MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Tip of the Week: Take Back Your Smartphone By Blocking Problem Numbers

Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.

It doesn’t matter which phone you have. This week’s tip will help you learn how to block everything from telemarketers to stalkers. Even though telemarketing is completely legal, the last thing you want to do is put up with it time and again. The most effective way to deal with it is to just block them. Follow these steps to block a number and never be bothered by the pesky number again.

Android Users
For users of Android Nougat and Marshmallow, follow these steps:

  • Go to the Phone application
  • Select All Calls
  • Choose Call from Undesired Contact
  • Select Block/Report Spam
  • You will be asked if you want to report the call as spam. If you’d like to report it, select this box.

For users of Android Lollipop (on Samsung Galaxy S4, S5, S6, and Note 4 users):

  • Open the Phone app and tap the Call Log
  • Select the phone number that you want to block
  • Tap More
  • Add the number to the Auto reject list

iPhone Users
If you want to block a number on your iPhone, follow these steps:

  • Select Recents, which is found at the bottom of the screen
  • Find the number of the caller that you want to block
  • Tap the i icon in the right-hand side of the screen
  • You’ll now see the caller’s information, along with how to create a new contact. Look at the very bottom of the screen and you’ll see the option to Block This Caller
  • Select this and a message will ask if you really want to do this. Tap Block Contact and you’ll seal the deal.

In the event that you’re receiving unwanted text messages from a stranger rather than phone calls, iOS demands that you add the number to your Contacts list before actually blocking them. To create a new contact directly from your Messages app, select the phone number at the top of the screen and select Create New Contact. Once you’ve done this, follow the directions outlined above. However, if you have yet to upgrade to iOS 10, you’ll have to look for the i icon in the top-right corner of the text conversation. Once you’ve selected it, tap Block This Caller and proceed to Block Contact.

Was our guide on how to block phone numbers helpful? Let us know in the comments, and be sure to subscribe to our blog for more technology tips and tricks.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 October 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Backup Network Security Hosted Solutions google Internet Disaster Recovery Computer Productivity Business Continuity Microsoft Business Managed IT Services Windows 10 Innovation IT Services IT Support VoIP User Tips Hardware Mobile Devices Outsourced IT Business Management communications Ransomware Efficiency Mobility Email Productivity Windows Mobile Device Management Telephone Systems Server Smartphone Save Money Cybercrime Saving Money Managed IT Virtualization Cybersecurity Apps Law Enforcement Operating System Hosted Solution Quick Tips Android BYOD Data Password Small Business BDR Money Information Technology Chrome Recovery VPN Data Backup Microsoft Office Passwords browser Hacking Avoiding Downtime Health Miscellaneous Managed Service Provider Computers Data Recovery Social upgrade Office 365 Communication Budget Data Management Wireless Facebook Unsupported Software Google Drive Gadgets Shortcut Automation Work/Life Balance Telephony Workplace Tips Alert Wi-Fi Firewall Application Office tips Applications Private Cloud Current Events Audit Proactive IT Social Media search App Smartphones USB Save Time Risk Management Government Data Security Cloud Computing Update Flexibility IT solutions iPhone IT Support Cost Management Mobile Computing DDoS Transportation Holiday Robot Television Samsung Social Engineering Antivirus History Windows 10 Remote Computing Streaming Media Battery Apple End of Support HaaS Spam Best Practice WiFi Compliance Internet of Things Phishing Personal Information Going Green The Internet of Things Automobile Bandwidth Humor Data Storage Politics Disaster Managed IT Services Saving Time Employer-Employee Relationship Cleaning Office Computer Care Network Phone System User Error Encryption Hacker Users Gmail Identity Theft Internet Exlporer Solid State Drive Wireless Technology Computer Accessories Worker Commute Artificial Intelligence calculator Mobile Device Data Protection Big Data IT solutions Collaboration Managing Stress Twitter Professional Services PDF control IT Management Books Windows 10s Scalability Nanotechnology Education WSJ Travel Hiring/Firing Text Messaging Vendor Management Commerce Router Exchange altivista SaaS WIndows Server 2008 Distributed Denial of Service Hard Disk Drive How To Root Cause Analysis Tablets Benefits SBS compaq Unified Threat Management Patch Management Content Filtering Augmented Reality NFL Training Laptop Business Intelligence Entertainment Uninterrupted Power Supply Wearable Technology Touchscreen hp Upgrades Outlook Electronic Medical Records Vulnerability Point of Sale Word Company Culture Touchpad Managed IT Service HIPAA domain Consultant Reputation Excel iOS Black Market Advertising Windows Ink Smart Technology Value Avoid Downtime remote Yahoo Two-factor Authentication Regulation eWaste Computer Fan Shadow IT Data storage OneNote Document Management Google Maps Screen Mirroring Experience Running Cable Data Breach Server 2008 Ali Rowghani Administration Sync Chromecast Dark Web Trending Meetings Cast Sports Emails Video Games Virtual Reality Colocation Adobe Data Loss Scam Settings Tech Support Hard Drives Music Files Marketing Legal server installation dvd "cannot install required files" Lithium-ion battery stock Licensing Administrator Google Docs Employer Employee Relationship HBO Analytics Webinar Instant Messaging tweet Relocation Mobile Keyboard Access Microsoft Excel Remote Monitoring File Sharing Storage Safety CrashOverride Emergency Software as a Service Worker WannaCry Thank You Cache Monitors Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...