Trending November 2023 # How To Eject Water From Your Iphone Speakers Using This Shortcut # Suggested December 2023 # Top 17 Popular

You are reading the article How To Eject Water From Your Iphone Speakers Using This Shortcut updated in November 2023 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested December 2023 How To Eject Water From Your Iphone Speakers Using This Shortcut

Have you ever accidentally dropped your iPhone in water and wondered how to get rid of the water from inside the speaker?

Even if your iPhone comes with an IP rating, it doesn’t mean water can’t get stuck in places. When water enters through the speaker grills on an iPhone, it’ll cause the audio to muffle. This is obviously not something you want.

As it turns out, there are simple ways to eject water from the iPhone speakers. You can either use a Siri Shortcut, or try out an app or a website to push out the liquid.

In this article, we’ll show you how to get the water out of your iPhone speakers.

How to eject water from iPhone speaker

First, let us briefly explain how this works.

Basically, a sound of a certain frequency is played through the iPhone speaker, which pushes the water out. The vibrations from the sound eject the liquid. Overall, this process is similar to Apple’s Water Eject feature found on newer Apple Watches.

With the basics covered, here are a couple of ways to get the water out from the iPhone.

1. Use the Water Eject Shortcut

This method involves using a Siri Shortcut to play the sound through your iPhone speakers.

Here’s how to use the Water Eject shortcut to get water out of your iPhone:

1) Tap this iCloud link on your iPhone to download the Water Eject shortcut.

On iOS 15 and later, tap Add Shortcut. If you’re on iOS 14 or earlier, make sure you allow untrusted shortcuts before tapping the iCloud link.

2) Inside the My Shortcuts tab of the Shortcuts app, tap Water Eject.

3) A notification should appear. Tap Begin Water Ejection to start the process.

You should now hear a sound play on your iPhone and see the water droplets come out of the speaker grill.

2. Use a third-party app or website

If you don’t want to install an untrusted shortcut on your iPhone, then there are other ways to get rid of the water. You can use free third-party apps, or you can head over to a website that simply plays the sound to eject the water.

There are plenty of apps that can do this, but we’d recommend Sonic, as it’s available for free from the App Store and does the job very well. After installing the app, you can adjust the frequency of the sound and see which works best. Tap the Play button to start removing the water from your iPhone speaker.

You could also try out a website called Online Tone Generator to get rid of any water from the speakers. Open the website on your iPhone, select a frequency, and hit the play button.

Water ejected from iPhone speakers!

If you ever drop your iPhone in the water and are trying to remove it from the speaker grill, you should try the above methods. Do not try to insert things into the speaker grill to get the water out. The above methods work well, so we’d recommend using them. Also, dry the iPhone immediately, keep it switched off for a while, and don’t open the SIM tray.

Even if your iPhone has a waterproof rating, water will still enter the speakers, earpiece, and charging port. Apple has added an IP rating on all iPhones, starting from the iPhone 7. But, if you drop your iPhone in water, it’s important that you dry it out as much as possible and not plug it into a charger.

We’d also recommend not to deliberately drop your iPhone in water as though newer models are waterproof, you can’t claim warranty if something happens to it due to liquid leaking inside the device!

Check out next:

You're reading How To Eject Water From Your Iphone Speakers Using This Shortcut

How To Get Water Out Of Your Apple Watch

Although the Apple Watch is water resistant, it’s not waterproof. If water enters the speaker grills, it can produce muffled sounds. To combat this, watchOS has a feature called Water Lock that helps you eject water from the speakers.

This tutorial will teach you how to use Water Lock to get water out of your Apple Watch and prevent moisture from seeping inside.

Table of Contents

How to Activate and Use Water Lock on Apple Watch

Water Lock is available on the Apple Watch Series 2, Apple Watch SE, Apple Watch Ultra, and newer models. It activates automatically when watchOS detects you’re swimming, diving, or water-skiing, but you can also enable it manually before you engage in a water-based activity. You can also turn on and use Water Lock after getting your Apple Watch wet.

To turn on Water Lock:

Swipe up from the bottom of the watch face to open the Control Center.

Locate and tap the

Water Lock


Water Lock is now enabled on your Apple Watch, and you should see a Water Lock status symbol icon at the top of the watch face. The screen remains unresponsive for the duration the feature is active.

Once you finish the activity, you can use Water Lock to eject the water from your Apple Watch. If Water Lock did not turn on automatically or you failed to enable it manually, you must activate it first. Then:

Press and hold the

Digital Crown

. The display should change from

Press and hold crown to turn off water lock


Keep holding


You should hear a sequence of tones as your Apple Watch expels the water from its speakers.

Release the

Digital Crown

after the

Ejecting water

animation ends.

Note: If you use an Apple Watch running watchOS 8 or earlier, you must rotate the Digital Crown to eject water from the speakers.

If the Apple Watch’s speakers sound muffled, enable and use the Water Lock feature multiple times. If the problem persists, wipe it with a lint-free cloth and let it dry overnight. You can speed up evaporation by keeping the watchOS device on its charger.

Understand the Water Resistance of Your Apple Watch

Always remember that while the Apple Watch is water-resistant, it’s not waterproof. Moreover, not all Apple Watch models are designed for water-based activities.

For instance, the first and second-generation Apple Watches are only resistant to splashes, and wearing them while swimming is not recommended. On the other hand, Apple Watch 2 Series and newer models are suitable for shallow water activities, while the Apple Watch Ultra is the only one that can endure diving and water-skiing.

Furthermore, you must take extra care to avoid exposing your watchOS device to certain substances, such as soap, lotions, and shampoo, which can permanently damage its water seals. Also, watch bands made from stainless steel and leather can degrade if constantly in contact with water.

Identify your Apple Watch model and check this Apple Support article to learn more about its water resistance capabilities.

Keep Your Apple Watch Dry

Water Lock on your Apple Watch is a handy tool to protect the device from water damage. Whether you’re going for a swim or get caught in the rain, Water Lock can help you eject water from the speakers and keep your Apple Watch running smoothly. However, remember to always keep the water resistance capabilities of your watchOS device in mind and avoid water-based activities that can cause lasting harm.

Protect Your Business From Ransomware Using Avast Business Hub

Protect your business from ransomware using Avast Business Hub




The Avast Business Hub is a suite of tools designed to protect your business from ransomware attacks and more.

Learn how to defend against all threats with a dedicated antivirus for your company.

Back up your data and store it in the cloud with a high level of encryption and security.

There is an increased number of ransomware attacks on company websites all over the world and nobody needs to tell you how important is to keep your sensitive information safe.

What are ransomware attacks? Wrongdoers will use specialized techniques and tools to get into the PCs and devices within your business network and encrypt your data.

Then, they will ask for money to restore your data, probably threatening to delete them if you don’t comply.

That is why you need to back up your sensitive data and protect them at all costs to avoid and counter any suck possible outcome.

How to choose the best anti-ransomware protection for your business?

First, you need to identify the need for a good defense for your business in terms of security but also for compliance with your industry regulations.

We outlined three main directions to go for when dealing with these kinds of ransomware and malware attacks in general.

➡ Get the best antivirus for business

The antivirus is the first line of defense to counter the attacks so you should give it the proper attention and get the best for your particular needs.

And because it’s important to personalize the solution to your business, it’s important to get as much information as possible on the product you want to buy.

➡ Automatize your patch management

A very common problem for businesses all over the world is the patch management system. Applying patches to the whole network is extremely important for security.

Unpatched systems become vulnerable spots in the network and once the attackers are in, they can infect the whole system.

Manage and apply patches from a single central desktop

Avast Business Hub can be outfitted with a Patch Management tool that allows the system administrators to detect and patch all the machines from a single dashboard.

➡ Ensure safe cloud backup

Sales, management, and clients’ data can be compromised after a ransom attack. And if the wrongdoers manage to get past your defense system, you need to have a backup.

The golden rule is to have a three-system backup set up. That means having outside backup on physical media, digital backup on a system outside your business network, and cloud backup.

When it comes to the third option, Avast Business Hub is already cloud-based and it can automatically perform regular backups from all the devices on your business network.

How can I protect my business with Avast Business Hub? 1. Use Avast Business Antivirus

As we’ve mentioned above, the antivirus is the first line of defense against attacks so it must be a powerful solution with proactive functions.

Avast Business Antivirus not only detects and removes malware but also prevents attacks so that your network-connected devices are fully protected online.

Although you have the option to customize it to your present needs, this solution is fully scalable so it will grow together with your business to cover all your endpoints when you expand the network.

You also need a fast and simple to use product and this tool is very easy to implement and update so it can maximize the workflow and productivity of your IT department.

One of its most important features is the Behavior Shield that monitors all software installed on all devices to observe any uncharacteristic changes and stops any possible harmful activity.

Other great features include the File Shield and Mail Shield that scan the downloaded or opened files and the incoming and outgoing emails for malware.

There are three versions that you can opt for. The other two are Avast Business Antivirus Pro and Pro Plus

The Pro Plus version comes with a few more important features like Data Shredder, Browser Cleaner, Webcam Shield, Password Protection, and SecureLine VPN.

Here’s how you can download and use Avast Business Antivirus:

As you can see, it’s very simple to implement and use Avast Business Antivirus and the Pro Plus additions are worth every penny if you need them for your business.

There is also the option to get the Avast Windows Server Antivirus that will also help you protect the main core of your network.

2. Use Avast Patch Management

Microsoft issues constant patches for the system but what about third-party apps that you install on your endpoints?

Updating and patching them is paramount for the security of your devices as outdated software can contain loopholes that can be easily exploited by attackers.

Avast Patch Management not only helps admins patch the third-party apps remotely but also provides an automated process that will save a lot of effort.

This way, you can distribute the tested patches to thousands of machines in minutes, with a very low impact on your network.

The Avast Patch Management app offers support for Windows but also from thousands of other products like iTunes, Oracle, Adobe Flash and Reader, Java, and many more.

And the IT team can do that from a single dashboard from anywhere to all the devices, wherever they are, even if they are behind a firewall or in a sleep mode.

That’s because the Avast Business Hub is a cloud-based platform accessible on many platforms with a simple Internet connection.

Let us go through a quick guide on how to get the Avast Patch Management tool and use it.

You probably noticed that the process is extremely simple, and it can be easily applied to all the devices in your network.

3. Use Avast Cloud Backup

First of all, a cloud backup is an excellent method for protecting your data and with the increasing number of ransomware, it has become a must.

With Avast Cloud Backup, you will be able to do just that, to backup your most important data from anywhere. Your files, folder, server, and even accounting files or QuickBooks will be safe.

And the best of all is that with one backup plan you will protect as many devices as you want and keep the data for unlimited time.

After you’ve installed the Cloud Backup for your devices, if something goes wrong with any of the systems, you can perform a recovery from anywhere using the Business Hub.

As security cannot be a trade-off, you will be happy to know that all the files you are backing up on the cloud are encrypted during the transfer and in the cloud.

Here’s our quick guide on how to install Cloud Backup on your devices and use it.

The devices will begin to backup silently in the background, without interfering with your other work so it’s no need to supervise the operation.

How can I scan the network and add devices quicker?

With Avast Business hub, it’s all about adding the devices from your network. You can add them one by one but the process can be more time-consuming.

If all your devices are in your local network, the process becomes a lot more simple and quick.

We hope that our guide helped you find out how you can protect your business against ransomware and other malicious attacks by using the Avast Business Hub and tools.

Keep in mind that for a better defense, you will need three important components: antivirus, backup, and patch solutions.

Of course, there are many other solutions that can solve the three components individually but having all of them in a single place under one dashboard makes it all a lot more simple.

Avast Business Hub

Entirely protect every piece of data within your business using this all-in-one cloud security platform.

Check priceVisit website

Using a single solution will help you cut costs, simplify all the processes and, most importantly, keep your business data safe and secure.

Was this page helpful?


Start a conversation

How To Copy Files From One Folder To Another Using Python?

A file is a collection of information or data that is stored on a computer. You are already familiar with several file types, such as your audio, video, and text files.

Text files and binary files are the two categories into which we often split files. Simple text is contained in text files, as opposed to binary data, which can only be read by computers.

A group of files and subdirectories is called a directory or folder. A subdirectory is a directory present inside a directory. Numerous operating system functions can be carried out automatically.

File Operations Using Python

Python provides various methods to perform operations on the files and folders of the underlying operating system.

The OS module in Python has functions for adding and deleting folders, retrieving their contents, changing the directory, locating the current directory, and more. Import this module, we will use the listdir() method of it to fetch the files.

Similarly, the shutil module provides a number of functions for dealing with operations on files and associated collections. It gives users the option to copy and delete files. You can copy the contents of one folder to another using the shutil.copy(), shutil.copy2() and shutil.copytree() methods of this module.

You can include these functions in your file by importing their respective modules as shown below −


shutil shutil




arguments passed


Using shutil.copy() operation

Using this function, the text or content of the source file is copied to the target file or directories. Additionally, the permission mode of the file is preserved, but the file metadata (such as the “Date Creation”, “Date Modification” etc..) is not preserved.


Following is the syntax of the shutil.copy() method−

shutil.copy(origin, target)


Origin − A string containing the source file’s location or path

Target − A string containing the destination file’s location or path.


Following is an example of to copy files from one folder to other using shutil.copy() operation −




shutil files



























"Files are copied successfully"



Following is an output of the above query:

Files are copied successfully

Note − Both a relative and an absolute path can be used to copy a file. The file’s location on the disc is indicated by the path

Here we are providing the folder path of both the source and the destination of the files.

Using shutil.copy2() operation

First of all, this function is exactly like copy() with the exception that it keeps track of the source file’s metadata.

The execution program for this is exact same as shutil.copy(). The only difference is that while fetching the file to directory, in place of shutil.copy() we write shutil.copy2().














Following is the syntax of the shutil.copy2() method –

shutil.copy2(origin, target)

Origin and target values are same as defined above.

The copy2() function in this code does one additional operation in addition to a copy() which is to keep the metadata.

Using shutil.copytree() method

This function moves a file and any subdirectories it contains from one directory to another.

This indicates that both the source and the destination include the file. The string must contain the names of both parameters.


Following is the syntax of the shutil.copytree() method –

shutil.copytree(origin, target)

Origin and target values are same as defined above.


Following is an example of to copy files from one folder to other using shutil.copytree() operation:





"File Copied Successfully"



Following is an output of the above query:

File Copied Successfully

As an output we will be able to see the changes made after the execution i.e. the ‘Works’ folder gets copied to the ‘Works TP’ folder with the name of ‘newfolder’ as assigned in the code above containing all the files inside it which was there in the Works folder.

In order to obtain a duplicate of that file, we have included the copytree() function in this code.

How To Make Memoji On Your Iphone

How to Create Memoji on Your iPhone

While sending a Memoji on iPhone that can mimic you is pretty fun, creating one can be tricky as there is no direct option. Below we have detailed the steps to create Memoji on iPhone and iPad:

1. Open the Messages app and compose a new message or open an existing conversation.

2. Tap the “Memoji” icon at the bottom of your iPhone’s screen.

4. Now, choose and customize different features like skin tone, hairstyle, eyes, and more, of your new Memoji.

5. Once you are satisfied with the created Memoji, tap “Done.”

How to Make Memoji Using the Messages App

As mentioned above, you can make Memoji directly from message conversations on your iPhone. We have shared another method that doesn’t need a message conversation to be opened. Here’s how you can –

1. Open your iPhone’s “Messages” app and tap the “Three Dot” button at the top right corner.

3. Tap the “Three Dot” button from the available options here.

4. Now, tap the “+” icon under the Memoji section and start creating and customizing your Memoji.

5. Lastly, tap “Done.”

To create another Memoji, again tap the “+” icon as shown in the fourth step above and repeat the process.

How to Edit Memoji on Your iPhone

1. Open the Messages app and compose a new message or open an existing conversation.

2. Tap the “Memoji” icon at the bottom of your iPhone’s screen.

3. Choose the Memoji you want to edit and tap the “Three Dot” button at the bottom left corner.

4. Now, tap the “Edit” tab.

6. Now, to save the changes, tap “Done.”

How to Use Memoji Stickers in iMessage or Other Messaging Apps

While Apple has been emphasizing animated Memoji, it also allows using the Memoji as stickers. You can use them in iPhone’s message app and some third-party apps, including WhatsApp. You even remove Memoji stickers from keyboard on iPhone and iPad. Here’s how you can use Memoji stickers on iPhone and iPad –

1. Open the Messages app and compose a new message or open an existing conversation.

2. Now, tap the “Memoji Stickers” button at the bottom right corner.

How to Send Animated Memoji in Messages on iPhone

You can create and send animated Memojis where the memojis will mimic your actions and animations to express better in a conversation.

1. Open the Messages app and compose a new message or open an existing conversation.

2. Now, tap the “Memoji” icon.

3. Here, select the Memoji you wish to animate and tap the “Record” button at the bottom right corner.

5. You can record for up to 30 secs and to stop the recording, tap the recording button again.

6. If you are satisfied with the recorded outcome, tap the “Send” button. Else tap the “Delete” button and start again.

While you are here, you can also check out How to Set Animated Memoji As Your Mac User Profile on the Lock Screen.

How to Use Memoji in FaceTime Calls on iPhone

1. Open the FaceTime app on your iPhone and initiate a call.

3. Tap the “Memoji” button.

4. Choose the Memoji and the “Animated Memoji” will mask your face.

5. To remove the Animated Memoji, tap the “X” button. 

Frequently Asked Questions

This Ios Shortcut Lets You Find Out Who Pays For Twitter Blue

Twitter owner Elon Musk had promised to put an end to the legacy blue check badge that was given to media and government personalities, but his plans have been delayed. Instead, Twitter has stopped distinguishing between those who pay for Twitter Blue and those who have a legacy verified badge. But there’s an iOS Shortcut that lets you find out if the person behind a Twitter account is paying for the blue badge or not.

The Checkmate shortcut shows who’s verified and who’s paying for Twitter Blue

Instead of removing the verified badge from people who don’t pay for Twitter Blue, the company updated its app and website to make that information ambiguous. Previously, Twitter displayed the message: “This is a legacy verified account. It may or may not be notable.” But now it shows that the account is “verified because it’s subscribed to Twitter Blue or is a legacy verified account.”

Twitter’s verified badge was created to confirm the identity and authenticity of specific accounts, such as those of journalists, politicians, artists, companies, and institutions. That way, users could know they were interacting with an official account. But with Twitter Blue, anyone who pays for the subscription can get the same badge.

If you still want to know whether a verified Twitter account is in fact authentic or are simply paying for Twitter Blue, there’s a way. Mike Beasley has created the “Checkmate” Shortcut to let iOS users identify whether the blue seal on a specific account is legitimate or from Twitter Blue.

“With all of the recent terrible changes at Twitter, it’s getting hard to tell who is or isn’t actually notable,” Beasley says. “Checkmate allows you to see through this nonsense and find out exactly how someone got verified,” he adds.

All you need to do is add the Checkmate shortcut to your device, then open Twitter, choose an account you want to check, and share it with the Checkmate shortcut. With a few seconds, it will show whether the verified badge of that account is legacy or from Twitter Blue. It can even show if an account was legitimately verified in the past and is now a Blue subscriber.

Musk wants everyone to pay for a blue badge

On Sunday, Elon Musk said on Twitter that he would give non-paying users “a few weeks grace” before removing their verified badges. The reason would be because removing the verified badges would require extensive manual work, which doesn’t seem ideal since Twitter has laid off many of its employees. Musk later deleted the tweet.

It’s worth noting that Musk also announced that Twitter will stop recommending tweets from non-Blue users. Such users should also be blocked from voting in polls in the future.

According to Musk, the original verification system was misleading and unfair. But in reality, Twitter Blue is letting everyone pretend to have a legitimate account without any ID verification. Now it remains unclear for how long the “legacy” verified accounts will keep their blue badge.

H/T: Matt Navarra

FTC: We use income earning auto affiliate links. More.

Update the detailed information about How To Eject Water From Your Iphone Speakers Using This Shortcut on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!