You're a bit of a N00b (not newb, don't get me twisted). I intentionally let you into my network, I intentionally let you dick around in my network for a bit. Then I just booted you out, like it was nothing. Truth be told, I have been toying with you this entire time. And to be completely truthful; I was seriously hoping you were gonna tap into the previous holes I have in my laptop and ipod. Actually I had my network open, just hoping s/he would come back; but after a couple of years, going back and forth at eachother, I don't think he wanted to risk loosing his Z-net.
You have done some interesting tries, some of which I actually thought was going to work. It would be nice to find another hacker, that is at his/her level. That motherfucker tossed me around like a fuckin rag doll.
Simply put my laptop (blackdragon), is currently just an out the box installation, not updated, not hardened, and the only thing I have done to it, is a custom firewall, that isn't loaded at boot. Back when my laptop was 10x more hardened then my desktop (nolimit); that fucker tore this laptop up down and all around. I can't count how many times I had to go very deep into this system, just to be able to use it. That person destroyed any system I wouldn't allow him into, simply to prevent me from tracking his ass down. But then again, the original target; in some ways kinda deserved it; hence how I got this laptop lol...
Now, I don't give a shit what you do to me; but touch my family, and I'll show you, death is a mercy. Truthfully, I've enjoyed watching your attempts; but you need to stop with the bullshit microshit exploits, and there is no point in constantly retransmitting your packets. And as far as I'm concerned; have fun, do whatever, just leave my family out of it. I learn from this type of shit; but I do need to make sure my family is protected; simply put, my mother was an ironworker for 15 years, she is disabled, and that is a job very few men, are man enough to do. And truthfully, I don't see that as asking for much; just simply some respect.
Now that, that is out of the way... Have you uncovered the Z-net from before? I noticed you're good at duplicating automated traffic; so I have to ask lol... Also something to keep in mind, I am using linux kernels, 3.9 and 3.19 I think it is. These systems are entirely binary installations, you probably don't want to see what I can do with compiled installtions, let alone what I can do with the rack servers sitting in my garage lol... Simply put, this is far from my first rodeo, and I live for this shit; take it up a few notches bruh, you got the opportunity to test your skills against someone who makes security agencies look like amatures, so use it. You could learn a lot from me, and I could also learn some from you, especially considering that I am still trying to get my bearings on the 3.X kernel series lol... 2.6 was the longest lived kernel for a reason lol... Anyways, I just watched you trying to spoof as my ipod; enjoy, just don't cross the line