Internet & Hackers & the dark web

Hackers uses their computers to network with other like-minded individuals, who purchases malicious software on the dark web that enable them to access your computer or more importantly intercept your data and communication as it passes thru the computers of your ISP (internet service provider modem). An ISP is the company that you pay for telecommunication (voice) and data service each month. 

Subject: Urgent Need for Enhanced Consumer Control Over Internet Subscription Services

As a home office professional relying heavily on online tools, I'm experiencing significant challenges with managing my internet subscription services. My work demands consistent access to essential software like Microsoft 365, Google Workspace, Adobe Acrobat, and Norton 360, resulting in approximately R6,000 in subscription costs over the past three months.

My primary issue lies in the lack of effective control and transparency over these recurring payments. Specifically:

The core problem is the lack of direct, user-friendly control over subscription management. Consumers should have:

The current system empowers service providers to continue charging consumers, even when services are unwanted or unusable. This creates a significant financial burden and erodes consumer trust.

I urge for immediate action to address these concerns and implement measures that prioritize consumer control and transparency in internet subscription services.  By John & Gemini Ai. 

Dell computers. New or 2nd hand are one of the best computers you can buy. 

If you own a Dell dont forget to use the free Dell driver update service. This will make a wonderful improvement to how your computer functions. Especially if it is one of the older Dell models. 

Hackers at work in Durban Kwazulu - Natal 

Hackers Working in Real Time

30th November 2024  I'm facing a difficult situation amidst my court case. It appears that hackers are viewing my desktop computer screen in real time. I've witnessed someone editing and deleting text in the files I'm actively working on—right in front of me on my monitor. This indicates that a hacker has access to my computer and can make changes at will. Although I don't know who is responsible, I can see the unauthorized alterations happening as I work.

Hackers Delete My TTS App

30th November 2024   I use Text-to-Speech (TTS) technology, which converts written text into spoken words, allowing visitors to listen to the content on my blog. Yesterday, for the second time in the last two or three weeks, the files linked to the TTS app have been deleted from my cloud storage. These files are essential for the TTS app to function, and they completely disappear, even from the deleted folder.

Messenger app. Hackers access the messenger app i use to text communicate with my clients internationally. The messenger app is made available by the agency i work with. Someone else will access the messenger app and leave a message that is disturbing and my client will think that message came from me.  

I am concerned that my blog posts are being tampered with and the wording altered. I take precautions and only ever use paid services. I do not use pirated software and regularly update my computer OS operating system and all the other many apps on my computer. All that i use have been paid for and updated regularly. 

The cost to me in damage to my property office equipment and interference with my clients exceeded one million rand over the last six years. My intruder alarm that user's fiber and wireless communication stops working and i have break-ins to my office. This is the price of fighting with an irregular spending municipality. On two occasions, my fiber line was disconnected for days, and then it would go on and off repeatedly. I have a long list of telecommunications fault report numbers.  I work online from my home office. I had to pack up everything in my office and move out of Westville to Olivedale in Johannesburg.

Can hackers mess with your internet?

By using a technique called DNS (Domain Name Server) hijacking, hackers can breach the security of your home Wi‑Fi and potentially cause you a great deal of harm. They can redirect your traffic to a website run by them, causing you to unwittingly give your credit card number or Facebook login credentials to a criminal.

Demand that your protection service, (anti-virus) app tells you who it was that hacked your device. They will know. And because we pay for their protection, they are obliged to keep the user updated especially with regards to who it was that hacked our device. Especial when someone removes your files/folder out of safe keeping cloud storage. 

What is wireless communication?

https://www.chicomm.com/blog/author/lisa-macgillivray

As its name suggests, wireless communication is a type of data communication that is transmitted between two or more devices using a wireless signal. Communication is sent through electromagnetic signals from a sender to a receiving device. Wireless communication encompasses all forms of wireless technologies you regularly hear about: satellite communication, mobile communication, wireless network communication, infrared communication, and Bluetooth communication.

Access denied. It is important that internet users in KZN understand that our fiber lines and other means of communication are managed by Open Serve and they are vulnerable to hacking. It means that there are individuals and corrupt groups of individuals who manage what the public may view, read and say on the internet.