TERMS AND CONDITIONS.
Please open this link for Hardware Terms: www.karl.co.za/termsHardware

Terms and Conditions of internet services
1. Payments in advance for the monthly services that you receive.
2. A 1 calendar month written notice is required when terminating a service.
CLick here for an example of ADSL cancellation
3. A 1 calendar month written notice is required when moving to new premises.
__ A special form needs to requested and submitted.
__ Moving the telephone lines and the internet is a complicated procedure and can cause many days or months downtime.
__ downtime = no internet, no phones, no faxes.
4. For written notices please confirm if I have received your email with the exact cancellation date.
5. It is the customer's responsibility to follow up on cancellations.
6. At the end of the month I only consider orders, not suggestions.
7. Services will be suspended if full payment is not received.
8. Outstanding payments not paid within 30 days are charged at 3% above prime.
9. If there is a virus on any of your computers and it starts sending out automated junk, the affected computer will need to be disconnected.
__ (i.e. A customer is prohibited from sending unsolicited bulk email.)
10. Line speed upgrade or downgrade (e.g. from 2mbps to 4mbps or faster):
__ Upgrade or downgrade takes about 5 business days to complete.
__ Line speed downgrade or upgrade requests are recommended on the 20th of a month.
11.For cash payments please make sure you have a receipt with my signature.
12.Going on holiday? please prepay in advance for the relevant months or have your cap suspended.
__ The following part can be cancelled, but then needs to be reapplied for:
ADSL line rental.(about 80% to 100% of the total monthly cost)
- A 1 calendar month written notice is required when terminating a service.
- For written notices please confirm if I have received your email.
- Cancelling your ADSL line rental is optional but you may lose the port/reconnection to a new neighbour.
- Reactivation of your ADSL line rental takes about 3 to 21 working days depending on port
____ availability in your area.
The following part can be suspended immediately : The Internet cap (about 0% to 20% of the total cost)
____ The internet cap can also be reactivated within 1 to 48 hours.
13. Due to the unrest in African countries the cable system is at risk and if it breaks, it may take days to fix.
__ During that time non-restored services will only have access to local sites. International websites will be affected or be non-operational.
14. Exceeding one's cap: Any overuse will be deducted from the topup or the next month's cap.
15. The ADSL modem router needs to be restarted every 2nd month to synchronize correctly with the ADSL line.
16. To prevent unnecessary call-outs, please go through the support site: www.karl.co.za/support
The technician checks the Telkom network. The Telkom networks stops on the wall socket.
17. FAULT REPORTING:
You may be subject to a call-out fee (R218 for residential or R872 incl vat for business) when a Telkom technician is dispatched. Prices are subject to change. You may be subject to the call-out fee if the problem is found on your equipment.
You may cancel the fault at any time.
18. Con-men, email spoofing, and phishing attacks:
The more information you put onto websites and give away to unidentified phone calls, the higher the risk of losing out to identity thieves.
19. Viruses, Trojans, Worms, Downloader Viruses and Malware:
___ If there is a virus on any of your computers which is either accessing an illegal network or is sending out automatic emails, then I may disconnect you after notifying you.


In reading this, you acknowledge that Karl Lompa has no power to control the content of the information passing over the Internet and its applications,
including e-mail; chatrooms; news groups etc, and that Karl Lompa cannot be held responsible or liable, directly or indirectly, for any of the abovementioned content, in any way for any loss or damage of any kind incurred as a result of, or in connection with your use of, or reliance on, any such content.
The customer acknowledges and agrees that Karl Lompa shall without limitation have no responsibility for, or liability in respect of any data lost as a result of this system including the loss of emails.
Karl Lompa urges customers not to reply to unsolicited mail or spam, not to click on any suggested links provided in the unsolicited mail. Doing so remains the sole responsibility of the customer and Karl Lompa cannot be held liable for the Customer being placed on any bulk mailing lists as a result.
Where the customer has authorised a minor to use any of the Karl Lompa's services or access its websites, you accept that as the parent/legal guardian of that minor, you are fully responsible for: the online conduct of such minor; controlling the minor's access to and use of any services or websites; and the consequences of any misuse by the minor, including but not limited to transactions entered into by the minor using such access.
Karl Lompa cannot be held liable for any business dealings you have with any third parties on the Internet. Further, Karl Lompa assumes no responsibility whatsoever for any charges you or any user of your account incurs when making purchases or other transactions in this manner. Further, the responsibility for ensuring compliance with all applicable customs and exchange control laws in connection with any such transactions shall be the customer's.
Terms and conditions may change without prior notice.

Fake anti-virus programs, unwanted programs, misleading applications
A fake (anti-virus or Registry cleaner) program is a type of misleading application that pretends to be security software, but which actually provides the user with little or no protection whatsoever and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. it lies that it can remove unwanted applications such as spyware or adware. These scams cheat users out of money by charging for their fraudulent product, but the personal and credit card information that users provide to register these fake products could also be used in additional fraudulent activity. Ref: www.symantec.com
They can even be disguised as needed video codecs or browser plug-ins to view web content. They also get onto your PC/laptop through unpatched software vulnerabilities. Ref: www.symantec.com
Online backup programs: is somebody offering you to backup all your confidential data for you for free? I wonder how they cover their costs.
In the case of experiencing high usage:
You may have a virus or peer-to-peer software installed on your machine.
Common peer-2-peer software is limewire, e-mule, e-donkey, Kazaa and morpheus. Peer-2-peer software, if not configured correctly, will allow users on the internet to download software from your computer which can result in a large portion of your Gigs being used without you knowing about it.
Scan your system for viruses (Full Scan) with a quality antivirus program such as Norton before changing any of your passwords.
Do not unsubscribe from an unwanted mailing list, this only confirms to them that your email exists.
Never contact your enemy.
Ref: http://www.skype.com/intl/en-us/legal/terms/tou/

5.9 Quality: Skype cannot guarantee that the Software, Products or Skype Websites will always function without disruptions, delay or errors. A number of factors may impact the quality of your communications and use of the Software, Products (depending on the Products used) or Skype Websites, and may result in the failure of your communications including but not limited to: your local network, firewall, your internet service provider, the public internet, the public switched telephone network and your power supply. Skype takes no responsibility for any disruption, interruption or delay caused by any failure of or inadequacy in any of these items or any other items over which we have no control.
19million users are currently using the Skype server. this can cause bottlenecks
The Skype server might be in America, so all the data gets pushed though repeaters underground the ocean.

Outlook Express issues: Do not cancel while it is compacting! You will lose data!
Make sure you have a semi-automated backup installed.

peer-2-peer file-sharing programs.

- software to swap music, video and other files over the Internet. Many free P2P file sharing programs exist.
The settings of these programs need to be checked: Disable file sharing
or the programs need to be removed:
BitTorrent, Ares, BearShare, Kazaa, Morpheus, Limewire, eDonkey, Overnet, eMule,
Ref: http://en.wikipedia.org/wiki/File_sharing

There are a number of risks associated with P2P file-sharing. P2P client software can easily infect personal computers with viruses and spyware, creating a host of problems for the computer’s owner such as the theft of financial information. Pornography, inflammatory material, and malware can be disguised and then shared through P2P networks unknowingly. Shared copyrighted material like copies of software, music, or movies is illegal and possession of these files has the potential to expose the computer owner to prosecution and fines.
Adware__
__ Annoying pop-up and banner ads? System slowdowns? Your computer may be infected with Adware
Bots & Botnets__
__ Hackers use bot programs for theft, fraud, and denial-of-service attacks on Web sites
Browser Highjacking__
__ Malware used by hackers to direct your computer to their websites, regardless of the address you entered.
Cookies__
__ A Web page that welcomes you by name uses cookies
Counterfeit Products__

Extortionware__
A software program that encrypts essential personal files - taking them hostage and demanding money for their safe return
Keylogger__
__ Hackers illegally use software keyloggers to identify their victims’ computer passwords, login names, bank account and credit card numbers
Malware__
__ Any software program developed for the purpose of doing harm to a computer system or to create mischief
Man-in-the-Middle Attack__
__ Cyber criminals eavesdrop on electronic communication between a consumer and a legitimate organization
Nigerian Scam__
__ Unsolicited email messages from a stranger who promises great wealth — a get-rich-quick scheme
P2P File Sharing__
__ Peer-to-peer file sharing is very popular on the Internet, but it can also lead to virus infections and a host of other problems
Pharming__
__ A technically sophisticated scam designed to trick individuals into disclosing sensitive information such as bank account, credit card, and Social Security numbers
Phishing__
__ Official looking and sounding messages that urge immediate action to update sensitive financial and identity information
SMishing__
__ Designed to trick you into divulging identity information, SMishing is Phishing over cell phones and other mobile devices.
Social Engineering Scams__
__ A scam that preys upon our acceptance of authority and willingness to cooperate with others
Social Networking Sites__
__ Never under any circumstances should your child or young teenager agree to meet in person someone from one of these sites
Software Piracy__
__ The illegal use and/or distribution of software protected under intellectual property laws
Spam__
__ The cyber equivalent to junk mail – spammers have developed many ways of obtaining email addresses
Spim__
__ Unsolicited product or service advertisements that appear as instant messages
Sping__
__ Spam from a fake blog tricking the unwary into visiting
Spit__
__ A spam campaign against VOIP voicemail
Splog__
__ A spam campaign directed against blogs
Spoofing__
__ A criminal pretends to be a business or organization in order to gain access to a computer user’s sensitive information such as bank account, credit card, or Social Security numbers
Spy-Phishing__
__ In a successful Spy-Phishing attack, a Trojan and/or Spyware is downloaded onto your computer from a Phishing message.
Stealth, Polymorphic, and Armored viruses
__ These viruses hide, copy, or “armour” themselves in an attempt to avoid detection and removal from a computer.
Bots & Botnets__
__ Hackers use bot programs for theft, fraud, and denial-of-service attacks on Web sites
Trojan Horses__
__ Files or software programs that appear to be legitimate, but once installed can cause havoc
Viruses__
__ Malicious programs or codes inserted into computer systems without the user’s permission
Warez Sites__
__ Any site that hosts pirated software
Worms__
__ These malicious software programs spread automatically from computer to computer
Zombie Drones__
__ Personal computers secretly under the control of hackers
___
Ref http://www.bsacybersafety.com/threat/p2p.cfm

Hoaxes: A hoax is intended to deceive or defraud the public. E.g. April Fools pranks or scientific fraud.


Phishing, Website Forgery and Website Cloning: Please read http://en.wikipedia.org/wiki/Phishing


please read the Security Alert on https://netbank.nedsecure.co.za/
The Security Alert mentions: Beneficiary Maintenance Scam
SIM Swap Scam
Confirmation of Payments or Deposits-Scam Warning
Online Identity Fraud
Phishing
Pharming
Smishing
Vishing
Keystroke Logging
etc
Please check http://us.norton.com/security_response/ for the latest viruses, worms, trojans and misleading applications
Security news:
Please make sure your passwords are secure & your antivirus is updated.
Please run a full system virus scan weekly.
Please make sure you have quality antivirus & internet security installed.
If you think your security has been breached shut down your PC and get it serviced immediately.
Do not reply to unidentified phone calls.
Do not reply to suspicious emails even if they come from your friend or relative.
Preventative maintenance is critical.
It is vital to have a daily backup of your data.


The Internet means: International network. it lets you view or access many computers all over the world. you are connecting your cmoputer to China, Russia, Germany, etc. Everyday there are thousands of new websites. There are many free programs on the web. Unfortuantely they come with optional adware software. if you do not unnselect the option, then adware installs on your machine: eg websearch, purityscan, transponder, keenvalue, perfect keylogger, Rogueantivirus, bullseyenetwork, browserhijacker, superfish. So even if I clean your machine, I do not know waht websites you browse or or what downloads you install that may cause (re)infection. The company Google has removed many unsolicited websites from their search engine. Adware cannot be easliy detected becasue it is not a malicious virus. The best way is to start with a clean machine: backup data, reinstall Windows, reinstall programs (eg Word, Excel, Outlook), drivers, antivirus and settings. There are many free "antimalware" programs one can try at own risk. Also disable the option of popups in your browser- eg Firefox, Chrome, Safari and Internet Explorer.