| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 29708 | 2003-01-30 08:47:00 | OT - is your son a computer hacker?? | DangerousDave (697) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 117296 | 2003-01-30 08:47:00 | lol for those who havn't already seen it!! As an enlightened, modern parent, I try to be as involved as possible in the lives of my six children . I encourage them to join team sports . I attend their teen parties with them to ensure no drinking or alcohol is on the premises . I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read . You could say I'm a model parent . My children have never failed to make me proud, and I can say without the slightest embellishment that I have the finest family in the USA . Two years ago, my wife Carol and I decided that our children's education would not be complete without some grounding in modern computers . To this end, we bought our children a brand new Compaq to learn with . The kids had a lot of fun using the handful of application programs we'd bought, such as Adobe's Photoshop and Microsoft's Word, and my wife and I were pleased that our gift was received so well . Our son Peter was most entranced by the device, and became quite a pro at surfing the net . When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase . I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: "Peter is a computer hacker!" As you can imagine, I was amazed . A computer hacker in my own house! I began to monitor my son's habits, to make certain that Cindy wasn't just telling stories, as she is prone to doing at times . After a few days of investigation, and some research into computer hacking, I confronted Peter with the evidence . I'm afraid to say, this was the only time I have ever been truly disappointed in one of my children . We raised them to be honest and to have integrity, and Peter betrayed the principles we tried to encourage in him, when he refused point blank to admit to his activities . His denials continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be responsible for his actions . After going through this ordeal with my own family, I was left pondering how I could best help others in similar situations . I'd gained a lot of knowledge over those few days regarding hackers . It's only right that I provide that information to other parents, in the hope that they will be able to tell if their children are being drawn into the world of hacking . Perhaps other parents will be able to steer their sons back onto the straight and narrow before extreme measures need to be employed . To this end, I have decided to publish the top ten signs that your son is a hacker . I advise any parents to read this list carefully and if their son matches the profile, they should take action . A smart parent will first try to reason with their son, before resorting to groundings, or even spanking . I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son's misbehaviour before a spanking becomes necessary . 1 . Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL . These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal . If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider . I would advise all parents to refuse this request . One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter . This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content . It is best to stick with the protection AOL provides, rather than using a home-based solution . If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites . 2 . Are you finding programs on your computer that you don't remember installing? Your son will probably try to install some hacker software . He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel . Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash" . The best option is to confront your son with the evidence, and force him to remove the offending programs . He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications . If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding . 3 . Has your child asked for new hardware? Computer hackers are often limited by conventional computer hardware . They may request "faster" video cards, and larger hard drives, or even more memory . If your son starts requesting these devices, it is possible that he has a legitimate need . You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer . If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm . AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips . They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking . AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites . Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well . 4 . Does your child read hacking manuals? If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies . Children are at their most impressionable in the teenage years . Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds . There are, unfortunately, many hacking manuals available in bookshops today . A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S . Raymond . If you find any of these hacking manuals in your child's possession, confiscate them immediately . You should also petition local booksellers to remove these titles from their shelves . You may meet with some resistance at first, but even booksellers have to bow to community pressure . 5 . How much time does your child spend using the computer each day? If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites . DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services . This can take up to eight hours . If your son is doing this, he is breaking the law, and you should stop him immediately . The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day . 6 . Does your son use Quake? Quake is an online virtual reality used by hackers . It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms . Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school . If your son is using Quake, you should make hime understand that this is not acceptable to you . You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed . You should also bring your concerns to the attention of his school . 7 . Is your son becoming argumentative and surly in his social behaviour? As a child enters the electronic world of hacking, he may become disaffected with the real world . He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour . This will manifest itself soonest in the way he treats others . Those whom he disagrees with will be met with scorn, bitterness, and even foul language . He may utter threats of violence of a real or electronic nature . Even when confronted, your son will probably find it difficult to talk about this problem to you . He will probably claim that there is no problem, and that you are imagining things . He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him . " Do not allow yourself to be deceived . You are the only chance your son has, even if he doesn't understand the situation he is in . Keep trying to get through to him, no matter how much he retreats into himself . 8 . Is your son obsessed with "Lunix"? BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War . It is based on a program called "xenix", which was written by Microsoft for the US government . These programs are used by hackers to break into other people's computer systems to steal credit card numbers . They may also be used to break into people's stereos to steal their music, using the "mp3" program . Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone . Your son may try to install "lunix" on your hard drive . If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional . If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix . In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive . Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface . 9 . Has your son radically changed his appearance? If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands . Hackers tend to dress in bright, day-glo colors . They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes . They may take to carrying "glow-sticks" and some wear pacifiers around their necks . (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them . If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences . 10 . Is your son struggling academically? If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association . Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation . This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry . In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases . Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight . For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically . I encourage all parents to read through this guide carefully . Your child's future may depend upon it . Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart . It cannot be taken too seriously . hmmmmmmm, that kid kinda reminds me of myself :D:D:D (quick i'm hacking into ppls stereo's, make me stop it!!) :P - David |
DangerousDave (697) | ||
| 117297 | 2003-01-30 09:20:00 | Many, many, many wrong things in your post Dave. I'll try and list some. Changing ISP may be because your child has found a better deal value-wise. Doesn't have to be because your current ISP is not hacker-friendly. CometCursor and Bonzi Buddy are useless programs at that, but not hacking programs. Bonzi Buddy is almost like the Windows XP Search companions, only with many more functions. I don't like it, and I believe it is spyware. CometCursor, last I knew, easily adds new cursors to your computer. Don't know about Flash. "New hardware" should be "faster internet". Though AMD may use child-labour to manufacture their processors, they are a source of much cheaper CPUs for many people. Intel processors are expensive, and AMD can be a much better solution for budget-tight people. "Programming in Perl" isn't necessarily about hacking. Perl is a computer language used to write internet-based applications. Yes, you may be able to develop applications to hack with in Perl, but the majority of people who use Perl use it for legitimite purposes. I spend a lot of time on the computer. It's quite safe to say everyone here does. Does that make us hackers? A 30 minute limitation to computers a day is about as ridiculous as my ISP giving you 200 free minutes of usage a month. Quake, unless there are two Quakes out there, is a game. You play it. It is a FPS, like Quake 2, Quake 3 Arena, and Quake 3: Team Arena. You can use any chat room, forum, or game to meet and talk about hacking. Argumentative behaviour could just be normal teenage rebelling. Not everyone goes through their teenage years wanting to separate from their parents more or thinking along the lines of "do they have to do that in public?" sometimes. Linux, as you'll find you're talking about, is used by many people here who, once again, are not hackers. Yes, hackers can use Linux to greater extent than Windows. But Linux, in all distros, is now a globally recognised OS, like Windows or Macintosh. Once again, changing appearance may be rebelling against how you want your son to look like - they don't always like that. It could, yes, be part of the hacker culture, but it could always not be. And failing academically can be for many reasons, including loss of interest in school, being bad at a subject, finding something harder than it once was, being put down in class/school, isolation, or bullying. |
agent (30) | ||
| 117298 | 2003-01-30 09:30:00 | > lol for those who havn't already seen it!! Im not sure if this was an article or whatever, but I going to write my views on the topic, as I believe some of it be way off . . . > To this end, I have decided to publish the top ten > signs that your son is a hacker . I advise any parents > to read this list carefully and if their son matches > the profile, they should take action . A smart parent > will first try to reason with their son, before > resorting to groundings, or even spanking . I pride > myself that I have never had to spank a child, and I > hope this guide will help other parents to put a halt > to their son's misbehaviour before a spanking becomes > necessary . > Okay, 1 in every 4 or 5 "hackers" is a chic AKA Female . . . Just thought Id point that out . . Thats what I last read at least . . :) > 1 . Has your son asked you to change ISPs? > > Most American families use trusted and responsible > Internet Service Providers, such as AOL . These > providers have a strict "No Hacking" policy, and take > careful measures to ensure that your internet > experience is enjoyable, educational and above all > legal . If your child is becoming a hacker, one of his > first steps will be to request a change to a more > hacker friendly provider . > > I would advise all parents to refuse this request . > One of the reasons your son is interested in > switching providers is to get away from AOL's child > safety filter . This filter is vital to any parent who > wants his son to enjoy the internet without the > endangering him through exposure to "adult" content . > It is best to stick with the protection AOL provides, > rather than using a home-based solution . If your son > is becoming a hacker, he will be able to circumvent > any home-based measures with surprising ease, using > information gleaned from various hacker sites . > Okay, hold up here a minute . . . Firstly, We dont have AOL, but Watchdog does have content filtering . . Id say that ISP gets chosen only coz of its filtering . . :) Otherwise, they'd go for a more "free viewing" one . . . so they can get to places like Geocities . . . Filtering is a pain if it is not a neccesity! Besides, if he's a real hacker, then he can get past the filtering if its DNS or Proxy without a problem! I can do that an Im not a hacker by any means, so if "Your 'Son'" is a hacker, then he can surely too! Another thing . . Im about to convincve my parents to switch ISPs coz when we get Cable internet, I want unlimited surfing, not a 5GB Limit which will be easily breached by 5 people all who like to surf the net! > 2 . Are you finding programs on your computer that you > don't remember installing? > > Your son will probably try to install some hacker > software . He may attempt to conceal the presence of > the software in some way, but you can usually find > any new programs by reading through the programs > listed under "Install/Remove Programs" in your > control panel . Popular hacker software includes > "Comet Cursor", "Bonzi Buddy" and "Flash" . > > The best option is to confront your son with the > evidence, and force him to remove the offending > programs . He will probably try to install the > software again, but you will be able to tell that > this is happening, if your machine offers to > "download" one of the hacker applications . If this > happens, it is time to give your son a stern talking > to, and possibly consider punishing him with a > grounding . Okay . . WRONG!!! Comet Cursor = Changes your cursor when you go to certain websites, also is spyware AFAIK, but NOTHING to aid a hacker . . Some people use it on sites, like Pokemon sites, to change the cursor (Only while at that site) to a pikachu or whatever for added visual effect :-) Bonzi Buddie = supposed to help out in everyday computing! He's a little purple ape/monkey that talks to you and guides you around Windows :-) Flash = Something for displaying "Flash" animations on the web . There's a Flash animation on Pf1 - The Virtual Backup ad is a Flash Animation :-) Absolutely NOTHING wrong with ANY of these proggys! I have Flash installed, and know lotsa people with the other two, however I dont need them and HDD space can be tight (BonziBuddy being about 20 Megs AFAIK, and Comet Cursor about 10 Approx . . . ) > > 3 . Has your child asked for new hardware? > > Computer hackers are often limited by conventional > computer hardware . They may request "faster" video > cards, and larger hard drives, or even more memory . > If your son starts requesting these devices, it is > possible that he has a legitimate need . You can best > ensure that you are buying legal, trustworthy > hardware by only buying replacement parts from your > computer's manufacturer . > > If your son has requested a new "processor" from a > company called "AMD", this is genuine cause for > alarm . AMD is a third-world based company who make > inferior, "knock-off" copies of American processor > chips . They use child labor extensively in their > third world sweatshops, and they deliberately disable > the security features that American processor makers, > such as Intel, use to prevent hacking . AMD chips are > never sold in stores, and you will most likely be > told that you have to order them from internet sites . > Do not buy this chip! This is one request that you > must refuse your son, if you are to have any hope of > raising him well . > Okay . . Well, Im constantly bitching (S'cuse me . . . ) and moaning about the onboard graphics on the "Family" PC! I can BARELY run Unreal Tournament! That's the main reason why I built my own PC! I wanted a better graphics card . . More RAM and a bigger HDD! Ive upgraded the family PC to 256MB RAM, Up from 64, coz 64 and Win2K just dont mix! As for AMD > They make the best chip as far as Im concerned! AMD Athlon XP, and Ive got one! They DO NOT to my knowledge use slave labor, or I would not buy them! That's a load of garbage! The CPU (AMD Chips . . ) make the PC run faster so it takes less time for Outlook Express to load up and stuff! Goto Compaq or whoever and they'll possibly supply you with one - makes no difference! > 4 . Does your child read hacking manuals? > > If you pay close attention to your son's reading > habits, as I do, you will be able to determine a > great deal about his opinions and hobbies . Children > are at their most impressionable in the teenage > years . Any father who has had a seventeen year old > daughter attempt to sneak out on a date wearing make > up and perfume is well aware of the effect that > improper influences can have on inexperienced minds . > > > There are, unfortunately, many hacking manuals > available in bookshops today . A few titles to be on > the lookout for are: "Snow Crash" and "Cryptonomicon" > by Neal Stephenson; "Neuromancer" by William Gibson; > "Programming with Perl" by Timothy O'Reilly; "Geeks" > by Jon Katz; "The Hacker Crackdown" by Bruce > Sterling; "Microserfs" by Douglas Coupland; "Hackers" > by Steven Levy; and "The Cathedral and the Bazaar" by > Eric S . Raymond . > > If you find any of these hacking manuals in your > child's possession, confiscate them immediately . You > should also petition local booksellers to remove > these titles from their shelves . You may meet with > some resistance at first, but even booksellers have > to bow to community pressure . > okay - Pearl or . pl is a programmin language for the web that a lot of websites use, nothing wrong with it, otherwise, I would probably confiscate the books myself too > Good one there :) > 5 . How much time does your child spend using the > computer each day? > > If your son spends more than thirty minutes each day > on the computer, he may be using it to DOS other > peoples sites . DOSing involves gaining access to the > "command prompt" on other people's machines, and > using it to tie up vital internet services . This can > take up to eight hours . If your son is doing this, he > is breaking the law, and you should stop him > immediately . The safest policy is to limit your > children's access to the computer to a maximum of > forty-five minutes each day . HAH!!!! LMAO matey! I spend a good 8 hours a day at IDG in front of a screen working, and then another two a night at home surfing and chatting with my mates . Plus - If your sons clever, he'll use another persons PC to perform it, somebody with Cable internet who cant be cut off the net! > > 6 . Does your son use Quake? > > Quake is an online virtual reality used by hackers . > It is a popular meeting place and training ground, > where they discuss hacking and train in the use of > various firearms . Many hackers develop anti-social > tendencies due to the use of this virtual world, and > it may cause erratic behaviour at home and at school . > > > If your son is using Quake, you should make hime > understand that this is not acceptable to you . You > should ensure all the firearms in your house are > carefully locked away, and have trigger locks > installed . You should also bring your concerns to the > attention of his school . > Quake! Ya gotta be kidding ME!!!! Quake is a legendary game man, and I dont know of ANY trading of how to make hackers in Quake . . . IRC is a more likely place . . Just leave quake alone, its a great game! As for the guns . . yeah . . I agree there . . but still . . Quake???? > 7 . Is your son becoming argumentative and surly in > his social behaviour? > > As a child enters the electronic world of hacking, he > may become disaffected with the real world . He may > lose the ability to control his actions, or judge the > rightness or wrongness of a course of behaviour . This > will manifest itself soonest in the way he treats > others . Those whom he disagrees with will be met with > scorn, bitterness, and even foul language . He may > utter threats of violence of a real or electronic > nature . > > Even when confronted, your son will probably find it > difficult to talk about this problem to you . He will > probably claim that there is no problem, and that you > are imagining things . He may tell you that it is you > who has the problem, and you should "back off" and > "stop smothering him . " Do not allow yourself to be > deceived . You are the only chance your son has, even > if he doesn't understand the situation he is in . Keep > trying to get through to him, no matter how much he > retreats into himself . This is also known as being a teenager . . Lasts until about the age of 15, sometimes up unti the age of 18 . . I know . . My "Phase" in life ended about 3 months ago according to my parents and them watching my behaviour!!! > > 8 . Is your son obsessed with "Lunix"? > > BSD, Lunix, Debian and Mandrake are all versions of > an illegal hacker operation system, invented by a > Soviet computer hacker named Linyos Torovoltos, > before the Russians lost the Cold War . It is based on > a program called "xenix", which was written by > Microsoft for the US government . These programs are > used by hackers to break into other people's computer > systems to steal credit card numbers . They may also > be used to break into people's stereos to steal their > music, using the "mp3" program . Torovoltos is a > notorious hacker, responsible for writing many hacker > programs, such as "telnet", which is used by hackers > to connect to machines on the internet without using > a telephone . > > Your son may try to install "lunix" on your hard > drive . If he is careful, you may not notice its > presence, however, lunix is a capricious beast, and > if handled incorrectly, your son may damage your > computer, and even break it completely by deleting > Windows, at which point you will have to have your > computer repaired by a professional . > > If you see the word "LILO" during your windows > startup (just after you turn the machine on), your > son has installed lunix . In order to get rid of it, > you will have to send your computer back to the > manufacturer, and have them fit a new hard drive . > Lunix is extremely dangerous software, and cannot be > removed without destroying part of your hard disk > surface Okay, Kiss my butt matey, I love Linux and we use it at IDG for certain things! Its probably the most predominant Web-Page server in the WORLD! Lilo - Nothing wrong with it . . Its supposed to be better than grub coz you can un-install it! Nothing illegal about Linux, Its free, ALL of it, and anybody can see the source code and make sure that its not designed to be used for purposes described! > > 9 . Has your son radically changed his appearance? > > If your son has undergone a sudden change in his > style of dress, you may have a hacker on your hands . > Hackers tend to dress in bright, day-glo colors . They > may wear baggy pants, bright colored shirts and spiky > hair dyed in bright colors to match their clothes . > They may take to carrying "glow-sticks" and some wear > pacifiers around their necks . (I have no idea why > they do this) There are many such hackers in schools > today, and your son may have started to associate > with them . If you notice that your son's group of > friends includes people dressed like this, it is time > to think about a severe curfew, to protect him from > dangerous influences . > Errr . . . This is also known as being a teenager, sorry :) > 10 . Is your son struggling academically? > > If your son is failing courses in school, or > performing poorly on sports teams, he may be involved > in a hacking group, such as the infamous "Otaku" > hacker association . Excessive time spent on the > computer, communicating with his fellow hackers may > cause temporary damage to the eyes and brain, from > the electromagnetic radiation . This will cause his > marks to slip dramatically, particularly in difficult > subjects such as Math, and Chemistry . In extreme > cases, over-exposure to computer radiation can cause > schizophrenia, meningitis and other psychological > diseases . Also, the reduction in exercise may cause > him to lose muscle mass, and even to start gaining > weight . For the sake of your child's mental and > physical health, you must put a stop to his hacking, > and limit his computer time drastically . > Okay - Radiation?? I spend around 10 hours a day in front of a PC! Its my job and my brain works perfectly fine, Im ahead of most others my age acedemically . . I sat School Cert . Maths 2 years ahead, did 3rd/4th year tertiary studies last year aged 15 and got 50% average! > I encourage all parents to read through this guide > carefully . Your child's future may depend upon it . > Hacking is an illegal and dangerous activity, that > may land your child in prison, and tear your family > apart . It cannot be taken too seriously . > Okay, I also encourage parents to read my replies, as a lot of this is extremist information and possibly false! Now, I dont wanna start a flame war, these are just my beliefs, and other have prolly commented in the 10 odd minutes it took me to reply, but please dont hurt me . . . ;-) lemme know what you think! Cheers Chilling_Silence |
Chilling_Silence (9) | ||
| 117299 | 2003-01-30 09:36:00 | > . . . a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds . WHAT effect can it have on inexperienced minds? Personally I've always preferred my daughter to go out on a date wearing perfume . It sure beats having her stay home wearing it and stinking the house out . Have I been wrong? |
Heather P (163) | ||
| 117300 | 2003-01-30 10:20:00 | I think the joke may have been lost to some readers..... heh heh! :-) |
BIFF (1) | ||
| 117301 | 2003-01-30 10:23:00 | I would have to agree with ever thing you said Chilling_Silence. I just hope the very funny joke artical is not read by thoses who either will take every word as law or by those who don't see that its a joke and have a go at the author for giving otu crap infomation. just hope it won't become a flame war............. but i must say it is very funny. |
robsonde (120) | ||
| 117302 | 2003-01-30 10:24:00 | Um . >Agent I really think it is a parody. Like do you get what DangerousDave is on about.. Dumb Parents etc that don't know anything about computers that they buy for their children. If you do > Agent ,your reply is very dry and quite witty if you get my drift Thanks for explaning the basics to the uninformed, It helps stop the madness.. :} |
333littledevil (2353) | ||
| 117303 | 2003-01-30 10:27:00 | But guys, you've lost the significant point . The perfume business . Help, please explain! <* paranoid parent /*> |
Heather P (163) | ||
| 117304 | 2003-01-30 11:05:00 | 1. Hackers arn't bad, crackers are! 2. ne1 who hate linux MUST work for or be affiliate with mircosoft because there is no reason to hate it. 3. Any parents like this are complete tosser control freaks. You need to give your children space. when I have children im not going to run around holding there hand telling wht the can and cant do, ill inform them on wht results could happen from there dicesions and let them choose wht the wish to do. lol @ linux stolen from us government by the reds, i wonder how much information the us govenment has stole/is steeling from other governments! |
Dylan (800) | ||
| 117305 | 2003-01-30 11:10:00 | Perfume? whts the difference (except the smell) |
Dylan (800) | ||
| 1 2 | |||||