Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

4. Does your child read hacking manuals?

Name: Anonymous 2006-11-11 19:26

If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.
There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.
If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

5. How much time does your child spend using the computer each day?
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.

6. Does your son use Quake?
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.
If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

7. Is your son becoming argumentative and surly in his social behaviour?
As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

8. Is your son obsessed with "Lunix"?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

Name: Anonymous 2006-11-11 20:00

4. Does your child read hacking manuals?
Oh boy. This one made me laugh.

Almost all of the books you listed have NOTHING TO DO WITH LEARNING TO "HACK." "Cyptonomicon" is a genuinely fascinating look at data encryption, and blends fact with a fictitious story. "Programming with PERL?" PERL is a powerful data extraction language used on machines worldwide. It is incredibly powerful for a wide range of data manipulation tasks. I would be PROUD of my child trying to master this language!

The ignorance you display here is astounding, and the fact that you suggest parents lobby to have such books removed from shelves is the most outrageous and idiotic thing I have read in your article yet.

5. How much time does your child spend using the computer each day?
YOU... ARE... A... FUCKING... IDIOT.

I spend upwards of 8 hours on my computer each day; much of this time involves my school studies, and much of it is spent communicating with my peers online and learning.

Suggesting your child is attempting to execute a Denial of Service (DOS) attack because they're spending too much time on the computer is the most illogical leap of reason I HAVE EVER HEARD. You should be ASHAMED. That's like assuming your child is planning to use his new iceskates to slit the throat of a 7-11 clerk. Get a clue!

6. Does your son use Quake?
"Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms." Wrong again, you moron! Quake is a GAME. Granted, Quake is a violent game, and I do not believe it is suitable for young children... but it is far from a "training ground" for hackers!

7. Is your son becoming argumentative and surly in his social behaviour?
One word: TEENAGERS.

(And of course he's going to be surly and argumentative in his behaviour if you try and approach him with the bullshit in this article! If you're going to approach him, at least be properly informed first!)

8. Is your son obsessed with "Lunix"?
It's spelled "Linux," you stupid fucking dolt.

Your total lack of research surfaces here (again). LINUX was invented by a FINNISH (not Soviet) man named LINUS TRAVOLDS (not Linyos Torovoltos) in 1991.

"Lunix" is meant for older 8-bit processors, not the machines we use today. If you had VISITED THE LINK YOU MADE, you would KNOW THIS!

Linux is also stable, free, and extremely powerful to those who know how to use it properly. It can save you time and money, and is arguably one of the best operating systems out there. If your son or daughter was able to even INSTALL it successfully, they are capable of greater things. You should encourage this exploration, not hide away in fear!

"These programs are used by hackers to break into other people's computer systems to steal credit card numbers." Uhh... what programs? Linux? Linux is an operating system, dumbass.

"They may also be used to break into people's stereos to steal their music, using the "mp3" program." That's INSANELY FUCKING MORONIC. You can't connect to a stereo to steal music! You don't even know what an MP3 is, do you?

DO SOME FUCKING RESEARCH.

MPEG Layer 3 (MP3) files are a way of storing music on a computer without taking up too much hard disk space. "MP3" is not a program... it is the set of rules and standards that define the creation and playback of MP3s.

Have you ever even used a computer?

PULL YOUR HEAD OUT OF YOUR ASS.

If your child is being challenged and engaged by his academics, he will put effort into it. He doesn't need your paranoia and misguided rantings... especially based on this non-article.

Electromagnetic radiation from monitors will not cause meningitis any more than watching TV, talking on your cell phone or listening to your hi-fi stereo will.

Yes, spending too much time on the computer could lead to an unhealthy lifestyle... but understand that this does not make computers evil or unhealthy. They might be the most powerful tool you have access to, and anyone who understands how to use them to their fullest extent will do very well for themselves in a computing career.

All things in moderation.

---

As someone who is training to make his living in technology, and someone who has had computers around all his life, I am disgusted and appalled by the quality of this article. It is, quite literally, a work of fiction.

Next time you write an article, you need to read up on your subject first so you don't:
1) misinform parents
2) make a total ass out of yourself

That being said, I would be more than happy to help you out with future articles.

furious_wombat@hotmail.com
Student of Network Engineering
Proud to be [H]

Name: Anonymous 2006-11-11 21:30

What the fuck, nigger?

Name: Anonymous 2006-11-11 21:43

"you guys are all idiots for believing, even for a second, that this article is serious. It's intended to offend morons like you and laugh at your silly, insulted, posts."

You gotta admit, there are some duuuumb people out there.

Name: Anonymous 2006-11-11 21:51

First off, this post is so full of misinformation that the only thing I can pray for is that this is a huge joke on dear Reginald's behalf and he is attempting to cause an uproar which has happened. If not;

Lord of the uninformed, thy name is T Reginald Gibbons.

First off, lets lay down a few simple facts which you have overlooked in your "expert" knowledge of all things hacker.

Numero Uno; A hacker is not someone who breaks into a computer for malious intent, but to garner information to increase his knowledge. Not to blackmail, not to destroy, hurt or intentionally harm anyone, but to learn. The definition that you have described is that of a cracker, a malious person who breaks into computers with the intent of destroying systems, information, data or stealing it to sell to others.

Number Two, the books you named in your point 4, which include "Cryptonomicon" and "Snow Crash", by Neal Stephenson are not hacker's manuals, and in fact have very little on the whole dealing with hackers, much less explaining how to do it. In your infinite wisdom if you bothered to read the books you'd understand this. They are cyberpunk FICTION, not hacker's manuals.

Number 3, It's LINUX, based off the UNIX system which never had even a passing aquaintance with the Virus you call Windows. Deleting it causes HD(Hard Drive for those of you without two brain cells) errors and harms it? Since when is this? And since when is it illegal considering 97% of all major businesses and corporations including the U.S. Government use it for backbone servers and terminals. But I forget myself in dealing with those who are unenlightened and still believe the Propaganda of Gates. You see, Linux is a stable operating system that works and doesn't malfunction, error out, crash or totally slag your system if you so much as look at it. Plus, unlike the capitalistic Microsoft Virus, it's free.

4. AMD is a superior product to your wintel systems by all definitions and designs and if your son wanted one for his system it's only to have a more powerful and more stable system.

5. Bonzi-Buddy, Comet Cursor, Flash are hacker programs? Now this is a first for me. Since when did a program to change the shape of your cursor become a hacker program? And since when did a multimedia program designed to create new visual entertainment in the web world become the tool of the dark side? As for Bonzi-Buddy, it's just an waste of HD space.

6. Apparel. Bright clothing, Pacifiers, glow-sticks. Sounds more like fetish then hacker. Glow-sticks and bright clothing are typical for those of the punk rocker, ska, or other closely related groups. Pacifiers...have yet to see those. To my knowledge, my hackers generally perfer dark colors with a catchy design emblazened across the back.

7. Accidemic decline. Hmmm...now this is an interesting one. If he preforms poorly on sports teams he must be a hacker because every all-american lad is quite adept at any number of sports from tennis to basketball to baseball, golf, bowling, soccer, racket ball, boxing, wrestling and swimming and let us not forget football and him still being the head of the debate team and the chess team. *rolls his eyes* Yes, we all are like that aren't we? *points out bitter dripping sarcasam* As for classroom achievement, perhaps, but not always, it is the teacher. In some cases it's the material presented, or the way it's presented. Sometimes it's just the class itself, or that the student is so bored with the class because he does know something more then the regular Joe Average that he slacks off. Perhaps this is a cry for attention to you the parent to notice him as a person and not as an onamental figure which you obviously do to your children. When I read your post, after throwing up my dinner, I picture you in your suburban home in america, two cars, wife, kid, etc. And when those party guests come over it's always "This is my Son Johnny who recently got an A on his history report and my daugter Susie who is the best writer in her class. Isn't that nice?" Now that is child abuse.

You say because your son is slipping in grades or didn't make first string he's associating with a high class hacker group hellbent on world domination and must be stopped no matter the cost. Here's a little bit of information for you, Mr. Average America. The chances of your child making it into a prestegious hacker group or society is less then you winning the lottery. In the world of the bit and the baud you and your son are about as adapt as a dog is as flying. And unless your child starts programming C++ in his sleep and deciphering 128bit encryption keys over breakfast chances are this isn't the case.

Next on the list: Quake. Quake is a video game created by ID Software that lets you portray the role of a person going around in first person shooting things with guns. I reiterate one word from the previous statement; GAME. If you think this is a virtual reality that is used as a common spawning pool to plot the destruction of governments you're sorely mistaken. Quake is, while I admit pointless and rather stupid, a game. The only hacking going on there is with a chainsaw. And you want to try to bring this up to your child's school? Jesus H.P. Christ in a Macintosh! What type of parent are you? Not only are you about as ignorant as a todler when it comes to things binary, you want to socially ostrasize your child, make everyone including faculty, staff and peers hate him, fear him and whisper things behind his back.

And with things like that and thinking in such ways you wonder why your child suddenly becomes defensive around you? Doesn't want you near them? Hell, I wouldn't want you near me either for fear you'll try to destroy something else of mine. But after socially killing him what is destroying his home life as well? My my...perfect parent indeed.
Do you take one lump with your hipocracy, or two?

Changing ISPS? Hmmm...lets see here...change from AOL, an ISP which takes you forever and a day to sign on to, gives you 5 minutes online then boots your sorry butt off. And you enjoy this? *rolls his eyes again* And for your information, security on AOL is about as protective as you logon password for windows. I.E. Hit Cancel. *shakes his head* AOL is one of the biggest breeding grounds for Warez Puppies and Toolz Kiddies that I have ever seen. And look up those definitions if you can't figure them out for yourself.

New hardware as a sign of a hacker. Well golly, if that's all it takes my dad must be a hacker and so must be my little brother...

I mean my dad was only in the Air Force for 20+ years serving his country as a communications tech, but now that he wants to upgrade his system to a larger harddrive to allow him to install the new games he bought he's a hacker. Wow, I'm sure he'll love that. *dry laughter* And my brother requesting more RAM for his computer so his game will play faster and quit lagging, but because of his request, he's a hacker too.

And now, reading back over some of your finer points, I again laugh hysterically.

To quote a paragraph;
"These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone."

Telnet runs on windows, is it a hacker program then too? And I'm going to break into my stero system across the room using my computer that isn't hooked up in any way to my computer much less the same power circut. Yup...sure am...gonna go crash NASDAQ with a cellphone and overthrow the government with my clock radio. *nods* Yup...sure am... right after I steal non-existant credit cards right off your system. Torovoltos is a notorious hacker? Extremely gifted programmer perhaps. Perhaps he is a hacker, if using the term as it was originally used back at MIT when computers were coded by hand each time and people developed programming shortcuts called "hacks".

And whats this about DOSing into someone's system? DOS, which is Disk Operating System, would be the stupidest thing in this modern age for someone to attempt to hack with. I mean I can remember telnet hacking alright but never DOS hacking... Ummm...the command prompt your little boy blunder is trying to hack his way into is the base underlying system of your computer.

And as for the argument in the comments about Female Hackers on a whole. There are quite a few out there, more then you would think, and as for the bit about scene whores, I've never seen that happen myself but if you have all the more power to ya. Female Hackers inferior to Male Hackers? And why is this? Because we as a society can not accept the possibility that a human without a penis is capable of doing anything better then those with one. *laughs softly to himself* Hate to tell you but I know quite a few female hackers that would send your 'puter into meltdown for the meer indication that you thought males were superior to them. While yes, there are males that are superior to them I'm sure, I'm also sure that they are superior in skill to quite a few male hackers and crackers out there.

And in conclusion of this drawnout trite discussion of the lack of intelligence brought forth in this post, I say this. If you brought your son or daughter a 'puter for christmas, and they become infatuated with how it works chances are they're not becoming hackers but learning a useful thing in today's society. Technology is growing and if you think because your child spends to much time on something they enjoy that you should cut them off, then I feel sorry for you when your child is 25 and still living at home because instead of that cushy job in Cali working for $100k a year they're stuck working at McDicks asking "Do you want fries with that?" Who do I blame on that one...bingo...you guessed it...Mom and Pop.

The chances of your child becomming a cracker, much less a hacker, are astronomical. The hacker of old, the true hacker, the keyboard cowboy, the silcon samurai is gone mostly. There are a few of the good ole boys and girls left kicking. Mostly the net, vast and infinite as it is, is filled with the Hapless Technoweenie, the Warez Kiddie, the Toolz Puppy and the Prog Pirate who just found a neat script that a real hacker took hours to program and suddenly thinks he's the next best thing to sliced bread.

Have fun Mr. and Mrs. Joe Average, and remember these simple words. The problem with the hacker isn't with your son or daughter...it's with you. It starts with you and will only end when they are rid of the likes of you. So before you go off accusing society, the internet, and everyone else, take a look in the mirrior and see if the problem really isn't with you.

Name: Anonymous 2006-11-12 0:09

/r original URL, I has forgettened it.

Name: Anonymous 2006-11-12 5:38

old troll is ooooooooooold. Not to mention inadaquate.

Name: Anonymous 2006-11-12 9:14

holy shit, this has to be fake

Name: Anonymous 2006-11-12 9:41

adequacy.org FTW

Name: Anonymous 2006-11-12 12:03

>>8

Of course it is you retard

Name: Anonymous 2006-11-12 12:31

Name: Anonymous 2006-11-12 13:32 (sage)

>>11
It isn't remotely as funny without the comments.

Name: Anonymous 2006-11-12 14:42

>>12

That's why he should've linked to the original

http://adequacy.org/public/stories/2001.12.2.42056.2147.html

Name: Anonymous 2006-11-12 15:07

Please tell me you're not this dumb sir. Your son uses comet cursor to hack people, he plays quake so he can learn to shoot people? Please, just tell me you're not that dumb.

Name: Anonymous 2006-11-12 15:46

>>13
Thanks.

Name: Anonymous 2006-11-12 17:48 (sage)

Almost six thousand comments. Those people knew what they were doing! That's some masterful trolling right there.

Name: Anonymous 2006-11-12 19:32

Adequacy was some genius trolling. I also have fond memories of egg troll.

Name: Anonymous 2006-11-12 20:36

delicious copypasta

Name: Anonymous 2006-11-12 21:32

LOL! SAUCE!

Name: Anonymous 2006-11-12 22:26

Name: Anonymous 2006-11-13 4:21

>>2, >>5 are noble but stupid, this is so obviously a troll. I can understand it could get you up to point 8 because people out there is so retarded, but man, point 8 is just too much.

Name: Anonymous 2006-11-13 11:23

>>1
8. "LUNIX"
...and even break it completely by deleting Windows...

ROTFLMAO! Priceless!

Name: Anonymous 2006-11-13 11:27

>>21 you dipshit.

>>2 and >>5 are replies from the original souce.

Name: Anonymous 2006-11-13 12:38

>>23
The guys who wrote that are still noble and stupid

The ones who copypasted it are just VIP quality like me

Name: Anonymous 2006-11-13 13:23

This copy pasta is pre 1999, though the book list has been modified. I remember this from freakin middle school...

adequacy.org/.../2001.12.2.42056.2147.html is not the original

Name: Anonymous 2006-11-13 15:45

>>25

Stop your trolling

Name: Anonymous 2006-11-13 17:36

first off a DOS attack is an attack aimed at denying someone access to some service or area, most notibly the Ping of Death attack, gaining access to someone console is not DOS you prick.  Perl, and Linux are what allows you to A) have servers that are reliable(sorry M$ lovers) and B) make sysadmins life easier.

Name: Anonymous 2006-11-14 6:42

A DOS attack is when you run a virus in MS-DOS. It aims at denying someone access to some private area of haxx. The Ping of Death attack consists of playing Ping Pong with a rigged ball and hitting your opponent with it. It gives you access to his Xbox 360 while he's unconscious. Perl and Linux allow you to A) make Nature documentaries about pearls and penguins, and B) compile from source with amazing CFLAGS.

Name: Anonymous 2006-11-14 8:18

>>28
+1 Informative

Name: Anonymous 2006-11-14 20:44 (sage)

TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL

Name: Anonymous 2006-11-15 6:03

bump

Name: Anonymous 2006-11-15 16:23

rotflmfaoollafzzzzxxxsosrsszzzzzzzz

Name: Anonymous 2006-11-16 7:30

TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL TROLL

Name: Anonymous 2006-11-16 15:33

Spaghetti code!

Reminds me of a final project I did in HS back when they taught QBasic... and I wrote an airline seat reservation program.

12 pages printed out, got an A on it because it works.... even though the comment on the returned printout said that the grader had no idea how it worked :D

Name: Anonymous 2006-11-17 6:57

Trolling in a legendary thread

Name: FAIRX 2006-11-17 22:35

hello im fairX the haxxor join my community of hackers if you payme enough i will give you access to a private area of haxx ;)
http://forum.curse-x.com/index.php

Name: liekzomg 2006-11-18 8:42

Well that was COMPLETE BULLSHIT.
"Programming with Perl" by Timothy O'Reilly
HEY LET'S SUSPEND PROGRAMMING BOOKS.
oh my god.
I am 15.
I can code/hack.
So what? What's your problem you fkin idiot parent?
'ZOMG HAX0RZ MUST BE FREAKS AND CHILD MOLESTORS'

Name: forgot to say 2006-11-18 8:44

Yeah i forgot to say that you obviously don't know shit about hackers.
Hackers meet in Quake? W-T-F
A hacker is:
Someone intelligent
Someone who codes (and is a good coder) in many languages
Someone who obviously is smarter than you
Someone who can find your mistakes at your websites and exploit them

Name: Hola soy LuzJustaX 2006-11-18 8:53

Unanse a mi comunidad de hackeo si me pagan lo suficiente les dare acceso a un area privada de hacks ;')
http://forum.curse-x.com/

Name: Anonymous 2006-11-19 8:54

>>37
1. Underage b&
2. Stop infecting /prog/ with your obvious mental deficiencies.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List