Legging it with the Green Net and Tony Turton on the Umzimkulu

Legging it with The Green Net and Tony Turton

Legging it with the Green Net and Tony Turton on the Umzimkulu Legging it with the Green Net and Tony Turton on the Umzimkulu: Legging is a method of moving a boat through a canal tunnel or adit containing water. This method of navigating through canal tunnels and adits was commonly used in canal tunnels during … Read more

Share

Sonar tagging Zambezi Sharks with Calum Murie

Although Zambezi Sharks are on the top of our hit list, these blacktips are also featured.

Sonar tagging Zambezi Sharks: Calum Murie could have been anything. But he chose to spend his life chasing huge sharks around with sonar tag in hand, ready to abuse the first full grown Zambezi Shark he sees. In the name of science, research and conservation, Calum’s motivation for this career path runs deep and his … Read more

Share

Last chance at Windows 10 for FREE

Windows 10

Last chance at Windows 10 for FREE If you, like me, ended up with one of your machines not upgraded to Windows 10, before the cut off date way back then, there is another way out. Way out. Well yes, a way out of the nonsensical Windows 8.x operating systems, for sure. And also, to … Read more

Share

FishBazaruto’s game-fishing video playlist getting bigger and better

Light tackle game-fish is just so much fun off Bazaruto

FishBazaruto’s game-fishing video playlist getting bigger and better Game-fishing for the camera! It’s real cool when the kids take over and just thump out cool little edits of your day at sea for you! Well this has been happening more and more as the young ones embrace technology – especially cell phones and video. Captain Duarte … Read more

Share

Phoney Phishing with Proof of Payments

Phoney phishing emails can look much like this one - the senders could even be bona fide

Phoney Phishing with Proof of Payments Please be careful not to open any PoP’s (Proof of Payments) that are coming into your inbox. The attachment is an html file that contains a payload of malicious code for you especially. This is called phishing. These payloads can be many forms – keylogger, trojan, spyware, malware, virus…the … Read more

Share