How to uniquely identify a computer based on Gmail, Skype and Apple updates [closed] - serial-number

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 13 years ago.
Improve this question
I bought an iMac some time ago. Although it was stolen some time ago, I managed to get the Serial Number from the provider who sold it to me. The point is that I know who took it and also that he is using it.
I have received gmail from him and also Skype. Could I somehow identify that serial number based on those messages?
If not, what about the Apple updates? Do they keep track of the serial numbers and IPs from where the update has been done?
I´ve looked at the different threads here and nobody seems to have an answer to this.

Nope, you're out of luck.
However, if you've got something credible showing that your buddy stole the machine, you should be able to get the police/judge to allow a very specific search to physically enter his place and check the serial on the box.

Related

How to delete data from iPhone without being able to recover it again [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
I want to sell my iPhone5, I have captured photos through its camera. Before selling I deleted all of my private pictures but I am worried that someone else will recover it.
My question is what should I do to delete photos permanently from iPhone5 without its recovery again.
Please help me. Thanks in advance.
Back up options :
You should use apple iCloud to store all your data which will be connected with your apple id online and can be restored any time.
Use iTunes to back up all your data to your local system.
Reference
Post 1 or 2 delete or factory reset your phone, which will wipe out all data and then it would be safe to sell it.

Apple's guidelines, regarding Network communication, encrypted data [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I am going to need to have encrypted messages between my app and my server.
I was going through apple's documentation to find something about that issue.
(basically I need to encrypt the way the communication is going on so that no other app can imitate that and use my server)
Does anyone know if this can pose a problem with Apple?
No apple has no problem with this, but....
If you are using strong encryption you will have to get a licence, look at this site for more details. The documents they provide when get the licence you will have to upload to apple when you publish your app.
I also found this SO which points to this blog which details how to obtain permission.

Would I get away with releasing an unfinished app? [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
So I'm going to do an app. It will have about 100 recipes, and so far I've only done 4. I need to have it submitted to the App Store tomorrow.
My question is, if I'm not done by then, could I get away with just polishing what I have and then submitting it? Would Apple or my customers hate my client?
It is very rare in software development to release an application without a few known defects, so long as those defects are not critical to the functionality of the application itself. This is why versioned releases exist. That being said, unless you have a clear understanding of what your client wants, via a customer statement, it may be hard to determine whether or not your client will respond in a positive manner.
If you're down to a crunch, polish up what you've got, make sure it works, and cross your fingers. Your other option would be to request pushing back the release date.
4 out of a 100 probably wont cut it though. :P

Does Twitter track a tweets originating IP Address? [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I had an iPad stolen a few months ago. A few days ago, the thief accidentally tweeted a random photo. That iPad has location services and iCloud disabled, so that's out. But, it brings me to the question at hand...
Does Twitter track the originating IP address for each tweet? If so, is there any immediate way to get it? I don't see it in any API documentation.
Here is all the data I can muster about said tweet: http://api.twitter.com/1/statuses/show/215632207346270209.json
They sure do, but you will have to obtain a court order for them to hand it over to you. Plus you will need a court order to get the user details from the ISP

Blackberry: Web Filtering [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 11 years ago.
Improve this question
I want to block the particular website from access to user. Is there is any API to block the website on blackberry.
Or is there is any way by which i can get the notification that which website is opened.
thanks in advance
This is possible if you are device is using BES. I'm sure that it would have to be controlled by an IT Policy in the BES. A single, standalone application should not be able to simply take control such access controls.
I don't know much about how BES works, but my understanding is that if you have administrative access to the BES infrastructure, you can institute "IT Policies" that can control pretty much everything about the devices that operate with your infrastructure.

Resources