Welcome, 2zone & company-We are registered computer resellers, software developer, computer technicians, Advertisements & event orgernizers and all ICT consultations.

.........We are here to serve.

Tuesday, 3. July 2012 - 20:16 Uhr

2zone New Computers Stock

Samsung NP-300 Laptop


Intel Celeron 1.5Ghz, 2GB RAM , 320GB Hard Disk, WebCam, Wi-Fi (for wireless internet), Bluetooth, Card Reader, 15.6” Screen, DOS (No Software)

HP 630 Laptop

Intel Celeron 1.6GHz, 2 GB RAM, 500GB Hard Disk, DVDRW, Webcam, Wi-Fi (For wireless internet), Bluetooth, Card Reader, 15.6” Screen, DOS (No Software) Price 690,000/=Tshs

Samsung Mini NP-N102S Netbook

Intel Atom 1.6Ghz, 1GB Memory, 320GB Hard Disk, WebCam, Wifi, Bluetooth, Card Reader, 10.1” Screen, Windows 7 Starter 

Price 520,000/=Tshs



Monday, 21. May 2012 - 17:45 Uhr

How to recover your Hidden files and folder from your Flash disk (Pendrive)


How to recover your Lost/ hidden Files from your storage Drives


Its very common to encounter this problem. Solving it is as easy as to encounter it too. If your pendrive/ flash disk or any other storage device shows hidden files and folders or shortcuts then you have every reason to panic if you you have very serious information in your device.


So what really happens.


The virus is dependent upon the autorun system of the computer to duplicate and infect targeted areas, since portable pendrives are the easy way of hardware sharing between one computer to the other, it makes them very vulnerable to virus infections.


Once you insert an infected pendrive Your Antivus programs have the capability to block the autorun file as the device is inserted. This prevents the virus from running and infecting other files within your computer.

 A Virus is indeed smart, smart to the extent of setting a backup plan incase its blocked by the antivirus through autorun. The virus then replicates your files and hides your original files replacing them with a shortcut - not to your files but to the virus itself.

This action serves as it’s backup plan encase the autorun system fails.  The original files are not damaged, only the attributes had been changed.


Understanding that only the attribute is changed then the solution is to reverse the process. And here is how.

  • Insert your drive and note its name (say H:, I:, G: etc)
  • Open the Command Prompt (easy way to do this: from start, type cmd, then click enter)
  • Once the Black and white interface (cmd) start, type the name of the drive followed by :

Eg. H:       then enter.

  • Type   attrib –s –h –r /s /d  (remember, there is a space between (attrib)and (-s) and(-h) and(-r) etc)
  • Then ENTER


Further more we recommend usage of a good antivirus and we recommend KASPERSKY. Get it by clicking HERE


For more Technical support Contact Us:

2zone Technical Unity

Mobile: +255719792703

Email: sales.2zone.page4.me

Tags: shortcuts hidden files antivirus virus 


1 Comment

Monday, 21. May 2012 - 11:21 Uhr

Twitter classic phishing scam DM

Some of you (infact many) have been receiving DM from your friends or other tweeter accounts saying "

 ‘Someone’s Saying Bad Things About You’

Well here is the story behind:

Hackers have managed to use fake tweeter ID which can spread faster (those having many followers or of big corporations) and send Direct Messages to followers saying someone is saying very bad things about you, or someone is saying very nasty things about you or someone is saying horrible  things about you etc.


Then to see the so called "bad/ horrible/ nasty" thing that are being said about you you have to click on a link that is attached with the mail.


By the time you follow that link, it takes you to a fake twitter log in Page (you can not recognise if its a fake, looks identical) and you are required to log in as your session is expired already.


Your Log in details are then collected this  information will pass on to hackers and your account gets compromised. After this, the hackers can misuse this twitter account to send more such provoking direct messages to more people and it starts to spread. 

Now what happen after they have all your web adresses,?

you may see this as a very simple issue but for a company sending very sensitive information through the emails that they use on their social networks, Just image,the thousands of business email addresses hackers could forward their target website addresses or viruses.

This onlineespionage crippled companies and cost them millions of dollars in lost revenue and worker hours 

Also, hacker may try and succeed  to infect your computer with a virus 

What to Do


If you get such message via email or Direct message on Twitter, do not click the link in this DM. Manually type twitter.com in the address bar of a browser and login to your twitter.

Click on messages, select thephishing message and click delete link at the bottom of the message,

then make sure you change your password atleast once after you have done the above process.

2zone Computers provide consultancy on  email management service for compromised corporate email addresses and Antivirus softwares that can minimize this threats, Value your confidentiality, Data and internet experience.

Contact us:


Mobile: +255 719 792 703

Email: sales.2zone@gmail.com

Tags: twitter scams phising 



Saturday, 28. April 2012 - 12:05 Uhr

Give back to the community, Bill & Melinda Gates Foundation

Its so amaizing when we see very successful people in this entire world stretching a hand to reach the community that are on the distance far enough to call a different planet from where they live.

It has neither being a normal thing for wealthier people in this worldto do and accomplish what this otstanding man has done, Bill Gates, a Tycoon in ICT or rather a founder and majority single owner of Microsoft, has been a very intrumental person in this world and now more than ever in Tanzania,.

I just came across Bill and Melinda Gates Foundation when i was passing through the Biography of the worlds most respected investor, Warren Bufet, or so called, "The Oracle Of Omaha" when he donated majority of his wealth to this Foundation.

Now Bill and Melinda Gates Foundation has reached the places that we can site an example, Bagamoyo in Tanzania, in the Video, Bill together with Melinda, visits the Hospitals and Labolatories in Tanzania and seems to know more than what our many Politicians dont, Listern to the statistics they say



Sunday, 8. April 2012 - 17:55 Uhr

Ifahamu Amazon Kindle

Tangu Kuingizwa sokoni mwaka 2007, Kindle imajizolea umaarufu mkubwa kutokana na kuongezeka kwa matumizi ya  majarida, vitabu, blogs na usomaji wa habari mbalimbali kutoka vyombo vya habari vianavyotoa habari katika mitandao.


Kwa ufupi KINDLE ni kifaa, tofauti kidogo na iphones au smartphones nyingi kutokana na uwezo wake wa kutoa muonekano halisi wa karatasi kielectroniki na wakati huo huo kutumia umeme kidogo kuliko smartphones.


Kuanza kwa matumizi ya kifaa hiki kumeleta mabadiliko makubwa kihistoria, kwa mfano katika miezi mitatu mfululuzo mwaka 2010, mauzo ya vitabu halisi katika mtandao yalipitwa kwa kiasi kikubwa na mauzo ya ebooks na pia uwezo wake wa kuhifadhi au kukaa na chaji hadi kufikia mwezi mmoja(kindle ya kizazi cha nne)


Kwa sasa Kindle iko katika kizazi cha nne, (fourth generation) mabadiliko yaliyotokana na kuongezeka kwa vitu mbalimbali kutoka kizazi kimoja hadi kingine, tofauti kubwa zikiwa katika ufanisi, kizazi cha kwanza hadi cha nne Kindle zimebadilika kwa kuongeza ufanisi muhimu ikiwa ni ukubwa wa umbile, labda na mbwembwe pale unapogeuza Kindle kutoka portrait kwenda landscape na kurasa unayo soma hufanya vivyo hivyo, uwezo wa kuhifadhi kumbukumbu na kuchakata data, kuwekwa kwa baobonye rahisi (Keys), na screen touch. Mabadiliko haya ndiyo pia yanayo saidia kuzipa majina, mfano, Kindle ya kizazi cha nne inaitwa Kindle touch, kuonyesha uwezo wake wa screen touch.


Naam ni wakati wa wasomi na wanafunzi, hususani tunaojari mazingira Kupunguza matumizi ya Karatasi na kutumia vitabu vya kielectroniki, yaani ebooks kama sijakosea, Kutokana na ufanisi wa vifaa hivi,

Kufahamu umuhimu wa kifaa hiki labda turejee takwimu za mauzo ambapo baadhi ya vyanzo vinavyosadidkika kutoka ndani ya AMAZON, wamiliki, watengenezaji(chini ya Lab126) na wauzaji wa teknolojia hii, mpaka kufikia 2009 takribani Kindle milioni tatu zilikwisha nunuliwa, japo mwaka mmoja tuu tangu kuanza kuuzwa rasmi.

Tuma Order yako kwa sales.2zone@gmail.com Ujipatie Kindle yako mapema, pia kupata bei na aina zilizopo.




Tags: third generation kindle touch kindle dx kindle amazon kindle 


1 Comment

Tuesday, 6. March 2012 - 01:19 Uhr

Brad Paisley- Alcohol

I can make anybody pretty
I can make you believe any lie
I can make you pick a fight
With somebody twice your size

I been known to cause a few break ups
I been known to cause a few births
I can make you new friends
Or get you fired from Work

[1st Chorus]
And since the day I left Milwaukee
Lynchburg and Bordeaux France
Been making the bars lots of big money
And helping white people dance
I got you in trouble in high school
But college, now that was a ball
You had some of the best times
You'll never remember with me

I got blamed at your wedding reception
For your best man's embarrassing speech
And also for those
Naked pictures of you at the beach

I've influenced kings and world leaders
I helped Hemmingway write like he did
And I'll bet you a drink or two that I can make you
Put that lampshade on your head

[2nd Chorus]
'Cause since the day I left Milwaukee
Lynchburg and Bordeaux France
Been making a fool out of folks just like you
And helping white people dance
I'm medicine and I am poison
I can help you up or make you fall
You had some of the best times
You'll never remember with me

[Repeat 1st Chorus]

Tags: Brad Paisley Alcohol Country Music Lyrics