Posted by Infostruction on February 07, 2019
  • February 07, 2019
  • No Comments
We suspect a new  Ubiquiti  DDoS taking advantage of open UDP/10001 on the USG (Universal Security Gateway) Firewall. These packets are overloading devices with amplification packets going outbound from business and home user networks. The issue started yesterday Firewall has a large capacity that’s being completely utilized. Investigating further to confirm the attack reported by ...

Who’s Online

Visits Today : 186
Visits Yesterday : 351
This Month : 7418
Total Visits : 99262
2 Visitors online now
Your IP Address:

Electronic Frontier Foundation

Donate to the EFF

About Me

Welcome to my Personal Blog at Infostruction! The opinions, information, and words expressed here are never connected to or associated with any large computer, or cybersecurity companies that I may have consulted to, or be employed with at the time of posting. These articles have been written by me as a blogger for

I’ve been using computers since the early 90’s when my adoptive family bought a PC from Packard Bell. We subscribed to Prodigy, AOL and other modem-based dial-up services in the region. My first hack was crashing a program called ‘Navigator’ that was designed to keep kids in a safe play area on the PC. The trick? I discovered a key combination that would crash Navigator, and expose the desktop of the computer. Simple, but circumvention in this way was appealing, and it came with it a desire to explore all things technological.

In those days, my brother made a habit of stealing the money that I was earning for web design and local computer support. I quickly caught on and then saved up enough to buy a large home safe. After all, was said and done, there was no money in the safe but I had the building blocks to keep out the intruder. He’d occasionally try to pry at the hinges anyway, just to spite me. I’d come home to see his handy work as he could only scratch the surface. I had told our parents that I wanted to put a camera in the hallway, and the experiences continued to weigh in on my strategy. I strongly believe in the practice of protecting users from malicious actors, and those who seek to take what does not belong to them.

My career has always been about maintaining an appropriate level of intensity, direction, and persistence to keep my life in balance and provide a consistent quality service to any organization that I work with. The end result today is self-concordance, job engagement, and commitment to achieving goals. Throughout the last 10 or so years, I’ve been able to build, explore, and secure systems all over the world. Clients are ranging from Fortune 100 companies to small and mid-sized businesses, in all vertical industries. I’d say the chances are pretty good that I’ve protected something that belongs to you, along the way…

In my writing I am typically drawing on experience from interviews and chats with hackers in the late 90s like as John Vransevich from AntiOnline, Kent Browne from HackPhreak, Carolyn Meniel of Happy Hacker, Eric Ginorio of, Marc Maiffret of EEye, Jodi Jones (VeNoMouS) Milw0rm, Patrick Gregory (MosthateD) from Global Hell and many others from various global hacking groups and organizations. I’ve got a lifetime of experience hanging around with hackers, and that’s because I was one at a very young age. I’ve had face to face meetings with the FBI, and Secret Service before I turned 18. I don’t ‘sell’ this, but it’s certainly a perspective. I was never a ‘bad’ person who stole things, conned people, or caused damage/losses to others. I’d never sought to damage, disrupt, defraud, or compromise the integrity, availability, or confidentiality of information.

Are you looking for something in particular?

Do you think at this point that I know more about you then you do about me?

Did you ever consider that I might be looking for you, and now that search is over?

Contact me at the bottom of this page, if you have any questions/comments about the site.


Your email address will not be published. Required fields are marked*