Internet & Hackers & the dark web
Internet & Hackers & the dark web
Hackers uses their computers to network with other like-minded individuals, who purchases malicious software on the dark web that enable them to access your computer or more importantly intercept your data and communication as it passes thru the computers of your ISP (internet service provider modem). An ISP is the company that you pay for telecommunication (voice) and data service each month.
To Google, Microsoft, and Norton 360,
I'm writing this as a paying customer, and frankly, as someone at their wit's end. I rely on your services – your operating systems, your productivity apps, your cloud storage, and your security software – to run my business. I pay for the promise of security and functionality. Yet, that promise is being broken daily.
My digital life is under siege. My computer and mobile phone are compromised. I'm experiencing hackers removing documents, actively attacking my Windows 11 operating system, and interfering with the essential business applications I depend on.
And please, let's move beyond the standard advice. I've changed my passwords more times than I can count. It's a temporary fix at best, and clearly, it's not a deterrent for determined attackers. The reality is, my online communications – Gmail, WhatsApp, even standard messages – feel transparent to prying eyes. None of them are 100% secure.
This isn't just about inconvenience; it's about the viability of conducting business online. When hackers can freely infiltrate systems, modify documents in real-time, delete files from supposedly "secure" cloud storage, and essentially watch my every move, the trust in your platforms erodes.
If the operating systems and applications I pay for cannot be adequately secured against these intrusions, then the responsibility to address these hackers more directly needs to be taken more seriously. We, your paying customers, cannot be left to fend for ourselves against sophisticated cyber threats while the attackers roam unchecked.
The constant interference, the altered documents, the compromised operating system – it makes focused work incredibly challenging, if not impossible. Surely, with the advancements in AI and the brilliant minds at your companies, there must be more robust methods to create a genuinely secure internet experience.
We need more than just password reset prompts. We need proactive solutions, stronger defenses, and a clear commitment that you will address the root causes that allow these hackers to operate so brazenly and effectively. The current situation is untenable for your users who are trying to navigate an increasingly hostile digital world.
We are looking to you for real, effective security and a commitment to protecting your customers from these persistent and damaging attacks. John & Gemini Ai
This has highlighted my long-standing and serious concerns about my digital security, stemming from two primary observations:
Email Content Exposure: For approximately seven years, individuals, including those I suspect are municipality staff, have demonstrated knowledge of my private email communications. They've explicitly told me what they've read or discussed it with others, pointing to unauthorized access to my email content.
Real-Time Computer Compromise: More recently, I've witnessed live, on-screen changes to documents I was actively working on, specifically during correspondence with the Public Protector's office. This indicates that someone has real-time visual access to my computer monitor and the ability to remotely control and edit my files.
The real-time access to my computer suggests a highly intrusive form of compromise, most likely due to sophisticated malware (like a Remote Access Trojan - RAT) or the misuse of legitimate remote desktop software that has been installed on my system. This level of access goes beyond simple email monitoring, allowing an attacker to directly manipulate my device.
Given the severity and consistency of these issues, particularly the real-time observation, it's clear I'm dealing with a significant breach of my privacy and security.
Internet subscription services. - Subscribers need more control over there accounts By John and Gemini Ai
Subject: Urgent Need for Enhanced Consumer Control Over Internet Subscription Services
As a home office professional relying heavily on online tools, I'm experiencing significant challenges with managing my internet subscription services. My work demands consistent access to essential software like Microsoft 365, Google Workspace, Adobe Acrobat, and Norton 360, resulting in approximately R6,000 in subscription costs over the past three months.
My primary issue lies in the lack of effective control and transparency over these recurring payments. Specifically:
Unauthorized Charges and Difficulty Cancelling Subscriptions:
I frequently encounter unauthorized deductions from my bank account, despite having no recent service changes.
Cancelling unwanted or faulty subscriptions proves excessively difficult, even when the services are unusable or no longer needed.
For example, I've faced significant issues attempting to cancel subscriptions with Microsoft and Google, resulting in continued charges despite my attempts to terminate the services.
I have 3 Microsoft office accounts. I only need one. I am being charged R 260 per month for each account. I cannot fix the problem because i cannot get access to my office accounts.
Ineffective Customer Support:
Customer support often directs me to self-help resources that are convoluted and ineffective.
Navigating complex online portals and endless "help" pages leads to a frustrating cycle of dead ends, without resolving the core issue.
I have been unable to access my Microsoft Account, and the help provided has been unhelpful.
Bank Limitations:
Banks are often unable to halt recurring payments without explicit authorization from the service provider, creating a frustrating loop of responsibility.
The core problem is the lack of direct, user-friendly control over subscription management. Consumers should have:
Simplified Cancellation Processes: A straightforward, no-questions-asked method for terminating subscriptions, without requiring extensive explanations or navigating complex menus.
Clear and Transparent Billing: Detailed billing statements that explicitly outline all charges and subscription terms.
Effective Customer Support: Accessible and responsive customer support that resolves issues promptly and efficiently, rather than relying solely on self-help resources.
Centralized Subscription Management: A potential platform or tool that allows users to view and manage all their subscriptions in one place, regardless of the service provider.
The current system empowers service providers to continue charging consumers, even when services are unwanted or unusable. This creates a significant financial burden and erodes consumer trust.
I urge for immediate action to address these concerns and implement measures that prioritize consumer control and transparency in internet subscription services. By John & Gemini Ai.
Dell computers. New or 2nd hand are one of the best computers you can buy.
If you own a Dell dont forget to use the free Dell driver update service. This will make a wonderful improvement to how your computer functions. Especially if it is one of the older Dell models.
Can hackers mess with your internet?
By using a technique called DNS (Domain Name Server) hijacking, hackers can breach the security of your home Wi‑Fi and potentially cause you a great deal of harm. They can redirect your traffic to a website run by them, causing you to unwittingly give your credit card number or Facebook login credentials to a criminal.
Demand that your protection service, (anti-virus) app tells you who it was that hacked your device. They will know. And because we pay for their protection, they are obliged to keep the user updated especially with regards to who it was that hacked our device. Especial when someone removes your files/folder out of safe keeping cloud storage.
https://www.chicomm.com/blog/author/lisa-macgillivray
As its name suggests, wireless communication is a type of data communication that is transmitted between two or more devices using a wireless signal. Communication is sent through electromagnetic signals from a sender to a receiving device. Wireless communication encompasses all forms of wireless technologies you regularly hear about: satellite communication, mobile communication, wireless network communication, infrared communication, and Bluetooth communication.