Thursday, March 31, 2011
This is a new adventure for me. I've worked either for various levels or government or private corporations for most of my life.
So far getting the business off the ground has been a lot of work but I look forward to the challenges ahead.
I've had one moment of panic so far, made some mistakes, and then got over it without committing any criminal acts, doing anything evil to anyone, while resolving the issue.
I'd say that's a good sign.
Now, I'm looking for clients so I'm going to shamelessly advertise it on my personal blog.
Check out my new Business site at Kitty Hundal Dot Com.
If you need someone to build your web site, web, software or phone application, or come up with a Cloud solution for a business problem you're having I'll be more than happy to help.
Wednesday, March 30, 2011
Most stalking victims are not only targeted in real life but in the virtual cyber world as well .
My own personal case demonstrates this reality quite well.
Companies like the following one are available to help for those who have the financial resources and would be well worth the price tag.
Unfortunately, I can't afford them, but for those of you who can, you should seriously consider this option.
With the kind of supportive evidence that they could provide it would become very difficult for the powers that be to ignore your case and very difficult for the stalkers to continue stalking, maliciously persecuting, slandering and libeling you undetected and behind the scenes, as many do.
For obvious reasons they cannot take on pro bono cases so please don't contact them to ask them to do that.
Only contact them if you can afford to pay for their services.
Cyber Investigative Services, LLC
Anonymous Internet Attack Investigations (Worldwide), Internet Litigation & Defamation Support, Online Reputation Repair & Defense.
Licensed PI Agency # - A1000310,
Website: www.netslander.com (educational)
Phone: (813) 344-1614
Our standard scenario is a client or their attorney faced with the daunting task of having to PROVE the identity of the person who is attacking them online. In 80%+ of our cases, everybody knows who is doing the attacks but frequently, that is not good enough to proceed. Many investigations are derailed by anonymous IP addresses, fake accounts and spoofed MAC addresses. Antagonists go to great lengths to hide their identity, so getting to the real information requires very specialized techniques.