MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 January 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Business Computing Hackers Software Network Security Malware Hosted Solutions Backup Internet google Productivity Computer Microsoft Managed IT Services Disaster Recovery Business Continuity IT Support User Tips Windows 10 Mobile Devices Business VoIP Outsourced IT Email IT Services Business Management Hardware communications Innovation Productivity Mobility Data Backup Windows Managed IT Efficiency Server Ransomware Smartphone Cybercrime Mobile Device Management Cybersecurity Apps Save Money Saving Money Data Recovery Telephone Systems Small Business Virtualization Law Enforcement Operating System browser Hosted Solution Quick Tips Android Data BDR Office 365 Money Chrome Information Technology VPN Recovery Passwords Microsoft Office Password Holiday BYOD Alert Health upgrade Miscellaneous Social Managed Service Provider Computers App Communication Social Media Wireless Budget Facebook Government Smartphones Data Management Unsupported Software Cloud Computing Gadgets Work/Life Balance Phishing Hacking Google Drive Avoiding Downtime Managed IT Services Application Automation Telephony Current Events Audit Private Cloud Office tips Personal Information Applications History search Data Security Politics Proactive IT Two-factor Authentication Best Practice USB Save Time The Internet of Things User Error Collaboration IT Support Risk Management Identity Theft Windows 10 Shortcut Workplace Tips Vulnerability Wireless Technology Wi-Fi Firewall iPhone Television Data Storage Samsung Antivirus Social Engineering Mobile Computing OneNote Content Filtering Data Breach Battery Transportation Streaming Media Apple HaaS Compliance Robot WiFi Going Green Bandwidth Marketing Automobile End of Support Remote Computing Google Docs Internet of Things Saving Time Cleaning Office Data Protection Humor Disaster Computer Care Phone System Redundancy Employer-Employee Relationship Encryption Commerce Users Gmail Network Sports Cortana Artificial Intelligence Update Flexibility Hacker IT solutions Internet Exlporer Solid State Drive DDoS Cost Management Spam Excel SaaS Comparison Benefits Regulation Computer Fan SBS PDF Evernote Google Maps Unified Threat Management compaq Specifications Screen Mirroring Sync Wearable Technology Training Dark Web Entertainment Text Messaging Networking Software as a Service Upgrades Meetings hp Electronic Medical Records Emails Point of Sale Sales Cast Adobe Company Culture domain HIPAA Workers Black Market Data Loss Consultant Settings Smart Technology Retail Laptop Licensing Uninterrupted Power Supply Value WannaCry remote Avoid Downtime Updates Shadow IT eWaste Yahoo Webinar Maintenance Document Management Conferencing HBO Touchpad Mobile Running Cable Server 2008 Experience Microsoft Word Reputation Microsoft Excel Ali Rowghani IT solutions Advertising Gifts Trending Professional Services Video Games Virtual Reality File Sharing Scam Windows 10s Data storage IT Management Travel Nanotechnology server installation dvd "cannot install required files" Music Legal Administration Storage Chromecast stock Employer Employee Relationship Hard Disk Drive Credit Cards WIndows Server 2008 Tablets Root Cause Analysis Analytics Instant Messaging Colocation tweet Keyboard Tech Support Computer Accessories Worker Commute Hard Drives FAQ Patch Management NFL Files Mobile Device Augmented Reality calculator Big Data Managing Stress Lifestyle Administrator Business Intelligence Lithium-ion battery Twitter Touchscreen Outlook control Charger Word Books Scalability Education Relocation Legislation Access Managed IT Service WSJ Hiring/Firing Vendor Management iOS Exchange Router Wireless Charging Windows Ink Distributed Denial of Service altivista How To Safety Cache Emergency Monitors Remote Monitoring Worker Thank You Congratulations CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...