Feeds

Access to Apple's iTunes goes bananas

And Orange broadband completes the fruitbowl

Intelligent flash storage arrays

Apple's discussion forums are alive with users who are mysteriously unable to access the company's iTunes Music Store.

The problems appear to have started about ten days ago, when one dixiechicksfan posted: "Everytime I try to connect to the music store, it says the connection has timed out. I was just looking at the music store 2 weeks ago! I don't know how to fix this problem."

Many, though not all, of the musically bereft are Orange broadband subscribers. People in the US and in Australia also seem to be affected.

Some have posted messages saying Orange support has acknowledged the problem and it trying to resolve things. One even says a support person implied the security alert two weeks ago was behind the problems.

However, Orange's PR has flatly denied this, and told us that it doesn't know anything about people having difficulty accessing iTunes.

"We haven't changed our settings at all," a spokeswoman said this morning. "And I don't know anything about any customer complaints."

Shame it hasn't checked its own message boards, also replete with people complaining about being cut off from iTunes, and other secure sites.

Users on the Apple forum have run through all the usual diagnostic tricks - checking for common operating systems, recent Windows updates, common ISPs, rebooting hardware - without finding a definitive solution.

One exasperated music fan writes:

I'm fed up and angry at missing out on my weekend itunes binge. Definitely going to sign up to another music store today.

Another says:

OK, i've downloaded the latest itunes, rebooted and instead of getting: "itunes cannot connect to music Store, connection timed out" (this was the message before updating IT), i now get a different error message with a number and the previous one as well!

Sort it out Apple!! i've done everything on the ITMS help section!!

We've been in touch with Apple to find out if it knows what the problem is, but so far the company is maintaining a stony silence. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.