Showing posts with label identity. Show all posts
Showing posts with label identity. Show all posts

Tuesday, March 22, 2016

Jocephus Gearz pays tribute to Draconian Hax

One of those people to avoid named Jocephus Gearz aka Joe Carrolls in RL (not the other way around) decided to pay tribute to Draconian Hax (me) on his blog with a special category named: Desperate Need for Recognition.

Well 'me' damn it ...  it's about time someone give me some credit and recognition for my skills.

...I was hoping for Forbes with the top biggest 400 assholes in the planet (where i would take all the seats ... of course - don't get any ideas or pathetic hope) but i will have survive with this very poor version of the razzies.

However Joey Carrots (i've upgraded him) once again fails to deliver and since he has not flushed ever since, it is fair enough to assume that he is literately full of shit.

Maybe someone should pass by, 1812 Tanner St, Rockingham, NC 28379 - (910-997-5462) and have a word with someone.


Some people should be left alone when they tell you to take a hike in the first and only time that they exchanged some words.


But lets continue with the tribute to me from his magnificent blog
that took months to create since that chat conversation and recently motivated by a couple bloodline bans of his alts/mindless soldiers who decided to bother me while i was clipping my toenails.

While in May 2010 the desperate gang here did not have the disgust anguish of my company; they got it now in October 2010. (enjoy... with mouth full and 2 fries with ketchup in your nostrils)


... all that work and effort to have to share the podium of assholeness glory with some irrelevant cartoons; left me crushed and crawling through the swears of life that i locked myself in a room and stayed in bed for a week mopping around boxes of chocolates and candy (chicks recovery mode) until i saw ... some light ....

But minutes later it was visible that this tribute was done by someone ...  anencephalic
 Obese ? (use some real man words like FAT) USI ? Next time do it properly like a man. ( i will wait 30 years  to read it) Now learn how it is done.

Draconian Hax -  Necroticly fucking fat ass and swollen colon with USI, HST, TXT, HIV, PST, STD, HEX, FST, DNR, FDC, RCT, ESX, AHC, TUL, ASD, CGH, HIO, CGI, GCC, ASP, FAT, PHP and multiply 26 x 26 x 3 for more possible key combinations. (throw in some numbers to make it look l33t like 4$$h0l3 )

ah.. much better now, which i dedicate to my hate fan group for their loyalty, dedication and of course endless support. You are the reason why i get up everyday at 4 am to count my pubic hair collection while using my balls as marbles.

Now joey; my next goal is to get recognized in the planet 'ur anus with a well shaken corked bottle of champagne in there and ready to party like an animal.

SL name: Jocephus Gearz
RL name: Joe Carrolls
Draconian Hax free upgrades: Joey Carrots  

Sunday, August 28, 2011

SL / Bloodlines Thieves: DasOman Actor & BaseBeta Python

A real Bloodlines scam. not that crap about huds that you dumbasses cry about all the time
update: 13/02/2011
Currently BaseBeta Python is not only harassing other people online as he is also sending naked pictures of the victim to other people (including me). He also went as far as posting a video of him and the victim, on youtube without her permission. This video included some shocking images. His account has been removed from youtube after the upload and the video will be posted here once the victim is blacked out on that video.


He also as gone as far as threaten me and other people for having posting his name here. (i don't negotiate with emotional terrorists)
Well deepshit... did it upset you ?
[2011/02/08 14:40]  BaseBeta Python: you really know how to piss people off

Noooo! really?

http://www.youtube.com/watch?v=cXr5Wb1dPHw (sick stalker video)

http://www.reverbnation.com/label/basebetapython

http://omeniacs.co.uk

http://sl-charts.com

21A Tudor Rd - Nuneaton - 01 - CV10 9EE United Kingdom

...next time it's your DNA code

update: 07/02/2011
Bloodstained Deed as now been able to prevent her visa information to be continuously used by BaseBeta Python (Paul) and stop part of the transactions that happen but she still lost over $1000 USD.
BaseBeta Python has also closed Bloodstained Deeds secondlife account and stole all her Bloodlines souls. He also made Jeffrey Hax very upset.
To make matters worse; all 3 secondlife accounts were used from the same internet connection which means that all 3 accounts; Das DasOman and BaseBeta Python who is the scammer will be incorrectly seen also as Bloodstained Deed who was the victim.
Both secondlife accounts and bloodlines accounts will show the same ip address for the the 3 avatars although they are 2 different people.
Redzone will also match their ips and no redone does not effectively detect alts.
(Reasons and methods used for this scam are known but not be revealed)

update: 02/02/2011
Das DasOman and BaseBeta Python are the same person who's real name is a guy named Paul from the UK. (picture in the bottom)
After taking over Bloodstained Deed's SL account, he also keep using her credit card information which reached around $2000 USD.

Now here are a couple of deepshit scumbags of the usual kind around secondlife bloodlines.
Two of those non existent very respectable bloodlines assholes (that are known to not exist)  that due to the lack of self achievement, need to steal and scam others for personal self importance. (the usual)

As i was enjoying my "usual" cigar at bloodlines east on the 27th (jan/2011) i saw Bloodstained Deed arriving and passing by me too fast , which at that moment i saw right away it was not her as the avatar passed by me resisting my incredible charm without saying a word or noticing me.

How was this possible ??? (i thought to myself, blinking like a christmas tree on steroids) And so i zoomed to see a noob using an avatar of someone i know not to be a noob.
This noob was DasOman Actor who was looking for a potion (hemlock) and showing that he did not know very well what he was doing.

He then bought the potion using her avatar and linden account info and went to the rezz area at east bloodlines to take the potion; passing by me again and resisting my charm. (2 times in a row ? not possible!)

At this time after having confirmed that it was not her using her avatar but a thief...

[11:22] Draconian Hax: HOW ARE YOU
[11:25] Draconian Hax: hemlock ?
[11:26] Draconian Hax: tisk tisk

[11:26] BloodStained Deed: noene of your business
[11:26] Draconian Hax: *ummm*



After this, i got the confirmed failure of answering the magic question.

None of my business ? (evil laugh here) oooohh  you have no idea of what is my business around deepshit dumbass.

This took place around 11:26 SL time and both avatars logged out at the same time from SL.

DasOman Actor moved Bloodstained Deeds soul from the abyss to his ownership, removed  her from being his liege and set BaseBeta Python as his liege. He stole all her souls and changed what was at the time his clan.

The next day their clan settings changed and Bloodstained Deeds soul was moved from DasOman Actor to BaseBeta Python who also owns his soul and is set as his liege.

Minutes later after the hemlock potion  was bought; Bloodstained Deed was notified and started the process of account recovery.


(/me cracks his virtual nuckles and frowns
(click pictures to maximize and see the current status)

The victim

The cock sucker

Yeah you heard me deepshit

[2011/02/08 14:29]  BaseBeta Python: without her i dont have a life
(... then do us all a favor...)
Another one of those excellent clans full of excellent people
And if the the rest of the deepshits still haven't got it right about your secondlife account ; read this because i have better stuff to do than babysitting.

(/me violently spits the rest of the cigar out)

...damn i hate disco...

Monday, July 26, 2010

Protecting your account passwords

-->
So... this is where we came up to...
(/me lights up a cigar and takes a deep puff)
It seems that more and more of you keep having problems about some people cracking your second-life account passwords, emails IM software and so on. (mostly around bloodlines). And for some universal law that is about to be broken I ... I ... (*frowns*)
... well lets just say that I must be extremely drunk or completely out of my mind to be writing the following as if it would even be worth to try to ¨teach¨ something to these people but then again even intelligence goes on vacation for a few minutes sometimes.
I will probably hate myself and all this post tomorrow, but then again do i like anything ? .... so equilibrium will be maintained.
Note: If you do not understand any or the linked terms/words; click them to know its meaning. And send this to other people, specially bloodlines people
First: You have to understand that these people are NOT hackers. They are simply script kiddies or at most; crackers which in other words mean untalented, dumbass, dirty people who use specific software tools that were made by experts in a devious way .
Second: If you run windows you have a lot to worry starting by the way the operating system is constructed to the way it is by set default and then how it is administered and ending on how the market want it to be vulnerable.
If you Run a MAC (UNIX) or Linux well .. you are by default much more protected while maybe having to worry (if you are a MAC dumbass - *BSD does not include dumbasses) with some rootkits for Unix / Linux and assuming that you are not a noob) you can skip everything else that i will write bellow because if you know how to use it you have brain starting by the fact that you use it.(*bsd/linux)
As for MAC users .. you might still glance your eyes around since most of you have no idea how your system works. And windows users you definitely NEED TO READ IT.
Trojans, vĂ­rus, adware, spamware, rootkits, malware, spyware, backdoors (not your ass), etc , etc and the list never ends) is more than available for your system and can and IS used against you by default.
Are you still reading ? *damn* you must not be a bloodlines player !!
Third: The security of an operating system relies in 2 things.
The software used and and how it is administrated and keep in mind that no matter how well the operating system is managed by having the latest anti-virus the latest firewall and the latest security updates, it will still be as weak as the human factor behind it and that's where social engineering comes in and all your I.T noob expertize goes down the drain.
While i will try not to cover here methods that allow a cracker to obtain what he wants i will have to refer to some.
Make sure you understand the linked words and expressions. The following may contain ¨wording¨ that may not be simple to most computer users and if you are a noob windows computer user... well just do what i say for you own good and shut up because i don't have the time to explain you people why it should be done the way i say.
1: A few basic rules about creating MORE secure passwords.
Never create a password that uses a name/word that is something related to you. Such as family names, favorite stuff, personal stuff (even if only you know it) and so on. So NEVER use personal stuff to define your security methods but if you are dumb enough to do it; then make it complicated to be found or figured out.
For example: The word ¨dumbass¨ makes a 56 bit password. Not only it is easy to figure out against dictionary attacks or brute force attacks it is also very low in encryption bits.
Turning it into: Du/\/\B@5$ not only makes it harder to crack with specialized software as even to figure out by someone else; even if you tell to some social engineer that you are a dumbass and that is your password. On top of it the encryption goes up to 80 bit. (now you are a dumbass with style)
The higher the encryption the harder it is to crack even by the experts.
Never use the same password for more than one record/login. If you do and that record/login gets compromised; the first thing the attacker will do is to try rely on your human weak factor and use it to try your other accounts.
Preferably you should also use a different email for each account/record/login. Some email services will allow you to create email alias for your main email account If not, create a new email.
Do NOT MIX your personal email accounts with hobbie stuff. If you have a business SL avatar keep it away from any kind of conflicts.
If your second-life password is 16 characters long make it worth the size. The more variety of characters you use the better (letters, numbers, symbols). If you do it less than 128 bits; then REDO IT ! Same is valid for any other type of logins/records. (always go as high as you can with encryption bit rate)
Storing passwords in your browser, SL viewer and internet applications is dangerous by default and if you use internet explorer for that, then you should get all of them stolen. You deserve it!
If you are going to store passwords on a browser make sure of 2 things.
- You don't use that browser for anything else other than to have your password stored there for fast login access
- Make sure that the browser will ask you to insert a master password for you to use it first.
For example use something like opera for saving secure passwords and lets say firefox for regular browsing.
Make sure you do not allow cookies on that secure browser that you don't known what they are and have browser always to delete it's latest activity records soon as you close it.
Always use secure https:// when creating accounts or access your accounts in any site if they provide secure logins.
Storing passwords on your second-life client viewer is NOT SAFE either even if the only thing you see there is [***********] . The password is stored in a specific file that can be easily decrypted and obtained. It can even be obtained by others from your SL viewer !
And if you use something like: --login Avatar Name to fast connect to the grid; that means storage of the password in clear text. (even easier to obtain no matter how high is the quality or complexity).
Second-life client viewers:
There is an endless amount of sl viewers (and more) out there, some almost open source, (lets not confuse with freeware) others less open source but most are copies from others. Are they good ? Well sure they work and they sure work in ways that most of you don't know. Ever heard about that one viewer that was great for griffing ? How about that one that was awesome to evade bans ? The list is long and quite a lot of these viewers have ¨hidden secrets¨ and vulnerabilities that can and ARE USED either by the creators of by those viewers or by those that found about the secrets and backdoors.
And for what ? For your SL account (lets not talk about RL identity theft too). Nothing comes free online unless is truly open source and clean from methods of obtaining information from the people that use it.
The same goes for all those ¨dark¨ tools and attachments that some dumbasses like to use around to play with fire. Sooner or later you will get burned. They can and are used against you.
Use the official and approved SL viewer by LL (way less chances of security problems) or if you know how to build, modify or inspect the source code of one; then do it yourself from the official source code. (read this)
While the official viewer/client that LL provides is not fully open source it does allow to inspect and build your own modifications to do what all others do if you know how.
The list of other SL viewers is bigger than 30 and if you want to check something fully open source, take a look at meerkat. (beware of those wicked thug SL viewers)
As for all you emerald lovers... well... if i was you ... i would stick with the official one.
Attachments and scripts in world:
The more free they are the more likely you are to pay in some way (for most of the cases). Do not accept anything from anyone that you don't know even if it looks like a landmark (specially around bloodlines - you will get bitten sooner or later) and if it is a landmark; ask for the slurl address instead.
Scripts can also spy you and this means connect to places that you don't know to provide the scripter with whatever info he/she wants from you. The only way you can be sure of whats happening is by performing traffic analysis (sniffing) on your own connection to see what it is going on.
Do not buy stuff around cheaper than what the official place sells it such like bloodlines products (YOU WILL be scammed sooner or later!!) When you buy... try to buy from reputable name ( i am not defending bloodlines here)
Secure communication in world:
While some SL viewers provide you the option of chat encryption like emerald and meerkat to avoid being spied in clear text (which is good); once again the viewer can have a backdoor or it may be vulnerable to in-world M.I.T.M.
Move your chat to something like skype (skype is not the best! its just an example) which provides encrypted communication and by using a second chat channel apart from Second-life to be in touch with in-world people; the chances of being successfully spied are VERY VERY slim to none.
Someone gave you some program to install on your operating system:
(Unix and for sure Linux users can skip this)
DO NOT install it ! Ask for the URL of that software for you to see what it does. Microsoft Windows users do not accept .executable files from your SL friends specially if you are a woman and he is a guy. And if you are a guy and you are taking it from a woman, then you are thinking with your penis and you deserve any possible the dirty outcome.
There are methods that allow any dumbass to create and bind a trojan executable inside of a regular software application that will even disable or get your firewall, anti-virus and other protection software alike; ¨numb¨ allowing him/her them to access your system without you knowing.
This will allow them to plant keyloggers which will record EVERYTHING you type and see; even if its complex passwords like: Du/\/\B@5$ if you type them manually.
(see also hardware keyloggers - not detected by protection software)
Using your accounts at someone else's place:
Well.. if you do that and the other person performs traffic analysis (sniffing) there and even uses keylogger on his/hers system to fish you or for his/hers own security; then you will be fished.
Important note: If the other person has some problems with LL regarding their in-world douche bag activities; once you login from their hardware and static ip; YOU WILL be under close attention too and in some cases your account will be suspended if needed or if your deepshit buddy got his suspended. IT WILL ! Do not doubt !
Using wireless:
If you use some else's wireless you are in it to get fished like the above example of using your accounts at someone else's place if the wireless owner wants too. (unless you VPN or SSH tunel to your trusted remote computer)
If you use your own wireless; make sure you use it with encryption of at least 128 bit to 256 bit (or higher) and wpa*-psk.
Wep keys can be cracked in 5 minutes and even some wpa*-psk. are vulnerable to certain kinds of attacks but at least wpa*-psk. will make life way harder for ant attacker to the point if quitting on the attack.
Use a cable as much as possible. It´ s faster !! and more secure starting from your neighbor. (maybe you have one that hates you or thinks you stink) or some second-life bloodlines war driving stalker ex-deepshit.
There is much more to say about all this but if you survived until now (which is mind blowing since you are not reading gossip); here goes some good tips as options to secure yourself.
Some security advices:
One of the best software applications out there to create extremely secure passwords and encryption them on file. This means that even if the attacker gets the file; he/she wont be able to read it. You can copy and past passwords in "shadow" mode and hide them from the database menu preventing keylogger screenshots or remote monitoring spy technical methods.
The following software if fully open source and is available for windows, unix and linux and also in a portable version.
It is a very full featured application with all sorts of secure options.
A very similar one http://keepass.info
If you need to access stuff like home banking ina very secure way use a linux live cd.
In short a linux live cd runs a linux operating system from a cd or dvd.
These are not build with Trojans, vĂ­rus, adware, spamware, rootkits, malware, spyware and not vulnerable to them by default.
You DO NOT need to install it! Simply run the cd when the computer reboots and load it.
( try something like knoppix live dvd)
Social engineering:
Some simple reading about the subject can be done from a well known master of it by the name of Kevin Mitnick. Easy reading;. Soft stuff for the noobs. (no gossip girls...) (The art of deception).
More complex readings regarding the subject and computer security can be done from Bruce _Schneier (website) (this one goes for *nix users mostly)

Identity Theft Toolkit (SMALL book and easy reading)

Now for the elite computer users:
To finish all of this you can always use your custom build SL viewer on your *nix box running a SCSI true-crypeted file system with usb fingerprint ID boot system after bios password settings and grub 256 (or more) bit password prompt logging in with a restricted games user provided with only 1 to 3 OS process for your user on a system that is protected by iptables, snort, and tcp dumped by something like wireshark. If you have to go online and you are not using your box, simply connect to it remotely through VPN or SSH 4096 rsa encrypted tunnel by user@ip and forwarding X if wanted using a live cd.
(i am not even going to bother to add links to those last lines)
Now that i lost 100 pounds sweating while writing all of this ...
(/me *spits the rest of the cigar out*)
.... and now that i have pretty much ruined my reputation in-world with this post i hope you all ignore it and get your accounts cracked because you deserve it for being dumb by choice and if i see you in-world; there is only 2 ways that thing can end....
and in both of them YOU die ...
*frowns hard*
... /me lights up another cigar ...
... damn noobs ....

Monday, November 2, 2009

Age verification hits secondlife bloodlines




Ever questioned yourself why is it for ? Truly for ?

oh... awesome.
Who comes up with these ideas in the first place and how does age verification can apply online and in specific to this virtual world and little corner of dumbass  thirsty flying rodents for erythrocytes ,neutrophil eosinophil lymphocyte virtual bodily fluid.
In a planet where in some countries you can drive at the age of 14 and others you can be sent do death penalty at legally 16 ( and illegally way before) on secondlife you can only be around if you are 18. (USA citizens can sign-up on SL but cannot drink there. Lets not forget that)




By accepting this Agreement in connection with an Account (other than for Teen Second Life), you represent that you are at least 18 years of age, or the legal age of majority where you reside if that jurisdiction has an older age of majority, and you have the legal authority to enter into this Agreement.

Ever visited a country where you can legally drink alcohol at 16 ? But you cannot have a cartoon on secondlife because it might see some cartoon boobs around or some BBC wild life sex scenes performed by cartoons played some real life primates behind the screen ?


But lets cut the crap here and get straight to the point. In a outstanding "democratic" country (USA) where death penalty in 14 states can be applied at 16 years of age and in the 1980's case of Thompson v. Oklahoma (487 U.S. 815) sent a 15 year old to death WE NEED age verification to be rough and tough on secondlife and in particular around second life bloodlines. YES oh yes we do... specially if you are a female because Rocco Sigfried or Ron Jeremy may sneak behind you any time and no one one wants to think you were rapped.

And why not ? (laughs... evil ones), being me a notorious advocate of draconian laws i can only rip my
face harder with a bigger smile as more work and personal accomplishment this means. After all what's the problem with age qualifying permit for death around the bloodlines vampire game ?
Lets face it, if you go to secondlife bloodlines, you are going to die (your cartoon of course, mentally you are already fucked); then you just walk around other puppets like you behaving like the inside of am empty refrigerator who voluntarily harass and try to replace the need of
air conditioning to everyone else on secondlife that like to enjoy the sun and garlic sauce with their pizzas or chicken wings.

Age Requirements for Teen Second Life
" ...you are at least 13 years of age and less than 18 years of age..."

Again; why not !? Seriously. If it's good for juvenile detention for 3 years and then death row waiting until 16. Whats the problem with the cartoon world and getting scammed on bloodlines for a few lindens converted from a few dollars stolen from moom and dads wallet or collected from welfare. Can't be for explicit cartoon sex for sure when cable/satellite tv is locked down with chains to prevent younglings and compulsive marturbators to click the button.

And that leads us to:

"...your parent or legal guardian has read and accepted this Agreement on your behalf..."

I can just see this one.
Teen (with Texas red neck accent)           
Moom (from some under Mississippi muddy rock)

Teen: Yo ma' ... i gotta go to bluudlines 
Moom: Bluudliiiiines ???
Teen: yah ma'... better than gettin' juv' detention for neighbaarhuuuud property damage.
Moom: son i ain't  givin' ya any money for that.
Teen: 'll just use my exquisite social engineering capabilities to scam there, like everyone else ma'.
Moom: ohhhh kids these days .... what are you gonna du with 'em...


...well.. how about:
"...If you are under 13 years of age, then please do not use Teen Second Life..."

Of course NOT ! 8 year olds make jihad terrorists shit their pants. We don't want them around the bloodlines vampire game annihilating scamming competitions. No nO N-O. I strongly oppose to that. I have limits for babysitting age. (even tho they all ignore that line).
 
So what is really age verification needed ? 
Wait until your secondlife account reaches 18 years of age, and by then if you still have to provide
your real life identification; you know if it is for moral and legal excuses or for personal profiling, identity theft, data mining, privacy intrusion, social engineering, fraud and who buys and sells that information and for what purpose.
Now; is none of this makes sense to you; then you are in the good path to achieve royalty (king/queen) in the bloodlines vampire world.


Signed:
Draconian Hax aka Frown Master truly loved and worshiped around the grid like banana grape flavor dingleberries.

PS: damn.. ain't i awesome ma'