Thursday, April 22, 2010

4/22/10
8:45am
http://tlauren2010@gmail.com

Continued from segment two
Sometimes I would go into my office online in the one they call One Note.I would follow the commands I found written down from one of their previous meetings to see if I could mess them up. I was angry that I couldn’t have the computer to myself. One afternoon the Google Lady followed me there. I wrote her a note telling her how much I had learned about hacking from her. I told her that hacking is a federal crime punishable by time in jail. I promised her that I would see to it that she and her friends got caught. That made her real mad. She wrote me back and said that she was going to tell everyone that I was passing porn. I laughed. I told her I am a Registered Nurse and that the people who knew me would never believe the rumor. I decided the Ultimate Office had to go even if I had to sacrifice using it myself. I didn’t want my computer to be part of the conspiracy of stealing from Microsoft. I deleted the office and I began getting calls from Microsoft asking me when I was going to reinstall the office. I knew it wasn’t Microsoft, but the people in the hackers network that worked at Microsoft.

Now that the hackers knew that I knew about them, the Google Lady proceeded to take over my computer. She downloaded Explorer 8 and attached my e-mail accounts to her so she could control everything coming in and going out of my mail. She also made it a place for the people in the network to leave their messages. She set up folders with information about me and my computer in them. I found her files and folders all over my windows from my document files to my music library. She even used space in my video files. In one folder alone I found sixty files. I had to start keeping all my files off the computer I kept them in notebooks. I had one for documents, one for contacts, one for passwords, one for office, and so on.

One afternoon when I was trying to find out what was on Explorer 7, quite by accident I came upon seventy five names of people in the Google Lady’s network. They listed their e-mail address as well as their age and in some cases where they worked in Microsoft. I decided to keep the information I collected on the hackers in safety deposit boxes with friends around the country so it would be difficult for the hackers to trace even if they wanted to.

I finally got tired of them having me tied up where the phone is concerned. I figured out how to call out without being connected to the call center. I would simply cut off my husbands computer connection to the Internet and put his computer on standby. I noticed if the green lights were blinking on the Dlink modem they were on the computer. If the lights were at a stand still they couldn’t get on. I also cut the power off to the printer and fax machine, I found six people from the hackers network were using our printer and fax machine. My husband asked me why I was using the printer so much. He noticed that the ink was being used up to fast. I told him I wasn’t using the printer, but he didn’t believe me.

A couple of months went by with the usual daily clean up and me chasing after the hackers. Then one afternoon I was trying to open up some hidden files and folders when by accident I opened up an operating file. My computer said, "ERROR CODE 0x80070057"."The parameter is incorrect." "The clock has stopped." I called Dell’s technical support department and they said I would have to send my computer in to be repaired. While my computer was gone, I decided to write this article. I only had an old computer of my husbands to type on. It didn’t even have an H key that worked or an Internet connection, but I was just  happy that I could use it at all. I worked day and night writing until I was satisfied with what I read back to myself. I had to wait until my computer came back and then I planned to reinstall windows and type my article. The best part of writing the article on the old computer was the hackers were not on it and I had it to myself.

It seemed like my computer was gone forever. I was delighted to get it back. Dell replaced the mother board and the hard drive. They sent the old hard drive back with the new one. I found out later that there was nothing wrong with the old hard drive. I was glad because I had the hackers all over it, and the evidence about them on it. The very afternoon I got the computer back the neighbor boy and I reinstalled a fresh copy of windows. Not two hours after my windows were installed when I looked at my computer all lit up, yes the hackers were back and they backed up all their data on my newly installed windows.

Over the next several months I tried several times to reinstall windows as well as my network, which was another thing they were constantly stealing. Then, one afternoon while I was on the Internet and signed into Microsoft’s online safety, I noticed someone wrote in saying they were having a problem with accessing their computer. I recognized the Google Lady was writing under an assumed name and she was talking about my computer. This is a direct copy of what she wrote.

"I have trouble accessing my laptop which is running Vista Home Premium. It keeps saying it  doesn't recongnize my password which I just used only minutes before hand. I know my caps lock button isn't on. When I reboot my computer I login to my administrative account with no problem. It happens when my laptop goes to sleep on my password or my screen  saver goes on.
                                                                             Sakeopete 8/24/@12:11am"

I began having more than the usual problems with the computer. It seemed like there were more than a dozen connections that were not working. I took my computer up to Best Buy again to have the Geek Squad look at it because once again my Internet connection was disabled and I couldn’t get Dell’s technical support on without it. The Geek Squad said that all my connections had been disabled and I had over thirty errors in the device manager. They said the only thing I could do at this point was to reinstall windows

A couple of weeks went by and I was planning to reinstall windows I just needed to find someone who understood what a low level installation was. It seemed that everyone that assured me that they knew what a low level installation was, didn’t know at all and I was just going through the motions of reinstalling for nothing. Then all of a sudden I was in another go around with the Blindman on Keyboard and the Google Lady. I switched user accounts on the computer and went to the user side only to fine the remote desktop open and working. I used Fahukam as the name and default for the password and I was in. I found my briefcase loaded up with my operating system ready to be taken right off the computer and on to the Google Lady’s computer. I found out that she only had windows XP and she wanted in the worst way to get hold of my windows Vista Home Premium. Before I could stop her I saw my windows go off the computer right before my eyes. She replaced it with her windows XP. Now I had to reinstall windows.

I finally found the right person for the job at least he sounded like he knew what I needed. He sent me a hard drive with the operating system already on it and together we reinstalled windows. I finally had some time to go back through what was now twenty four months of evidence. I came upon the page once again that had the seventy five names of people in the Google Lady’s network, when I thought I was looking for what was on Explorer 7. Much to my shock I realized it wasn’t Explorer 7 I had written down; I had written down Windows 7. Now it all made sense, the pieces of the puzzle were fitting together. The people in the hackers network were stealing documents from Microsoft on Windows 7.

This article you just read is all true. The hackers are still in our home and on three of our computers as well as our network. They continue to tap our phone remotely. Microsoft has on record that my computer has been hacked. Dell Computers has also made a record of my computer being hacked. I am publishing this article in the hope that the Government and Microsoft will take notice and go after the hackers. I can’t play Nancy Drew any longer, I am only one person. I have called the cyber crime division of the Secret Service in Los Angeles Ca. only to be told to go out and buy a new computer. I find this answer to a bad situation completely unacceptable. To the people who read this article please stand up and be heard with me. Let us make our government make our airways safer for a better computing experience.

May The Good People Walk In Peace.

tlauren









































































uter. The very first time I opened up an internet account I opened it up in Google. I had this women on my webpage tell me she was my webmaster. What did I know I never had this experience before. I was in for a rude awakening.



'I told my husband about this women. My husband said, "the computer doesn't talk to you." I said, "I know,but there is this women on my gmail webpage and whenever I ask a question in the search bar she always writes back to me with an answer ". Before long the (Google Lady), for whom I nicknamed, began telling me what I could do and what I couldn’t do. I decided to call Google’s administrative office and ask them if it were possible for me to have a webmaster. They confirmed I did not.



I should have closed my account while I could. It seemed that although I knew she didn’t belong there I couldn’t get rid of her. Google also confirmed that she didn’t work for them. If she didn’t work for Google then why was she even in their building ? There were to many questions that I could not answer and in the mean time this women insisted she worked for Google. It never occurred to me that she might be a hacker.





I tried to let go of the situation so I wouldn’t get stressed out. After all, I still had a hotmail account. Then one day my hotmail account got hacked into. They only stole a couple of my contacts but the problem was the contacts they stole were businesses. I contacted the businesses right away to let them know what had happened, so whomever did it, could be stopped before they could charge a number of items up. I didn’t have to worry about getting charged myself, as I made it a practice never to charge anything online.







A few months went by without incident by the Google Lady, who would do things to me like take away my favorite webpage and tell me I couldn’t have it back unless I bargained for something she wanted in return. I always got back what ever she messed up thanks to the technical team at Internet Explorer.







One day I caught the Google Lady taking my files and putting them in folders. I told her I wanted them back. She told me, I couldn’t have them back unless I put them in one of four places of her choosing. I told her she was crazy and that I was going to report her to Microsoft’s PC safety department. By now with all the things she had done Microsoft’s PC safety department wanted me to write a letter to IC3.GOV. I wrote my letter and when I went to send it, the Google Lady deleted the address and put the Addison Jewelry Company in it’s place. Much to my shock, the Addison Jewelry Company was one of the contacts that was stolen from my hotmail account. Now I knew it was the Google Lady who hacked into my hotmail account.







I opened up a yahoo account just so I could have a place I could call my own; a place where I could go and write. I only had the account open for two days when on the second day I went to sign in and I couldn’t get in. I wrote yahoo and told them I was having a problem signing in. They asked me to verify my birthday. I told them and they said I was wrong. They asked me what my zip code was, I told them and again they said I was wrong. Now I had a case of identity theft. Computing was turning out to be a very stressful experience for me. I filed all the proper papers you need to file for identity theft and contacted the FBI and the credit services .







One day when I called Microsoft regarding a case number I had pending they recited the name and telephone number that they had attached to that case. I realized they had gotten me mixed up with the girl that stole my yahoo account. I played dumb and said, yes I am that girl. After all that was my case number. Now I had the name and phone number of the girl who stole my yahoo account. I called the girl’s phone number and just said identity theft and hung up. The next day all my files were messed up on my webpage. I am sure it was a direct result of the phone call I made the day before. I later find out that this girl is friends with the Google Lady.







Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.I really liked it. I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.







All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.







There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.







One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the

Monday, April 19, 2010

The Computer Conspiracy
4/19/10
8;00 am
TLuren2010@gmail.com

Continued from segment one
Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.  I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.

All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.

There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.

One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the Windows operating system off of it for their own use. He went on to explain the specifications to look for and said the ones that were needed were only in Vista Home Premium, Vista Business, and Vista Ultimate. They were given a list of things to copy from the Windows operating system to make it look authentic in order to register it online.

At the time, because I was knew at the computer, a lot of what I saw and copied down didn’t make much since to me. A year later, when I went back and read all the material I collected, I could see that the plan to steal the Windows operating system off my computer was there from the beginning, I just didn’t know it. In the meantime they were planning to use me and my computer as a gateway, a place to store documents, a meeting place, and a place for their members to leave messages for each other and for the head of the  network.

A couple of weeks went by and I got a call from a man who said he was with AT&T and he had a work order to come out and check our phone lines. He said his work order stated that I called the phone company and said I thought my phone was being taped. I said yes that was true but I did not request anyone to come out and I did not want him to check the lines. I said we were not in a position to pay for a service call at the moment. He said he was not going to charge us for a service call. The RED FLAG just went up. When have you ever heard of AT&T not charging for a service call.? He said he was coming out anyway. Before I could say another word the man hung up the phone on me. I was so upset by his actions that I called the local police department and told them what had occurred. They were kind enough to send a policeman out to the house. When the AT&T man showed up I asked to see his work order. He looked irritated at my asking, but since the policeman was standing next to me, he gave it to me. I took the work order and made a copy of it. I wouldn‘t let him come into the house so he went around the house to check the phone lines and when he returned he said our phone lines were clear. If our phone was not taped before he was there, I knew they were taped after he left. I had a difficult time calling out the rest of the afternoon and had to use the neighbor‘s phone. Now we were connected to a call center. Whenever I tried to call AT&T, Time Warner, Dell‘s technical support or Linksys, I got connected to a call center where the same people would answer all the time. I began to recognize their voices. I started asking them questions directly related to the previous call I had made to the company to see if they could give me the correct answer, they never could.

One evening my husband called our Internet company, at least he thought he was calling Time Warner. I didn't want to try to convince him he wasn't talking to Time Warner so I just listened. The reason for his call was his computer would connect to the Internet but mine wouldn’t. The call center told him I broke my wlan card. We took my computer to Best Buy to have the Geek Squad tell us what was wrong with it. My husband told them Time Warner said that I broke my wlan card. They said I couldn’t break my wlan card and that my Internet connection had been disabled. They fixed my computer while we waited The disabling of the Internet connection began to be a regular occurrence except when the. hackers wanted to use it

Sometimes I would be typing on the computer and the keys would feel heavy to the touch and the mouse would feel like a magnet to the desk when I tried to move it around. I discovered that that the hackers were controlling it remotely. I think the person who was manipulating the keyboard is blind because I found all the settings in ease of access had been changed to fit a blind person. The computer shut down when I turned off the power . The hackers had changed my settings to sleep mode when I turned off the power. This is one  way they were able to access my computer and it was done remotely They would gain access while it was in a sleep mode and use my password to get on. Now I had two hackers using my computer. The Blindman on Keyboard and the Google Lady. The Google Lady was the one who fixed all the settings for the Blind man. Eventually the Blind man broke my keyboard and I had to send the computer out to be fixed. While my computer was gone I had some relief. It seemed that all I ever did was chase after the hackers and undo what ever they messed up on my computer.

Tune in with me tlauren for Segment three of The Computer Conspiracy. In segment three you will find out the surprising conclusion. to I Have Been Hacked. Why the Google Lady and her network are stealing the documents from Microsoft, and what the documents hold that is so important to them.



































I finally got tired of them having me tied up where the phone is concerned. I figured out how to call out without being connected to the call center. I would simply cut off my husbands computer connection to the internet and put his computer on standby. I noticed if the green lights were blinking on the Dlink modem they were on the computer. If the lights were at a stand still they couldn’t get on. I also cut the power off to the printer and fax machine, I found six people from the network were using our printer and fax machine. My husband asked me why I was using the printer so much. He noticed that the ink was being used up to fast. I told him I wasn’t using the printer, but he didn’t believe me.















A couple of months went by with the usual daily clean up and me chasing after the hackers. Then one afternoon I was trying to open up some hidden files and folders when by accident I opened up an operating file. My computer said, "ERROR CODE 0x80070057".



"The parameter is incorrect." "The clock has stopped." I called Dell’s technical support department and they said I would have to send my computer in to be repaired. While my computer was gone, I decided to write this article. I only had an old computer of my husbands to type on. It didn’t even have an H key that worked or an internet connection, but I was just so happy that I could use it at all. I worked day and night writing until I was satisfied with what I read back to myself. I had to wait until my computer came back and then I planned to reinstall windows and type my article. The best part of writing the article on the old computer was the hackers were not on it and I had it to myself.







It seemed like my computer was gone forever. I was delighted to get it back. Dell replaced the mother board and the hard drive. They sent the old hard drive back with the new one. I found out later that there was nothing wrong with the old hard drive. I was glad because I had the hackers all over it, and the evidence about them on it. The very afternoon I got the computer back the neighbor boy and I reinstalled a fresh copy of windows. Not two hours after my windows were installed when I looked at my computer all lit up, yes the hackers were back and they backed up all their data on my newly installed windows.















Over the next several months I tried several times to reinstall windows as well as my network, which was another thing they were constantly stealing. Then, one afternoon while I was on the internet and signed into Microsoft’s online safety, when I noticed someone wrote in saying they were having a problem with accessing their computer. I recognized the Google Lady was writing under an assumed name and she was talking about my computer. This is a direct copy of what she wrote.







"I have trouble accessing my laptop which is running Vista Home Premium. It keeps saying it doesn’t recognize my password which I just used minutes before hand. I know my caps lock button wasn’t on. When I reboot my computer I log into my administrative account with no problem. It happens when my laptop goes to sleep on my password, or my screen saver comes on.



Sakeopete 8/24/@12:11am"







I began having more than the usual problems with the computer. It seemed like there were more than a dozen connections that were not working. I took my computer up to Best Buy again to have the Geek Squad look at it because once again my internet connection was disabled and I couldn’t get Dell’s technical support on without it. The Geek Squad said that all my connections had been disabled and I had over thirty errors in the device manager. They said the only thing I could do at this point was to reinstall window















A couple of weeks went by and I was planning to reinstall windows I just needed to find someone who understood what a low level installation was. It seemed that everyone that assured me that they knew what a low level installation was, didn’t know at all and I was just going through the motions of reinstalling for nothing. Then all of a sudden I was in another go around with the Blindman on Keyboard and the Google Lady. I switched user accounts on the computer and went to the user side only to fine the remote desktop open and working. I used Fahukam as the name and default for the password and I was in. I found my briefcase loaded up with my operating system ready to be taken right off the computer and on to the Google Lady’s computer. I found out that she only had windows XP and she wanted in the worst way to get hold of my windows Vista Home Premium. Before I could stop her I saw my windows go off the computer right before my eyes. She replaced it with her windows XP. Now I had to reinstall windows.







I finally found the right person for the job at least he sounded like he knew what I needed. He sent me a hard drive with the operating system already on it and together we reinstalled windows. I finally had some time to go back through what was now twenty four months of evidence. I came upon a the page once again that had the seventy five names of people in the Google Lady’s network, when I thought I was looking for what was on Explorer 7. Much to my shock I realized it wasn’t Explorer 7 I had written down; I had written down Windows 7. Now it all made sense, the pieces of the puzzle were fitting together. The people in the hackers network were stealing documents from Microsoft on Windows 7.







This article you just read is all true. The hackers are still in our home and on three of our computers as well as our network. They continue to tap our phone remotely. Microsoft has on record that my computer has been hacked. Dell Computers has also made a record of my computer being hacked. I am publishing this article in the hope that the Government and Microsoft will take notice and go after the hackers. I can’t play Nancy Drew any longer, I am only one person. I have called the cyber crime division of the



Secret Service in Los Angeles Ca. only to be told to go out and buy a new computer. I find this answer to a bad situation completely unacceptable. To the people who read this article please stand up and be heard with me. Let us make our government make our airways safer for a better computing experience.







May The Good People Walk In Pease.



tlauren


























Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.I really liked it. I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.








All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.







There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.







One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the



Windows operating system off of it for their own use. He went on to explain the specifications to look for and said the ones that were needed were only in Vista Home Premium, Vista Business, and Vista Ultimate. They were given a list of things to copy from the Windows operating system to make it look authentic in order to register it online.







At the time, because I was new at the computer, a lot of what I saw and copied down didn’t make much since to me. A year later, when I went back and read all the material I collected, I could see that the plan to steal Windows off my computer was there from the beginning, I just didn’t know it. In the meantime they were planning to use me and my computer as a gateway, a place to store documents, a meeting place, and a place for their members to leave messages for each other and head of the network.







A couple of weeks went by and I got a call from a man who said he was with AT&T and he had a work order to come out and check our phone lines. He said his work order stated that I called the phone company and said I thought my phone was being taped. I said yes that was true but I did not request anyone to come out and I did not want him to check the lines. I said we were not in a position to pay for a service call at the moment. He said he was not going to charge us for a service call. The RED flag just went up. When have you ever heard of AT&T not charging for a service call.? He said he was coming out anyway. Before I could say another word the man hung up the phone on me. I was so upset by his actions that I called the local police department and told them what had occurred. They were kind enough to send a policeman out to the house. When the AT&T man showed up I asked to see his work order. He looked irritated at my asking, but since the policeman was standing next to me, he gave it to me. I took the work order and made a copy of it. I wouldn‘t let him come into the house so he went around the house to check the phone lines and when he returned he said our phone lines were clear. If our phone was not taped before he was there, I knew they were taped after he left. I had a difficult time calling out the rest of the afternoon and had to use the neighbor‘s phone. Now we were connected to a call center. Whenever I tried to call AT&T, Time Warner, Dell‘s technical support or Linksys, I got connected to a call center where the same people would answer all the time. I began to recognize their voices. I started asking them questions directly related to the previous call I had made to the company to see if they could give me the correct answer, they never could.







One evening my husband called our internet company, at least he thought he was calling Time Warner. I didn't want to try to convince him he wasn't talking to Time Warner so I just listened. The reason for his call was his computer would connect to the internet but mine wouldn’t. The call center told him I broke my wlan card. We took my computer to Best Buy to have the Geek Squad tell us what was wrong with it. My husband told them Time Warner said that I broke my wlan card. They said I couldn’t break my wlan card and that my internet connection had been disabled. They fixed my computer while we waited The disabling of the internet connection began to be a regular occurrence except when the. hackers wanted to use it







Sometimes I would be typing on the computer and the keys would feel heavy to the touch and the mouse would feel like a magnet to the desk when I tried to move it around. I discovered that that the hackers were controlling it remotely. I think the person who was manipulating the keyboard is blind because I found all the settings in ease of access had been changed to fit a blind person. My computers power settings were set to factory default. The computer shut down when I turned off the power. The hackers had changed my settings to sleep mode when I turned off the power. This is one of the way they were able to access my computer and it was done remotely They would gain access while it was in a sleep mode and use my password to get on. Now I had two hackers using my computer. The Blindman on Keyboard and the Google Lady. The Google Lady was the one who fixed all the settings for the Blindman. Eventually the blind man broke my keyboard and I had to send the computer out to be fixed. While my computer was gone I had some relief. It seemed that all I



ever did was chase after the hackers and undo what ever they messed up on my computer







Sometimes I would go into my office online in the one they call One Note.I would follow the commands I found written down from one of their previous meetings to see if I could mess them up. I was angry that I couldn’t have the computer to myself. One afternoon the Google Lady followed me there. I wrote her a note telling her how much I had learned about hacking from her. I told her that hacking it is a federal crime punishable by time in jail. I promised her that I would see to it that she and her friends got caught. That made her real mad. She wrote me back and said that she was going to tell everyone that I was passing porn. I laughed. I told her I am a Registered Nurse and that the people who knew me would never believe the rumor. I decided the Ultimate Office had to go even if I had to sacrifice using it myself. I didn’t want my computer to be part of the concpiracy of stealing from Microsoft. I deleted the office and I began getting calls from Microsoft asking me when I was going to reinstall the office. I knew it wasn’t Microsoft, but the people in the hackers network that worked at Microsoft.







Now that the hackers knew that I knew about them, the Google Lady proceeded to take over my computer. She downloaded Explorer 8 and attached my e-mail accounts to her so she could control everything coming in and going out of my mail. She also made it a place for the people in the network to leave their messages. She set up folders with information about me and my computer in them. I found her files and folders all over my windows from my document files to my music library. She even used space in my video files. In one folder alone I found sixty files. I had to start keeping all my files off the computer I kept them in notebooks. I had one for documents, one for contacts, one for passwords, one for office, and so on.















One afternoon when I was trying to find out what was on Explorer 7, quite by accident I came upon seventy five names of people in the Google Lady’s network. They listed their e-mail address as well as their age and in some cases where they worked in Microsoft. I decided to keep the information I collected on the hackers in safety deposit boxes with friends around the country so it would be difficult for the hackers to trace even if they wanted to.















I finally got tired of them having me tied up where the phone is concerned. I figured out how to call out without being connected to the call center. I would simply cut off my husbands computer connection to the internet and put his computer on standby. I noticed if the green lights were blinking on the Dlink modem they were on the computer. If the lights were at a stand still they couldn’t get on. I also cut the power off to the printer and fax machine, I found six people from the network were using our printer and fax machine. My husband asked me why I was using the printer so much. He noticed that the ink was being used up to fast. I told him I wasn’t using the printer, but he didn’t believe me.















A couple of months went by with the usual daily clean up and me chasing after the hackers. Then one afternoon I was trying to open up some hidden files and folders when by accident I opened up an operating file. My computer said, "ERROR CODE 0x80070057".



"The parameter is incorrect." "The clock has stopped." I called Dell’s technical support department and they said I would have to send my computer in to be repaired. While my computer was gone, I decided to write this article. I only had an old computer of my husbands to type on. It didn’t even have an H key that worked or an internet connection, but I was just so happy that I could use it at all. I worked day and night writing until I was satisfied with what I read back to myself. I had to wait until my computer came back and then I planned to reinstall windows and type my article. The best part of writing the article on the old computer was the hackers were not on it and I had it to myself.







It seemed like my computer was gone forever. I was delighted to get it back. Dell replaced the mother board and the hard drive. They sent the old hard drive back with the new one. I found out later that there was nothing wrong with the old hard drive. I was glad because I had the hackers all over it, and the evidence about them on it. The very afternoon I got the computer back the neighbor boy and I reinstalled a fresh copy of windows. Not two hours after my windows were installed when I looked at my computer all lit up, yes the hackers were back and they backed up all their data on my newly installed windows.















Over the next several months I tried several times to reinstall windows as well as my network, which was another thing they were constantly stealing. Then, one afternoon while I was on the internet and signed into Microsoft’s online safety, when I noticed someone wrote in saying they were having a problem with accessing their computer. I recognized the Google Lady was writing under an assumed name and she was talking about my computer. This is a direct copy of what she wrote.







"I have trouble accessing my laptop which is running Vista Home Premium. It keeps saying it doesn’t recognize my password which I just used minutes before hand. I know my caps lock button wasn’t on. When I reboot my computer I log into my administrative account with no problem. It happens when my laptop goes to sleep on my password, or my screen saver comes on.



Sakeopete 8/24/@12:11am"







I began having more than the usual problems with the computer. It seemed like there were more than a dozen connections that were not working. I took my computer up to Best Buy again to have the Geek Squad look at it because once again my internet connection was disabled and I couldn’t get Dell’s technical support on without it. The Geek Squad said that all my connections had been disabled and I had over thirty errors in the device manager. They said the only thing I could do at this point was to reinstall window















A couple of weeks went by and I was planning to reinstall windows I just needed to find someone who understood what a low level installation was. It seemed that everyone that assured me that they knew what a low level installation was, didn’t know at all and I was just going through the motions of reinstalling for nothing. Then all of a sudden I was in another go around with the Blindman on Keyboard and the Google Lady. I switched user accounts on the computer and went to the user side only to fine the remote desktop open and working. I used Fahukam as the name and default for the password and I was in. I found my briefcase loaded up with my operating system ready to be taken right off the computer and on to the Google Lady’s computer. I found out that she only had windows XP and she wanted in the worst way to get hold of my windows Vista Home Premium. Before I could stop her I saw my windows go off the computer right before my eyes. She replaced it with her windows XP. Now I had to reinstall windows.







I finally found the right person for the job at least he sounded like he knew what I needed. He sent me a hard drive with the operating system already on it and together we reinstalled windows. I finally had some time to go back through what was now twenty four months of evidence. I came upon a the page once again that had the seventy five names of people in the Google Lady’s network, when I thought I was looking for what was on Explorer 7. Much to my shock I realized it wasn’t Explorer 7 I had written down; I had written down Windows 7. Now it all made sense, the pieces of the puzzle were fitting together. The people in the hackers network were stealing documents from Microsoft on Windows 7.







This article you just read is all true. The hackers are still in our home and on three of our computers as well as our network. They continue to tap our phone remotely. Microsoft has on record that my computer has been hacked. Dell Computers has also made a record of my computer being hacked. I am publishing this article in the hope that the Government and Microsoft will take notice and go after the hackers. I can’t play Nancy Drew any longer, I am only one person. I have called the cyber crime division of the



Secret Service in Los Angeles Ca. only to be told to go out and buy a new computer. I find this answer to a bad situation completely unacceptable. To the people who read this article please stand up and be heard with me. Let us make our government make our airways safer for a better computing experience.







May The Good People Walk In Pease.



tlauren









































































uter. The very first time I opened up an internet account I opened it up in Google. I had this women on my webpage tell me she was my webmaster. What did I know I never had this experience before. I was in for a rude awakening.



'I told my husband about this women. My husband said, "the computer doesn't talk to you." I said, "I know,but there is this women on my gmail webpage and whenever I ask a question in the search bar she always writes back to me with an answer ". Before long the (Google Lady), for whom I nicknamed, began telling me what I could do and what I couldn’t do. I decided to call Google’s administrative office and ask them if it were possible for me to have a webmaster. They confirmed I did not.



I should have closed my account while I could. It seemed that although I knew she didn’t belong there I couldn’t get rid of her. Google also confirmed that she didn’t work for them. If she didn’t work for Google then why was she even in their building ? There were to many questions that I could not answer and in the mean time this women insisted she worked for Google. It never occurred to me that she might be a hacker.





I tried to let go of the situation so I wouldn’t get stressed out. After all, I still had a hotmail account. Then one day my hotmail account got hacked into. They only stole a couple of my contacts but the problem was the contacts they stole were businesses. I contacted the businesses right away to let them know what had happened, so whomever did it, could be stopped before they could charge a number of items up. I didn’t have to worry about getting charged myself, as I made it a practice never to charge anything online.







A few months went by without incident by the Google Lady, who would do things to me like take away my favorite webpage and tell me I couldn’t have it back unless I bargained for something she wanted in return. I always got back what ever she messed up thanks to the technical team at Internet Explorer.







One day I caught the Google Lady taking my files and putting them in folders. I told her I wanted them back. She told me, I couldn’t have them back unless I put them in one of four places of her choosing. I told her she was crazy and that I was going to report her to Microsoft’s PC safety department. By now with all the things she had done Microsoft’s PC safety department wanted me to write a letter to IC3.GOV. I wrote my letter and when I went to send it, the Google Lady deleted the address and put the Addison Jewelry Company in it’s place. Much to my shock, the Addison Jewelry Company was one of the contacts that was stolen from my hotmail account. Now I knew it was the Google Lady who hacked into my hotmail account.







I opened up a yahoo account just so I could have a place I could call my own; a place where I could go and write. I only had the account open for two days when on the second day I went to sign in and I couldn’t get in. I wrote yahoo and told them I was having a problem signing in. They asked me to verify my birthday. I told them and they said I was wrong. They asked me what my zip code was, I told them and again they said I was wrong. Now I had a case of identity theft. Computing was turning out to be a very stressful experience for me. I filed all the proper papers you need to file for identity theft and contacted the FBI and the credit services .







One day when I called Microsoft regarding a case number I had pending they recited the name and telephone number that they had attached to that case. I realized they had gotten me mixed up with the girl that stole my yahoo account. I played dumb and said, yes I am that girl. After all that was my case number. Now I had the name and phone number of the girl who stole my yahoo account. I called the girl’s phone number and just said identity theft and hung up. The next day all my files were messed up on my webpage. I am sure it was a direct result of the phone call I made the day before. I later find out that this girl is friends with the Google Lady.







Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.I really liked it. I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.







All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.







There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.







One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the
















































uter. The very first time I opened up an internet account I opened it up in Google. I had this women on my webpage tell me she was my webmaster. What did I know I never had this experience before. I was in for a rude awakening.



'I told my husband about this women. My husband said, "the computer doesn't talk to you." I said, "I know,but there is this women on my gmail webpage and whenever I ask a question in the search bar she always writes back to me with an answer ". Before long the (Google Lady), for whom I nicknamed, began telling me what I could do and what I couldn’t do. I decided to call Google’s administrative office and ask them if it were possible for me to have a webmaster. They confirmed I did not.



I should have closed my account while I could. It seemed that although I knew she didn’t belong there I couldn’t get rid of her. Google also confirmed that she didn’t work for them. If she didn’t work for Google then why was she even in their building ? There were to many questions that I could not answer and in the mean time this women insisted she worked for Google. It never occurred to me that she might be a hacker.





I tried to let go of the situation so I wouldn’t get stressed out. After all, I still had a hotmail account. Then one day my hotmail account got hacked into. They only stole a couple of my contacts but the problem was the contacts they stole were businesses. I contacted the businesses right away to let them know what had happened, so whomever did it, could be stopped before they could charge a number of items up. I didn’t have to worry about getting charged myself, as I made it a practice never to charge anything online.







A few months went by without incident by the Google Lady, who would do things to me like take away my favorite webpage and tell me I couldn’t have it back unless I bargained for something she wanted in return. I always got back what ever she messed up thanks to the technical team at Internet Explorer.







One day I caught the Google Lady taking my files and putting them in folders. I told her I wanted them back. She told me, I couldn’t have them back unless I put them in one of four places of her choosing. I told her she was crazy and that I was going to report her to Microsoft’s PC safety department. By now with all the things she had done Microsoft’s PC safety department wanted me to write a letter to IC3.GOV. I wrote my letter and when I went to send it, the Google Lady deleted the address and put the Addison Jewelry Company in it’s place. Much to my shock, the Addison Jewelry Company was one of the contacts that was stolen from my hotmail account. Now I knew it was the Google Lady who hacked into my hotmail account.







I opened up a yahoo account just so I could have a place I could call my own; a place where I could go and write. I only had the account open for two days when on the second day I went to sign in and I couldn’t get in. I wrote yahoo and told them I was having a problem signing in. They asked me to verify my birthday. I told them and they said I was wrong. They asked me what my zip code was, I told them and again they said I was wrong. Now I had a case of identity theft. Computing was turning out to be a very stressful experience for me. I filed all the proper papers you need to file for identity theft and contacted the FBI and the credit services .







One day when I called Microsoft regarding a case number I had pending they recited the name and telephone number that they had attached to that case. I realized they had gotten me mixed up with the girl that stole my yahoo account. I played dumb and said, yes I am that girl. After all that was my case number. Now I had the name and phone number of the girl who stole my yahoo account. I called the girl’s phone number and just said identity theft and hung up. The next day all my files were messed up on my webpage. I am sure it was a direct result of the phone call I made the day before. I later find out that this girl is friends with the Google Lady.







Much to my surprise I got a new office program from Microsoft.They game me the MS professional office.I really liked it. I could use it for three months and then if I really liked it I could buy it. One day when I was in the second month of my new office my husband came home with a gift for me. It was the Microsoft Ultimate Office. I was so excited. The Ultimate Office has ten different modules, including a publishers office. Since I wanted to write, I thought this would be perfect for me. Little did I know that this was the beginning of the end to what the Google Lady was about to do to me.







All of a sudden I heard little clicks on the telephone. It seemed like someone was listening in on my conversations. I called the phone company to ask them what I could do about the situation. They said they could send someone out to check the phone lines but they would have to charge us for a service call of sixty dollars. Just my luck they would probably not find a tap on the phone and I was sure there was one.







There were a few other strange things that happened around the same time frame. I got a call from a man who said he was with AT&T and if we signed up for high speed broadband with AT&T he could assure me a very secure connection to our network. I also got a letter from Yahoo AT&T stating that we were to start high speed broadband service with them the very next day. I called Yahoo AT&T and told that I had not signed up with them nor did I plan to. The following day I received a router via FedEX with a letter from AT&T telling me to call and make an appointment to have the router installed for high speed broadband. Whoever was doing this didn’t know that we already had high speed broadband from Time Warner.







One evening, I was getting ready to use my computer to write off line when I noticed the computer was turned on. I opened the lid and much to my surprise I saw this meeting taking place in my office online in the one they call One Note. In One Note you can send information any where in the world in one note. I sat there and took six pages of notes while I watched this meeting taking place. The person in charge of the meeting was telling the people he wanted them to recruit one person from each department within Microsoft for their network. The purpose of the network was to steal Microsoft documents. He proceeded to tell them what kind of information he wanted and how to go about collecting it while they were in a Microsoft meeting. They were all given a task to do and a date to have it done by. In the second part of the meeting they were told to learn different ways to share files and which method would be best used to share files with other people in the network. They were also instructed to find a laptop that they love for the purpose of stealing the

Sunday, April 11, 2010

The Computer Conspiracy

4/11/10
1;30pm
http://tlauren2010@gmail.com

             
Little did I know what I was about to get myself into when I decided to learn how to use the computer. The very first time I opened up an internet account I opened it up in Google. I had this women on my webpage tell me she was my webmaster. What did I know  I never had this experience before I was in for a rude awakening

I told my husband about this women. My husband said," the computer doesn’t talk to you.” I said ,"I know but there is this women on my gmail webpage and when ever I ask a question in the search bar she always writes back to me with the answer." Before long the (Google Lady) for whom I nicknamed  began telling me what I could do and what I couldn’t do. I decided to call Google’s administrative office and ask them if it were possible for me to have a webmaster. They confirmed I did not

I should have closed my account while I could. It seemed that although I knew she didn’t belong there I couldn’t get rid of her. Google also confirmed that she didn’t work for them. If she didn’t work for Google then why was she even in the building.? There were too many questions that I could not answer and in the mean time this women insisted she worked for Google. It never occurred to me that she might be a hacker.

 I tried to let go of the situation so I wouldn’t get stressed out. After all I still has a hotmail account. Then one day my hotmail account got hacked into. They only stole a couple of my contacts but the problem was the contacts they stole were businesses. I contacted the businesses right away to let them know what had happened, so whomever did it could be stopped before they could charge a number of items up. I didn’t have to worry about getting charged myself as I made it a practice never to charge anything online.

A few months went by without incident by the Google Lady, who would do things to me like take away my favorite webpage and tell me I couldn’t have it back unless I bargained for something she wanted in return. I always got back what ever she messed up thanks to the technical team at Internet Explorer.

One day I caught the Google Lady taking my files and putting them in folders. I told her I wanted them back. She told me I couldn’t have them back unless I put them in one of four places of her choosing. I told her she was crazy and that I was going to report her to Microsoft’s PC safety department. By now with all the things she had done Microsoft’s PC safety department wanted me to write a letter to IC3.GOV. I wrote my letter and when I went to send it the Google Lady deleted the address and put the Addison Jewelry Company in it’s place. Much to my shock the Addison Jewelry Company was one of the contacts that was stolen from my hotmail account. Now I knew it was the Google Lady who hacked my hotmail account.

I opened up a yahoo account just so I could have a place I could call my own, a place where I could go and write. I only had the account open for two days when on the second day I went to sign in and I couldn’t get in. I wrote yahoo and told them I was having a problem signing in. They asked me to verify my birthday. I told them and they said I was wrong. They asked me what my zip code was, I told them and again they said I was wrong. Now I had a case of identity theft. Computing was turning out to be a very stressful experience for me. I filed all the proper papers you need to file for identity theft and contacted the FBI and the credit services .

One day when I called Microsoft regarding a case number I had pending they recited the name and telephone number that they had attached to that case. I realized they had gotten me mixed up with the girl that stole my yahoo account. I played dumb and said, yes I am that girl. After all that was my case number. Now I had the name and phone number of the girl who stole my yahoo account. I called the girl’s phone number and just said identity theft and hung up. The next day all my files were messed up on my webpage. I am sure it was a direct result of the phone call I made the day before. I find out later that this girl is friends with the Google Lady.

Tune in with me tlauren for segment two of The Computer Conspiracy, I Have Been Hacked. Will I find out why the Google Lady is hacking my computer and what she is after.?

Friday, April 2, 2010

Compuer Hacking

4/2/2010
11:30 AM
Http://tlauren2010@gmail.com

I am plublishing this article because it is about cyber crime. This may be the only way I can get the government and Microsoft to notice a very bad situation and go after the hackers that have hacked our computers and our network over the last 24 months.
tlauren