You are on page 1of 2

Home Page BIO

Any good cybersecurity professional knows how to examine a company's entire security system
from megabyte vault and analyzing everything in between on the way. I have a clear understanding of
security issues associated with operating systems, networking, virtualization software, web browsers,
and what makes what vulnerable. For example, lets say Window's 10 has a vulnerability which is only
exploitable using Mozilla Firefox's Waterfox browser. Personally, I hang out in cybercriminal chatrooms
watching for information being put on the market. What vulnerabilities are “hitting”. I have been able to
create an online identity of the kind of people I hunt. This has set me out from others in my field. Having
an inside to the “dark side”. A good detective can think like the one they are hunting. What makes my
job any different is I do it behind a computer screen and internet connection. Remember dial up? Ugh
times have changed, technology evolves daily. Criminals are constantly evolving with it as well as
cybersecurity professionals. These are all reasons I came into this field. I enjoy solving difficult problems
and searching for whatever it maybe. I view life from a unique perspective and that is what makes me
good at my job. I am constantly learning and staying up to date with current exploits being utilized at
company’s expense.

Recently I have gotten into cloud computing and the vulnerabilities that come with that infrastructure.
Cyber crooks are coming up with new methods of deceit and discretion. Did you know there is a browser
built for cyber criminals. I have toyed with this browser and it is successful. Allowing you to cloak your
settings to make your device look like the victims device. Basically a browser clone. With this and virtual
machines, They are able to sneak past verification measures and bypass 2FA and OTP (One Time
Passwords). The ability these cyber criminals have is unbelievable but logical. These tools, configs, and
programs built for anonymity and malicious intent.

As a matter of fact amazon just tried to charge my CashApp account for close to $600. Good
thing I dont use that account anymore. I will allow this to continue just to waste the criminals time.
Draining their time is a very effective way of keeping them from targeting other people or companies.
This is something I have come accustom to practicing. In a weird way, I enjoy it. Knowing that the
information I am providing him will get him nowhere. I have ideas on ways to track these kinds of
attacks. I have not yet put my methods into practice but I think the best way to put these kinds of
people behind bars is to communicate with them under the pretense of peer/co-conspirator. I get a rush
while preforming and acting under my criminal alias. I’ve been invited into secret chats and groups non
accessible from the internet everyone uses. Using a special browser that allows me to access criminal
marketplaces, forums, and chatrooms I have sat back and watched how these kinds of sites operate,
accessing these sites in the first place have put my identity and bank account in jeopardy countless times
and probably the reason for the attempted amazon hijacking on my account.

I have come up with countless strategies and methods to put a damper on fraud over the
internet. I started working for Hostgator.com in 2010. Within the next few years, I’d find I had a huge
passion for cybersecurity. When you enjoy nit picking through stuff and finding problems to solve, stuff
most people would find tedious, I enjoy. Once I figured out that Cybersecurity was what I wanted to do
with my life, things started to get much clearer and I began to enjoy life to the fullest. Without this
career field, I’m afraid I wouldn’t be as enthusiastic about life as I am today. Cybersecurity has given me
a purpose. To save humanity. One sudo command at a time.lol Happy Hacking and please keep it ethical.
Or WE WILL FIND YOU!lol
Website Ideas

 Appointment/Consultation
 Penetration testing
 Security strategy

You might also like