Man Puts Semen in Co-Workers Drink – How to Get Revenge

Michael Kevin Lallana slipped into his coworkers office and ejaculated into a female co-workers water bottle.

The woman drank it, felt ill, but not ill enough to drink it again when Lallana repeated his actions a second time.

I’m not sure if they guy had issues with her and wanted revenge, or if  he acted out of sexual gratification. What I can tell you is that he screwed up in the revenge aspect of it.

How could he have gotten revenge by doing something similar?

One should never put their own semen into someone’s drink. He could have used the semen from an unrelated friend, added a little water, and poured it in from a small vile, or other small container. It’s always stupid to use your own semen, because of DNA. Since he worked in the same office, naturally they are going to check all male workers. Totally dumb!

2. Much better is to do something that I always suggest. Use psychological revenge. Instead of actually putting semen in someone’s drink, just let them know anonymously that someone is doing it to them. Of course, don’t tell your enemy that you are the one who is doing it.

This tactic works great, because of the way the human mind thinks. If he added a little egg white into her water bottle, and she drank it, or just noticed it, she might get ill by thinking that it was semen.

A few years ago in Chicago, a 17-year old boy was sentenced to a $750 fine, and had to perform 120 hours of community service. putting semen in the salad dressing of his Chicago suburb high school cafeteria. In that case, the boy took a bottle of ranch dressing from the school cafeteria, entered the boys toilet, and ejaculated into the ranch dressing, and returned it to the cafeteria where students later used it.

Immediately afterward, there were a couple of copycat cases involving semen and food.

If you know your enemy has recently gone to a restaurant, or eats in a school cafeteria, or goes to nightclubs or bars, just send them an anonymous e-mail, or text message saying that someone was bragging about putting semen in their drink or food when they went out.

It immediately makes your enemy paranoid, and gets them worried over something over nothing. I’ve heard of cases of people vomiting just from hearing that someone did that to them. They might also feel the need to get tested for other kind of infectious sexual diseases, too.

Whatever you do, don’t actually physically jizz in someone’s drink. Like licking the stamp on a threatening letter you sent to someone, jizz can leave DNA.

For other revenge ideas, sign up for the Purpose Driven Knife Revenge Newsgroup. Also, hurry up and get some of the remaining copies of The Purpose Driven Knife II, and Toxic Internet.

How to Get Revenge – Where to Find Saved Passwords

Maybe you are using a computer that your enemy also uses. Maybe they were dumb enough to save their password, or it’s stored by default in the program.

You might also have passwords that were stored in various locations without knowing. This is a good opportunity to find out about them, and have them removed.

Below you will find where passwords are stored in many applications. This list was provided by Nir Sofer. Check out a lot of his free Password Utilities and other useful Internet tools at NirSoft.net.

Internet Explorer 4.00 – 6.00: The passwords are stored in a secret location in the Registry known as the “Protected Storage”.
The base key of the Protected Storage is located under the following key:
“HKEY_CURRENT_USERSoftwareMicrosoftProtected Storage System Provider”.
You can browse the above key in the Registry Editor (RegEdit), but you won’t be able to watch the passwords, because they are encrypted.
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.

Internet Explorer 7.00 – 8.00: The new versions of Internet Explorer stores the passwords in 2 different locations.
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerIntelliFormsStorage2.
HTTP Authentication passwords are stored in the Credentials file under Documents and SettingsApplication DataMicrosoftCredentials , together with login passwords of LAN computers and other passwords.

IE PassView can be used to recover these passwords.
Firefox: The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)
These password files are located inside the profile folder of Firefox, in [Windows Profile]Application DataMozillaFirefoxProfiles[Profile Name]
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.

Google Chrome Web browser: The passwords are stored in [Windows Profile]Local SettingsApplication DataGoogleChromeUser DataDefaultWeb Data
(This filename is SQLite database which contains encrypted passwords and other stuff)

Opera: The passwords are stored in wand.dat filename, located under [Windows Profile]Application DataOperaOperaprofile

Outlook Express (All Versions): The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.

Outlook 98/2000: Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.

Both Mail PassView and Protected Storage PassView utilities can recover these passwords.

Outlook 2002-2008: All new versions of Outlook store the passwords in the same Registry key of the account settings.

The accounts are stored in the Registry under HKEY_CURRENT_USERMicrosoftWindows NTCurrentVersionWindows Messaging SubsystemProfiles[Profile Name]9375CFF0413111d3B88A00104B2A6676[Account Index]
If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.

Windows Live Mail: All account settings, including the encrypted passwords, are stored in [Windows Profile]Local SettingsApplication DataMicrosoftWindows Live Mail[Account Name]
The account filename is an xml file with .oeaccount extension.

ThunderBird: The password file is located under [Windows Profile]Application DataThunderbirdProfiles[Profile Name]
You should search a filename with .s extension.

Google Talk: All account settings, including the encrypted passwords, are stored in the Registry under HKEY_CURRENT_USERSoftwareGoogleGoogle TalkAccounts[Account Name]

Google Desktop: Email passwords are stored in the Registry under HKEY_CURRENT_USERSoftwareGoogleGoogle DesktopMailboxes[Account Name]

MSN/Windows Messenger version 6.x and below: The passwords are stored in one of the following locations:
Registry Key: HKEY_CURRENT_USERSoftwareMicrosoftMSNMessenger
Registry Key: HKEY_CURRENT_USERSoftwareMicrosoftMessengerService
In the Credentials file, with entry named as “Passport.Net\*”. (Only when the OS is XP or more)

MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USERSoftwareMicrosoftIdentityCRLCreds[Account Name]
Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with “WindowsLive:name=”.

Yahoo Messenger 6.x: The password is stored in the Registry, under HKEY_CURRENT_USERSoftwareYahooPager
(”EOptions string” value)

Yahoo Messenger 7.5 or later: The password is stored in the Registry, under HKEY_CURRENT_USERSoftwareYahooPager – “ETS” value.
The value stored in “ETS” value cannot be recovered back to the original password.

AIM Pro: The passwords are stored in the Registry, under HKEY_CURRENT_USERSoftwareAIMAIMPRO[Account Name]

AIM 6.x: The passwords are stored in the Registry, under HKEY_CURRENT_USERSoftwareAmerica OnlineAIM6Passwords

ICQ Lite 4.x/5.x/2003: The passwords are stored in the Registry, under HKEY_CURRENT_USERSoftwareMirabilisICQNewOwners[ICQ Number]
(MainLocation value)

ICQ 6.x: The password hash is stored in [Windows Profile]Application DataICQ[User Name]Owner.mdb (Access Database)
(The password hash cannot be recovered back to the original password)

Digsby: The main password of Digsby is stored in [Windows Profile]Application DataDigsbydigsby.dat
All other passwords are stored in Digsby servers.

PaltalkScene: The passwords are stored in the Registry, under HKEY_CURRENT_USERSoftwarePaltalk[Account Name].