Page 1 of 5 123 ... LastLast
Results 1 to 10 of 41

Thread: Is your child a hacker

  1. #1
    Join Date
    Mar 2007

    Default Is your child a hacker

    I had a lot of people ask me about my old sig. This is the artical i got it from

  2. #2
    Senior Member imported_spankdidly's Avatar
    Join Date
    Feb 2006


    LOL, Lunix.
    I felt like bending the bars back, and ripping out the window frames and eating them. yes, eating them! Leaping, leaping, leaping! Colonics for everyone! All right! You dumb*sses. I'm a mental patient. I'm *supposed* to act out!

  3. #3
    Junior Member imported_Delta's Avatar
    Join Date
    Nov 2007


    LoL this is funny .. i wonder how old his son is?!
    the best part is this quote : "lunix is a capricious beast" geezzz im still laughing about it!

    woow this is too funny to be true!
    "Bart, with $10,000, we'd be millionaires! We could buy all kinds of useful things like...LOVE!"
    by, Homer J Simpson:cool:

  4. #4
    Senior Member
    Join Date
    Apr 2007


    Just to add to the theme of hacking...

    Seen this one??

    Go to that page and take a closer look at everything. Even try a "search".
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [URL=""][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL=""][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]

  5. #5
    Member Primey's Avatar
    Join Date
    Sep 2007


    ok, i will sleep in fear now that i know that "linux" is a capricious beast...LOL!

    who do i get the sudden feeling that Microsoft had a hand in that article?

    this one made me laugh as well "such as Intel, use to prevent hacking."

  6. #6
    Developer balding_parrot's Avatar
    Join Date
    May 2007


    Not to mention that you cannot buy AMD processors in the shops.

    I guess someone ought to tell the shops near me that.

  7. #7
    Very good friend of the forum drgr33n's Avatar
    Join Date
    Jan 2010
    Dark side of the moon ...


    If that was my dad I'd be more interested in killing him then lunux lol. Could you imagine it hahah "He's been using that fu%$ lunux again. Before long he will be a zombie or dead" lol

  8. #8
    Junior Member
    Join Date
    Oct 2007


    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

    Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional..........

    i have this lunix thing on my harddrive.........i saw the lilo ....HEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPP PPPPPPPPPPPPPPP!!!!!!!!!!!!!!!!!!!!!!!
    I like to think but the promise of easy answers is hard to pass up
    You know your a geek when binary jokes make you giggle

  9. #9
    My life is this forum Barry's Avatar
    Join Date
    Jan 2010


    Looks like something Michael Moore would write.
    Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69

  10. #10
    Junior Member dethmetalkid's Avatar
    Join Date
    Jun 2007


    "If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites"

    I just spent 29 minutes in the clear guys!!
    “Remember, Friends Don’t Let Friends Choose Signatures.”

Page 1 of 5 123 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts