- October 28, 2020
- No Comments
Welcome to my Personal Blog at Infostruction! The opinions, information, and words expressed here are never connected to or associated with any large computer, or cybersecurity companies that I may have consulted to, or be employed with at the time of posting. These articles have been written by me as a blogger for Infostruction.com.
I’ve been using computers since the early 90’s when my adoptive family bought a PC from Packard Bell. We subscribed to Prodigy, AOL and other modem-based dial-up services in the region. My first hack was crashing a program called ‘Navigator’ that was designed to keep kids in a safe play area on the PC. The trick? I discovered a key combination that would crash Navigator, and expose the desktop of the computer. Simple, but circumvention in this way was appealing, and it came with it a desire to explore all things technological.
In those days, my brother made a habit of stealing the money that I was earning for web design and local computer support. I quickly caught on and then saved up enough to buy a large home safe. After all, was said and done, there was no money in the safe but I had the building blocks to keep out the intruder. He’d occasionally try to pry at the hinges anyway, just to spite me. I’d come home to see his handy work as he could only scratch the surface. I had told our parents that I wanted to put a camera in the hallway, and the experiences continued to weigh in on my strategy. I strongly believe in the practice of protecting users from malicious actors, and those who seek to take what does not belong to them.
My career has always been about maintaining an appropriate level of intensity, direction, and persistence to keep my life in balance and provide a consistent quality service to any organization that I work with. The end result today is self-concordance, job engagement, and commitment to achieving goals. Throughout the last 10 or so years, I’ve been able to build, explore, and secure systems all over the world. Clients are ranging from Fortune 100 companies to small and mid-sized businesses, in all vertical industries. I’d say the chances are pretty good that I’ve protected something that belongs to you, along the way…
In my writing I am typically drawing on experience from interviews and chats with hackers in the late 90s like as John Vransevich from AntiOnline, Kent Browne from HackPhreak, Carolyn Meniel of Happy Hacker, Eric Ginorio of Attrition.org, Marc Maiffret of EEye, Jodi Jones (VeNoMouS) Milw0rm, Patrick Gregory (MosthateD) from Global Hell and many others from various global hacking groups and organizations. I’ve got a lifetime of experience hanging around with hackers, and that’s because I was one at a very young age. I’ve had face to face meetings with the FBI, and Secret Service before I turned 18. I don’t ‘sell’ this, but it’s certainly a perspective. I was never a ‘bad’ person who stole things, conned people, or caused damage/losses to others. I’d never sought to damage, disrupt, defraud, or compromise the integrity, availability, or confidentiality of information.
Are you looking for something in particular?
Do you think at this point that I know more about you then you do about me?
Did you ever consider that I might be looking for you, and now that search is over?
Contact me at the bottom of this page, if you have any questions/comments about the site.