Skip to main content

The Obvious Haxor

Oh Little Haxor Boi, your fly is open.
I post to LinkedIn and you re-direct to UPS.
I link to youtube and you issue a DDOS.
Very nice.

Just to be crystal clear - this blog isn't coming down until Don Stovner, Steve Daggett and Carole Stovner Krieg are criminally prosecuted. The petty little fines handed down by the Civil Court are no longer acceptable. The time for peaceful negotiation has long past and I'm not interested in some insulting pay off.

Oh, but the prospect of having this much power while The Men With the Hairless Dogs and the Keystone Kops drag their feet on "forensics" is completely intoxicating. Which sites shall we take down next?

Tell you what, I'll think about it over the weekend. We shall rejoin The Game when my creative imagination selects some interesting domains.  I warn you, it is entirely possible that I come up with some challenges that your skills just can't match.  I mean, come on Honey, we have had a 12-36 hour gap since May, so you can't be that great. All I got is a Browser & a Brain against your Haxor Tools.
It's 3am on the Flight Line and all I got is a torque wrench

In the meantime, don't be such a Putz, discretion is your Friend.

Victory is an elusive Whore
She is as easily mine as she is yours
Code Red you're staring at me
~Tori Amos, Code Red~

Comments

Popular posts from this blog

The Progression of Lies

This is the Don Stovner I met at the Wynn in June 2008 and then worked with from June 2009 through January 2010.  This is the man who, after my troubles with the Applications Analyst on the Food & Beverage Team at the Wynn, caused me the most problems with Network Engineering Projects. The photo at the left was taken in mid July 2009, while we both worked for Clearwire in Las Vegas, at a weekday lunch break from our projects.  Don made an effort to reconcile the events at the Wynn and to amend our professional relationship.  We did not work in the same departments or for the same management.  We had no reason to interact while at work other than to go to lunch. It should be noted, that had the Wynn IT shop been more professional, had they employed proper management of their staff, the affair between Don & I would have started in 2008 when he went to the Wynn, during the period he sent his wife to Russia the late Summer and Early Fall of 2008.  Howe...

For the Little Haxor Boi

You think you can come around here
 All up in my face
 All up in my world You better know you better know you better know
 I´m at your door I´m at your door I´m at your door
 You gotta right you gotta right to know
 Me and my Teenage Hustling
 I´ve been workin´it
 since I´z fourteen
 Me and my Teenage Hustling
 It´s gonna save me
 save me save me save me save me save me
 From your dirty dealings
 I’m a Dirty Girl 
I’m such a Dirty Girl Maybe the riddle of this accident 
goes back to your gossip
 With a ferocious strategy
 you play wounded in his cockpit
 But I think that you forgot my days 
of Teenage Hustling Me and my Teenage Hustling
 I´ve been workin´ it
 since I´z fourteen
 
 But you´ve been skankin´ around
 with your talentless trash
 You only shoot blanks
at your cocksure best
 Me and my Teenage Hustling
 It´s gonna save me
 save me save me save me save me save me
 From your dirty dealings
 Now i don´t mind a Dirty Girl
 ...

DOXing as Warfare

I never considered what I am doing to Don Stovner “DOXing”.  In my mind, it is simply playing the game he started, by following the Rules as he changes them.  You know, Goose & Gander .  He went out of his way to track down intimately personal information about me, dating back to the Pre-Internet Age and claimed that it was “technically legal” because he used Publically Available Information.  Well…. I’m just making this information public.  Just like he did. "DOXing", is  hacker slang for publishing someone's personal information in order to intimidate or punish them. DOXing is a technique of tracing someone or gather information about an individual using sources on the internet. Its name is derived from “Documents” or “Docx”. DOXing method is based purely on the ability of the hacker to recognize valuable information about his target and use this information to his benefit. It is also based around the idea that, “ The more you know abou...