Back to: Home Page      Back to: SUPPORT Page
Experiencing high internet usage? 
For iPhones or Macbooks or Macbook Air, please click here: For iPhones or Macbooks or Macbook Air, please click here
First one needs to find which computer or cellphone or iPad or laptop is using the most internet.
How many devices could be on your network?
If new antivirus definitions are available, all 3(?) computers will be updating themselves at the same time.
Are there any other Wi-Fi capable devices on your network (e.g. cellphones)?
Reliability and security downloads are important. They prevent hackers from damaging your operating sytem (e.g. Windows) and its programs.
I recommend installing a little program (for Windows) which tells you how many Megs or Gigs you have used from the internet on your laptop/PC.
Click here for the networx installation manual:

Click here for the networx user manual:

Experiencing high internet usage? Did your internet stop working?
Any issues or topup requests, call the cellphone number or my landline telephone or email me or Skype me.
Only contact me after restarting your modem & PC.

To reduce usage: I recommend switching off your computer(s) when you do not use them. Alternatively you may unplug the network cable from the modem-router or switch off the wireless button of your laptop.

Usage could be any of the following:

1. Viewing online advertising: moving pictures or movies on websites.

2. Server-side type websites, e.g. Facebook, Google, that use built-in programs (apps) such as a built-in chat program, or a "preview".

3. Skype only uses much bytes when one uses voice or video (webcam).
   In text-chat mode usage is minimal.
To switch of video receiving and sending open Skype, click Tools > Options > Video Settings > Untick "Enable Skype Video".

4. Online streaming movies. (for example Facebook or YouTube movies)
Talks are streaming videos.
that means that it is a live video&voice which downloads as you view it.

7. Compress and resize pictures before emailing/uploading them.
8. Convert scanned TIF pictures to JPEGs.
9. Block
Spam emails by blocking their email addresses.
10. Online games (e.g. Casino games)
Change Facebook Account settings so that Facebook or Twitter stops sending automated email messages.
14. Websites with
music running in the background.

15. Uninstall unwanted program such as peer-to-peer download-and-file-sharing programs. e.g. Limewire
16. Downloading music or videos or programs.
17. Llistening to
internet-radio music. Similar to audio-streaming or voice-streaming.

18. Do not leave your web browser open on a site with automatically refreshing content.
20. Emails: Use "text-only" format instead of HTML.
21. Do not register to unnecessary mailing lists.

22. Facebook, chat, photos, music, slideshows, research, google, website editing, DropBox, movies,

23. Antivirus updates

24. Free automatic Microsoft security patches

25. Free automatic Microsoft service pack donwload

26. Free automatic Microsoft reliability  patches

27. Online backup programs constantly backing up.

28. please do a full advanced  virus scan of all your computers.

How to reduce your usage: (To save on Megs/Gigs:)

1. Check that nobody else is using your internet account wirelessly:
  Is your wireless network secure? Does it have a password (/numbers)?
2. Switch off computers & screens at night (Saves electricity as well).
3. When on holiday, unplug both telephone cable and power supply from your modem. Also unplug your PCs and screens.
This will also protect your devices from lightning or power surges coming through the phone line or the power cables.
4. Email your friends to stop sending you boring messages or forwarded messages and boring photos and slideshows.
5. For sending scanned faxes: Use JPG compression instead of .TIF
6. Disable "Send Receipt request" in Outlook/ Outlook Express/ Windows Mail/Fedora.
7.Switch off the "Read-Receipt" email feature.
There are many more things one can do!
Viruses, Trojans, Worms, Downloader Viruses and Malware:
If there is a virus on any of your computers which is either accessing an illegal network or is sending out automatic emails, then I may disconnect you after notifying you.
In reading this, you acknowledge that Karl has no power to control the content of the information passing over the Internet and its applications, including e-mail; chatrooms; news groups etc, and that Karl cannot be held responsible or liable, directly or indirectly, for any of the abovementioned content, in any way for any loss or damage of any kind incurred as a result of, or in connection with your use of, or reliance on, any such content.
The customer acknowledges and agrees that Karl shall without limitation have no responsibility for, or liability in respect of any data lost as a result of this system including the loss of emails.
Karl urges customers not to reply to unsolicited mail or "spam", not to click on any suggested links provided in the unsolicited mail. Doing so remains the sole responsibility of the customer and Karl cannot be held liable for the Customer being placed on any bulk mailing lists as a result.

Where the customer has authorised a minor to use any of the Karl's services or access its websites, you accept that as the parent/legal guardian of that minor, you are fully responsible for: the online conduct of such minor; controlling the minor's access to and use of any services or websites; and the consequences of any misuse by the minor, including but not limited to transactions entered into by the minor using such access.
Karl cannot be held liable for any business dealings you have with any third parties on the Internet. Further, Karl assumes no responsibility whatsoever for any charges you or any user of your account incurs when making purchases or other transactions in this manner. Further, the responsibility for ensuring compliance with all applicable customs and exchange control laws in connection with any such transactions shall be the customer's.
Terms and conditions may change without prior notice.

Fake anti-virus programs, unwanted programs, misleading applications:
A fake (anti-virus or Registry cleaner) program is a type of misleading application that pretends to be security software, but which actually provides the user with little or no protection whatsoever and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. It lies that it can remove unwanted applications such as spyware or adware. These scams cheat users out of money by charging for their fraudulent product, but the personal and credit card information that users provide to register these fake products could also be used in additional fraudulent activity. Ref:
They can even be disguised as needed video codecs or browser plug-ins to view web content. They also get onto your PC/laptop through unpatched software vulnerabilities. Ref:
Online backup programs: is somebody offering you to backup all your confidentail data for you for free? I wonder how they cover their costs.
In the case of experiencing high usage:
You may have a virus or peer-to-peer software installed on your machine.
Common peer-2-peer software is limewire, e-mule, e-donkey, Kazaa and Morpheus. Peer-2-peer software, if not configured correctly, will allow users on the internet to download software from your computer which can result in a large portion of your Gigs being used without you knowing about it.
Scan your system for viruses (Full Scan) with a quality antivirus program such as Norton before changing any of your passwords.Do not unsubscribe from an unwanted mailing list, this only confirms to them that your email exists. Never contact your enemy.
Peer-2-peer file-sharing programs:
- software to swap music, video and other files over the Internet. Many free P2P file sharing programs exist.
The settings of these programs need to be checked: Disable file sharing or the programs need to be removed:
e.g. BitTorrent, Ares, BearShare, Kazaa, Morpheus, Limewire, eDonkey, Overnet, eMule,

There are a number of risks associated with P2P file-sharing. P2P client software can easily infect personal computers with viruses and spyware, creating a host of problems for the computer’s owner such as the theft of financial information. Pornography, inflammatory material, and malware can be disguised and then shared through P2P networks unknowingly. Shared copyrighted material like copies of software, music, or movies is illegal and possession of these files has the potential to expose the computer owner to prosecution and fines.
Annoying pop-up and banner ads? System slowdowns? Your computer may be infected with Adware
Bots & Botnets
Hackers use bot programs for theft, fraud, and denial-of-service attacks on Web sites
Browser Highjacking
Malware used by hackers to direct your computer to their websites, regardless of the address you entered.
A Web page that welcomes you by name uses cookies
Counterfeit Products
A software program that encrypts essential personal files - taking them hostage and demanding money for their safe return
Hackers illegally use software keyloggers to identify their victims’ computer passwords, login names, bank account and credit card numbers
Any software program developed for the purpose of doing harm to a computer system or to create mischief
Man-in-the-Middle Attack
Cyber criminals eavesdrop on electronic communication between a consumer and a legitimate organization
Nigerian Scam
Unsolicited email messages from a stranger who promises great wealth — a get-rich-quick scheme
P2P File Sharing
Peer-to-peer file sharing is very popular on the Internet, but it can also lead to virus infections and a host of other problems
A technically sophisticated scam designed to trick individuals into disclosing sensitive information such as bank account, credit card, and Social Security numbers
Official looking and sounding messages that urge immediate action to update sensitive financial and identity information
Designed to trick you into divulging identity information, SMishing is Phishing over cell phones and other mobile devices.
Social Engineering Scams
A scam that preys upon our acceptance of authority and willingness to cooperate with others
Social Networking Sites
Never under any circumstances should your child or young teenager agree to meet in person someone from one of these sites
Software Piracy
The illegal use and/or distribution of software protected under intellectual property laws
The cyber equivalent to junk mail – spammers have developed many ways of obtaining email addresses
Unsolicited product or service advertisements that appear as instant messages
Spam from a fake blog tricking the unwary into visiting
A spam campaign against VOIP voicemail
A spam campaign directed against blogs
A criminal pretends to be a business or organization in order to gain access to a computer user’s sensitive information such as bank account, credit card, or Social Security numbers
In a successful Spy-Phishing attack, a Trojan and/or Spyware is downloaded onto your computer from a Phishing message.
Stealth, Polymorphic, and Armored viruses
These viruses hide, copy, or “armor” themselves in an attempt to avoid detection and removal from a computer.
Bots & Botnets
Hackers use bot programs for theft, fraud, and denial-of-service attacks on Web sites
Trojan Horses
Files or software programs that appear to be legitimate, but once installed can cause havoc
Malicious programs or codes inserted into computer systems without the user’s permission
Warez Sites
Any site that hosts pirated software
These malicious software programs spread automatically from computer to computer
Zombie Drones
Personal computers secretly under the control of hackers

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location.
 A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.
Traffic is simply the number of bits that are transferred on network connections.
A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for is about 1.5mB (1.5megabyte = 1500 Kilobytes = 1500,000 bytes). This is typically large for a web page. In comparison, Yahoo's home page is about 887KB.

How much internet does a company use??

1GB = 1000MB
1MB = 1000KB
1KB = 1Byte

Basic emails are 3kb to 15kB big
Big Emails with attachments are 100kb to 2000kB (2MB) big
1GB = 500 very big emails or 100000 small emails.

40 emails per person per day is about 20MB per day
(20 emails sent and 20 emails received)
which is 620MB per person per month for emails alone

Let's say we have 7 users

7 x 620 = 4340MB = 4.3Gigs.

now we add the internet: Facebook, chat, photos, music, slideshows, research, google, website editing, movies, antivirus, Microsoft or Mac security patches etc.
50MB per person per day (upload and download)
1550 per month

7x 1550MB = 11 Gigs

Add internet with emails: 15.3Gigs

For comments and ideas please contact Karl.
Back to: Home Page

if you don;t want to use Networx, you can check your computer:
Click once on the little computer icon on the System Tray icon.
(For Vista: Click Network Sharing Center)
 System Tray Icon Little Computers     SystemTrayIconComputers
Click View Status                                                                Click Status
 Network Sharing Center
 LAN statusWindows XP Local Area Connection Status
Watch the numbers. if the computers are flashing wildly, that means that your computer may be using too much internet.
Another way of checking your usage is to download a program called Networx:
Download & install it for free here (for Windows):

If it asks for .net framework version 1.1, you may download and install it from here:    .net framework version 1.1
You may also upgrade your internet to any of the following accounts:
3Gigs, 5Gigs, 10Gigs, 20Gigs, 30Gigs, 40Gigs or Uncapped