In iOS 9 how you unfollow someone who share their location with you?

Since we no longer have the app for friends to find how disable you someone following you? I have people who come in my friends list to find inside the Mac OS 10.11.6 notifications bar that I don't want to see. How can I get rid of these people? I tried to remove his business card, but it does not work.

I thought about it, to find friends application is on the phone just hidden in a folder. You go and remove the people you don't want to see.

Tags: iPhone

Similar Questions

  • How to block someone who is in my safe senders list

    How to block someone who is in my safe senders list

    In your email to remove access to its reliable lists and if you want to block, add to the block list.

  • Someone who can help me with.  Updated Adobe Bridge CS6 5.0.2 update is not applicable. Error code: U44M2P28

    Someone who can help me with.  Updated Adobe Bridge CS6 5.0.2 update is not applicable. Error code: U44M2P28

    be sure to use the correct update (32 or 64 bit).

    http://www.Adobe.com/downloads/updates/

  • I received a phone call from someone who claims to do with Microsoft.

    Original title: scam?

    I received a phone call from someone who claimed to be 'windows', and he said that they had received a message from my computer that he downloaded a virus.   When I asked to get her phone number to call to check, that we have been disconnected.  What is the scam here?  I traced the call to 253-802-0309, which is International Telecom.

    Calls unrequested telephone of this nature are almost always a common scam. Do not let them give any info, do not give access to your PC, not give them all the money and do not go to all the websites that they suggest. One moment.

    Please see:

    http://www.Microsoft.com/en-GB/security/online-privacy/avoid-phone-scams.aspx

    Microsoft issues never not solicited for phone calls of support or security.

    These types of callers can use completely fictitious names or bogusly claim to be of real companies other than Microsoft as well.

  • Hi there, is there someone who can help me with a safe way to turn my site into sensitive site?

    Hi, I'm new to BC and I have a site that is created on the platform of the BC, but unfortunately this is not admissible. Is there anyone who can help me with a safe way to turn my site into sensitive site?

    Of course. Send me the link and I can quote it. It could be days rather than hours to do it properly. There, some work involved to do this.

    [email protected]

  • Looking for someone who has an Alienware with dual ATi R9 M290X 18 cards

    Just get one of these systems and research if anyone else have one of these systems and want share their experiennce?

    The two GPU appear as discrete units in Device Manager, even before you install the AMD drivers. Once you install the AMD Catalyst Suite, Crossfire is enabled/disabled in the center of control of AMD, as well as various other configuration options.

    A question, as I have said in my original post - I had to disable Ultra Low Power State (ULPS). It is a part of the AMD Catalyst driver that is not well optimized for Crossfire configurations and instead to reduce the consumption of energy on two cards, it tends to force one that runs at full clock speed or 99% people whatever the load, which is obviously not good. A small utility to turn off ULPS is here: http://www.sevenforums.com/tutorials/316913-ulps-ultra-low-power-state-disable-amd-crossfirex.html . He cured the problem for me.

  • How many people can I share my folio with?

    Hi, I am looking to share my folio with up to 80 users. Is he a linit to the amount of people I am able to share it with?

    Thanks for your help. Much appreciated!

    Anyone who seeks to share content through Adobe Content Viewer in bulk: there will be restrictions and limits on the number of id, you can share the folio with in the future because of security concerns, so plan accordingly.

    P.S. I think that the current limit is around 300 that will be reduced in the future.

  • A call from someone who says they are with windows and there is a problem on my laptop anonomous

    I just got a phone call from a person saying they are with windows and there is a problem with my laptop. This happened to someone else and how is it possible to know what type of camera I use (e.g., laptop computer)? How can I check to see if someone else has access to my account?

    The game, June 5, 2014 19:29:39 + 0000, mslindatx wrote:

    I just got a phone call from a person saying they are with windows and there is a problem with my laptop. This happened to someone else and how is it possible to know what type of camera I use (e.g., laptop computer)? How can I check to see if someone else has access to my account?

    It's a scam and with all the names and phone numbers, one who has
    become very frequent lately. See
    http://www.troyhunt.com/2012/08/virus-scams-social-engineering-victims.html
    and
    http://www.howtogeek.com/176605/tell-your-relatives-no-Microsoft-wont-call-you-about-your-computer/
    and
    http://www.howtogeek.com/180514/the-%E2%80%9ctech-support%E2%80%9D-scammers-called-Htg-so-we-had-fun-with-them/

    In addition to their money get on your part to do anything of any value,
    If you leave them in your computer, who knows what they were doing or where
    What confidential information they stole.

    So if you have done so, I highly recommend that you do both of the following
    immediately:

    1 do a clean reinstall of Windows.

    2. change all of your passwords, especially banks or other
    financial sites.

  • How to stop someone from changing my password with the hack of sethc.exe?

    Today, I just read that ANYONE with an ERD can start my computer and reset my password. If they copy the command prompt in the sethc.exe file, they can reset your password using the StickyKeys. I read it here: http://www.pcworld.com/article/249181/how_to_reset_your_windows_password.html

    I tried it and it worked. Now, I am very concerned that someone will be able to make my computer. How can I stop people hacking my computer by doing this?

    Thank you very much

    -JP

    Hi JP,

    Please contact technical support for your computer manufacturer - you'll need be specific enough on the details and specifications to get the right answer (it varies not only by the manufacturer, make and model, but by the internal components and BIOS versions)- and ask for the procedure (if necessary - and it is usually) to set up a BIOS password.

    This can then be assigned to be required before you can start by any other method.

    And Yes, there is probably another way to get around that - but it would be much more difficult and almost certainly need to open the computer on a variety of procedures for workarounds.

    It is usually sufficient protection for most people who want an extra layer.

    Good luck.

    Kosh

  • I received recent phone calls from someone who says they are with Microsoft

    I received phone calls recently from a person saying they are with Microsoft and that my computer has been downloading unnecessary files.  They claim they know because the error and warning messages are sent to the Inbox of Microsofts.  I am reluctant to talk more with them.

    How can I be sure of who's calling?  In addition, if it is true, how can I check my computer?

    Hello

    Calls unrequested telephone of this nature are almost always a common scam. Do not let them give any info, do not give access to your PC, not give them all the money and do not go to all the websites that they suggest. One moment.

    Please see:

    https://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    Microsoft issues never not solicited for phone calls of support or security.

    These types of callers can use completely fictitious names or bogusly claim to be of real companies other than Microsoft as well.

  • I just got a call from someone who claims in partnership with Microsoft.

    They said that my computer was sending error reports and they wanted me to download a program of monitoring Viewer to teamviewer.com.  I refused when they didn't know what version of windows I was using.  A feedback?

    Tuesday, May 22, 2012 23:45:12 + 0000, JohnKohlwey wrote:

    They said that my computer was sending error reports and they wanted me to download a program of monitoring Viewer to teamviewer.com.  I refused when they didn't know what version of windows I was using.  A feedback?

    They are not Microsoft partners and your refusal was very wise.

    It's a scam and with various names and phone numbers, is
    becomes more common lately.
    In addition to their money get on your part to do anything of any value,
    If you leave them in your computer, which knows what losses they did are
    where confidential information they stole.

    So if you have done so, I highly recommend that you do both of the following
    immediately:

    1 do a clean reinstall of Windows.

    2. change all of your passwords, especially banks or other
    financial sites.

    Ken Blake, Microsoft MVP

  • How can I get a list of locations with address and contact information?

    In Adobe Story more, I have gone through the effort to enter the address and the contact information for all locations. Now, I would like to use this information.

    When I choose the sets and locations, I get only names, separated by the Studio and location. No location, no address.

    When I choose to export the list in XML format, I get an XML file that appear to contain address information. However, there don't seem to be a valid, readable XML file or in Excel or Google Docs.

    There are reports that I can create that include this information? Is there a way useful to export XML and open in Excel/number/Google Docs/Word, etc.?

    I'm about to start looking how the XML code can be formatted correctly, but it isn't really where I wanted to spend my time on this project.

    Thank you.

    Yes. I tried on a version of Windows.

    Could you do the following steps to view this XML file in table form in Safari? Then Safari, you can copy paste it Excel.

    1 export the XML from the history list.

    2 check out the "transformSetListIntoTable.xsl" file in the attached zip file and place it in the same directory where the XML list value.

    3. open the xml list file in a text editor and paste the following in its debut.

    4. save the changes.

    5. open the list xml file defined in Safari

    6. in Safari, select all and paste it inside Excel.

  • How do I enroll in a new location with the same email address

    I have registered in the UNITED Arab Emirates, but am now in England and cannot make a purchase online

    Contact technical support by phone or web chat.

    Mylenium

  • Does anyone know how to find the ip address of someone who is to be a nuiscance?

    Does anyone know how to find the ip address of a person who uses different names to communicate with you. A member of the family has problems with someone who does this.  Thank you in advance, I know one of the guys will help me.

    Hi, Ros,

    Use the e-mail headers

    http://www.johnru.com/Active-WHOIS/trace-email.html

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

Maybe you are looking for

  • new windows open randomly - even when you're far away computer

    Firefox open new windows at random, but a new window every 30 to 60 minutes. happen without user input - even when the screen is locked - when I unlock the morning on 10-20 new windows opened. --new installation of arch linux with only a few packages

  • I can't activate "Remember passwords for sites"

    I am trying to enable the "Remember passwords for sites" option after you install mozilla again due to problems with the computer and mozilla does not allow me to do. I tried to change things in my antivirus without success. What can I do?I send a pi

  • The new synchronization process and the master password do not mix

    Article why I can't sync my passwords? linkified ~ J99 says that the password inhibits synchronization, which explains why the "password sync" option is grayed out, if the password is used. Then to syncv passwords that must disable the master passwor

  • Satellite A300-1NO - wakes up to the top of the standby mode

    Hi all!I have a Satellite A300 1NO with Win XP pro.The problem is that the laptop wakes up from sleep mode automatically after about 5 minutes. I tried unplugging all the cables (LAN, usb, etc.) but the power plug, but it's the same result.So what ca

  • FMS Flight Simulator

    I recently bought a Flight Simulator and it says the d3drm.dll are not installed. I went to a website to download and also move in the correct folders that the manufacturer suggests and still no chance someone can it help?