Once connected with care device has to be plugged into an external power source. We advise device is charged only with the designated Chargers and USBs. A: Rollover of Unused balance data is available on all data capped plans offered by Spectranet. Unused data on these plans will be rolled over to next month upon Renewal of Plan before expiry or current plan or within 7 days plan expiry.
Using Payoutlet: Open www. Using MyPaga: Open www. Ng to make payments for your subscription. Now you can renew your subscription or pay in advance using Spectranet Recharge Vouchers. All you need is to register at My Account and subsequently login to load Recharge Vouchers. Payments can also be deposited to following Spectranet — Collection accounts and scanned copy of teller or payment sent to care spectranet. A new denomination of N would also be made available. A: You need to fill in the payment slip teller with clear, easily readable letters.
A: Spectranet 4G LTE Self Care account is a portal where you can conveniently access and view your personal account and account activities anytime, anywhere. Q: I did not get the temporary password when I send my password retrieval request via email.
A: For information on our coverage areas in Nigeria, you can call customer care helpline Other cities will be announced soon. Only Spectranet customers enjoy this advantage. A: Netflix uses about 1 GB of data per hour for each stream of standard definition video, and up to 3 GB per hour for each stream of HD video. Estimated data consumption per settings is given below:. A: To select a setting that consumes data at a controlled rate or as per your requirement, please follow:.
Customer can introduce any number of new users to Spectranet 3. Benefits will be released only upon successful activation of new user. If multiple new users are referred and activated, a Eligible benefits will be released on future renewals only. Discount will be given at the point of invoice generation both on renewal as well as plan change. Discount given as Referral Bonus non-refundable and non-transferable. Keep your browser and security systems anti-virus software, firewalls, etc.
A: Viruses, worms and Trojans are malicious programs that can infect your computer and change the way it works. A: Spyware is software that collects and sends information from your computer without your permission. Avoid clicking on them, even to cancel or close them. A: Emails have been known, to be a major channel for scam and frauds. Evaluate all emails you receive: 1. Do you know the sender of the email?
If yes, still be cautious before clicking a link. If no, do not click any links. Are there any attachments in the email? If so, is the attachment an executable a file with the extension. If so, do not click on the attachment. Even if the file does not contain one of the above mentioned extensions, be cautious about opening it. Contact the sender to verify its contents. Does the email request personal information?
If so, do not reply. Does the email contain grammatical errors? If so, be suspicious. If you have a relationship with the company, are they addressing you by name? Be cautioned as your company will usually address you by registered name on their system. Have you checked the link? Mouse over the link and check the URL. Does it look legitimate or does it look like it will take you to a different Web site? A: Phishing Phishing refers to an activity that attempts to fraudulently obtain sensitive information about you.
There are several ways scammers will try to obtain sensitive information from you. Sometimes you will first receive an email to lure you into a conversation and then follow that up with a phishing email. At other times, you will just receive a phishing email in the first instance. Once you click on the links provided, it will lead you to a duplicate website fake which would ask you to feed in your personal information.
Vishing Similar to phishing only that the mode applied is telephone, instead of email which is used in phishing. Criminals use the phone to solicit your personal information in an effort to steal your identity or commit fraud.
People can also use this information to pretend to be you and open new lines of credit. It is highly recommended that all such messages be immediately deleted and do not respond. Smishing Just like phishing, smishing uses mobile phone text messages to lure consumers in. The phone number often has an automated voice response system.
And again just like phishing, the smishing message usually asks for your immediate attention. In many cases, the smishing message will come from a masked name or short number instead of displaying an actual phone number.
This usually indicates the SMS message was sent via email to the cell phone, and not sent from another cell phone. This code then redirects clicks you make on a website to another fraudulent Web site without your consent or knowledge.
To avoid pharming, be careful when entering financial information on a website. Look for the key or lock symbol at the bottom of the browser and the web address bar. A: You will receive an email which looks as if it has been sent out by an organization you are associated with.
Such entity can be your bank, your webmail, or any other institution. This page would ask you to enter your details see figure 3. Once you enter details which are required by the hacker and submit, you are redirected to the actual website see figure 4.
By the time this act is completed you have already lost your personal details to the hacker who can misuse them to his benefit at obviously your cost!!! Do notice that original website displays as in figure 4, the following: 1. Favicon an icon associated with a URL that is variously displayed, as in a browser's address bar or next to the site name in a bookmark list visible at the tab 2. Displays a LOCK sign place your cursor on top of it to display the identifying agency. Figure 1 Figure 2 Figure 3 Figure 4.
Follow the tips for creating a good password. A: Contrary to popular belief, you are not safe with antivirus software alone. Cyber-criminals and unscrupulous businesses are constantly devising new ways to hijack your computer, capture your personal information or steal your money. Given below are most common security threats, and what you can do to protect yourself from them. A virus can spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks.
Some viruses delete files, reformat the hard disk or cause other damage, while others replicate themselves and may present text, video, or audio messages. Viruses take up memory and may cause erratic behaviour, system crashes and loss of data. SPIM is spam sent via instant messaging systems.
Spam can clog a personal mailbox, overload mail servers and impact network performance. On the other hand, efforts to control spam such as by using spam filters run the risk of filtering out legitimate email messages.
Spammers frequently take control of computers and use them to distribute spam, perhaps the use of a botnet. A common tactic is to spoof a URL or website see phishing. The phony page is on a server under the control of the attacker. Criminals try to trick users into thinking that they are connected to a trusted site, and then harvest user names, passwords, credit card details and other sensitive information.
Phishing is typically carried out by email or instant messaging. The email message claims to be from a legitimate source but when the user clicks on the link provided, he or she lands on the fake web page. Also read more about phishing under Tips - Information Protection section. As spoofing, phishing, and to a lesser extent, pharming, rely on tricking users rather than advanced technology, the best way to handle these threats is through vigilance.
It monitors user activity or interferes with user control over a personal computer. Spyware programs can collect various types of personal information, such as websites visited, credit card details, usernames or passwords, as well as install other malware, redirect web browsers to malicious websites, divert advertising revenue to a third party or change computer settings often leading to degraded or unstable system performance, slow connection speeds or different home pages.
Keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer. Thank you alot my man,it took a couple of trials but I eventually did it right.. Does this work for Lyca as well? Bro, thank you for your support, but the zip file is locked.
What is the password for the zip file. It shows "Searching" for a long time then eventually "no service". Do u have a solution for this error? After pressing the green button, it brings perform target reset to start processing so am asking how???? How do I overcome that? Hello I unlocked a mT mifi but it only says searching and it doesn't display the network bars. What could've gone wrong? I am having trouble with a 1D70 version of the MT. I had done the flash on another one but second one brings a wrong model error.
I have tried mine and since then the Mifi cant be recognized by the computer and its not turning on. What could be the problem?
Any feed backs will be appreciated. Sorry for any problems, please try the procedure afresh and incase it doesn't work you will have lost it. Simply give it some time, leave it for a couple of hours, it will turn on then continue, thats what happened to me. Thanks, this works, now the issue is using a lycamobile sim card, how can we better this as its not picking signals. I want to unlock my mifi now I dot have softweres,can someone send me names of softwere so that I download.
My Mifi has refused to turn on nor does it charge.. What might be the problem. I tried using your method to unlock my mifi and after erasing it has gone off completely.
You have to make sure the model is exactly the same. If not, the mifi will not turn on or display on screen What to is, charge the mifi completely, press the on button and then try connecting your devices to available networks. In case a network named smart bro appears, then you are lucky and you will have to use your mifi without display This was tested on the smile mifi model won't be disclosed to prevent people loosing their mifis. I am not receiving network at all It keeps saying searching Is there a way round this?
Put in airtel Put in mtn All keep saying searching. Everything works eventually but the 4G signal doesn't that's why lycamobile which only works on 4G doesnt have the signal so someone should help and provide the solution to that.
I had to accept it the hard way. Lycamobile works only with 4G and will actually not run on easily on 3G devices Nokia C1 was used for the test.
Thanks so so much for this helpful imformation it has really helped me. But i am still having a little problem with my 4g sim cards. They do not read. I really appreciate your support on this. Look forward to hearing from you soon. Post a Comment Comment. Plug and play — no installation required. Smart switching for a multi-WAN network. USB tethering without SW installation hassles. Easy to charge via USB port. It also has a slot for the Memory Card.
So what exactly do we have to do? We shall be changing the firmware that is locked to Vodafone and replacing it a free one. Please make sure you follow the below steps very well to avoid malfunctions. If you pay attention, you will be through in a flash.
Even if you mess up at one step, you can restart the whole thing and rest assured it will work. All Files to use. Thus you will require mobile connection to download these. Of course, you need the MiFi. USB cable. When you get all these, then you are set to get to the next step. Follow These steps correctly without missing even one.
You can download all the content that is required for this operation from HERE. It is a zip file. Save the files in the MiFi Unlock Folder on your desktop for easy use. Make sure the download ends fully as it can be a source of unlocking failures. You can then extract the files into the same folder. The password is freetechuganda. Please check if all you have all of them before you proceed. We now need to install generic drivers so that the PC can recognize our MiFi. You now have the device manager window open.
After selecting the PC, click action. It is just the second from the file. Select-Add Legacy Hardware. Click on Next for the screen that follows. Then select the second option of-Install the Hardware that I manually select from a list. Then click Next. Choose the option to show all devices and then click Next. Select, Have a disk. A smaller window will pop up; click on browse and move to the Folder where you extracted the stuff. MiFi Unlock on the desktop or any that you used. In the next window displaying Marvell AT interface, just click next and also next for the next window.
Wait for it to finish installing. Click the finish button and close device manager. Quite confusing, watch the demo below.
Hope the above demo helps you a little. These next steps are so crucial. Try to follow them properly so that your MiFi gets unlocked successfully. First, remove the battery and the sim card from the MiFi. Tick all the unticked options. Click on options, and choose: -Erase all Flash. Click on start With a green bulb sign. IMEI: email: alimoamartey gmail. Looking forward to your response. Pls can u help me unlock busy mifi mt? My email is sedzroredeemer yahoo. Pls I would like u to help me with my busy mifi MT My email is enocharthur gmail.
Unknown 16 February at Unknown 18 February at Fast Unlock Team 18 February at Unknown 26 February at Unknown 7 February at Unknown 20 March at Unknown 2 July at Unknown 11 April at Fast Unlock Team 11 April at Unknown 13 April at Fast Unlock Team 13 April at Unknown 8 January at Login or Sign Up.
Logging in By logging into your account, you agree to our Privacy Policy , personal data processing and storage practices as described therein. Remember me. Log in. Forgot password or user name?
0コメント