Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Try This Weird Trick to Free Up Space on Your iPhone

b2ap3_thumbnail_iphone_storage_trick_400.jpgIt’s a situation that’s all too familiar to an iPhone user: after taking a gorgeous picture, or trying to download a new app, the device flashes up a warning that there is not enough storage to complete the download. So what do you do?

Most people would do either of two things, depending on how badly they wanted to complete what they had first attempted. They would either start cleaning out the apps on their phone, deleting the ones they no longer used, or give up and not download the app. However, what if there was another option? One that would allow a user to free up storage space without sacrificing other files and applications that they would rather keep?

According to Reddit user eavesdroppingyou, there is a trick that has been verified by dozens of other users and quite a few technology websites since the original thread was started. All one has to do is try to rent a movie from the iTunes store. Not just any movie, however; one with a file size larger than the amount of available space left on the phone.

The trick works like this: a user enters the Settings on their phone and checks how much space is left available in the device’s memory. They then enter the iTunes store and attempt to rent a movie with a file size larger than the allotted space remaining. The phone will notify the user that there is not enough available storage to download their selection, giving the user the option to either accept the notification or travel back to Settings. If the user returns to Settings to reevaluate their available storage space, it will have increased since they attempted their futile download.

This is apparently because the iPhone will try to make room for the file by clearing out extraneous data from the apps you already have, like cookies and histories, which take up extra space while serving no real purpose. This process can be repeated, as the memory gains will most likely be incremental. After a few attempts, however, a user can accumulate a considerable amount of extra space. Commenters and posters on the Reddit thread and the various websites publicizing the find have reported memory gains ranging from a few hundred megabytes to a few gigabytes.

What makes the process even nicer is that, since the rental is unable to complete its download, the user is not charged for it and receives data space at essentially no cost. As long as, that is, they remember to check their available storage between attempts, so that they don’t inadvertently rent a movie by clearing up enough space to host it on their device.

Furthermore, this in no way voids any warranty and requires no jailbreaking of the device. The riskiest aspect of this method is the possibility of the trick adding a few megabytes of data to the phone (as has been reported by a few commenters), or perhaps renting a movie that there was no interest in watching. Regarding that, who knows - the rented movie just might become a new favorite.

How would you make use of the newly freed-up space on your phone? Leave a comment below and let us know what your next download will be!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Data Backup Ransomware Windows 10 Office Data Recovery Cloud Computing Server Save Money Passwords Windows 10 Saving Money Holiday Gadgets Chrome Tech Term Virtualization Social Media Managed IT Services Managed Service Microsoft Office Automation Cybercrime Artificial Intelligence Operating System Facebook Computers Health BYOD Internet of Things Mobile Device Management Networking Wi-Fi IT Support Hacking Alert Covid-19 Spam Information Managed Service Provider Office 365 Telephone Systems Information Technology Remote Recovery Employer-Employee Relationship BDR Bandwidth Social Engineering Mobility Router Law Enforcement Human Resources Application Remote Monitoring Password Money Big Data App Encryption History Applications Data Breach Mobile Computing Private Cloud Remote Computing How To Blockchain Managed IT Paperless Office Mobile Office Apps Data Storage Patch Management Office Tips Training VPN Government IT solutions Avoiding Downtime Entertainment Website Data Security Budget Two-factor Authentication Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Vulnerability Infrastructure Voice over Internet Protocol Windows 7 Word Wireless Google Drive Flexibility Servers Marketing Gmail WiFi Settings Firewall USB Virtual Reality Vendor Apple Save Time Managed Services Display Social Software as a Service Telephone System Staff User Error Machine Learning Meetings Cleaning Connectivity Employee/Employer Relationship Remote Work Conferencing RMM Scam Risk Management End of Support Hacker Education Physical Security Safety The Internet of Things HIPAA Lithium-ion battery Sports Redundancy Vendor Management Data Protection Keyboard YouTube Compliance Help Desk Comparison Printer OneNote Printing Black Market Computer Care Bluetooth Fax Server Current Events CES Telephony Samsung SaaS Document Management Business Technology Managed Services Provider Content Management Wireless Technology Access Control Solid State Drive How to Downtime Value Database IT Consultant Network Congestion Virtual Assistant Remote Workers Authentication Electronic Medical Records eWaste Spam Blocking Data storage Humor Automobile Processor Hiring/Firing Update Computing Infrastructure Hard Drive Going Green Wearable Technology Hard Drives Retail Google Docs Instant Messaging Computing Identity Theft Robot Excel Battery Business Intelligence Biometrics Shadow IT Audit Worker Virtual Desktop Legal IT Management Virus Augmented Reality Internet Exlporer Digital Signage Fraud DDoS Botnet Unified Threat Management IT Plan SharePoint Computer Accessories PDF Remote Worker Unsupported Software Cryptocurrency Procurement Proactive IT Charger Net Neutrality Customer Service Workplace Strategy Environment Best Practice Hosted Computing Antivirus Experience Sync Employees GDPR Emails Employee/Employer Relationships Windows 8 Scalability Wireless Internet ISP Online Shopping Windows 365 IT service Business Owner Video Conferencing File Sharing ROI NarrowBand Inventory Two Factor Authentication Shortcuts Specifications Printer Server Sales Camera Netflix Bitcoin Point of Sale Tablet Search Root Cause Analysis Personal Wire Cryptomining Evernote Travel Domains HBO Supply Chain Management iPhone Knowledge Music Batteries Millennials Skype Monitoring Printers Windows 8.1 Data loss Digitize Smart Office Wireless Charging IaaS Maintenance Bloatware Outlook Files Leadership Windows Server 2008 R2 Troubleshooting Chromecast Workforce Start Menu Customer relationships Virtual Private Network Email Best Practices Tablets Screen Mirroring IT Assessment Loyalty Manufacturing Cables Entrepreneur Frequently Asked Questions Colocation Uninterrupted Power Supply Books Managed IT Service Nanotechnology Security Cameras Telecommuting Mobile Computer Tips Project Management Windows 10s Virtual CIO Cast OneDrive Monitor Biometric Security Cortana Shortcut Consultant Cost Management Tip of the week Peripheral webinar Digital Signature Emergency Public Cloud Using Data Employer Employee Relationship Social Networking Analytics Professional Services Digital Security Cameras Warranty Copiers Reputation HVAC Assessment 5G Streaming Media Google Apps Best Available Content Windows Server 2008 Quick Tip Tech Support Analysis Laptop Devices Smartwatch Running Cable WIndows 7 Tools Ergonomics Techology Administrator Memory Development Customers Enterprise Content Management Television OLED Audiobook PCI DSS MSP Virtual Machine Accountants Fiber Optics Touchpad Thought Leadership Employee Credit Cards 2FA Microchip Messaging Password Management Public Computer Cabling Password Manager Transportation Multi-Factor Security Politics Regulations Policy Advertising Hypervisor Computer Fan Trend Micro Twitter Rootkit User PowerPoint Dark mode Science Windows Media Player Search Engine SMS NIST Default App Notifications Business Mangement Benefits Trending Procedure Workers Saving Time Smart Tech FENG Shopping Addiction Google Search Amazon Distributed Denial of Service Managing Stress Customer Relationship Management dark theme Analyitcs AI Relocation IBM IT Infrastructure Recycling Smart Technology Bing Programming Cameras Flash FinTech Wiring Practices Video Games Social Network Cache Amazon Web Services Worker Commute Software Tips Safe Mode Supercomputer Investment Criminal

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code