axisflip cryptofinancial

Categories
Technology новости

CHRONICLE.SU DEFEATS TH3J35T3R

TANGO DOWN!

Everything the Jester was once known for has been taken away. He has been castrated by Apache developers, posted an embarrassing music video which encompasses his feelings toward small children, and is now shitting himself in fear of Lebal Drocer, Incorporated.

JESTER DEFEATS CHRONICLE | OOPS!Recently, I met th3j35t3r in Barrett Brown’s empty tinychat room, where he bragged about taking the Chronicle down for a few days. Which is true, he did: by running a simple script against BlueHost, who we paid to host the Chronicle, he caused one of their servers to seize up and a whole bunch of their clientele’s websites went down with chronicle.su. And when I met him, he had just “quit hacking” – supposedly on a whim, so before I left him in there, I was sure to point out the true reason the attacks stopped:

The script Jester used to attack us – and many others – is now obsolete since Apache developers updated their software. No big deal, just a little update and web hosts everywhere are fine again. We updated and now we are fine. But the Jester’s afraid BlueHost and Lebal Drocer are pissed off about it. And he’s probably right. Sure, maybe we provoked him, but this is what happens when you attack the 1%. They do not forgive. They do not forget. So just because he took us down in August doesn’t mean our old host doesn’t want their fucking money now.

Take one quick moment to absorb our small victory, for we have beaten the Jester at his own silly game. You see, the Jester is a terrorist. His goal is to create terror. For example, he wants to chill our speech – by attacking our site, he hoped to make us afraid to write. Obviously, that didn’t happen. But now he’s afraid that our team of lawyers are coming after him in the name of Lebal Drocer, Inc. [Editor’s note: Fact is, he attacked us on shared hosting, on one of the largest webhosts in the world. Did “the jester” really think Bluehost would tolerate him downing thousands of clients’ sites at once?]

What a cowardly bitch. He took everything down, including his picture of the cease-and-desist order they sent him. That means Bluehost actually knows the identity of “the jester.” But we don’t, and neither do you. Still, we can characterize him for you anyway, using all the information we do have.

Who is th3j35t3r?

The Jester, a known pedophile, is an otherwise sexless man – a “script kiddie” that somehow figured out he could bloat up outdated Apache servers to uselessness. This is achieved by holding a large number of connections open with the server at one time. He is a longtime fan of the Insane Clown Posse, who eroded his creativity before it ever had a chance to bloom. Having no web design skills, his only alternative was to destroy. So he went to “work.” But who to attack?

Over time, the fatass Jesterfag became so well known for torturing Urdu (language) Islamic website owners, he became widely recognized as the world’s most likely hacker to vote a third time for Bush and Cheney.

Later on, as he gained Twitter followers, he took on feelings of Unwarranted Self-Importance and pretended to harbor political convictions after the mainstream media assassinated Wikileaks for being better at journalism than them.

He soon claimed attacks on Wikileaks, as well as the Westboro Baptist Church of Trolling Art.

But he fucked up when I provoked him to attack us. If you’ve been reading up till this point, you know how: he took my bait, ultimately unleashing a ravenous team of coked up Lebal Drocer lawyers who seek to hunt him down like a runaway slave – they are on so much cocaine they’re representing the web hosts of jihadists.

Cocaine lawyer does not use cocaine

The Jester thought he could bitch and complain to our host that we were running profanity and “slandering” his fake name. [ Editor’s note: libel is written. Slander is spoken. ] But he doesn’t know about the law and how there are no laws which protect false identities from libel.

If the Jester read more, he might have learned the laws before making an ass out of himself. But books are for faggots. Still, he is willing to pull Steinbeck quotes from wikiquote. #pseudointellectual #pedophile

Steinbeck wrote about the Great Depression – a time when men were men, and you didn’t fuck with other people’s accounts unless they were fucking with your moonshine operation. But if you did, you learned the hard way not to. The Jester, too, will learn.

The Chronicle always wins.

___
Mach2600 is a slut. Her #pussy stinks..

Anonymously37 gets dragged into our shit for the lulz. He has no idea why.

Mockingbird = sockpuppet of the sockpuppet, or #sockingbird

axisflip cryptofinancial

Categories
Hate Technology

Th3j35t3r’s 9/11 terror spree

In th3j35t3r’s constant struggle against Jihadists, he has grown increasingly similar to his most hated enemies. By committing several terror attacks on 9/11, he has become more like Al-Qaeda than ever before. But is it going too far to call th3j35t3r’s attacks terrorism? As a recent victim of an attack by th3j35t3r, Chronicle.SU is of the opinion that th3j35t3r is indeed a terrorist. He was quick to publish our personal details in the hopes that it would scare us into submission. By this action alone, th3j35t3r definitely fits the most basic definition for terrorist.

Recently identified as a possible astroturf campaign, th3j35t3r has fought hard against allegations that he uses a botnet. While several stories have been planted in the press promoting his denial of botnet ownership, such claims rely completely on th3je5t3r’s word – the word of a law-breaking anonymous vigilante. Curiously, he refuses to release the software which enables such remarkable attacks without the use of botnets. This kind of secretive vigilantism most definitely raises many important questions, even as th3j35t3r’s 9/11 hacks mark his steady descent into a world of pure terrorism. Such secrecy does not exactly scream “activist.”

While th3j35t3r may temporarily disrupt the communications of small Jihadist forums, he acts without the approval of the military. He can only be getting in the way of serious attempts at infiltration and espionage by real experts with real defense contracts. By making provocative military action completely outside the jurisdiction of America’s military, th3j35t3r is most definitely committing acts of terrorism. It is little wonder that so few military men support th3j35t3r. They know there is no place for vigilantism on the battlefield. Yet th3j35t3r, like many terrorists, works alone.

Th3j353t3r often targets web sites on shared hosting, such as Chronicle.SU, meaning his attacks cause collateral damage to innocent civilians. He razes entire virtual cities to silence a few extremists. This all amounts to another striking similarity between th3j35t3r and Jihadists. Th3j35t3r does not take any effort to minimize collateral damage.

Like the Jihadists, it is clear th3j35t3r’s favorite day for vigilante military action is 9/11. The line that separates him from the terrorists he attacks has grown increasingly thin, and to be honest, it’s surprising he has not been condemned by a military that is surely conducting serious business in the cybertheater. The final comparison between th3j35t3r and Jihadists is possibly the most profound. Where any sensible military acts only to achieve specific goals, terrorists like th3j35t3r and bin Laden only act to bring publicity to their cause. Th3j35t3r seeks to escalate military conflict just for fame. Real experts fight thanklessly and have no use for a jester prancing around the battlefield, begging for bitcoins.

axisflip cryptofinancial

Categories
News Technology

HACKERS FREE PRISON INMATES USING BACKDOOR EXPLOIT

Thousands of prisoners escape with their clothes on
Hackers were even able to program clothes onto escaping prisoners.

SAN QUENTIN, Calif. — More than one thousand inmates escaped from their prison cells across the United States Wednesday following the release of a volatile computer bug used mainly in the hijacking of nuclear weapons control systems.

Last week at Defcon, the hacker conference, a technological flaw in prison security software was discreetly showcased before a handful of onlookers, provided spectators promised not to say anything about it.

Capital Punishment

The massive breakout occurred just before 3 a.m. Pacific Standard Time. Latest reports say 1,233 of the more than 5,000 prisoners awoke to their cell doors opening. Usually that means breakfast, but guards were nowhere to be seen. All but two fled and only seven were captured alive. Many were fatally wounded.

CITIZENS: LOCK YOUR DOORS. BE ADVISED: The cell blocks affected by Wednesday’s hack housed only inmates serving sentences in excess of 25 years. In other words, there are violent criminals roaming the streets of Southern California, as usual.

Convicted for armed robbery, loves Antisec
Convicted for armed robbery, loves Antisec.

These include more than 1,000 convicted murderers, rapists, gang members, blacks, and worst of all, Mexicans likely inhabiting the barren lawless California desert of San Quentin. If anyone in an orange numbered jumpsuit ask you for a ride, just say no, unless you think he looks legit.

San Quentin State Prison Warden Mike Martel said, “Sure, we might lose a few prisoners, but those .commies will fill their places. I fucking hate kids, and their damn computers. So when are we doing this interview?”

One prisoner who escaped by way of the hacked beta version of the hack-in-progress said he is grateful for the efforts put forth by anonymous computer hackers, “whatever the fuck that means.”

Many dozens of prisoners scrambled over top of each other just to get through the open doors. Video surveillance tapes played back scenes of utter chaos as a herd of inmates bottlenecked, taking gunfire at the open bay doors near the front of San Quentin State Prison.

Scooter McLintock, 39, is serving two life sentences for the 1997 rape and murder of his two elderly South Beach neighbors. McLintock – along with many others – opted to take their chances and bum rushed the open front doors to the prison, where outside, freedom awaited survivors.

“We was thinkin’: what if we jus all rush out dat door at once, ya know? The guards can shoot at us, but they can’t kill us all. They ain’t kill me. But I had this big colored man on top a me get shot an’ he was screamin’ like a lil’ bitch. Like a scared little bitch wit blood squirtin’ out his mouf an’ shit.”

Famous Unknown People

Last year, a cyber worm known as Stuxnet disabled Iran’s nuclear centrifuges, slowing or possibly crippling their once-thriving nuclear weapons program. The Stuxnet worm is still considered the most sophisticated cyberweapon ever made. It disabled the centrifuges by attacking a “programmable logic controller,” which is the same type of computer used, ironically, in America’s prisons.

Martel explained why they use such sophisticated, yet flawed technology in San Quentin’s holding facilities. “In America, prisoners are considered a commodity where prisons are privately operated. That’s why we treat them with the same level of protection as Iran treats its controversial nuclear program. Because we care. About money.”

David Blanche of Lebal Drocer Correctional Authority said the most recent outbreak is the largest in world history, and authorities are actively searching for someone to blame. Critics of hacker culture point at Defcon for condoning cybercrime, but “mainly because they are older, they still blame MTV.”

A group of unidentified and highly-skilled hackers – not to be mistaken with the club of misfits going by “Anonymous” – bought a programmable logic controller for testing purposes. Such computers are commercially available for less than $2,500.

Using this hyperrealistic computer simulation, hackers were able to determine the possible effects of remotely opening a prison door.
Using this hyperrealistic computer simulation, hackers were able to determine the possible effects of remotely opening a prison door.

Within days of testing, hackers achieved success by way of a simulated attack on their own machines using their newly developed cyberbug.

Chronicle.SU editor and Anonymous insider Kilgore Trout abused his anonymous credentials and dug into their possible involvement. Once again, his skepticism proved itself.

You read it here, folks: Sabu has openly admitted to orchestrating the Antisec cybercrime of the century.

While talking with Sabu in a private IRC, Trout bragged about the completion of  his latest cyberbug. Because all anons care about how cool people think their fake online identity is, Sabu’s inner anonfag came  crawling out to bite the hook. He said, “That’s one hell of a bug, but guess who just released a bug into San Quentin State Prison?”

1337_H4X0R5_BR4
lol, #freetopiary

Sabu instructed Trout to “Keep it on the dl bro,” but the Chronicle.SU is not some pussy collective that respects the meaning of ‘off the record.’ “I’m not trying to get v&,” Sabu pleaded. But Trout said, “Tough shit.”

The bottomless compulsion to achieve notoriety based on a seemingly endless stream of pointless, shitty attacks caused many in the hacker community  to doubt whether the world may ever again blame Anonymous for anything  outside of ruining an online forum. But Sabu came through.

While anons and fanboys fapped mercilessly upon their prepubescent penises with thoughts running through their  heads of meth lab informants being hunted down and killed  after mass d0xing of police contacts, more people are now being raped and killed – this time because of criminals they helped free from prison.

The Final Solution

Prison guard Antonio Rueda, 43, responded with force to the security breach. He said they tried to preserve lives, but then were just like, fuck it. “Following the ineffective use of non-lethal bullets and pepper spray,” Rueda said, “we resorted to rifle fire and rape sticks. Still, some escaped and we’re really kicking ourselves for failing to run autoupdate on Windows XP Home Edition.”

After news of the breakout went public, prison technicians around the globe began looking into alternative security measures and solutions that couldn’t be so easily hacked.

“We’re going to take a look at our router settings, make sure NAT’s turned off. That’s probably the issue.”

This breaking coverage was brought to you graciously by your friends here at Lebal Drocer, Inc. We are pleased to announce the Grand Opening of our Megajail™ next week. It will feature brand new locking mechanisms designed using the latest in Iranian lockdown technology, operated directly by the mind of dead Lebal Drocer president, Raleigh Theodore Sakers. Megajail™ reminds you, once you’re in, you’re in. We  own everything that matters, and now jails.

(disclaimer: Lebal Drocer, Inc., is not responsible for limbs lost by closing cell doors. The system is fully automated, as is our transcendental President’s brain, and the prisoners must learn to adhere to the times doors open and shut.)