2.1 Hacked
PS
2.1 Hacked
By Peter Snyders (21.5.2026) G
Have you been hacked? If so, add your experience to our site. If you have not been hacked yet, read this post to learn about it. This way, you can avoid being hacked yourself.
Tip Number 1.
Listen to your inner voice. If you do and remain obedient, you will discover that your Inner Master knows when you get hacked. If you are a spiritual practitioner, you may be hacked so that you can warn others of your experiences. Your Supreme Master, or a member of his/her team, will advise you.
If you are, for example, a composer or have your money openly on your computer, you will be advised to put all your Music, MP3 songs, bank, and insurance data on an external hard drive. Get yourself an external drive and use it as your main PC drive. You can get your external drive from Makro online. So, when you get hacked, the few songs you were working on would be on a flash drive when you get hacked. Also, do not forget to register your songs at the South African Music Rights Organization (SAMRO).
The prime hacking they do is for money, music, and anything that can bring in money for them. Use complicated random passwords that have nothing to do with you, your family, or your pets. If you have a lot of other things on your computer, you can put your precious things under a disguised name for the files and folders. Remember to do this only if you have a two or more-gigabyte external hard drive. Remember that given the opportunity, they will open every file and folder. If they have no luck with the first batch of folders they opened, they will skip file and folder names that they are not interested in.
Tip Number 2
Identify their system
The first sign to look out for is that you cannot close the window. The window is usually a Google. It has all the new AI features and looks very convincing. Since you cannot close the window, SWITCH OFF YOUR COMPUTER!
If you don’t switch off your computer, you will be asked to change your email address. They will have many different options for you, but you can use them or create your own email address. Google will NEVER ask you to change your email! If you have not shut down your computer yet, DO IT NOW! Press the big round button on your computer.
So, next, they will state that you should choose a password. When you choose your last Google password, they will inform you that you changed that password four months ago. This should be a red flag because you know that you did not change your password four months ago. This is your last chance. SWITCH OFF YOUR COMPUTER! If you give them a new password, their deception worked on you. This far, it is too late to turn off your computer, but do so, so that they cannot enter your data right away.
If you do not switch off your computer, the scanner will know that you are easily deceived. He will then request a recognition picture and will present you with a typical biometric scan diagram. Please don’t give him this. This is your last chance to SWITCH OFF YOUR COMPUTER!
Tip Number 3
Only have your computer on when you work with it.
They cannot get to your material when your computer is off. So, never leave your computer on when you are not going to be working on it. Even if you are just going to the toilet for 10 to 15 minutes, switch off your computer. If you are doing a big search and it is not finished by the time you want to leave, either collect the partial data or switch off your computer and try again during your next computer session. Things will be different, of course, when you are working on your company’s computer.
Number 4
Try putting your computer to sleep
For this, and all uses for your computer, you must have a password. Do not use the names, dates of your family and yourself, or anything else applying to you or the family. Whether you use numbers or characters, let them always be random. Use a completed Sudoku. If you do not do Sudokus, go to Google and download a page of Sudoku solutions (up to 12 x 81per page).
There are nine rows, each containing nine numbers per line. You want to mix capitals as E, R, T; lower case as y, u, and p; numbers such as 2, 5, and 9, and characters like @ # { “ : and <. You will need nine of them. If you are going to use a numbers password, use a row of numbers from you sudoku solutions. If you put your computer to sleep, it is quicker to wake it up with only your password. The computer goes off – all but the blue light. It is also easy to switch on. But your PC does not always ask you for your password. Use this option only when you are going to be away for less than five minutes.
