Home Blog Page 68

How to install stable beta MIUI 11 based android 10 on Xiaomi Redmi 7A

Xiaomi’s A series portfolio was intended for the budget conscious consumers who were keen to get every value they could from their hard-earned money. And the Redmi 7A which is currently retailing in the country for Ksh. 9,499 offers the best combination possible for value and best bang for the buck. In fact, the model is touted to outperform rivals that utilize the Go edition of android, and to make things even more fun, you can now easily upgrade to a stable version of android 10 based on MIUI 11.

It has one of the best hardware configurations for devices that cost under Ksh 10,000 in Kenya and is currently discounted on Jumia through Jumia’s anniversary sale. Although the device was unveiled with android 9 onboard, Xiaomi has been gracious enough as it has been in the past to issue at least one major android version before its end of life.

While the handset was launched back in 2019, it came packed with interesting specs that pundits praised to be exceptionally better than its launch price. It came installed with MIUI 10 on top of android 9 from the manufacturer, and it was just a matter of time before we got MIUI 11 once Xiaomi made it available staying true to its promise. Under the hood is a Snapdragon 439, 2GB RAM and 16GB.

Important notes;

It should be noted that the aforementioned android version of Xiaomi Redmi 7A build is considered as “stable beta” at the time of this post. Therefore, for a successful installation, you’ll need to first authorized Mi Account with beta tester privileges to sideload the above package. Although you could bypass the need to authorize via MI account by installing via TWRP if you have some basic bootloader skills.

However, when Xiaomi will finally confirm that the OS is stable enough, they will flip a server-side switch to remove the Mi Account verification requirement availing the respective download file for installation without needing a beta tester account.

How to Install stable MIUI 11 based android 10 on Xiaomi Redmi 7A

  • First, you’ll need to download the Global version of MIUI 11 android 10 for Xiaomi Redmi 7A which is compatible with devices sold in Kenya from this link: MIUI 11 based android 10 on Xiaomi Redmi 7A
  • Copy the file to your SD card on your mobile phone.
  • Secondly, you’ll need to authorize your MI account with beta tester privileges as mentioned above. Otherwise use the TWRP option to sideload the ROM.

Users with beta tester privileges;

  • If you have beta tester privileges, then head over to Settings > About phone > System update and click on the MIUI logo 7-8 times to access recovery options
  • Secondly, while on the same page, tap on the three-dot menu on the top right and go to Choose update package.
  • Select the location of your Zip file and hit OK when prompted.

Users without beta tester privileges; How to Unlock Xiaomi Redmi 7A bootloader

  • First, you’ll need to unlock the bootloader (official way) and install recovery software first to proceed. This will void your warranty and to start, you’ll need the following; a computer, USB cable and ensure your phone is sufficiently charged.
  • Download and install ADB fastboot from this link
  • Download MI Unlock Flash Tool from this link extract the file into a folder and launch “MiFlashUnlock” choose “Agree” on the pop up and log into your MI account when prompted
  • After you’ve Logged in, the validation process will start and you’ll most probably receive a message saying that “Your device is not Supported” this shouldn’t worry you, just click on the “Go” button and it will take to you to the following page: https://en.miui.com/unlock/
  • You will then see a blue screen on the next page with “UNLOCK YOUR MI DEVICE
  • Tap on “Unlock Now”, thereafter a prompt to login again will appear, when your application is approved, you’ll receive an OTP to verify on your phone.
  • Open the “Mi Unlock Tool” from the extracted folder after which you should be able to unlock your mobile phone
  • You can then proceed to install custom recovery  – download and follow instructions on how to download from here: https://twrp.me/Devices/Xiaomi/

Install the ROM by going into recovery mode and tapping on install

How to launch recovery mode on Redmi 7A

  • Power off your phone by holding the Power key for a few seconds.
  • Then press the Volume Up and Power buttons for a couple of seconds together.
  • Let go of the Power key when the Mi logo pops up.
  • Release Volume Up if Recovery Mode appears.

Xiaomi unveils the Redmi Note 9, Note 9s and Redmi Note 9 Pro alongside Mi 10 Lite in Kenya

Xiaomi has officially unveiled its Redmi Note 9 trio in the Kenyan market – each with its own set of features that correspond to their price tags. The trio which were released early this year, have quietly been selling in the country for Ksh.24,999 for the 64GB “Pro” variant and Ksh. 19,999 for the lower model. The handsets offer a variety of specs and are targeted towards various consumers who are otherwise looking for a specific requirement on their next device.

Xiaomi Redmi Note 9

Of the bunch, the Redmi Note 9 packs the least attractive specs in some areas though has a lot of similarities with its slightly high-priced siblings. It comes with a smaller 6.53inches display and is the only one which comes with a paltry 3GB RAM on the base model. It falls short of our basic minimum to run android 10 apps without putting up much effort. For the same amount, you’d easily pickup a feature rich Nokia 5.3 that doesn’t disappoint in so many ways and at least meets our set threshold of at least 4GB RAM on any android smartphone. But at least it meets our bare minimum of 64GB internal storage.

Xiaomi Redmi Note 9S

It’s a bit peculiar that Note 9S came out first while the other two siblings were unveiled a month later. It’s one of those moments we find ourselves feeling Xiaomi kind of wasn’t fully satisfied with its first creation and wanted to accommodate more! Notably, the Redmi Note 9S packs some of the goodies you’d find on the 9 as well as 9 Pro but physically looks more of the Pro. If you’re a bit skeptical of the Note 9 but can’t raise enough to get the Pro model, then the 9S should be your safest bet. Unlike the lower classified 9, it comes with 6GB RAM, 128GB Internal storage and accommodates a larger 6.67inch display screen that also packs a substantial pixel density to manage sharp text and vivid images.

Xiaomi Redmi Note 9 Pro

If the first two models are not up to your needs, then you might as well have a look at the Pro model. While we don’t really endorse the “Pro” iteration but understand Xiaomi meant something there. It has the best features of the trio, packing a 6.67inch panel, 6GB RAM and 64/128GB internal storage.

During the online launch event that was hosted by Javier Aranzale – Founder and content creator at Afrobeats with Kamau, Redmi highlighted just how it’s easier to take photos on the Pro model that features Kaleidoscope. The company was keen to point out how Redmi has over the years gained popularity due to its unique features such as longer battery life that charges within minutes, thanks to a 30w fast charger. It also comes with a Z-axis linear motor for excellent haptic feedback which is better than traditional rotating motors.

On the Note 9, Xiaomi touted its long battery life and supports 18w fast charging.

Xiaomi also unveiled the Mi Note 10 Lite that comes with an AMOLED screen that’ll cost Ksh. 37,670 for the 6GB/128GB variant.

Differences between Xiaomi Redmi Note 9, 9S and Redmi Note 9 Pro

SPECIFICATIONSRedmi Note 9Redmi Note 9SRedmi Note 9 Pro
DISPLAY6.53Inch (1080 x 2340)6.67Inch (1080 x 2400)6.67Inch (1080 x 2400)
RAM3GB/4GB6GB6GB
INTERNAL64GB/128GB64/128GB64/128GB
PROCESSORHelio G85Snapdragon 720GSnapdragon 720G
REAR CAMERA48MP + 8MP+ 2MP+ 2MP48.0MP+8MP+5MP+2MP64 MP + 8MP+ 5MP+ 2MP
SELFIE CAMERA13MP16MP16MP
BATTERY5020 mAh5020 mAh5020 mAh
SIMDUAL SIMDUAL SIMDUAL SIM
ANDROID V.101010
COLORSForest Green, Midnight Grey, Polar WhiteAurora Blue, Glacier White, Interstellar GrayInterstellar Grey, Aurora Blue, Glacier White
FINGERPRINTRearSide mountedSide mounted

5 Impactful Cyber Online Security Tips to Work from Home

The pandemic has taken the whole world by surprise. One must only feel privileged to have employment in such grave circumstances. Employees, along with students and educational institutes’ staff, have been using the internet for communication and work. In this way, not only, the workers can practice social distancing (COVID-19 virus SOPs) but are also able to continue working and earning. However, depending more on the internet has risen a security issue. Problems like breaching and hacking are becoming a huge concern since people transfer most of their information and data through the internet. To prevent hacking and cyber interventions, improve the security of your system and connection. Here are a few impacts of cybersecurity, which will not only enhance your work and productivity but also keep you safe from all kinds of data theft, hacking, and breaching.

  1. Physical Security And System Access

Most obviously, a foremost concern is the physical security of your devices and gadgets. Even if you are working from home, you need to keep your work secured and avoid unauthorized access for confidential data.

  • If you live in a house with children or have a roommate, it is best to lock your desktop, mobile, and all other lockable devices to ensure privacy. It also prevents unauthorized access.
  • It is best to have a home-based office in the corner of your house where no disturbance or distraction is there. Regardless of where you have set up your workplace, make sure to shut down all your devices when you are not around. It will save electricity, avoid privacy invasion and connection breaching.
  • If your house does not have a spare room and you are unable to carve a separate workplace, make sure to wrap up all your devices, cables, and other stuff and keep it all in a place out of sight.

Office LANs and other connections are far more protected compared to a regular home connection, which makes employees often overlook cybersecurity. When you are working from home, your system and relationships are more prone to breach.

  • Passwords and PIN codes are the easiest way to keep people out of your system. Always use intense and unpredictable patterns and passcodes to ensure high security. The data would be safe even if someone steals your device or you sent it to a repair shop.
  • Some people are not quite good at remembering passwords, so they save them on sites. When you click on ‘remember me’ for a PIN, even on a reliable website, your account can be accessed anytime.
  • Keep your connections and devices hidden. Turning the visibility on will mark the presence of your device for the nearby tools, which can make it available for the hackers. This feature is also available in mobile technology, so you can keep it off when not being used.
  • Use encryption for sensitive information, especially when you are working from home as home connections are not as protected as organizational ones.
  1. Antivirus And V-checkers

Office connections and systems have pre-installed antiviruses and system scanners for eliminating bugs and keeping the work smooth and problem-free. When it comes to home offices, people use personal devices, which are not always entirely protected as they are rarely used for sensitive information. Here is what you can do to avoid virus attacks and keep your system problem and breaching-free.

  • Scan The Entire System Regularly

Systems and mobiles usually have a pre-installed antivirus; however, if you do not have one, install one immediately. Regularly, do a smart scan of the entire system, including every drive to ensure zero problems. If you have downloaded a file or an application, run it through the checker to make sure it is safe to be on your system.

  • Unknown Sources

You might have had a notification saying, “this file may harm your device.” Such files are not to be downloaded on your system as not only can it crash your device, but it can also have a virus (Trojan), which will stay in your order despite deleting the file it can with.

  • Spam Emails

Sometimes spam emails can seem entirely legitimate. Their claims of being sponsored by big market giants like Amazon and PayPal will make you believe them. Make sure to report them before you delete them. Never open such emails as there can be a hacker at the back trying to get in your system.

  • Powerful Antivirus

Due to a more vulnerable connection, home offices tend to get victimized by hackers more often. Install a robust and reliable antivirus to stop all such activities. Some refusals are quite complex, and regular antivirus might not detect or remove them. Using a potent one would guarantee maximum security.

  1. Phishing Scams

The pandemic has given rise to many hackers attempting phishing scams on people to get their personal information and bank details for theft. The capitalization of the COVID-19 virus has led hackers to steal many, and the rate of cyber theft has gone high up to a great extent.

They do it via emails, SMS, audio calls, etc. hackers use various tricks for deceiving people, including money reward, charity, and much more. Such email, SMSs, etc. include short links, exe., zip. Files and single numbers. Instructions include contacting the sender on the given detail or opening the file for further information. When you do so, you allow the hacker at the back end to access your system and connection information which makes it quite easy to penetrate and make changes in your device.

Such emails have a more powerful effect on a home office system as they are far less secure than an organization’s policy, which has a preinstalled powerful firewall for all such threats and attacks. This is why you need to be extra careful and cautious about your system and connections while working from home.

  1. Virtual Private Network (VPN)

VPN is the best part about cybersecurity. When you transfer data from the core system to an external based employee system, VPN provides protection as well as makes sure your data is not openly available under your IP address for a hacker to detect and spot it. In simpler words, you can call it an additional security layer.

  • The Hidden IP Address Of The User

When you send data while the VPN is on, your IP address is not visible to the recipient; instead, it replaces your IP with one from another location, which protects your original id and hence, data as well.

  • Encryption And Encoding

VPN encodes the data in transit and makes it encrypted, which guarantees that there is no breathing while the data is in transit. The data passes through a VPN-server tunnel, which is meant for encryption so no one can exploit or access your information while it is in transit. When you turn on the VPN, your system connects to the VPN server to utilize its encryption for your sensitive information.

  • Camouflaging

When your home system connects to a VPN server, not only the IP address of your order gets masked, but it also conceals your location as the VPN provides your system’s connection to one of their IP addresses and a pseudo place. If you are working from Germany, you can use a VPN, which will display your location for any country, maybe Australia or the UK.

  1. Other Practices For High Cybersecurity

Some security measures are quite easy to follow in a professional environment like your office but can often be overlooked and forgotten while working from home. Follow these WFH security measures for maximum protection against hackers and infringements

  • Social Media Exposure

It is quite common to check Instagram and Facebook during lunchtime. Here is what you might not know: social media has been tracking your searches and other activities for a long time. It plays a role in digital marketing as the consumer behavior of individuals is analyzed and sold to big firms for targeting relevant audiences and potential customers. Sometimes this can lead to breaching too.

  • Updating Is Essential

Keep all your applications along with the base operating system up to date. It will not only fix the already present bugs but also alters the algorithm and patterns to avoid breaching. Updating also Improves security and strengthens the firewall, which will take the hassle of regular scanning off your shoulders.

  • Back-Up

Losing data is quite common, especially when you are working from home. It is hard to remain as organized as you can be in an office. Use built-in backups for securing your data. If you want to go the extra mile in the security of your confidential and significant data, use an external hard drive or SD card. It is a safer option.

  • Online Payments

NEVER! I repeat never pay bills or shop from the same system you use for storing and working sensitive data. It can compromise and expose your information.

How to send airtime to another phone number on the Airtel Kenya network using Me2U

There are a couple of ways you could share Airtel Kenya’s airtime with buddies in just a few steps. It’s a revolutionary way that mimics Safaricom’s Sambaza and Telkom’s Pewa service which allows subscribers on the network to send/share part of their airtime balance with other users on the same network. There are several reasons why this service could be ideal; for example, a friend with enough airtime to share with another friend on the same network, or even an employer who for some reason distributes credit to staff in a similar manner.

While Safaricoms Sambaza and Telkom’s Pewa services can be accessed in a single method, Airtel Kenya has provided a few ways you could still accomplish the same purpose. Like Safaricom, you could use sim tools to access the Me2u menu, or even use a USSD code just like Telkom Kenya.  

There are some few points to note;

  • You can transfer between Ksh.10 to Ksh.1000 worth of Airtel airtime per day
  • Obviously, this service is only available to share credit between Airtel and Airtel phone numbers

How to send Airtel Airtime using SIM Tool options;

  • Launch your SIM Tool app on your phone,
  • Select Me2U option
  • Choose the send airtime option
  • Enter the credit amount you intent to share
  • Key in your password and press send

How to share Airtel credit via a text message

  • Compose a new text message in the following format
  • 2u [space] <phone number> [space] <amount> [space] <password>
  • Example: to send KSH30 to 0733 456789 (Simply type: 2u 0733456789 30 0000 and send the SMS to 5050

Sony’s PS4 Games likely to be compatible on the PlayStation 5 on release day

When the PS4 was unveiled, as expected there was reasonable hype and excitement for the next gaming console but some of us were a bit disappointed especially those of us who had the previous PS3 model. The main reason was lack of backward compatibility meaning we only had two options at our disposal, either to hold on to the previous model for a while longer and not enjoy the latest and greatest in gaming or churn out some good cash for the newest model. And as any gamer would say, both options sucked big time but at least the later made some sense. Although there’s little known about Sony next model – the PlayStation 5, at least we got a vague confirmation of its backward compatibility with some PS4’s titles when it becomes available.

Backward compatibility has been one of the most requested features for Sony’s gaming consoles over the years, we have some hints of what the PS5 would cost and its not cheap by any means. It’s only fair that for about Kenyan shillings 70,000, gamers will have an option to run PS4 titles on the latest console. For those of us who had stuck on the PS3, I believe now would be the best time to switch, but for current PS4 hold outs, things aren’t quite as clear yet. For some reason one would love switching for the latest and greatest and by all means if you’ve got cash then it should be a no brainer, but for the rest of us, it’ll all depend on what’s new on PS5 and just maybe decide to switch later on.

Confirmation of backward compatibility for the next PS5 console with PS4

For some of us who have a collection of top PS4 games, switching to the next console won’t necessarily mean shopping for new games. Sony has at least confirmed backward compatibility with “top” 100 PS4 games on release date. By “top”, the tech giant basically meant games which currently hold the first 100 slots in popularity within PS4’s genre. At the moment, PS3 and PS2 console games doesn’t seem like they’ll be supported and Sony is currently only focusing on how PS4 games will work on the new console.

While we’d hoped things to be a little straight forward, running PS4 games on the next console is further complicated by boosted frequencies that some game codes in the previous model can’t quite handle. We therefore proceeded to look at the current top 100 PS4 titles that Sony might include on PS5’s compatibility list. Sony is also keen to force developers of PS4 games to include compatibility with the next console

Some of PS4 Games likely to be supported on PS5

Red Dead Redemption 2Resident Evil 3Doom Eternal
God of WarThe Last of Us (Parts 1 & 2)Iron Man
Horizon Zero DawnControlBloodborne
OverwatchSekiro: Shadows Die TwiceFortnite
Star Wars Jedi: Fallen OrderBorderlands 3Final Fantasy IV Remake
Spider-ManCyberpunk 2077Apex Legent
Persona 5Monster Hunter: WorldFIFA 20
Ghosts of TsushimaDeath StrandingDreams

Ways to organize your smartphone apps on an iPhone and android device

Finding apps on your smartphone is something that can literally save you a lot of time; and in my case time doesn’t go by without figuring out how to creatively organize my applications so I could reach commonly used apps with a lot of ease. It’s a phenomenon I’ve come to adopt whenever I get a new device or just want to reorganize following a certain occurrence such as career change and so on.

I remember the first time I used an iPhone and wanted to access MPESA services, I couldn’t figure out exactly where to find the options and resorted to MySafaricom app instead. Organizing our home-screens is something we often take lightly but can save us a ton of time if we paid just a little attention to place those beautiful icons where we can easily reach them.   

iOS has a standard way of moving those icons and organizing them into folders or on different home-screens while android is a bit complicated and differs from one manufacturer to another. Since android is open source and available to OEM’s who can tweak as they wish, most manufacturers often slap their skin on top which might add some features but move away from Google’s original behavior.  So, in this case, I’ll describe using un altered android version found on the Google Pixel devices.

I understand there’s a simpler way to reach any app you need by just searching in spotlight for iOS and search feature in android’s app drawer; however, a good number of us still end up scrolling through our home screens looking for a single app. And the situation isn’t any better, with thousands of applications we often install. We could decide to minimize the number of apps on our devices, but that’s beyond any sensible understanding – somehow, we just have to tidy-up our devices on the most convenient way to access important apps.

 Reorganizing apps on an iPhone

It’s actually simple to move around app on an iPhone and organize them in folders. Just tap a single app and hold steady until it starts to “shake”, similar as when you want to uninstall an app.

Reorganizing apps on an android device (Pixel version)

Open the app drawer and long-press on specific app you want to move and just drag it to any of the home screens.  

Ways to organize apps on your smartphone home screen

  • Alphabetical order

Simply move your apps according to their alphabetical order so that you can always look for an app considering its first letter.

  • Organize in folders

You could place apps in several folders depending on your preferences.  Google apps in one folder, entertainment apps in another and Games in a separate folder as you wish.

  • Frequency of usage.

Most used apps on a separate screen, row or folder

How to access MPESA menu on an iPhone

Using an iPhone for the very first time comes with its problems and most of us who were previously conversant with the “SIM TOOLKIT” app on an android device can attest to that. While its exciting to move from android to an iPhone at least for some of us, not everything is simple out of the box as most reviewers would like to allude. There are a couple of things that are just easier on an android phone than an iPhone and MPESA is definitely one of them.

If you’ve been hunting all over your iPhone for the MPESA menu, then you’ve come at the right place and most probably not alone. To access the service, you’ll need to navigate some options first unlike the straight forward nature android users enjoy.

How to access MPESA Menu on an iPhone (This guide is for iOS devices running iOS 12.1 or earlier)

  • Open the settings app on your device
  • Then from the options, tap on “Mobile Data” this is for those who have set “region as Kenya”
  • If you’ve set your device’s region as “US”, tap on “Cellular” instead
  • On the next window, look for “SIM Applications” and select it
  • You’ll see “Safaricom+” and “M-PESA”
  • Proceed as necessary and remember to reap this process next time you want to use MPESA.

Unfortunately, Apple hasn’t made the service as accessible as we’d hoped, but some of us still find the hidden MPESA Menu thrilling for some reason.

How to block all incoming, outgoing calls or text messages on the Safaricom network

Have you ever been in a situation where you literally wanted to block everyone from reaching you either via phone calls or text messages? Safaricom has a nifty feature that can literally enable you to do just that. Instead of activating the block feature on your device, you can disable all incoming or outgoing calls even text messages on a network level.

And yes, you can achieve the same functionality by enabling airplane mode on a smartphone or do not disturb on capable devices; however, unfortunately these features are not available on non-smartphones. And for some reason’s, disabling these functionalities at network level might be convenient for some of us rather than on a device.

Differences between blocking outgoing, incoming calls and text messages at device level and network level

As the name suggests, disabling phone calls and text messages at the network level will simply render your SIM card unreachable regardless of the device you’re using including its settings. This ability is usually achieved by using certain USSD commands provided by the network provider – in this case Safaricom.

On the other hand, disabling phone calls and text messages on a device level simply allows the caller’s call to got through the network but fails to be completed at the device level. This relies on device settings such as do not disturb or airplane mode. If you swap the SIM card to a differed device, calls and text messages will still go through.

How to block all incoming, outgoing calls and text messages on Safaricom network

  • To block or unblock all Outgoing Calls, dial *33*0000#
  • To block or unblock all Incoming Calls, dial *35*0000#
  • To block or unblock all Incoming Calls When Roaming, dial *351*0000#
  • To block or unblock all Incoming Calls Except Home Calls (when Roaming), dial *332*0000#
  • To block or unblock all International Calls, dial *331*0000#
  • To block or unblock all Outgoing SMS, dial *33*0000*16#
  • To block or unblock all Incoming SMS, dial *35*0000*16#