Okay...
Let's say that someone went through all the trouble to:
1. Gain access to your server.
2. Decrypts the salted MD5 hash of your blog account.
3. Writes two posts on your "TheLastHonestMan.com" blog.
4. Writes a thread on GFY about it.
5. Then tomorrow writes a thread how someone "wiped" his databases.
6. Then basically says that someone gained access to all of your accounts and posted stuff on GFY.
Yeah, right.
