Posted by Infostruction on March 21, 2018
  • March 21, 2018
  • 2
It’s somewhat well known that misspelled domains are a method for redirecting users to surveys, pop-ups, and parked websites. These domains are leveraged by advertising networks, and groups who seek to funnel unsuspecting web users aka leads to an advertisement chosen by a publisher on the network. We had reports of users visiting misspelled sites …
Posted by Infostruction on August 15, 2018
  • August 15, 2018
  • No Comments
Skype now has four versions of its software – purely for your confusion and inconvenience. Most recently Microsoft was on it’s way to canceling Skype v7.0 with a deadline of Sept 1st  until an uproar from internet users not so quietly rolled that back. The new version of Skype that Microsoft is pushing is now …
loding...

California Fire Foundation

Donate to the California Wildfires

Recent Posts

loding...

Tags

Who’s Online

Visits Today : 88
Visits Yesterday : 138
This Month : 3463
Total Visits : 40810
4 Visitors online now
Your IP Address: 54.162.171.242

Feedly

follow us in feedly

Electronic Frontier Foundation

Donate to the EFF

About Me

Welcome to my Personal Blog at Infostruction! The opinions, information, and words expressed here are never connected to or associated with any large computer, or cybersecurity companies that I may have consulted to, or be employed with at the time of posting. These articles have been written by me as a blogger for Infostruction.com.

I’ve been using computers since the early 90’s when my adoptive family bought a PC from Packard Bell. We subscribed to Prodigy, AOL and other modem-based dial-up services in the region. My first hack was crashing a program called ‘Navigator’ that was designed to keep kids in a safe play area on the PC. The trick? I discovered a key combination that would crash Navigator, and expose the desktop of the computer. Simple, but circumvention in this way was appealing, and it came with it a desire to explore all things technological.

In those days, my brother made a habit of stealing the money that I was earning for web design and local computer support. I quickly caught on and then saved up enough to buy a large home safe. After all, was said and done, there was no money in the safe but I had the building blocks to keep out the intruder. He’d occasionally try to pry at the hinges anyway, just to spite me. I’d come home to see his handy work as he could only scratch the surface. I had told our parents that I wanted to put a camera in the hallway, and the experiences continued to weigh in on my strategy. I strongly believe in the practice of protecting users from malicious actors, and those who seek to take what does not belong to them.

My career has always been about maintaining an appropriate level of intensity, direction, and persistence to keep my life in balance and provide a consistent quality service to any organization that I work with. The end result today is self-concordance, job engagement, and commitment to achieving goals. Throughout the last 10 or so years, I’ve been able to build, explore, and secure systems all over the world. Clients are ranging from Fortune 100 companies to small and mid-sized businesses, in all vertical industries. I’d say the chances are pretty good that I’ve protected something that belongs to you, along the way…

In my writing I am typically drawing on experience from interviews and chats with hackers in the late 90s like as John Vransevich from AntiOnline, Kent Browne from HackPhreak, Carolyn Meniel of Happy Hacker, Eric Ginorio of Attrition.org, Marc Maiffret of EEye, Jodi Jones (VeNoMouS) Milw0rm, Patrick Gregory (MosthateD) from Global Hell and many others from various global hacking groups and organizations. I’ve got a lifetime of experience hanging around with hackers, and that’s because I was one at a very young age. I’ve had face to face meetings with the FBI, and Secret Service before I turned 18. I don’t ‘sell’ this, but it’s certainly a perspective. I was never a ‘bad’ person who stole things, conned people, or caused damage/losses to others. I’d never sought to damage, disrupt, defraud, or compromise the integrity, availability, or confidentiality of information.

Are you looking for something in particular?

Do you think at this point that I know more about you then you do about me?

Did you ever consider that I might be looking for you, and now that search is over?

Contact me at the bottom of this page, if you have any questions/comments about the site.

Contact

Your email address will not be published. Required fields are marked*