How Did Ryan Johnson aka RJ2 Die?

13895007_10154005449092408_2746630578823007805_n

Source: http://touch.npaper-wehaa.com/clevescene/2015/05/13#story?id=2511530

Anyone know the legitimacy of this (the details.. not his death)? I just found it snooping around a little deeper on the google… This never popped up before when I did a basic search?! All I’ve read about his death was that he was “trapped in an upstairs bathroom”. This says he was essentially murdered it sounds like… and drained his bank account?!? WTFFFFF.

Ed Rhodes Rj lived close to me…i hadn’t heard about the bank account…but locals were screaming foul play.

Eli Godfrey I was still in touch with Ryan when he died. He still had a lot of goals (he wanted to make movies) but unfortunately he was a bit of a mess. Never heard this foul play stuff before, though. Sounds like hearsay.

Cykic / Ryan

Cykic / Ryan –[email protected]

skam / ryan

skam / ryan –[email protected]

Delay / Ryan

Delay / Ryan –[email protected]

rmkbenz / op ivy / ryan

rmkbenz

op ivy / ryan – [email protected]

RJ2 living room in passing stream gets a stun by police

A “millionaire” Ohio man arranges his living room in passing stream on his private property and threatened police with a shovel. The man was eventually subdued by the police and tazered.

“Police were also told, according to the report, that Johnson turned on a water faucet in a second-floor bathroom and left it running, causing it to overflow and seep through the kitchen ceiling…. Police say Johnson threatened to jump off the roof of the home at one point and also fought with officers. He was taken to St. Thomas Hospital by emergency medical technicians after the incident.”

He was arrested on an unrelated charge.

Sadly, Ryan D. Johnson aka RJ2 passed away on January 14, 2010. May he rest in PEACE.

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
[email protected]
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
[email protected]
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

(more…)

Read More