been rejected from iBookstore several times by now, because of the 'table of contents' issue. I may assume, it is b

  • How to disable debugger to stop at java internal exceptions?

    I'm debugging my code with following line: TimeZone tz = TimeZone.getTimeZone("GMT"); It works when I run it. But the debugger keeps prompting me there is uncaught exception when debugging it. In fact this method does not throws any exception. There

  • Performance monitor stops running

    In Windows Server 2012, in Performance Monitor, I have a user-defined Data Collector Set. It is configured to sample every 2 minutes. But it stops running after taking only 3 samples. Could I please get some advice on how to find what is stopping thi