Send Money from TIGO PESA to NMB Bank

To make a cash transfer from your mobile phone with the TIGO line to our bank account make sure that your TIGO PESA account has enough cash to perform the transfer.

  1. In the phone call screen type *150*01# and press the call button
  2. Select – Financial services
  3. Select  – TIGO-PESA to Bank
  4. Select from the list  – NMB
  5. Select  to Enter the Bank Account Number
  6. Enter Bank Account Number (Our account no. is 40810111200)
  7. Enter the amount you want to pay
  8. Enter PIN to confirm

Wait for the completion message from TIGO and the Bank. If the transaction is unsuccessful, please repeat step no. 1 above

SEND US PAYMENT NOTIFICATION:

IMPORTANT! Remember to include the following references:

  1. Attach or reply to the latest received Invoice # plus
  2. NMB Bank Success Transfer Message OR
  3. A scanned copy of the original deposit slip if deposited physically to the bank or via agents.
  4. Remember also to keep the payment evidence as may be requested in the future for verification

SEND US PAYMENT NOTIFICATION:

IMPORTANT!

Your order won’t be processed until evidence of payment is sent to us. Please send the following as the evidence of payment:

  1. Attach or reply the latest received Invoice # plus
  2. CRDB Bank Success Transfer Message OR
  3. Scanned copy of the original deposit slip if deposited physical to the bank or via agents.

NB: Remember also to keep the payment evidence as the same may be requested in the future for verification

Reasons to why website is suspended by web host

Unsettled Bills

A website can be suspended due to unsettled bills related to that domain or website. It can be web hosting annual fee, domain registration fee, the website design charges not paid or other critical reasons

Violation of server terms and conditions

The website can also be suspended if it violates server terms and conditions. These terms vary according to the host but common ones are:

  1. Email spamming
  2. Server resource over usage eg. Over CPU usage, physical memory over use, Virtual memory over use, too many processes normally over ten (10) processes etc
  3. It can also can be suspended if it is under attack or hacked. The hacking can originate from admin or backend access, database injection or cross platform scripting.

How is the website attacked?

Backend or Administrator access

The access through the backend are normally caused by using either weak password, common words, and easy to guess usernames.  

SQL Injection

SQL injection is a code insertion method, used to attack database-driven web applications, in which evil SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

Cross-site scripting -XSS

Crosssite scripting (XSS) is a kind of computer security hole typically found in web applications. XSS allows assailant to insert client-side scripts into web pages viewed by other users.  This is normally used for phishing, stealing users important information like passwords and credit card numbers

Bugs

scrip bug is an error, flaw, failure or fault in a web application that causes it to allow attacker insert harmful codes/commands to that applications  

Poor coded scripts

Poorly coded scripts in many cases originate from students who are still learning or from developers with insufficient coding skills and experiences. The poor coded scripts can also originate from pre release software or beta

Cross-Site Request Forgery (CSRF)

Cross-site request forgery is abbreviated as CSRF is a type of harmful exploit of a website where unlawful commands are sent from a user that the web application trusts.

DDoS Attack

A distributed denial-of-service(DDoSattack takes place when multiple systems flood the bandwidth or resources of a targeted server, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

Server security misconfiguration

Security Misconfiguration arises when Security settings are defined, implemented, and maintained as defaults. Good security requires a secure configuration defined and deployed for the application, web server, database server, and platform.

Email spamming

There are two types of email spamming

  1. Bulk emails are sent to your email server from unanimous senders
  2. Bulk email are sent to third parties in bulk via your email server by spoofing means

How to protect your website from Attacks

Backend or administrator access

Always use difficult to guess usernames and strong passwords. Password from 8 and above characters that contains at least 4 character types from Capital, small letters, numbers and special characters can reduce the risk.

Parallel to this deploy to your website login attempt limiters and firewalls. This can reject all dictionary or related bots that guess your username and passwords.

Implement also webmaster reporting mechanism if something changes from your website. You may go far by limit logins from know IP addresses or countries. If you don’t have any deal to specific country, then block your website from appearing from those vulnerable countries. If at all you don’t need public presence then block search engine bots and any other bots from visiting your website

SQL Injection

You may need to use difficult to guess usernames and password for your database.  Password from 8 and above characters that contains at least 4 character types from Capital, small letters, numbers and special characters can reduce the risk. Implement webmaster reporting mechanism if something changes from your database. You may go far by limit logins from know IP addresses or countries. If you don’t have any deal to specific country, then block your website from appearing from those vulnerable countries. If at all you don’t need public presence then block search engine bots and any other bots from visiting your website

Cross-site scripting -XSS, Bugs,

Buy scripts from reputable and known providers. Avoid cheap scripts. Also deploy backend security mechanism as described above. For script with bugs that are from known genuine vendors or developers, pl;ease make sure you immediately update all outdated scripts or uninstall if the vendor did not release the update patch on time    

Poor coded scripts

Buy scripts from reputable and known providers. Avoid cheap scripts. Also deploy backend security mechanism as described above

Cross-Site Request Forgery (CSRF)

Always deploy security monitors, scanners and blockers for unauthorized outbound and inbound communications

Server security misconfiguration

Check your server configuration regularly and if any misconfiguration detected correct it and or communicate to the server admin/ tech personnel for correct configuration. In many cases let the web server have the optimal security setting

DDoS Attack

  1. The best way to stop DDoS Attack is tto use the web application Firewall
  2. Monitor the DDoS Attack continuously in order to device the better option of preventing the attack

Email spamming

There are two types of email spamming

  1. Bulk emails are sent to your email server from unanimous senders
  2. Bulk email are sent to third parties in bulk via your email server by spoofing means

Protect bulk emails spamming from unanimous senders

For the first case you can use mails assassin

To enable SpamAssassin in cPanel, follow these steps:
  1. In the Mail section of the cPanel home screen, click Spam Assassin™.
  2. Click Enable Spam Assassin.
  3. To enable auto-deletion of spam messages, select a score level under Filters, and then click Auto-Delete Spam.

Protect bulk emails spamming via you email server

For the second case you can use SPF or disabling PHP Mail function in cpanel

Using SPF to control email spoofing and phishing

Adding an SPF record to your DNS zone file is the best way to stop spammers from spoofing your domain. In addition, an SPF Record will reduce the number of legitimate e-mail messages that are flagged as spam or bounced back by your recipients’ mail servers.

This is an easy way to control phishing and email spoofing.

Disabling PHP Mail function in cpanel

  1. While in Cpanel go to Software section
  2. Select PHP Version
  3. Switch to PHP Options
  4. in send mail path select /bin/true
  5. Then click apply and save the PHP setting

How to avoid website suspension?

Pay bills ontime

Always pay your bills ontime. In order not to miss when you are required to pay your bills do the following:

  1. Give your web host the emails that you commonly use and are active. If the emails is not in use immediate report to the web host for emails replacement and it is recommended to always provide extra email and phone
  2. You may need premium notification services like those that uses sms notification if you do not frequently use you email
  3. Request the web host to notify the next bill at least 60 or 30 days before
  4. Set your phone, tablet or computers to notify you before the deadline. You can even use email functions like calendar from your emails or third party websites
  5. If your website is an important asset to you or your business, plan always to pay longer payment plans

Monitor your website security

After you have secured your website, it is not the end, monitor the security of your website within your website or from third party services. The third party services common one is www.CloudFlare.com, www.websitedefender.com, www.wix.com, www.verisign.co.uk, www.uptimerobot.com etc For more websecurity info go to http://seo.co.tz/website-security-management-for-seo/

Does the customer have corporate branding?

Font, colors, graphics, sound and slogans, USP and other texts phrases are constituent of website branding that we will also ask the customers to have or look for. If the customer does not have all or some of these important items, especially logo, graphics, slogan, USPs etc, we will create with additional cost.

Hosting a Website in Tanzania

You can host a website in Tanzania with InfoCom Center Ltd at a reasonable price. The plans are:  Basic budget Web Hosting Plan, Premium web hosting plan and Unlimited web hosting plan

Our web hosting plans are

Basic Web Hosting Plan (Suitable for personal, small size and none popular website)

You get

  • Free regular domain (.com, .net, .org, .info)
  • 500MB of disk space
  • 5GB of Bandwidth
  • Unlimited MySQL databses
  • Unlimited databse space
  • Unlimited emails accounts
  • Unlimited sub-domains
  • Unlimited parked domains
  • Unlimited addon domains
  • Unlimited FTP Accounts
  • Free online scrips like joomla. drupal, wordpress etc
  • And much more features and applications

Premium Web Hosting Plan (Suitable for medium sized websites with moderate popularity)

You get

  • Free regular domain (.com, .net, .org, .info)
  • 2000MB of disk space
  • 20GB of Bandwidth
  • Unlimited MySQL databses
  • Unlimited databse space
  • Unlimited emails accounts
  • Unlimited sub-domains
  • Unlimited parked domains
  • Unlimited addon domains
  • Unlimited FTP Accounts
  • Free online scrips like joomla. drupal, wordpress etc
  • And much more features and applications

Unlimited Web Hosting Plan (Suitable for medium sized websites with moderate popularity)

You get

  • Free regular domain (.com, .net, .org, .info)
  • Unlimited disk space
  • Unlimited Bandwidth
  • Unlimited MySQL databses
  • Unlimited databse space
  • Unlimited emails accounts
  • Unlimited sub-domains
  • Unlimited parked domains
  • Unlimited addon domains
  • Unlimited FTP Accounts
  • Free online scrips like joomla. drupal, WordPress etc
  • And much more features and applications

Best Optimized Website Photos For Good SEO

Why optimized website photos For Good SEO? Of all reasons, alternative text that tell about  the photo is highly recommended for optimal users experience.  It is a good idea to link also the image text to the title of the page that host the photo. Good looking and attractive photos which are self explanatory attract many website visitors to your website and hence more leads with more sales from the website. On the other hand, bad photos chase away website visitors and hence make life more difficult. If you means business, invest time, money and skills on getting smart, good and professional photos for your website

Good photo must talk by their own. Arranged in folders with relevant keywords as folders’ names and photo names detailed with activity description.

Above all photo must meet the following attributes:

  1. Must be digital photos
  2. Must have a resolution of not less than 1024px
  3. Not too dark or too bright
  4. Must be natural photos
  5. Must be sharp and fine tuned focused photos
  6. Must be taken from professional cameras

Must be digital photos

A digital photo is not only the one in electronic form, but it must be taken by a digital camera and never scanned from the hard copy photo

Must have a resolution of not less than 1024px

The resolution can be vertical pixels of 1024 or horizontal pixels’ of 1024. We may accept photos below this range but they will be only for webpage thumbs and not gallery photos

Not too dark or too bright

This is straight clear, you’re smart photos will attract many web site visitors. Likewise bad photos will chase them away

Must be natural photos

Photo which are natural in color reflect the original object and therefore will not mislead the website visitor or customer.

Sharp and fine tuned focused photos

The texture of a good photo is fine and sharp. This attributes help viewer to note the actual appearance of the object as it look from original viewing.

Must be taken from professional and brand cameras

Professional photos are all branded photos cameras with both options, manual and automatic functions. Most cameras manufactured by not limited to Canon, Nikon, Pentax, Fujifilm, Olympus, Sony, Panasonic, Kodak, Konica Minolta, Ricoh, Leica, Yashica, Samsung, Toshiba, Lemix, Casio etc