Archive for the ‘wordpress’ Category

I Guess I’m Still Pissing Them Off.

June 13, 2007

For the past month or so, I’ve focused on tracking kiddie porn sites to Corporate American located in the good old USA. So far, I have never seen a foreign kiddie porn site, there is very little black kiddie porn and most of the pictures were variants of ones shown at trial from the National Archive of Hashed Kiddie Porn Pics. This is good solid white America at it’s worst under the leadership of George Bush.

Now don’t get me wrong, these pictures are hauntingly evil and remain embedded in memory, the same way Holocaust pictures do. It’s just fucking disgusting that all of it is published in America, much has been online for almost a decade and it’s all hosted and transported by big American Business.

I first recognized that I was pissing them off when CERT hit me with a military strength Trojan and of course being stalked by Carnivore was a dead give away that I was a so called “person of interest.” Now They have topped all that.

I have always suspected that some of my search results were filtered so, I’ve gone to the extreme of using Google from foriegn locations (Mexico and Washington DC), using very clean secure machines, various mobile IP’s such as war driving for access and using multiple search engines. The one thing that I never expected was that I would be tagged for access denial to a site such as

Can you imagine my surprise when I Googled a know porn serving malware program and found several posts on the topic at then clicked a link and got the following message.

mySQL query error: DELETE FROM ibf_secessions WHERE ip_address = ‘’

Now I hope that you all recognize that ‘’ represents both of my IP addresses on my two networks at two physically remote locations.

You got to love it.

With more than 4 billion IP addresses in the world, I’ve pissed off someone enough to get both of mine blocked at

They even blocked my ability to contact SWI or join a forum so I couldn’t bitch about the shoddy treatment they are giving The Fat Savage. Christ, I thought I was fighting for privacy, intellectual freedom and against government created malware and these dumb fucks should be on my side.

The really sad part, I had printed the articles of interest on a weak printer and just wanted a better copy, so I already have hard copy on the articles of interest.

I Speak The Truth

June 12, 2007

You can always tell when you speak the truth when people try to shut you up.  I have reached the point where my feed stats exceed my blog stats which means my regular readers exceed my total readers.

It seems I’m suffering a denial of access attack.

I would have never noticed except I dropped from 300 viwers to 20 overnight and my feed stats were still above 40 per day. 

 When the Feds want to fuck with you, they will.

Oh well, I was always writing to document the crap said at trial so I will write until the appeal is over. 

The question is why stop me if I’m wrong. At least you know the basis of appeal if I stay on line.

Do You Yahoo at My Web???

May 16, 2007

Most of us use the default homepage and get zapped with more than a dozen cookies as we turn the machine on and check our Hotmail account. It really is informative to check the visible information to check what is passed in the cookies. Where a line is unknown, I’ll just use “line unknown” instead of a bunch of encrypted stuff that I don’t understand. Where I do have an idea, I’ll put it in the second column.

I’ll be skipping a lot of cookies that are meaningless to me so as only to get to the essentials.

CULTURE                 What Culture?
EN-US                        United States English speaking                     Company Address
1024                            User Class maybe big business
Line Unknown
Line Unknown
Line Unknown
29854330                 Cookie ID

MUID                        Microsoft User Identification?
753AB7F41(etc.)      My Encrypted ID                    Company Address
1024                           User Class maybe big business
Line Unknown
Line Unknown
Line Unknown
29854330                 Cookie ID

MSPPre                     Not sure    My Email Account in plain English (an example)            Company Address
1024                           User Class maybe big business
Line Unknown
Line Unknown
Line Unknown
29854330                  Cookie ID

MSPCID                     Microsoft PC Identification Number
7cfde65372a37c3a    My Machine’s Encrypted ID             Company Address
1024                            User Class maybe big business
Line Unknown
Line Unknown
Line Unknown
29854330                   Cookie ID

Now that we have checked the email and the cookies are carrying my Microsoft identity, my Hotmail name and my machine ID, how about surfing a little porn over at

__utm(a b or z)         Three cookies are set. One for a, b & z.
Mess of numbers       Line used for Google Analytics.            Company Name
1600                            User Class probably porn.
Line Unknown
Line Unknown
Line Unknown
29854330                  Cookie ID

So our porn habits are measured by Google Analytics and tracked to my microsoft identity, my hotmail name, and my machine ID through my Cookie ID. Now lets see what happens when we click the My Web Button for Yahoo.

Line Unknown
Line Unknown                 Company ID
1024                           User Class Probably big business
342532096               Ties Yahoo button to hotteens account
32065574                  Ties Yahoo button to hotteens account
29854330                  Cookie ID

Yahoo then asks you to sign in with your yahoo account to put the page in your My Web Folder.

Can anybody deny who they are, what machine was used, and where they went? Unfortunately, anybody that read my first post on this subject knows that I never asked to go to, I was automatically redirected there.

Stalking the Carnivore.

May 13, 2007

Never believe that the FBI’s Carnivore is extinct. Like any other animal it actually leaves tracks while stalking you. This program is done in cooperation with your local ISP and for some reason contact is made through them. This is like a lion using a gazelle as a front to stalk a human.

It seems if you are using Norton Internet Security, your very first on line update is controlled through a contact with your local ISP. If you’re using Pccillin, you have incessant messages that your local ISP is attempting to make contact with your machine through a wireless connection – even when your using a LAN

The real proof comes when you check your Virtual Server Setup on your Internet router and all of a sudden the epiphany hits and you want to puke – not out of fear but disgust at what your government is doing to its citizens in the name of security.

A virtual server is a method of partitioning your hard drive such that every partition can operate as an independent machine. Each server will have it’s own full fledged operating system and each server can be independently rebooted. Remember when I complained about sneak a peak warrants and someone turning on my machines. Remember when I complained about by rapidly shrinking hard drive. Seems all those other independently operating servers take space and can be rebooted by their controller without being present. No shit this explains it all.

Right now my machines are set up by someone other than me to allow traffic from Virtual Servers through a private IP of which you may recall is the IP on the router which bypasses the firewall. I have virtual servers to handle FTP (Ports 20/21), HTTP (port 80), HTTPS (port 443), DNS (port 53), SMTP (port 25), POP3 (port 110), and Telnet (port 23). Hey those are all pretty normal servers and the Russian mafia might want to use them.

How about i2eye (port 1720?) This is patent pending technology from D-link which happened to manufacture my router which is designed originally for enhanced streaming video technology to Televisions so I’m not sure why its on my machine as I have never knowingly downloaded a audio or video, and don’t have a TV card. Also, I reset the router to factory defaults three times in the past week so none of this crap should be on it.

Of course PPTP was enabled through port 1723 which allowed the virtual machine to operate on point to point contact basis through a secure channel using IPSec on port 500. No wonder I can’t figure out how to find out whats stored on my machines or how to remove it. The machines have their own operating systems, have encrypted content, unique encoded keys and are immune from programs which can snoop on them.

How do I know it’s Carnivore. Easy.

DCS 1000 is also on my machine operating through port 80. This is the new user friendly name for the FBI’s Carnivore which sounded too much like a predator.

With all this shit on my machine, it’s hard to tell what is real and what’s not. Have I been getting valid research and making actual posts or just looking at the results from virtual servers on my own machine?

And I thought The Truman Show was a fucked up movie.

Post script. So in order to get the post on line I wiped out all of that shit and reset the router while it was off line. In spite, it added NetMeeting at port 1720 and DSC-2000 to the virtual server list – Cool Technology??????

One of Dem Dayz!

May 12, 2007

Today is one of those days  where I’m gettin my ass beat.  Seems my last post on who’s copping a piece of young models must have pissed off a few people.  My network went down at work. The last time it happened, it was a fried antenna and it took a couple of days to fix it which means it’s not likely to happen tomorrow.

On my other access network, my so called “counterfit” windows (If they can fuck with me I can use a small w in windows) is giving me a case of the ass.  It started by saying my hardware had changed and I had to update the system.  Then it said my addition was counterfit and I needed to contact them. The last time it said , I had used the number too many times and it was no longer valid.

Each time it gathered more information(enough for another post) and finally it said for $99 they would issue a new product key and I could keep using my bogus addition.

Funny thing, I think it really was Microsoft on a phishing trip for Uncle Sam. So much for their privacy promises.

I’m typing this on a laptop so I apoligize for the errors.  I’ll get it into it’s docking station tomorrow so I can jerk their tools somemore.

Counterfeit Windows?

May 10, 2007

After my code grabbing foray to, and the damage assessment, I restarted the machine which told me I had substantial changes in my hardware and had to reactivate my Windows Operating system within 3 days or my machine would crash. Of course there were no changes to hardware.

I did what every kid would do, I ignored it and started surfing the web. I had so many pop-ups from Microsoft asking me to reactivate my operating system that I finally decided to do it. I went on line and was told that it’s not an equipment problem but that I was using a Counterfeit copy of Windows XP and that I should either purchase a legal copy or work with them to resolve the issue. They even have an 800 number. This machine was updated and activated in the states and had been used online for 3 months.

Can’t you just imagine the call:

Hi Bill, this is the Fat Savage who is publishing a site about Trojans, and Kiddie Porn and being attacked by the Russian Mafia and the US Government with Military Strength Trojans that attack both Linux and Windows XP and while I was at this nasty site called, they fucked my machine and changed my registry number so I’d like to straighten this mess out.

My Name Oh Yeah I’m the Fat Savage.
My Address – What’s the difference
My Phone – You already tracked it but it’s one of those drug dealer phones you buy at K-mart and pay a kid Ten Bucks to figure out how to activate it. It was purchased for cash.

Hey do you even care about the original product key number on the package or do you just want my mothers maiden name and the Internet account number.

Oh – Those were the next two questions

Bye, I’ll figure this out myself.

Entrapment is Not a Crime!

May 1, 2007

That’s right there is no such criminal activity called entrapment and law enforcement agencies are free to play with there honeypots all day long.

Start with There are 108 million websites in the world and only has one incoming link. Hell, has 459 incoming links. You could claim that you wandered into visit the fatsavage 458 times easier than saying you wandered into by mistake. also has one incoming link other than the automatic redirect from so to say you are there by mistake is ok if you admit you came from Now according to the testimony by Agent Carter, you would be well on your way to being labeled a pedophile because teens is one of the keywords that identifies a pervert. Others include young, teeny, Lolita, girls, petite, skinny and smurf.

Now once you are on the hotteen site, you can look at the mostly cute, mostly young girls and when you mouse over you see some safe names – things that won’t prove that you are a pervert So lets see what you click and what the log shows. All the girls looked 18 to me so I felt safe with the experiment.

I skipped the following sites because they had dangerous names. But since very few men on a hunt for porn look at the URL address in the lower left corner of their browser, I’m not sure many other people would be concerned.

I went to the following sites and arrived at others: took me to took me to also took me to took me to

So in six minutes of surfing the site, I had clicked on 4 links and the word teen was in the URL 3 times and if we are establishing a pattern Babsitter once. This is in addition to the previously mentioned young and teen. A definate pattern is established.


The bait was cast and I caught a slightly different kind of fish than what was offered. I did not have to click a link to find out where they went. This is not the same as when I was automatically shifted to porn and it was downloaded. In this case I took voluntary action to see naked 19 year olds but in the cases previous reported I got hit with shit and left.

In either case, I could be charged because there is no difference in the logs to document what I asked for and what I didn’t

PS. In the six minutes at and affiliates, 5 cookies were set from the teen sites to track my future surfing habits and there were 500 images planted on the machine from half a dozen sites and the most disturbing was naked young boys. Now I might sneak a peak at full bodied 19 year old well developed girls, but if I want to see a naked guy I look in the mirror. The fuckers planting this evidence are sick assholes and ought to be in jail.

Ah, but remember entrapment is not a crime, it’s only a defense and a weak one at that.

Your National Identity Numbers

April 27, 2007

I have been tickling the tigers tail with mixed results. It seems that when I get done wiping the hard drive, reformatting the disc, and reinstalling the operating system, two things happen: First, The Trojan is still present and second, I never get the same results twice. It’s sort of like they know who the Fat Savage is and only let me play in the minor league with no chance of moving up.

In my research, I finally stumbled on the answer and also, why law enforcement people are positive they have the right combination of machine and person. It seems when you use your 25 number windows product activation key it assigns values to all of the hardware on your computer to generate a unique 50 digit number. Now to let you know how unique that is consider that the total human population of the earth is only 11 digits and when counting every animal on earth it probably doesn’t reach 30 digits. So after eliminating the numbers which only exist to check that the other numbers have been properly compiled, that’s still over 10 billion unique numbers which could be assigned to every mouse and mole on the planet. After all, mice, dogs and cats in comic strips all have computers, so why not plan for the future.

Now your own unique number called the Windows Product Activation number is made up of the product key, the hard drive, volume number, the identity number and a number for the type of controller; the network MAC number, a CD Rom Drive identity number, the CPU identity number and another number for the the Ram Size and whether it’s a dockable laptop.

Now this number has been assigned to survive most normal upgrades. You would have to change more that three things on the list to generate a new number or change the operating system to generate a new number.

Now couple this number with a browser and search bar hijack and the observer can track everything that happens on your machine with your user name and password. The Trojan can set up group meetings and dial-out your habits to interpol, the FBI and Bill Gates. This group meeting keeps all those messy bugs from fighting for control of your system.

Always remember the best estimate of spyware infected machines is around 80% which happens to be slightly lower that the estimate of 86% of adult males who surf porn.

Oh well, I guess I wont quit tickling the Tigers Tail until I confirm their game. This new knowledge just slows me down and increases the cost as I figure out the least amount of operating system changes and hardware changes to remain reasonably anonymous.

The Difference between Bitch and Witch

April 26, 2007

In high school my daughter had a t-shirt which said “I am a bitch but that’s Ms Bitch to you!”

Since that time she has grown into an aggressive world class bitch and I’m proud of her. Her aggressiveness has allowed her to move up the corporate pyramid while still controlling a hyperactive husband and a couple of great kids. Despite her very dominant personality, she has developed a sense of grace and good manners which contribute to her success.

When I first saw the Prosecutor from Washington, she reminded me of my daughter. She appeared intellectually sharp and extremely aggressive. She showed no fear. Now for those who don’t know the Prosecutor is supposed to be an officer of the court, a so called seeker of truth.

During the course of the trial, she was supposed to present the government’s case with honesty and integrity. She was not supposed to suppress evidence and coach her expert and other witnesses to lie about the facts. Assuming that she was intellectually capable, she was supposed to evaluate all evidence and sculpt her arguments accordingly and when directly challenged not lie about anything.

I’m not sure whether my favorite lie was Trojans don’t deliver porn, the government does not use honeypots, there was no such thing as a Trojan operating on the mk:@MSITStore exploit or Trojans never work on dial-up. Oh yeah, I guess my favorite is that a person who is charged with kiddie porn does not have to be guilty beyond a shadow of doubt, you just have to think there’s a good chance the evidence as presented at trial with all the omissions and lies indicates they are guilty.

If this mental midget is the best we have in the war on terror, no wonder we need oppressive laws like the Patriot Act. Good old fashioned intelligent due diligence will never work when there is no intelligence involved.

At one point in conversation, I told her she reminded me of my daughter. Her response was to glare and flare her nostrils. Her total lack of grace was my first indication that there was no resemblance at all so I turned and walked away without finishing the thought. As the trial progressed and I watched a pugnacious mental midget deny all truth, I knew there was no resemblance.

Obviously, this woman was not a respectable Bitch, she was a fucking Witch!

Tickling the Tigers Tail!

April 1, 2007

For those who don’t know the game, the concept of tickling the tiger’s tail is you keep on playing why the untamed beast to enrage him without getting harmed. In the history of science, it was the name of the experiment which was used to confirm the critical mass of uranium needed for an atomic bomb. In the movie Fat Man and Little Boy, a defining moment was when the experiment got screwed up and Los Alamos suffered the first causality of the nuclear age if you don’t count Madam Curie, the Polish woman who died from radiation poisoning.

Well I played with the computer Innocent Victim #2 (the one I found the sissy pictures on) and had it near perfect. From about a dozen, I got it down to one open exploit and dumped a few Trojans along the way. Not being satisfied, I decided to push a little harder and did a military wipe on the hard drive to get rid of any weird pictures and reinstall the operating system and antivirus.

What a stupid move!!!!

Now I had an older versions of the operating system and when I went on line for updates, I was blocked and/or sent to a phishing look alike site for false updates. Really cool technology!!

I’ve definitely renamed the machine Tigers Tail #2 and intend to scientifically describe my capture of world class jumbieware and describe it in detail.

So without going on line, I did another DOD wipe of the hard drive and and reinstalled Windows XP. The install was performed with a requested reformatting of the hard drive. I then did an exam and found I had 58 MS Vulnerabilities and Dialer_Coulomb. This confirmed the reproducibility of the infection as hardware based and not software based.

So as not to alter the state of the machine I once again did a DOD wipe of the hard drive. After reformatting and reinstalling, I intend to go on line with a dial-up account and update the computer. I will then upload the software to measure the changes, rewipe, reinstall, update and start surfing for the bad guys

I don’t think I’ll have to do much to find them. I notice that if you do a Google search on mk:@MSITStore + dial-up, a couple of nasty porn sites make the top three pages of results and when you click on them, they start loading crap on your computer.

A message to “Interested Party”:

Your thoughts sent me to do deeper research on Choopa. Give me a few days to digest it all and then I’ll post.