How can I add a person who has an iPhone to my imessage

I tried to message someone with an iPhone from my iPad, but he says not delivered because they are not in my contacts iMessage. How can I add the contact?

Hello

IMessage works from iPhone to iphone just make sure you have direct contacts on both devices & ipad

See you soon

Brian

Tags: iPad

Similar Questions

  • How can I add a separate apple for the iphone and ipad wife id

    How can I add a separate apple for the iphone and ipad wife id

    Hi, are the measures already implemented? If they are, you need to configure them again and establish a Apple ID at this time.

    Apple ID - Support official Apple

  • How can I check the owner, who has installed oracle s/w on the server?

    Hi all;

    My server with "n" of users. Suppose I want to find out who is the owner of the oracle software.

    How can I check it? Is there a specific file to find out?

    Thanks in advance...

    > Can we consider OraInventory location to determine the owner of the oracle s/w?

    You can do anything that you consider appropriate on your system.

    IMO, the OS user which has the Oracle software is "qwerty", as evidenced by the ls command.

  • My menu bar disappears suddenly. How can I reinstall it? Who has ' file, publishing, display, Favorites, etc. Thank you.

    The top bar is the one w / refreshment, X, then the bar to type in host sites. The menu bar has been below that it has now disappeared and I have a bar that says: "The most visited, free Hotmail & Windows."
    I got several sites registered in my favorites for my home business and I can't go to them now. Thank you.

    Menu bar is missing

    How to show or hide various toolbars?

    Back and before or other toolbar items are missing

    Frequently asked questions after Firefox update

    Check and tell if its working.

  • In Windows 7 (64 bit) how can I add sleeves personalized to an mp3 downloaded?

    I converted audio video in an mp3 player and I want to create custom however, album art when I right click on the generic music note, that he don't give me the ability to create custom album art. I can only "find album info" but this will not help me because the mp3 is not a part of any public album.

    Help, please! I don't understand why it won't allow me to create a custom cover. I have WMP version 12.0.7601.17514

    Make your image in your favorite photo editor or whatever. Save it as a .jpeg file.

    Download and install mp3Tag and use it to add the jpeg file to your mp3.

    See you soon,.
    Jerry

  • How can I get this circle who has rounded soft vertical dashboard?

    I want to know how the soft rounded dash VERTICAL.

    http://Tinypic.com/r/33jqtc4/6

    Chemun Wong (or is it Wong Chemun?).

    To get dashes to fit perfectly all the way around (instead of too big/small pit where he meets himself, probably the anchor on the right), you'll (probably) need to use the script of dashes adjust free available here:

    http://PARK12.wakwak.com/~SHP/LC/et/en_aics_script.html

    A third way for the same number of rounded lines / dashes, is to:

    (1) create a vertical line with round caps and the length and width of the supposed (dash);

    (2) move a copy vertically downwards by the desired RADIUS and to combine the two.

    (3) effect > Distort > Distort & Transform > transform with angle of rotation 360/desried number and less exemplary.

    You can set the width (dash) freely.

    As it appears, this third way reuses elements of the way first.

    The path from the fourth to the 10th may well reuse elements of the first three.

  • How can I stop the pirate who has gaqined acccess to all my email contacts, to send spam to them since my email account.

    I was using my computer in an airport with Wi - Fi free and open my email account and responded to a known contact who asked me to click on click here to open the video. When I did another option was presented, which was to click on one of the three to win a prize. Then I tried to delete the message but couldn't, tried to sign out of the account but couldn't that be and could not access my mail for at least 15 minutes, when I was able to disconnect. I signed up again and remove the problem as spam e-mail. Check my emails sent and discovered that the e-mail I had received had now been forwarded to everyone on my contact list. This happened the Feb.15th, I sent emails to all my contacts to inform, not to open no matter what mail from me because I had been hacked. I received the Feb.16th 13 mail delivery failure notifications and notifications of failure of Feb.18th 11.

    Hello

    I recommend you to change the email password and also communicate with the mail provider to resolve the problem.

  • How can we invite a friend who has a Windows Live account?

    I clicked on this contact everyting and cannot produce the feature 'guest' I accidentally launched with another contact.

    Hello

    I would recommend posting your query to community specific to Microsoft Windows Live. Please visit the links below to find a community that will support what ask you in the right direction for Windows Live.

    http://windowslivehelp.com/

  • How can I add 1 single album to my iPhone without deleting my music together with a new library? Last update for iTunes, OS Yosemite. I use to be able to add more albums of all 3 of my computers. Phone is synced to iMac.

    Add an album to the iBook/iMac iPhone

    An i - device can synchronize with a library at a time. You can have the same library on multiple computers, but if you have different libraries it was never possible to synchronize the individual elements of a second library to iPhone synced to another library.  If these are purchases on the iTunes Store, or you use iCloud centralized as game or music Apple Sync, you can download in iCloud.

  • How can I fix the icons who are unable to move the bar to the add-on?

    How can I fix the icons who are unable to move the bar to the add-on?

    It didn't help me, but it was a good try. I found an extension called U I 1.4.4 Fixer who did most of what I was looking for. Thanks for answering my question so quickly Cor - el.

  • How can I add the "open a new tab" button back to tabs & bookmarks to the menu bar? I was able to click and drag the bookmarks there and the tab button has always been thr

    How can I add the "open a new tab" plus button back to tabs & bookmarks to the menu bar? I was able to click on and drag the bookmarks and folders containing the bookmarks in the menu bookmark to a bar of tools and click the tab + button was always on the right side of a tab before seeing ff 13.0.1 on windows 7.

    I need back, areas have red around em

    http://i48.Tinypic.com/25gue0x.jpg

    Draggin ' bookmarks toolbar items, it's done. Thank you for the mind can.

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

  • always get the files "prohibited" a a person who has been added to "sender".

    I always get "Prohibited Files" of a person who has been added to "sender". I tried for a month to get these files. They are very important, I need these files. This is very aggravating. HOW CAN I OPEN THE FILES?

    Hello

    ·         What happen when you try to open the files?

    ·         When exactly do you get the message?

    ·         What exactly do you mean by prohibited files?

    Response with above information to better help you.

  • How can I add my signature to a document

    How can I add my signature to a document

    Hi Jessica,.

    To place the signature to a document, follow these steps:

    1 - Open the pdf file and click comment tool

    2 - type pencil icon which is given in the toolbar at the bottom.

    3 - Select the location where you want to place your signature on the document.

    4 create the Signature and press 'done '. It can show you the signature ready to use with your initials in this place, you can use or you can create your own.

    5. also you can change the color of the signature, it also allows you to remove the signature, if you want.

    To change the color, hold the signature and the pop-up will come who will give you the option to change the color.

    I hope this has been helpful.

    Thank you!

    Shivam

  • How can I add a second computer to my account?

    How can I add a second computer to my account?

    Your single license allows you to have two active facilities, which means that you can have it installed and activated on both machines.  You can have the software installed on the machines as much as you want, but only two of them can be enabled at any given time.

    With regard to the use of both machines at the same time, the jury's currently on it - I had the question of clarification, but has not yet received a response.  They have rewritten recently the license agreement and the portion that explicit, that you can not use both at the same time has been either deleted or moved somewhere else, I have yet to find.

    If you mean you want to have another machine under license for someone else to use, you must purchase a new license for this other person.

Maybe you are looking for