Page 3 of 3 FirstFirst 123
Results 21 to 27 of 27

Thread: Extending my wifi pick up range?

  1. #21
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by balding_parrot View Post

    Now can we get away from surfing the chocolate highway references
    Does talk like that make your sphincter pucker?

    ok, I'm done..
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  2. #22
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by streaker69 View Post
    Does talk like that make your sphincter pucker?

    ok, I'm done..

    ROFLMAO!!!! My God man...have you no orals..I mean morals??

    But yes, I'm a Pirate, through and through. I have to tinker with other peoples code so I can learn how they did it.The difference from me and regular Pirates though is..I don't claim to be the original writter of the code..altered by me or not.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #23
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    For the longest time this was my in signature at other forums..and I still don't see why it was offensive..I wasn't talking about the "current" definitions..but from the computer technical mumbo jumbo jargon.....

    The old code: Rape, Pillage, and Plunder. Now the new code is : Hack, Crack, and Exploit.
    God how I miss the old code.

    Rape meant to rape a hard drive..not raping someone literally!!..lol. Thats the word that seemed to offend the most..but if you know your computer literacy like balding_parrot said..this wouldn't offend you at all.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #24
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010
    Posts
    3,817

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    ROFLMAO!!!! My God man...have you no orals..I mean morals??

    But yes, I'm a Pirate, through and through. I have to tinker with other peoples code so I can learn how they did it.The difference from me and regular Pirates though is..I don't claim to be the original writter of the code..altered by me or not.
    I think he just has crap in mind all the time now. Not his fault, just his environment.

  5. #25
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by Barry View Post
    I think he just has crap in mind all the time now. Not his fault, just his environment.
    Shhhhhhhhhhh, the guys over here don't know that about me.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #26
    Junior Member
    Join Date
    Jul 2007
    Posts
    40

    Default

    I think your avatar rox! hehe.
    --
    "Linux is user-friendly. It's just very selective about who its friends are."

    "Linux users swear by their OS, and Windows users swear at their OS."

  7. #27
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010
    Posts
    3,817

    Default

    Quote Originally Posted by streaker69 View Post
    Shhhhhhhhhhh, the guys over here don't know that about me.



    Oh, my bad.

Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •