At that time, the free update will begin rolling out across local Windows Stores, and will be available “at retail and on new devices” from the 18th onwards, depending on your region.
Both the iPhone and iPod touch contain Liquid Contact Indicators which change color when they come into contact with water. The crux of the issue, however, is that these Liquid Contact Indicators were also prone to change color in humid environments.
To qualify for a cash refund, you must: (a) be a United States resident; (b) Apple denied warranty coverage for your iPhone on or before December 31, 2009, OR for your iPod touch on or before June 30, 2010; (c) when it was submitted to Apple for warranty coverage, your iPhone or iPod touch was covered either by its original one-year limited warranty or by an AppleCare Protection Plan; and (d) Apple denied warranty coverage because Apple stated that your iPhone or iPod touch had been damaged by liquid.
The chart below is instructive, but note that the amounts are subject to change depending on how many folks actually file claims.
Do I even have to remind you to backup your systems early and often? I’ll resist the temptation to scold those of us who don’t do an adequate job, and consider that you may well just not be aware of how easy and cheap it can be today.
Lifehacker’s Alan Henry has come up with a great list of the top five best online backup services. A quick summary of each…
Carbonite is one of the web’s most popular online backup services, and for good reason. The Carbonite client runs quietly in the background uploading your data to Carbonite’s servers to make sure it’s safe in case something happens to your computer. Carbonite can automatically back up documents, music, email, and other files (although it manually backs up video), and grants you access to those files and your archives on your smartphone.
Backblaze earned praise from many of you for being easy to set up, even for non-technical people. It’s built for people who want to get their data backed up, without being forced to search for error codes and cryptic status messages whenever something goes wrong.
CrashPlan is our favorite backup tool for Windows, for the Mac, and we’ve even shown you how to build a bulletproof backup solution with it. CrashPlan gives you the flexibility to back up any folders you select on your computer (or whole drives, if you prefer) to external hard drives, other computers on the same network, a friend’s computer across the internet, or online to CrashPlan’s own servers, where it’s stored and encrypted to keep your data safe.
SpiderOak is well known as one of the most privacy-centric cloud storage services, but it’s also a great backup service. The same power and features that you get for file syncing and access extend to its backup client, and SpiderOak’s “Zero Knowledge” policy extends to your backups as well. Even they don’t know what you’re storing on their servers.
Bitcasa Infinite Drive is relatively new, but it’s one of your favorite cloud storage providers in general, mostly because they offer virtually unlimited storage for syncing and backups. When we say unlimited, we mean it—some of you are using terabytes of storage with Bitcasa. It’s not primarily a backup service though, and while it was built for file syncing and storage, the Bitcasa desktop client does support regular file backups.
According to an article out in the Wall Street Journal this week, it appears that the FBI has been busy exploiting vulnerabilities in the Android operating system to spy on people. Hopefully they’re just spying on the bad guys, but with things going as they have been lately, who knows?
According to the WSJ’s source, the FBI resorts to these tactics when they’re out of options, and “don’t have any other choice.” The tools used to gather the data are often installed remotely, using essentially phishing style links that injects essentially Trojan software when clicked by a suspect under surveillance. They can also be installed via physical access and a USB drive, the report says, and in all cases the FBI tries to ensure only “relevant data” are gathered by its hacking efforts, through the use of a screening team that checks for relevancy before handing information off to investigators working the case.
The FBI employs a number of hackers who write custom surveillance software, and also buys software from the private sector, former U.S. officials told the WSJ.