Security of your Apple Account | Review before any change accounts on the device



Rep: (1777)
Security of your Apple account

This guide has only one goal - to help the reader keep his Apple device with his own.

Apple ID: Basics
IdentifierApple ID Is the username used for almost all Apple-related activities, including working with the iCloud service to store content, download programs from the App Store, and purchase songs, movies and TV shows on the iTunes Store. Get more knowledge on your Apple ID account from the article in Apple Knowledge Base .
Simply put, this is your pass to the i-ecosystem. Like any real document, the Apple ID is personal: one account is one real person (see user agreement).
For most users, an Apple ID (or "account") means using the app store first.
Remember:
- your account belongs only to you and only you are responsible for it; do not ask the consultant of the store to "customize your iPhone", do it yourself
- never transfer the login and password from your account to third parties
- Apple support can ask you for a username, but not a password
- keep your credentials and password in a safe place, do not forget the answers to secret questions
- recovering a forgotten Apple ID is relatively easy

A few words about iTunes
All content - apps, games (no matter you buy them or set free), music - leaves a trace in your Apple account in your account. All purchases are made once, re-install the software and music downloads - for free. This means that you can always remove, for example, an application, and then set it back - free of charge. Of course, if you have two devices, then using them is one and the same account, you can save money on games and applications: buy one - install both. The same thing happens when you change the device: you have access to all your applications, they need only to install.

"General" accounts
In the web you can find often the so-called "General accounts" - specially designed Apple IDs, usually administered by a group of persons. General accounts operate on the principle of the pyramid: the administrator creates an account, makes initial investments - buying a popular game or a program (usually - a set of software), and then starts to offer all interested persons access to your account for a small fee, we know from the previous point, that the purchased software re-installed without payment when logged into the shop under the account from which it is purchased.
Funds received from the sale of a password are partially spent on new applications, and partly - distributed among administrators.
Remember:
- the creation and use of "shared accounts" violate Apple's user agreement, such accounts are detected and blocked; The use of such an account threatens to lose all the applications installed from it.
- because of the illegality of the account, there are no guarantees that you will be given a password after the next shift
- after changing the password, applications installed from a shared account may stop working
- onsavagemessiahzine.comGeneral accounts are not and never will be!
However, there is no big risk in using someone else's account for the app store.
See how to properly switch to another account inthisarticle.

iCloud: account and features
iCloud service is the implementation of cloud storage, access to which is possible from the user's device with iOS operating system (version 5.0), OS â…© (with Lion version) or the Windows (with Vista version) over the Internet using a universal ID Apple ID available to each buyer's iTunes Store. Each user is given a free space (expandable for a subscription fee) for storing e-mail, documents and backup files. Also, the service provides the ability to automatically synchronize with the iTunes media library on the player, allowing you to keep using the iCloud music, books and apps.
In other words, iCloud is a proprietary service for Apple devices, allowing you to keep your files in the cloud and access them from all devices. In addition, it is possible to synchronize data, files and settings between all user devices.
You can register (more precisely, connect iCloud to your account) only from iPhone, iPad and iPod Touch when you first access the iCloud settings directly on your device. Therefore, the service is not available to owners of iPod Classic, Suffle and Nano.
With the upgrade to iOS 7.x.x Apple introduced a new feature to protect your device - bind to iCloud. This function is called Find my iPhone and includes remote monitoring of location-bound device management (inclusion audible alarm and message display) and, most importantly, remote erase content, and inability to re-activate the device. Furthermore, such a device can use only the host, because a password is required by Apple ID, used in the binding. Get detailed information on the Find my iPhone system can behere.
Remember:
- Find my iPhone provides increased security when using the device; You can not be afraid of the loss of the device, because personal data can be easily erased, and the device itself can be made inactive
- never tell third parties your login and password: they can erase your device connected to Find my iPhone or block it
- do not forget the credentials, this can turn into big problems - for example, the inability to reactivate the device
- you can use different Apple ID for iCloud and app store
- see how iCloud settings window looks like on iPad example:
Attached Image


ICloud fraud
With the release of iOS 7, a new type of fraud has appeared on the Web - fake shared accounts. The actions of intruders are primitive and designed for an inexperienced user: as is the case with this account, you are offered a login and password, often completely free. But they are asked not to enter them into the application store login form (seeabove), and into the iCloud login window (look at itagain)! Attackers ask you to connect your device to their iCloud account. It is not hard to guess what is happening next: the device is locked remotely, and a message appears on its screen with a demand for a cash redemption for unlocking.
There is another option when the attackers gather information about the victim (most often - in social networks and forums), and then gain access to the e-mail, which is registered Apple ID (typically - Reset your password through the checklists). Owning mail, fraudsters password reset your Apple ID and change it to your gain access to iCloud and block your device. Usually, the victims in the mailbox attacker creates a filter that removes all letters from Apple, the device thus remains tied to the account of the victim even if restored access to email, and the victim is trying to reset the password - letters she does not see. In this case, you need to: restore access to a mailbox by contacting tech support email provider, change your password and security questions, turn off all filters and try to recover the password to the Apple ID.
Remember:
- never enter your Apple third-party ID into iCloud settings
- use complex passwords and security questions
- if it still happened, and your device is locked - do not go on negotiations, contact Apple technical support, starting with reading the topic headerI can not activate, requires apple ID

Conclusion
In this article, we briefly introduced you to the core of the Apple ecosystem — Apple ID, your personal account. Repeat the main points:
- your account belongs only to you
- do not forget passwords and other credentials, store them in a safe place
- always keep track of what entrepreneurial merchants offer you
- always remember that iCloud is like underwear: only yours and nobody else's; iCloud login form is for your account only
- do not forget: free cheese is usually not the same and free; do not rush to do what you do not know or do not understand; Remember that only smart people learn from the mistakes of others.

Post has been editeddirectorgeneral - 13.08.16, 16:49



Rep: (674)
M
Topic is closed


Full version    

Help     rules

Time is now: 09/09/20, 15:36