Skip to content
  • Home
  • Updates
  • Tanzania
  • Introduction to Bobland
  • About
  • Services
    • Web Design / Development
    • Domain Registration & Hosting
    • Website Maintenance
    • Search Engine Optimization (SEO)
    • Online Marketing
    • SMO & Mapping
    • Other Services
    • Portfolio -Web Design in Tanzania
  • Cinema
    • Updated Cinema Schedule for Tanzania Movie Theaters
    • Now Showing and Upcoming Movies Previews in Tanzania Theaters
  • Events
  • Places
  • FAQs
  • Disclaimer
  • Contacts
  • Interesting Links
  • Connect with Us
Bobland : Techniques
  • Home
  • Updates
  • Tanzania
  • Introduction to Bobland
  • About
  • Services
    • Web Design / Development
    • Domain Registration & Hosting
    • Website Maintenance
    • Search Engine Optimization (SEO)
    • Online Marketing
    • SMO & Mapping
    • Other Services
    • Portfolio -Web Design in Tanzania
  • Cinema
    • Updated Cinema Schedule for Tanzania Movie Theaters
    • Now Showing and Upcoming Movies Previews in Tanzania Theaters
  • Events
  • Places
  • FAQs
  • Disclaimer
  • Contacts
  • Interesting Links
  • Home
  • Updates
  • Tanzania
  • Introduction to Bobland
  • About
  • Services
    • - Web Design / Development
    • - Domain Registration & Hosting
    • - Website Maintenance
    • - Search Engine Optimization (SEO)
    • - Online Marketing
    • - SMO & Mapping
    • - Other Services
    • - Portfolio -Web Design in Tanzania
  • Cinema
    • - Updated Cinema Schedule for Tanzania Movie Theaters
    • - Now Showing and Upcoming Movies Previews in Tanzania Theaters
  • Events
  • Places
  • FAQs
  • Disclaimer
  • Contacts
  • Interesting Links

Blog

Home/Blog

How to protect your Company and users against malicious emails

May 29, 2021BoblandCyber Security, Technology

One of the most common tools used by cybercriminals is email. Using a simple but malicious message, an attacker can deploy malware through a file attachment or a linked page. Phishing campaigns take advantage of email to convince people to share account credentials or other sensitive data, which the attackers use themselves or sell to

Read More

June 1: Google Photos storage deadline is coming up

May 28, 2021BoblandIT Tips, Technology

Google Photos is a popular option for people looking to back up their camera roll and more. Here’s what the looming storage policy update means for new and existing uploads. Google Photos is a popular service for people looking to back up their camera rolls and other media assets. However, a Google Photos storage deadline

Read More

How to: Use Excel to calculate the shift hours worked

May 27, 2021Boblandhow to, IT Tips

With Microsoft Excel, you can create a worksheet that figures the hours worked for any shift. Follow these step-by-step instructions. To calculate in Excel how many hours someone has worked, you can often subtract the start time from the end time to get the difference. But if the work shift spans noon or midnight, simple

Read More

What to do when your Phone falls into Water

May 26, 2021Boblandhow to, Technology

Even if your waterlogged smartphone seems like it has the totally died off, there’s a good chance you can still resuscitate it. But you’ll need to act fast: The longer the water sits inside, the greater the likelihood it will corrode the metal components inside for good. This is a DIY moment. While most people

Read More

WhatsApp may soon let you migrate Chats between Android, iOS when changing Number.

May 25, 2021Boblandsocial media

WhatsApp users switching to a new phone number might get a new chat migration feature soon. WhatsApp is working on a way to let users transfer their chat history when migrating to a new phone that is using a different phone number, according to a report. The new development seems to be an extension of the ability

Read More

Hackers Unleash Malware That Can Survive OS Re-installs

May 24, 2021BoblandBobland, Cyber Security

Hackers may be using malware that can survive Windows OS reinstalls to spy on computers.  Security firm Kaspersky Lab uncovered the malware, which exploits a computer’s UEFI (Unified Extensible Firmware Interface) to continually persist on a Windows machine.   Attacking the UEFI is pretty alarming because the software is used to boot up your computer and

Read More

Why you should consider moving IT related services to cloud

May 22, 2021Boblandcloud computing

One of the core demand of the business owners is to reduce operational cost while maximizing efficiency and profitability. It is well known that in this era of information age ,IT services has become the heart of business operations. Poor IT services can result into poor efficiency of business operations as well as profitability. In

Read More

Microsoft to Officially Retire Internet Explorer in 2022

May 20, 2021BoblandBobland

Microsoft today announced that the Internet Explorer 11 web browser will be retired and go out of support on June 15, 2022. This announcement is applicable only for certain versions of Windows 10. For enterprises, this retirement does not affect in-market Windows 10 LTSC or Server Internet Explorer 11 desktop applications. It also does not

Read More

Ransomware attackers are now using triple extortion tactics

May 20, 2021BoblandBobland

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties. Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also threaten to leak it publicly unless the ransom is paid. Now, some attackers have progressed

Read More

Shein overtakes Amazon as the most installed shopping app in US

May 18, 2021BoblandECommerceShein

Shein‘s quiet rise has reached a crescendo as the fast fashion e-commerce app takes the crown from Amazon as the most downloaded shopping app on iOS and Android in the United States, according to data from app tracking firm App Annie. Its ascent is quiet because the startup, despite reportedly exceeding a $15 billion valuation, maintains

Read More

What to do if you become the victim of a ransomware attack

Jul 26, 2017BoblandCyber Security, Technology, web security

If you’re reading this, you’ve either already become the victim of a ransomware attack or you’re interested in finding out what your options are should it happen to you. So, in this article we’re going to discuss what a ransomware attack does and how best to react to one. What does a ransomware attack look

Read More

Apple will require HTTPS connections for iOS apps by the end of 2016

Dec 17, 2016BoblandCyber Security, IT Tips, Technology, web security

  During a security presentation at Apple’s Worldwide Developers’ Conference, the company revealed the deadline for all apps in its App Store to switch on an important security feature called App Transport Security — January 1, 2017. “Today, I’m proud to say that at the end of 2016, App Transport Security is becoming a requirement for

Read More

Posts navigation

Previous 1 … 17 18 19 … 27 Next



Configured by Keeping iT Simple. Hosted by Bobland.
  • Home
  • Updates
  • Tanzania
  • Introduction to Bobland
  • About
  • Services
  • Cinema
  • Events
  • Places
  • FAQs
  • Disclaimer
  • Contacts
  • Interesting Links
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT