Skip to main content

How to delete the lost mobile phone's full data

Smartphone users keep a lot of important data and pictures in their phones, videos and so on. Many users themselves forget their mobile somewhere, or their phones are stolen. In this case, the biggest tension for the users is the private data in the phone. The user fears that his phone's data is not misused. If you have been through such a problem, then today we are telling you about a Google service.

With this help, you can delete data without touching the phone without having to login to Google. Let's know about it.
Note- After the mobile is lost, Google's Service Find My Device is used to make your phone
Should be on-the-go
- Must be logged in to Google account
-Mobile must be connected to WiFi or Internet
-The device location should be ON
- Find My Device Service On
Work on the mind instead of being disturbed when the phone is gone. The hurdle can cause more trouble for you. First log in to Gmail account. Now search android.com/find.
After Gmail is logged in, any number of phones connecting to your Gmail will now appear on the screen. Choose the handset that is missing your phone.
If you think that ringing the phone is likely to be available, then the phone can ring through the options available on the screen. In this feature even if your phone is silent, the ring will ring.
If you want your phone to be locked after it is lost and no one is able to see the data inside it, then you can do this in Google's special service. Just below the ring, you will see the 'LOCK' option. You can also leave a recovery message and contact number on the screen by locking your phone.


If you think that the phone is difficult to get back and the data in the phone can be misused by someone else's hands, then you have the last version, delete the data. Select the 'ERASE' option to delete the data. After that all the data permanent of your phone will be deleted.

Comments

Popular posts from this blog

How to Secure Your Wireless (Wi-Fi) Home Network

How to Secure Your Wireless (Wi-Fi) Home Network Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless devices anywhere in the house without the clutter of cables . With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment. This practice, also known as piggybacking, is bad for three reasons: It will increase your monthly Internet bill especially when you have to pay per byte of data transfer. It will decrease your Internet access speed since you are now sharing the same internet connection with other users. It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network. [*...

How to secure gmail account

A recent information was provided by mail service provider Yahoo, which surprised and impressed many people. Yahoo said that about 3 billion users of Yahoo! accounts were hacked in 2013. People's passwords, personal information and other data had reached hackers, which did not even have information about users. Yahoo has described it as the Internet's biggest hacking. At the moment, Yahoo is on the verge of ending, and in 2016 it was purchased by VariJion Communications. Well it was a matter of Yahoo, but at the moment most users of Gmail use Gmail. If you also use Google Mail, you can tell that hackers are trying to hack more users' Gmail account than hacking social networking accounts these days. Your entire online information is attached to Gmail, through which hackers can steal all information about you and misuse them. In this case, you have no choice but to increase the security of your Gmail account. Follow these steps to protect your Gmail account from h...

How To Lock Aadhaar Card

While creating the Aadhar card, the government stores fingerprints and retina scan data, which is called biometric data. It is used for base verification. You can lock this biometric data sitting at home. Visit the UIDAI website and Lock / Unlock Biometrics? Click on You will now have the option of Lock your Biometrics. Insert your 12-digit base number below it and send the OTP. After this there will be a one time password on your mobile. After that open the OTP in the OTP bar of the open page and click on Verify. Now check enabled biometric locking. After checking enabled biometric locking, click on the enable. If you want to disable the lock, then uncheck the enabled biometric locking. Disable it again. In this way you can lock / unlock your base biometric data. Explain that after locking the biometric data, the transaction based on the basis and request will be validated only through OTP sent to the mobile number. The thumb and iris scan facility will end.