• Complain

Beatrice Mrs - The Stories of My Hackers and I

Here you can read online Beatrice Mrs - The Stories of My Hackers and I full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, genre: Detective and thriller. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

The Stories of My Hackers and I: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Stories of My Hackers and I" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Overview: The purpose for this book is to bring awareness of Internet fraud. Everything written here is true. Should anything proved to be wrong, it should be judged because I had no knowledge of its true nature by fact for I would never have intended to place false accusation of anyone or any organization.

Beatrice Mrs: author's other books


Who wrote The Stories of My Hackers and I? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Stories of My Hackers and I — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Stories of My Hackers and I" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

The Story of My Hackers and I

By Beatrice Lin Walsh

The purpose for this book is to bring awareness of Internet fraud. Everything written here is true. Should anything proved to be wrong, it should be judged because I had no knowledge of its true nature by fact for I would never have intended to place false accusation of anyone or any organization.

Best regards

Beatrice

Content

A Missing Cake Order

FIFA14 And Its In-app Purchase

found out my home hp pc had a keylogger

trying to understand my computer day and nightgoogle account activities and key loggers

Apple id and the lost controls on my iphones and ipad

Storms hit the roof when it is already leaking--even my mobile phones were compromised

Current status: tips to keep distance from keyloggers

one month later

the truth

seeking help all the way to the top

secrets of mobile phones

landline can be hacked, too

bubbles of the world

e-signatories

A Missing Cake Order

The whole hacking incident started on the eve of my birthday. That afternoon I ordered online a cake from Belgique for myself, a heart-shaped chocolate cake. I paid through a credit card and I received a confirmation on screen saying I - photo 1

I paid through a credit card and I received a confirmation on screen saying I had completed the payment. But I never received a confirmation letter in my mailbox. I was puzzled. I thought I should wait till the next morning. After that, soon my life was turned upside down. I couldnt care less I heard nothing about the cake again until June 17th when I recovered the very email address that I used to log in for the cake shop.

On June 17, I saw the message fromBelgique It made me laugh For crying out loud my - photo 2 I saw the message fromBelgique,

It made me laugh. For crying out loud, my hackers wouldnt let go of anything even a birthday cake.

I dialed the number to speak to Belgique. It was my secret hope there might be a chance to eat a cake after all. The gentleman working atBelgique was very kind. He couldn't find any orders at first. All data had been erased from my account--no contact number, no delivery address, only the names. He kindly went through credit card bills. And he discovered two orders on that day. The first one was 28.50 which matched with the price of my heart-shaped cake; the second one was 19.50. Unfortunately, or maybe fortunately, neither order went through.

This was only the tip of the iceberg to start unveil how hackers impersonated me. First, theyobtained my email address, then keylogged into my home computer PC ,and finally control my mobile telephonesim number.

FIFA14 And Its In-app Purchase It was my birthday next day That evening I remembered the cake so I thought I - photo 3

It was my birthday next day That evening I remembered the cake so I thought I - photo 4

It was my birthday next day. That evening I remembered the cake so I thought I might take a look at my bank account. Words could not express my shock when I saw the statements.

These - photo 5These are not the end of the bills for that month There were a lot more alread - photo 6

These are not the end of the bills for that month There were a lot more - photo 7

These are not the end of the bills for that month There were a lot more - photo 8

These are not the end of the bills for that month There were a lot more - photo 9

These are not the end of the bills for that month. There were a lot more already been authorized but had not hit the invoices.

I panicked and I phoned the bank. First Direct was absolutely brilliant. The lady from the credit card department reassured me the bank would reimburse the fraud charges first and then talk to Apple's Fraud Dept. I was quite happy when Iheard it. As usual, anything I thought was educational Iwould try to share the knowledge with my children. Id like them to know how to spot suspicious unauthorized charges.

I called my 11-year-old son and eight-year-old daughter to show them the bill saying how people can steal other's identity and fraud. But to my greatest horror and distress, I heard my son stammering, " Mom, I played the games. It's me who did it. What is going to happen to me? "

My brain shattered in that instance. I couldn't utter a word.

I fell into such a state that I couldn't think anymore.

My son ran to his father. His father came to me and said, " You need to speak to the bank to call it off. You have to withdraw. We'll pay for whatever the cost is but to preserve our sons record. "

I understood the seriousness and the possible impact to my child, so I phoned the bank immediately. I located the lady I spoke to before and apologized to her.

It was the worst night in my life.

I questioned myself, " Why am I so hurt because it was my son? Why wouldn't I feel so distressed if it were my husband or my sister? "

Because I valued the parental bond. Only my son and my daughter are part of me. I grasped upon the relationship almost no different from the attachment to myself ego.

That night I didn't sleep. I sat in front of the computer trying to source out all the invoices. Only till now I can see all the problems clearly: My son thought he played all the games and it was him who spent all the money. The fact was It wasn't done all by himself. All my Apple accounts have been compromised. My son accidentally fell into the trap of FIFA14's in-app purchases when he was constantly cohorted by a gang of online players who happened to be our key-loggers. They were monitoring his mobile phone and his iPad like shadow puppet players. In the rest of the book, I will show evidence and proof to you how hackers can see and hear whatever you say over the phone and what you save in the computer.

found out my home hp pc had a keylogger

My PC had always been changing. There were always new icons of applications popping up on the screen. I used to think they were new softwares installed by my husband. But after my birthday I started to think differently. I became suspicious of every change. I stared at my computer day and night. I believed I was sharing my computer with a group of whose existence I had no knowledge of.

My first clue came from Google report. When I opened an Google email account, I noticed I had a choice to sign up to receive my account activity report at that time. And the following 2 pictures were what I got. My address was not in Bognor Regis.

My hackers ar e keyloggers who unlawfully secretly monitor and log all - photo 10

My hackers ar e keyloggers who unlawfully secretly monitor and log all - photo 11 My hackers ar e keyloggers who unlawfully secretly monitor and log all keystrokes of my properties.

According to geeks, keyloggers are mostly spread using the following methods:

When you open a file attached to an email;

When a file is launched from an open-access directory on a P2P network

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Stories of My Hackers and I»

Look at similar books to The Stories of My Hackers and I. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Stories of My Hackers and I»

Discussion, reviews of the book The Stories of My Hackers and I and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.