Internet & Hackers & the dark web
Hackers uses their computers to network with other like-minded individuals, who purchases malicious software on the dark web that enable them to access your computer or more importantly intercept your data and communication as it passes thru the computers of your ISP (internet service provider modem). An ISP is the company that you pay for telecommunication (voice) and data service each month.
Internet subscription services. - Subscribers need more control over there accounts By John and Gemini Ai
Subject: Urgent Need for Enhanced Consumer Control Over Internet Subscription Services
As a home office professional relying heavily on online tools, I'm experiencing significant challenges with managing my internet subscription services. My work demands consistent access to essential software like Microsoft 365, Google Workspace, Adobe Acrobat, and Norton 360, resulting in approximately R6,000 in subscription costs over the past three months.
My primary issue lies in the lack of effective control and transparency over these recurring payments. Specifically:
Unauthorized Charges and Difficulty Cancelling Subscriptions:
I frequently encounter unauthorized deductions from my bank account, despite having no recent service changes.
Cancelling unwanted or faulty subscriptions proves excessively difficult, even when the services are unusable or no longer needed.
For example, I've faced significant issues attempting to cancel subscriptions with Microsoft and Google, resulting in continued charges despite my attempts to terminate the services.
I have 3 Microsoft office accounts. I only need one. I am being charged R 260 per month for each account. I cannot fix the problem because i cannot get access to my office accounts.
Ineffective Customer Support:
Customer support often directs me to self-help resources that are convoluted and ineffective.
Navigating complex online portals and endless "help" pages leads to a frustrating cycle of dead ends, without resolving the core issue.
I have been unable to access my Microsoft Account, and the help provided has been unhelpful.
Bank Limitations:
Banks are often unable to halt recurring payments without explicit authorization from the service provider, creating a frustrating loop of responsibility.
The core problem is the lack of direct, user-friendly control over subscription management. Consumers should have:
Simplified Cancellation Processes: A straightforward, no-questions-asked method for terminating subscriptions, without requiring extensive explanations or navigating complex menus.
Clear and Transparent Billing: Detailed billing statements that explicitly outline all charges and subscription terms.
Effective Customer Support: Accessible and responsive customer support that resolves issues promptly and efficiently, rather than relying solely on self-help resources.
Centralized Subscription Management: A potential platform or tool that allows users to view and manage all their subscriptions in one place, regardless of the service provider.
The current system empowers service providers to continue charging consumers, even when services are unwanted or unusable. This creates a significant financial burden and erodes consumer trust.
I urge for immediate action to address these concerns and implement measures that prioritize consumer control and transparency in internet subscription services. By John & Gemini Ai.
Dell computers. New or 2nd hand are one of the best computers you can buy.
If you own a Dell dont forget to use the free Dell driver update service. This will make a wonderful improvement to how your computer functions. Especially if it is one of the older Dell models.
Hackers at work in Durban Kwazulu - Natal
Hackers Working in Real Time
30th November 2024 I'm facing a difficult situation amidst my court case. It appears that hackers are viewing my desktop computer screen in real time. I've witnessed someone editing and deleting text in the files I'm actively working on—right in front of me on my monitor. This indicates that a hacker has access to my computer and can make changes at will. Although I don't know who is responsible, I can see the unauthorized alterations happening as I work.
Hackers Delete My TTS App
30th November 2024 I use Text-to-Speech (TTS) technology, which converts written text into spoken words, allowing visitors to listen to the content on my blog. Yesterday, for the second time in the last two or three weeks, the files linked to the TTS app have been deleted from my cloud storage. These files are essential for the TTS app to function, and they completely disappear, even from the deleted folder.
Messenger app. Hackers access the messenger app i use to text communicate with my clients internationally. The messenger app is made available by the agency i work with. Someone else will access the messenger app and leave a message that is disturbing and my client will think that message came from me.
I am concerned that my blog posts are being tampered with and the wording altered. I take precautions and only ever use paid services. I do not use pirated software and regularly update my computer OS operating system and all the other many apps on my computer. All that i use have been paid for and updated regularly.
The cost to me in damage to my property office equipment and interference with my clients exceeded one million rand over the last six years. My intruder alarm that user's fiber and wireless communication stops working and i have break-ins to my office. This is the price of fighting with an irregular spending municipality. On two occasions, my fiber line was disconnected for days, and then it would go on and off repeatedly. I have a long list of telecommunications fault report numbers. I work online from my home office. I had to pack up everything in my office and move out of Westville to Olivedale in Johannesburg.
Can hackers mess with your internet?
By using a technique called DNS (Domain Name Server) hijacking, hackers can breach the security of your home Wi‑Fi and potentially cause you a great deal of harm. They can redirect your traffic to a website run by them, causing you to unwittingly give your credit card number or Facebook login credentials to a criminal.
Demand that your protection service, (anti-virus) app tells you who it was that hacked your device. They will know. And because we pay for their protection, they are obliged to keep the user updated especially with regards to who it was that hacked our device. Especial when someone removes your files/folder out of safe keeping cloud storage.
What is wireless communication?
https://www.chicomm.com/blog/author/lisa-macgillivray
As its name suggests, wireless communication is a type of data communication that is transmitted between two or more devices using a wireless signal. Communication is sent through electromagnetic signals from a sender to a receiving device. Wireless communication encompasses all forms of wireless technologies you regularly hear about: satellite communication, mobile communication, wireless network communication, infrared communication, and Bluetooth communication.
Access denied. It is important that internet users in KZN understand that our fiber lines and other means of communication are managed by Open Serve and they are vulnerable to hacking. It means that there are individuals and corrupt groups of individuals who manage what the public may view, read and say on the internet.