Anyone know the legitimacy of this (the details.. not his death)? I just found it snooping around a little deeper on the google… This never popped up before when I did a basic search?! All I’ve read about his death was that he was “trapped in an upstairs bathroom”. This says he was essentially murdered it sounds like… and drained his bank account?!? WTFFFFF.
Cykic / Ryan – firstname.lastname@example.org
skam / ryan – email@example.com
Delay / Ryan – firstname.lastname@example.org
A “millionaire” Ohio man arranges his living room in passing stream on his private property and threatened police with a shovel. The man was eventually subdued by the police and tazered.
“Police were also told, according to the report, that Johnson turned on a water faucet in a second-floor bathroom and left it running, causing it to overflow and seep through the kitchen ceiling…. Police say Johnson threatened to jump off the roof of the home at one point and also fought with officers. He was taken to St. Thomas Hospital by emergency medical technicians after the incident.”
He was arrested on an unrelated charge.
Sadly, Ryan D. Johnson aka RJ2 passed away on January 14, 2010. May he rest in PEACE.
Ryan Johnson RJ2’s Smart house back on the market. (This isn’t the house where he died in the fire). However this is the same house with the infamous YouTube video with his living room furniture in the water. [link]
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23
Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.