Design Layout and Graphics by Douglas S. Taylor for DarcWorX
It’s all in the Meta-Data!
It is a lot of fun creating powerful, useful, and enjoyable things so others may benefit in some small way. I am here for my fans and friends. Though, June 2016 I had to say goodbye to a few of my closest friends because they are friends of a very insidious person. You may have already read, “Psychic Vampires” article that discusses in great detail of such negative and highly toxic human beings. These creatures are real life people by its what’s inside, or, lacking inside them that makes them what they are.
I would also like to make mention that the article brought in a lot of readers from the Universe of Social Media. If you have read the article then there is no need for me to go into any detail about it here. If you have not read it. Please, stop right here, and do so now.
Then come on back here.
Anyways, there are people who are quite talentless, boorish, and only shows contempt for people around them who are exceedingly leaving these fuckers in the dust.
Now as for my dear friends who are probably no longer me friends, they were not the Psychic Vampires I speak of in the least, but they are being used and or consumed in a toxic stew of negativity from one single person that at one time, I even respected.
I never tell anyone who they can or cannot be friends with. But to end the possibilities of this toxicity, I unfollowed, and blocked them from me via the social networks. I do this to keep out the caustic drama, and any more harm done to my friend who was nearly destroyed as you will read below.
Then came a dear friend who is battling depression in which I cannot or will not name. She is doing much better and every day, I think about her 20 times on the average. You see this person is a very strong person but was devastated by betrayal and her work stolen or what we all call, plagiarized. The anger and hostility that she received was beyond being just gutted, but her business and personal life affected accordingly.
Who is this spineless motherfucker?
Normally I would definitely say with listing their full name, address, IP Address, Cell Phones, Passwords to various accounts, and hack into their life setting off a cataclysmic event that would ruin this man, his marriage, his job, and those friends he is associated with along with posting undisputable evidence. Some of you reading this may seem that these measures are a bit harsh. But the cyber-sleuthing I was doing could have been a cyber-attack of exposing a real monster into the light of day with unforgiving consequences and the annihilation of his professional and personal life..
As for his friend, a close friend and fellow monster had caught my attention because of some things he was saying and doing. The new monster revealed to me, his friend, has a massive collection of child pornography that I personally seen on his cell phone and hard drive off of his desktop and laptop. The information was sent to the Pittsburg Police as well as his ISP. The bust was a layup for the police. I told one of my friends that I had to let go on what was happening to this asshole’s associate in grime. She said and I quote, “I know his wife and himself are investigating BDSM…”
Now as you know, I am one of those people who could care the fuck less in what happens between two consenting adults and it is their business and in my little private cyber investigations, I can see my friend is right about the BDSM thing. I kept digging and It only gets sicker, darker or deeper yet.
There are videos of said man with a different woman that isn’t his wife but a woman in located in Philadelphia that many of us all know. Again, I can care less, it was obvious to me she was, at the time, very consenting. However, this woman, she didn’t know she was being recorded. I didn’t find anything illegal, certainly immoral, and rather disturbing. Besides, she was wasted on cocaine she digested before and during her intimate time with this stain of humanity.
I wonder what she would do if someone, heaven forbid, grabbed those videos and posted them on YouTube or something?
Now understand something here; no one is perfect and everyone has something in their closets.
Nevertheless I would like to share a few things with you about all of this and this is something that everyone says they don’t care about because they are not doing anything illegal. We all know, or should know that Microsoft created the perfect Trojan Horse operating system in Windows 10. Now you also must realize the feds also have keys going back to Windows 95 RC1. Apple OS, OSX, and Linux is just as violated and easy to hack into especially when you are running pirated software. Pirated software is illegal here in the United States as well as many other countries in the world.
Having said that, many of these pirated software that you download and have installed comes with some very nasty malware and back doors where your machine is working for some really evil people and their dark agendas. You may be unwittingly trafficking illegal porn, spreading the malware around, and giving these hackers great access to all your financial, business, and personal information. We read about this all the time and it seems like it’s the other guys who get it and we all kick back and thank our lucky stars it didn’t infect us. But how do you know for sure that unknowingly, you helped?
Allow me to explain…
Today’s malware is designed in proliferation, like a real virus and uses all kinds of new techniques to infect sometimes, millions of machines. It is a full blown cyber war. A lot of the pirated software comes from Chinese, Russian, Romanian, and even from out own government because the American Government has lackeys, cheap contractors and all the while you think you’re getting one over on some corporation in a perceived victimless crime. Meanwhile your smart device, laptop, desktop, and network is severely compromised, or what we call, “Owned.”
How far does the digital rabbit hole go?
Check out the Undernet and then you shall begin to realize some real life horror.
Your digital word just got a whole lot darker…
Most people don’t even realize this until it is too fucking late and they are in some sort or another, digitally destroyed. I know people who download pirated antivirus and anti-malware suites and are asking for it but good and they usually get hit the hardest. Call pirated software something like a prophylactic. You think you are being safe and the whole time you’re getting truly fucked!
When the tears begin to fall and your secrets are viral, you’ll now know why. I wanted to bring the later up because it made my job so much easier to penetrate through the Swiss Cheese of Pirated Antivirus and Firewalls in a few machines belonging to some assholes in the London area. They’re entire systems security legs were wide open. This happens all over the world every day as more machines exponentially are being compromised and “Owned.”
China recently revealed in the news that its hacked the NSA and the Pentagon for years and no doubt still testing fences and finding gaping holes in our government’s security at one level or another.
Even our corporate news had Obama admitting to this breaches and that is the only ones they know about.
There are so many great articles, online IT Magazines, and web pages to inform and help protect you while educating you to better manage your own digital life. Security and prevention of malware isn’t a “one time” thing but a constant battle that YOU must be involved in.
Let this article teach you a couple of things. Don’t be a fucking dick, Dick. The assholes online picking on creative people who are in this case, women, and remember, your digital life will be exploited.
<Enter the Anonymous Slogan Here>
The days of anonymity have long been gone.