Page 1 of 2 12 LastLast
Results 1 to 25 of 40

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    WDC bronze medal ballroom Metanoia's Avatar
    Join Date: Jul:2001
    Location: Âåëèêî Òúðíîâî
    Posts: 3,895

    Çàùî â ÑÀÙ íå ñå êóïóâà Athlon èëè êàê äà ðàçáåðåì äàëè ñèíúò íè å õàêåð!

    Çàáåëåæåòå êàêâî ïèøå åäèí àìåðèêàíåö îòíîñíî òîâà êàê ìîæåø äà ïîçíàåø äàëè ñèíà òè å õàêåð èëè íå... Ïîñëå âúðâè ìè îáÿñíÿâàé, ÷å àìåðèêàíöèòå íå ñà òúïè... è ÷å ñè ïðàâÿò äîáðå ñìåòêàòà êàêâè êîìïþòðè äà êóïóâàò
    As an enlightened, modern parent, I try to be as involved as possible in the
    lives of my six children. I encourage them to join team sports. I attend their
    teen parties with them to ensure no drinking or alcohol is on the premises. I
    keep a fatherly eye on the CDs they listen to and the shows they watch, the
    company they keep and the books they read. You could say I'm a model parent. My
    children have never failed to make me proud, and I can say without the slightest
    embellishment that I have the finest family in the USA.
    Two years ago, my wife Carol and I decided that our children's education would
    not be complete without some grounding in modern computers. To this end, we
    bought our children a brand new Compaq to learn with. The kids had a lot of fun
    using the handful of application programs we'd bought, such as Adobe's Photoshop
    and Microsoft's Word, and my wife and I were pleased that our gift was received
    so well. Our son Peter was most entranced by the device, and became quite a pro
    at surfing the net. When Peter began to spend whole days on the machine, I
    became concerned, but Carol advised me to calm down, and that it was only a passing
    phase. I was content to bow to her experience as a mother, until our youngest
    daughter, Cindy, charged into the living room one night to blurt out: "Peter is
    a computer hacker!"





    As you can imagine, I was amazed. A computer hacker in my own house! I began to
    monitor my son's habits, to make certain that Cindy wasn't just telling
    stories, as she is prone to doing at times.

    After a few days of investigation, and some research into computer hacking, I
    confronted Peter with the evidence. I'm afraid to say, this was the only time I
    have ever been truly disappointed in one of my children. We raised them to be
    honest and to have integrity, and Peter betrayed the principles we tried to
    encourage in him, when he refused point blank to admit to his activities. His
    denials continued for hours, and in the end, I was left with no choice but to ban
    him from using the computer until he is old enough to be responsible for his
    actions.

    After going through this ordeal with my own family, I was left pondering how I
    could best help others in similar situations. I'd gained a lot of knowledge
    over those few days regarding hackers. It's only right that I provide that
    information to other parents, in the hope that they will be able to tell if their
    children are being drawn into the world of hacking. Perhaps other parents will be
    able to steer their sons back onto the straight and narrow before extreme
    measures need to be employed.

    To this end, I have decided to publish the top ten signs that your son is a
    hacker. I advise any parents to read this list carefully and if their son matches
    the profile, they should take action. A smart parent will first try to reason
    with their son, before resorting to groundings, or even spanking. I pride myself
    that I have never had to spank a child, and I hope this guide will help other
    parents to put a halt to their son's misbehaviour before a spanking becomes
    necessary.

  2. #2
    WDC bronze medal ballroom Metanoia's Avatar
    Join Date: Jul:2001
    Location: Âåëèêî Òúðíîâî
    Posts: 3,895
    1. Has your son asked you to change ISPs?

    Most American families use trusted and responsible Internet Service Providers,
    such as AOL. These providers have a strict "No Hacking" policy, and take
    careful measures to ensure that your internet experience is enjoyable, educational
    and above all legal. If your child is becoming a hacker, one of his first steps
    will be to request a change to a more hacker friendly provider.

    I would advise all parents to refuse this request. One of the reasons your son
    is interested in switching providers is to get away from AOL's child safety
    filter. This filter is vital to any parent who wants his son to enjoy the internet
    without the endangering him through exposure to "adult" content. It is best to
    stick with the protection AOL provides, rather than using a home-based
    solution. If your son is becoming a hacker, he will be able to circumvent any
    home-based measures with surprising ease, using information gleaned from various hacker
    sites.

    2. Are you finding programs on your computer that you don't remember
    installing?

    Your son will probably try to install some hacker software. He may attempt to
    conceal the presence of the software in some way, but you can usually find any
    new programs by reading through the programs listed under "Install/Remove
    Programs" in your control panel. Popular hacker software includes "Comet Cursor",
    "Bonzi Buddy" and "Flash".

    The best option is to confront your son with the evidence, and force him to
    remove the offending programs. He will probably try to install the software again,
    but you will be able to tell that this is happening, if your machine offers to
    "download" one of the hacker applications. If this happens, it is time to give
    your son a stern talking to, and possibly consider punishing him with a
    grounding.

    3. Has your child asked for new hardware?

    Computer hackers are often limited by conventional computer hardware. They may
    request "faster" video cards, and larger hard drives, or even more memory. If
    your son starts requesting these devices, it is possible that he has a
    legitimate need. You can best ensure that you are buying legal, trustworthy hardware by
    only buying replacement parts from your computer's manufacturer.

    If your son has requested a new "processor" from a company called "AMD", this
    is genuine cause for alarm. AMD is a third-world based company who make
    inferior, "knock-off" copies of American processor chips. They use child labor
    extensively in their third world sweatshops, and they deliberately disable the security
    features that American processor makers, such as Intel, use to prevent hacking.
    AMD chips are never sold in stores, and you will most likely be told that you
    have to order them from internet sites. Do not buy this chip! This is one
    request that you must refuse your son, if you are to have any hope of raising him
    well.

    4. Does your child read hacking manuals?

    If you pay close attention to your son's reading habits, as I do, you will be
    able to determine a great deal about his opinions and hobbies. Children are at
    their most impressionable in the teenage years. Any father who has had a
    seventeen year old daughter attempt to sneak out on a date wearing make up and perfume
    is well aware of the effect that improper influences can have on inexperienced
    minds.

    There are, unfortunately, many hacking manuals available in bookshops today. A
    few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by
    Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by
    Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling;
    "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral
    and the Bazaar" by Eric S. Raymond.

    If you find any of these hacking manuals in your child's possession, confiscate
    them immediately. You should also petition local booksellers to remove these
    titles from their shelves. You may meet with some resistance at first, but even
    booksellers have to bow to community pressure.

    5. How much time does your child spend using the computer each day?

    If your son spends more than thirty minutes each day on the computer, he may be
    using it to DOS other peoples sites. DOSing involves gaining access to the
    "command prompt" on other people's machines, and using it to tie up vital internet
    services. This can take up to eight hours. If your son is doing this, he is
    breaking the law, and you should stop him immediately. The safest policy is to
    limit your children's access to the computer to a maximum of forty-five minutes
    each day.

    6. Does your son use Quake?

    Quake is an online virtual reality used by hackers. It is a popular meeting
    place and training ground, where they discuss hacking and train in the use of
    various firearms. Many hackers develop anti-social tendencies due to the use of
    this virtual world, and it may cause erratic behaviour at home and at school.

    If your son is using Quake, you should make hime understand that this is not
    acceptable to you. You should ensure all the firearms in your house are carefully
    locked away, and have trigger locks installed. You should also bring your
    concerns to the attention of his school.

    7. Is your son becoming argumentative and surly in his social behaviour?

    As a child enters the electronic world of hacking, he may become disaffected
    with the real world. He may lose the ability to control his actions, or judge the
    rightness or wrongness of a course of behaviour. This will manifest itself
    soonest in the way he treats others. Those whom he disagrees with will be met with
    scorn, bitterness, and even foul language. He may utter threats of violence of
    a real or electronic nature.

    Even when confronted, your son will probably find it difficult to talk about
    this problem to you. He will probably claim that there is no problem, and that
    you are imagining things. He may tell you that it is you who has the problem, and
    you should "back off" and "stop smothering him." Do not allow yourself to be
    deceived. You are the only chance your son has, even if he doesn't understand the
    situation he is in. Keep trying to get through to him, no matter how much he
    retreats into himself.

    8. Is your son obsessed with "Lunix"?

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation
    system, invented by a Soviet computer hacker named Linyos Torovoltos, before
    the Russians lost the Cold War. It is based on a program called "xenix", which
    was written by Microsoft for the US government. These programs are used by
    hackers to break into other people's computer systems to steal credit card numbers.
    They may also be used to break into people's stereos to steal their music, using
    the "mp3" program. Torovoltos is a notorious hacker, responsible for writing
    many hacker programs, such as "telnet", which is used by hackers to connect to
    machines on the internet without using a telephone.

    Your son may try to install "lunix" on your hard drive. If he is careful, you
    may not notice its presence, however, lunix is a capricious beast, and if
    handled incorrectly, your son may damage your computer, and even break it completely
    by deleting Windows, at which point you will have to have your computer
    repaired by a professional.

    If you see the word "LILO" during your windows startup (just after you turn the
    machine on), your son has installed lunix. In order to get rid of it, you will
    have to send your computer back to the manufacturer, and have them fit a new
    hard drive. Lunix is extremely dangerous software, and cannot be removed without
    destroying part of your hard disk surface.

    9. Has your son radically changed his appearance?

    If your son has undergone a sudden change in his style of dress, you may have a
    hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may
    wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to
    match their clothes. They may take to carrying "glow-sticks" and some wear
    pacifiers around their necks. (I have no idea why they do this) There are many such
    hackers in schools today, and your son may have started to associate with them.
    If you notice that your son's group of friends includes people dressed like
    this, it is time to think about a severe curfew, to protect him from dangerous
    influences.

    10. Is your son struggling academically?

    If your son is failing courses in school, or performing poorly on sports teams,
    he may be involved in a hacking group, such as the infamous "Otaku" hacker
    association. Excessive time spent on the computer, communicating with his fellow
    hackers may cause temporary damage to the eyes and brain, from the
    electromagnetic radiation. This will cause his marks to slip dramatically, particularly in
    difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure
    to computer radiation can cause schizophrenia, meningitis and other
    psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass,
    and even to start gaining weight. For the sake of your child's mental and
    physical health, you must put a stop to his hacking, and limit his computer time
    drastically.

    I encourage all parents to read through this guide carefully. Your child's
    future may depend upon it. Hacking is an illegal and dangerous activity, that may
    land your child in prison, and tear your family apart. It cannot be taken too
    seriously.

  3. #3
    Registered User nplus's Avatar
    Join Date: May:2004
    Location: Ãàáðîâî
    Posts: 607
    Quote Originally Posted by Metanoia
    1. Has your son asked you to change ISPs?

    Most American families use trusted and responsible Internet Service Providers,
    such as AOL. These providers have a strict "No Hacking" policy, and take
    careful measures to ensure that your internet experience is enjoyable, educational
    and above all legal. If your child is becoming a hacker, one of his first steps
    will be to request a change to a more hacker friendly provider.


    I would advise all parents to refuse this request. One of the reasons your son
    is interested in switching providers is to get away from AOL's child safety
    filter. This filter is vital to any parent who wants his son to enjoy the internet
    without the endangering him through exposure to "adult" content. It is best to
    stick with the protection AOL provides, rather than using a home-based
    solution. If your son is becoming a hacker, he will be able to circumvent any
    home-based measures with surprising ease, using information gleaned from various hacker
    sites. /* Îëåå... Äà íå ñïîìåíàâàì ïîâå÷å çà íîâ ïðîâàéäúð, ÷å ùå ìå ïîìèñëÿò çà õàêåð */

    2. Are you finding programs on your computer that you don't remember
    installing?

    Your son will probably try to install some hacker software. He may attempt to
    conceal the presence of the software in some way, but you can usually find any
    new programs by reading through the programs listed under "Install/Remove
    Programs" in your control panel. Popular hacker software includes "Comet Cursor",
    "Bonzi Buddy" and "Flash".

    The best option is to confront your son with the evidence, and force him to
    remove the offending programs. He will probably try to install the software again,
    but you will be able to tell that this is happening, if your machine offers to
    "download" one of the hacker applications. If this happens, it is time to give
    your son a stern talking to, and possibly consider punishing him with a
    grounding.
    /*Áúðçî äà ñêðèÿ ôëàøà, ÷å ùå ìå ðàçêðèÿò*/
    3. Has your child asked for new hardware?

    Computer hackers are often limited by conventional computer hardware. They may
    request "faster" video cards, and larger hard drives, or even more memory. If
    your son starts requesting these devices, it is possible that he has a
    legitimate need. You can best ensure that you are buying legal, trustworthy hardware by
    only buying replacement parts from your computer's manufacturer.

    If your son has requested a new "processor" from a company called "AMD", this
    is genuine cause for alarm. AMD is a third-world based company who make
    inferior, "knock-off" copies of American processor chips. They use child labor
    extensively in their third world sweatshops, and they deliberately disable the security
    features that American processor makers, such as Intel, use to prevent hacking.
    AMD chips are never sold in stores, and you will most likely be told that you
    have to order them from internet sites. Do not buy this chip! This is one
    request that you must refuse your son, if you are to have any hope of raising him
    well.
    /*À êàê ñà ñå ñáúðêàëè äà ìè ïîäàðÿò íîâà êîíôèãóðàöèÿ çà Êîëåäà? */

    4. Does your child read hacking manuals?

    If you pay close attention to your son's reading habits, as I do, you will be
    able to determine a great deal about his opinions and hobbies. Children are at
    their most impressionable in the teenage years. Any father who has had a
    seventeen year old daughter attempt to sneak out on a date wearing make up and perfume
    is well aware of the effect that improper influences can have on inexperienced
    minds.

    There are, unfortunately, many hacking manuals available in bookshops today. A
    few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by
    Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by
    Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling;
    "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral
    and the Bazaar" by Eric S. Raymond.

    If you find any of these hacking manuals in your child's possession, confiscate
    them immediately. You should also petition local booksellers to remove these
    titles from their shelves. You may meet with some resistance at first, but even
    booksellers have to bow to community pressure.
    /*Áåç êîìåíòàð!*/

    5. How much time does your child spend using the computer each day?

    If your son spends more than thirty minutes each day on the computer, he may be
    using it to DOS other peoples sites. DOSing involves gaining access to the
    "command prompt" on other people's machines, and using it to tie up vital internet
    services. This can take up to eight hours. If your son is doing this, he is
    breaking the law, and you should stop him immediately. The safest policy is to
    limit your children's access to the computer to a maximum of forty-five minutes
    each day.
    /*5 ÷àñà äíåâíî...Äîáðå, ÷å íå ñúì â Àìåðèêà.*/

    6. Does your son use Quake?

    Quake is an online virtual reality used by hackers. It is a popular meeting
    place and training ground, where they discuss hacking and train in the use of
    various firearms. Many hackers develop anti-social tendencies due to the use of
    this virtual world, and it may cause erratic behaviour at home and at school.

    If your son is using Quake, you should make hime understand that this is not
    acceptable to you. You should ensure all the firearms in your house are carefully
    locked away, and have trigger locks installed. You should also bring your
    concerns to the attention of his school.
    /*Quake íå ñúì èãðàë îòäàâíà.Çàãóáèõ òàéíèÿ êîä çà âðúçêà... */

    7. Is your son becoming argumentative and surly in his social behaviour?

    As a child enters the electronic world of hacking, he may become disaffected
    with the real world. He may lose the ability to control his actions, or judge the
    rightness or wrongness of a course of behaviour. This will manifest itself
    soonest in the way he treats others. Those whom he disagrees with will be met with
    scorn, bitterness, and even foul language. He may utter threats of violence of
    a real or electronic nature.

    Even when confronted, your son will probably find it difficult to talk about
    this problem to you. He will probably claim that there is no problem, and that
    you are imagining things. He may tell you that it is you who has the problem, and
    you should "back off" and "stop smothering him." Do not allow yourself to be
    deceived. You are the only chance your son has, even if he doesn't understand the
    situation he is in. Keep trying to get through to him, no matter how much he
    retreats into himself.
    /*ÁÅÇ ÊÎÌÅÍÒÀÐ*/

    8. Is your son obsessed with "Lunix"?

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation
    system, invented by a Soviet computer hacker named Linyos Torovoltos, before
    the Russians lost the Cold War. It is based on a program called "xenix", which
    was written by Microsoft for the US government. These programs are used by
    hackers to break into other people's computer systems to steal credit card numbers.
    They may also be used to break into people's stereos to steal their music, using
    the "mp3" program. Torovoltos is a notorious hacker, responsible for writing
    many hacker programs, such as "telnet", which is used by hackers to connect to
    machines on the internet without using a telephone.

    Your son may try to install "lunix" on your hard drive. If he is careful, you
    may not notice its presence, however, lunix is a capricious beast, and if
    handled incorrectly, your son may damage your computer, and even break it completely
    by deleting Windows, at which point you will have to have your computer
    repaired by a professional.

    If you see the word "LILO" during your windows startup (just after you turn the
    machine on), your son has installed lunix. In order to get rid of it, you will
    have to send your computer back to the manufacturer, and have them fit a new
    hard drive. Lunix is extremely dangerous software, and cannot be removed without
    destroying part of your hard disk surface.
    /*Äîáðå, ÷å ñúì ñ GRUB */

    9. Has your son radically changed his appearance?

    If your son has undergone a sudden change in his style of dress, you may have a
    hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may
    wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to
    match their clothes. They may take to carrying "glow-sticks" and some wear
    pacifiers around their necks. (I have no idea why they do this) There are many such
    hackers in schools today, and your son may have started to associate with them.
    If you notice that your son's group of friends includes people dressed like
    this, it is time to think about a severe curfew, to protect him from dangerous
    influences.
    /*...*/

    10. Is your son struggling academically?

    If your son is failing courses in school, or performing poorly on sports teams,
    he may be involved in a hacking group, such as the infamous "Otaku" hacker
    association. Excessive time spent on the computer, communicating with his fellow
    hackers may cause temporary damage to the eyes and brain, from the
    electromagnetic radiation. This will cause his marks to slip dramatically, particularly in
    difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure
    to computer radiation can cause schizophrenia, meningitis and other
    psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass,
    and even to start gaining weight. For the sake of your child's mental and
    physical health, you must put a stop to his hacking, and limit his computer time
    drastically.
    /*Àç ñúì ñëàá ïî ïðèíöèï*/

    I encourage all parents to read through this guide carefully. Your child's
    future may depend upon it. Hacking is an illegal and dangerous activity, that may
    land your child in prison, and tear your family apart. It cannot be taken too
    seriously.
    /*Ìäààà...Òîçè å îò íàé-íîðìàëíèòå èäèîòè */
    Íÿìàì äóìè.Ùå ïàäíà îò ñìÿõ!

  4. #4
    Registered User Nicko's Avatar
    Join Date: Jul:2001
    Location: Sofia
    Posts: 644
    Íåàì äóìè ............
    Òàêà íå ïîìíÿ îò êîãà íå ñúì ñå ñìÿë :lol: :rot: :lol: :rot: :lol:
    Linyos Torovoltos, à :lol: :lol: ..... Soviet computer hacker :lol::lol:
    À-à-à-à-à, ñåãà ðàçáðàõ çàùî ìè ñå ïîÿâèõà ëîøè ñåêòîðè íà ñòàðèÿ HDD - ñèãóðíî îùå ùåøå äà ðàáîòè àêî íå ìó áÿõ èíñòàëèðàë òàÿ íåëåãàëíà õàêåðñêà ÎÑ Linux ...
    AMD ??? Ïî äÿâîëèòå !!! Çíàåõ ñè, ÷å íå òðÿáâà äà ñè êóïóâàì òîÿ Athlon. Äàíî íå ìå àðåñòóâàò çà òàçè ãðóáà õàêåðñêà ïðîÿâà !!! Ëåëå ïúê àêî ðàçáåðàò, ÷å è Quake èãðàÿ .... :lol: :lol: :lol: .........

  5. #5
    Senile Member QWERTY's Avatar
    Join Date: Jul:2001
    Location: Ñîôèÿ
    Posts: 3,039
    Áàñè... Òîëêî ìó å ïðîìèò ìîçúêà íà òîÿ, ÷å àêî ìó ãî ïðîìèÿò îùå ìàëêî è ñèãóðíî øå óìðå. Èìàì ÷óâñòâîòî ÷å â òàÿ ñòðàíà àêî ïðîïàãàíäàòà ñïðå õîðàòà ùå óìðàò, ùîòî íÿìà äà çíàÿò êâî äà ÿäàò.

    Òåçè ïèñàíèÿ ñà òîëêî êðåòåíñêè ÷å äàæå íå ìè å ñìåøíî...
    Íåùî íå ìè ñå êîìåíòèðà, íî âñå ïàê:

    - ×îâåêà å ïúëåí ëàèê ïî òåìàòà "ùî å òâà õàêåð", îáà÷å å ñòðàøíî ñèãóðåí ÷å å ïðàâ, ÷å äàæå è ñúâåòâà äðóãèòå "çàãðèæåíè" ðîäèòåëè. Ñïîðåä ìåí ïðîñòî å ñòîÿë ïðåêàëåíî äúëãî ïðåä ïëàêàòà "Äàéòå íà àìåðèêà çäðàâè è îáðàçîâàíè äåöà"...

    - Êàê ñå ñòàâà õàêåð çà 2 ãîäèíè è êàê ñå ðàçîáëè÷àâà õàêåð ñ 2 äåíà ÷åòåíå ìîæå äà çíàå ñàìî ÷îâåê íàïèñàë ïîäîáíè íåùà...

    Ïðåäëàãàì âè äà ñúáåðåì ïàðè è äà ïîêàíèìå ãîñïîäèí Õú íà ñëåäâàùîòî ñúáèðàíå íà HWBG. À àç øå âçåìà äà ñè áîÿäèñàì êîñàòà è äà äîíåñà íÿêîé ëàïòîï ñ ëèíóêñ... äðåõèòå è íàâèöèòå ìè ñúâïàäàò ñ îïèñàíèåòî (÷å äàæå ñà ãè çìèíàëè 10 ïúòè... )

  6. #6
    Êàëôà âèíî÷åðïåö
    Join Date: Jun:2002
    Location: 85435
    Posts: 4,620
    [QUOTE=QWERTY]Áàñè... Òîëêî ìó å ïðîìèò ìîçúêà íà òîÿ, ÷å àêî ìó ãî ïðîìèÿò îùå ìàëêî è ñèãóðíî øå óìðå. Èìàì ÷óâñòâîòî ÷å â òàÿ ñòðàíà àêî ïðîïàãàíäàòà ñïðå õîðàòà ùå óìðàò, ùîòî íÿìà äà çíàÿò êâî äà ÿäàò.

    QUOTE]
    Äîéäîõìå ñè íà äóìàòà - ëè÷íè âïå÷àòëåíèÿ.
    X570 Aorus Elite || R5 3600x || NH-D14 || 32GB RAM || GTX1070Ti Ultra Silent || PCE-AC56 || 850 EVO+MP510+HDDs || SSR-650RT all in Dark Base 900 || EV2736W || G29 || Obutto Ozone+Sparco R333

  7. #7
    Ãàäíÿð ionstorm's Avatar
    Join Date: Mar:2004
    Location: Ñîôèÿ
    Posts: 1,257
    Ëå-ëå-å, êàòî ãî ÷åòà òîÿ ËÓÌÏÅÍ, íàïðàâî äà ñè ñòÿãàì âúðçîï÷åòî çà êúì ïàíäåëàòà. À ïúê ìàéêà ìè êàêúâ uber haxOr å, ÷àê ñå ïëàøà. Áàõòè èçïèòèÿ ìîçúê, ïèëåøêè!! Òîÿ ñèí íå îáè÷à ëè áàùà ñè, áå!?! Äà âçåìå äà ãî ãðúìíå, äà íå áåðå äóøà ÷îâå÷åöúò!! Àìà, ïîñëå ïúê ùå ïèøàò, ÷å ãî çàñòðåëÿë ùîòî ïðåäè òîâà ÏÎËÇÂÀË QUAKE.
    Last edited by ionstorm; 28th December 2005 at 09:08.
    À-À-ÌÀ-ÕÀ!

  8. #8
    FFC HWBG Overclockers #3 Thoth's Avatar
    Join Date: Dec:2003
    Location: Ñîôèÿ & Âàðíà
    Posts: 624
    21-05-2002 ã., 03:39
    Õàõà å òâà å ñúáóæäàíå íà òåìà .
    Èíà÷å íàäÿâàì ñå ÷å òâà å øåãà, ùîò' èíà÷å çíà÷è å ìíîãî çëå ïîëîæåíèåòî òàì.

    Åäèò: À àêî áÿõ íà îíÿ õàêåð êîìóíèñò îò ðóñèÿ äåòî å íàïèñàë íåçàêîííàòà ÎÑ Ëèíóêñ...áèõ ãî ñúäèë, àìà ñúâñåì ñåðèîçíî! , ñòèãà äà íå øåãà ðàçáèðà ñå, òîãàâà áè áèëî ïðîñòèìî

  9. #9
    Ñòàðîòî (êó÷å) Gentu's Avatar
    Join Date: Dec:2003
    Location: SOFIA
    Posts: 3,485
    Quote Originally Posted by Thoth
    21-05-2002 ã., 03:39
    Õàõà å òâà å ñúáóæäàíå íà òåìà .
    Èíà÷å íàäÿâàì ñå ÷å òâà å øåãà, ùîò' èíà÷å çíà÷è å ìíîãî çëå ïîëîæåíèåòî òàì.

    Åäèò: À àêî áÿõ íà îíÿ õàêåð êîìóíèñò îò ðóñèÿ äåòî å íàïèñàë íåçàêîííàòà ÎÑ Ëèíóêñ...áèõ ãî ñúäèë, àìà ñúâñåì ñåðèîçíî! , ñòèãà äà íå øåãà ðàçáèðà ñå, òîãàâà áè áèëî ïðîñòèìî
    Äààà , ìíîãî ÿêî ñúáóæäàíå - íà òåìà îò Dec 02, 2001.
    Íî çà äà ñå ðàçáåðå òðÿáâà äà ñå ïðî÷åòàò è êîìåíòàðèòå ïî òîç òóïèê , à òå íå ñà ìàëêî - 5913!Òàì ñå ðàçáèðà êîé êàêâî ìèñëè è êîé êîëêî å òúï è êàê ñå ïðèåìà òîâà "ïèñàíèå"!
    Is Your Son a Computer Hacker?
    "Ãëóïàâèòå õîðà îáñúæäàò äðóãè õîðà, óìíèòå õîðà îáñúæäàò èäåè."

  10. #10
    Forum Leader ToHu's Avatar
    Join Date: Jul:2001
    Location: Sofia
    Posts: 3,602
    Íèùî íå ìîæå äà ìå ó÷óäè, íàëè âè îáÿñíèõ çà Ì64 âèé òóêà ìó ñå ñìåéòå íà ÷îâåêà, òîâà ìó êàçàëè òîâà çíàå, àìà òîâà çà AMD è Linux å íàïðàâî âúðõúò .......

  11. #11
    WDC bronze medal ballroom Metanoia's Avatar
    Join Date: Jul:2001
    Location: Âåëèêî Òúðíîâî
    Posts: 3,895
    Äîñòà ñúì ñå ÷óäèë äàëè òîâà å ïèñàíî íàñåðèîçíî èëè íå, íî â êðàéíà ñìåòêà ñòèãíàõ äî èçâîäà, ÷å òîçè ìàé íàèñòèíà ñè âÿðâà! Ïúê è äà íå ñè âÿðâà äðóãèòå àìåðèêàíöè íÿìà äà ðàçáåðàò ìàéòàïà...
    Àìà âèæòå, íÿêîè îò ñúâåòèòå èìàò ëîãèêà - íàïðèìåð òîâà çà ñìÿíàòà íà äîñòàâ÷èêà ìîæå è äà å âÿðíî...
    Èñêàõ ñàìî äà ïîêàæà, ÷å íå âñè÷êè êóïóâàò Èíòåë, çàùîòî çíàÿò, ÷å å "ïî-äîáúð", à çàùîòî íÿêîé èì ãî å íàáèë â ãëàâàòà! À ÀÌÄ èìàò íàèñòèíà óæàñåí ìàðêåòèíã - åäíà òÿõíà ðåêëàìà íå ñúì âèäÿë ïî ñàòåëèòíèòå òåëåâèçèè!

  12. #12
    ïîëçâà redhat Manchev's Avatar
    Join Date: May:2002
    Location: Ñîôèÿ
    Posts: 3,830
    Àáå ïè÷îâå, òîâà å îò ãîòèíèòå 1-àïðèëñêè áàçèöè, êîèòî ìîãàò äà ñå èçìèñëÿò
    çà ñïðàâêè âèæòå PC Ðåâþ , áðîé íÿêúäå îêîëî 1 àïðèë áåøå, èìà ìàëêî îò íåãî.
    Tîâà ñ ðåêëàìàòà íà AOL è ñ ðóñêèÿ õàêåð ìå íàêåôè, èíà÷å àç ñúì ñè ïî÷èòàòåë íà Intel

  13. #13
    ...And Justice for All! Chertoianov's Avatar
    Join Date: Jul:2001
    Location: Ñò. Çàãîðà
    Posts: 2,027
    Êàòî ãè çíàì àìåðèêàíöèòå çà äà ñå ïðèåìå òîâà êàòî øåãà òðÿáâà äà ïèøå :
    "ÒÎÂÀ Å ØÅÃÀ !!!" ,à îòäîëó: "Îäîáðåíî îò ïðàâèòåëñòâîòî íà USA", à îùå ïî-äîëó - "Áîã äà ïàçè Àìåðèêà".
    Èñòèíñêî ùàñòèå å ,÷å ïèøåùèÿ íå å äîñòèãíàë äî áëåñòÿùîòî (è ëîãè÷íî) èìîçàêëþ÷åíèå , ÷å AMD å íà íÿêîé ñè Î.Á. Ëàäåí , èñíîâåí çàâîä FAB 666 â Òîðà-Áîðà, Àôãàíèñòàí.

  14. #14
    ìàãüîñíèê èíæåíåð nomatter's Avatar
    Join Date: May:2002
    Location: Ñîôèÿ
    Posts: 2,073
    ÒîÍè òè êîãà ïî÷íà è îò linux, äà îòèáðàø, íàëè çà íèùî íå ñòàâàøå, àêî íå ïðîäàâàøå ñàìî AMD ïðîöåñîðè ùÿõ äà ñè ïîìèñëÿ, ÷å è òè ñè çàðèáåí àìåðèêàíåö

  15. #15
    Intel Rulezz buzzfuzz's Avatar
    Join Date: Apr:2005
    Location: Sofia
    Posts: 721
    õàõàõ, íàïðàâî ìå ðàçáè òîâà, ñèãóðíî å íÿêàêâà øåãà.
    ASRock Z68 ext4 gen3 l 2500K@4,5Ghz/1,29V l Megashadow 2xAP-15 l ENGTX560 DCII OC l 2x2GB A-Data
    l WD5000AAKS l Asus 2014S1T l SS-760KM l CM 690 II l

  16. #16
    Intel Rulezz buzzfuzz's Avatar
    Join Date: Apr:2005
    Location: Sofia
    Posts: 721
    Òå ÷å ñà òúïè, òúïè ñà àìåðèêàíöèòå íî ÷àê ïúê òîëêîâà íå âÿðâàì. À òîçè àêî ìè áåøå áàùà îòäàâíà äà ñúì èçïåðêàë
    ASRock Z68 ext4 gen3 l 2500K@4,5Ghz/1,29V l Megashadow 2xAP-15 l ENGTX560 DCII OC l 2x2GB A-Data
    l WD5000AAKS l Asus 2014S1T l SS-760KM l CM 690 II l

  17. #17
    Fo Walk_On_Life's Avatar
    Join Date: Aug:2005
    Location: Ñîôèÿ
    Posts: 449
    "Comet Cursor", "Bonzi Buddy" and "Flash". - Íå íå íå...òîâà öÿëîòî ïèñàíèå ïðîñòî ìå ðàçáè, óìðÿõ îò ñìÿõ Âñúùíîñò îïèñàíèåòî å íà ïîäðàñòâàù ãåéìúð ñ ïñèõÿñàëè ðîäèòåëè...È äà íå äàâàòå íà äåöàòà ñè ïîâå÷å îò 45 ìèí. íà äåí ïðåä ïö-òî, ÷å ùå âçåìàò äà âè õàêíàò ñ íÿêîé ëèíóêñ è ïîñëå ùå ïóñêàòå òåìè "êàêúâ õàðä äà ñè âçåìà?"
    "Íàé -õóáàâîòî ñå âèæäà ñàìî ñúñ ñúðöåòî, ñúùåñòâåíîòî å íåâèäèìî çà î÷èòå"

  18. #18
    öååñ-àð
    Join Date: Apr:2004
    Location: Sf
    Posts: 1,332
    ìàéòàï å åñòåñòâåíî,ïðè òîâà äîáðå ñú÷èíåí!
    íî è òîâà å íà÷èí äà ñè íà÷åøåø ïîðàçìàçàíîòî åãî,àêî èìàø íóæäà...

  19. #19
    Registered User dushko's Avatar
    Join Date: Jan:2005
    Location: SomeWhere
    Posts: 166
    Quote Originally Posted by Metanoia
    If your son has requested a new "processor" from a company called "AMD", this
    is genuine cause for alarm. AMD is a third-world based company who make
    inferior, "knock-off" copies of American processor chips. They use child labor
    extensively in their third world sweatshops, and they deliberately disable the security
    features that American processor makers, such as Intel, use to prevent hacking.
    AMD chips are never sold in stores, and you will most likely be told that you
    have to order them from internet sites. Do not buy this chip!
    Ñðàì ìå å îò òåçè åêñïëîàòàòîðè íà äåòñêè òðóä - ÀÌÄ. Ùå ñè ïðîäàâàì ÿâíî ñèñòåìàòà è ùå ìèíàâàì íà Intel. È íÿìà äà èçïîëçâàì LUNIX ÎÑ (íå ÷å ÿ èçïîëçâàì äå

  20. #20
    Get a Mac moridinbg's Avatar
    Join Date: Dec:2004
    Location: 0x00000000
    Posts: 4,211
    Ñàìî íå ðàçáðàõ çàùî íàìåñèõòå Ëèíóêñ. ×îâåêà âè ãîâîðè çà "Lunix". Àìà íèùî íå ðàçáèðàòå îò õàêâàíå âèå... :Ð

    À íå çíàåõ, ÷å AMERICAN Micro Devices ñà êîìïàíèÿ îò 3èÿ ñâÿò. Ïðåäïîëàãàõ, ÷å òîâà â çàãëàâèåòî å ñàìî çà çàáëóäà!

  21. #21
    Come get some! DukeFan's Avatar
    Join Date: Jan:2003
    Location: Áúëãàðèÿ
    Posts: 1,763
    Òî÷íî AMERICAN Micro Devices ìîæå äà ñà è îò ÷åòâúðòèÿ
    Îòàâà ¨
    Have you seen the writing on the wall...

  22. #22
    |<o>| rosskata's Avatar
    Join Date: Feb:2005
    Location: the-emptyness-that-blinds
    Posts: 263
    Âñúùíîñò AMD = Advanced Micro Devices .
    Last edited by rosskata; 29th December 2005 at 09:39. Reason: òî÷êà
    îñíîâåí ïðèíöèï íà òåðìîäèíàìèêàòà :íåùàòà, îñòàâåíè ñàìè íà ñåáå ñè, ïðîÿâÿâàò òåíäåíöèÿ äà ñå ïðîìåíÿò îò ëîøî êúì ïî-çëå Áëîãúò íà Ðîñêàòà

  23. #23
    Banned
    Join Date: Jun:2001
    Location: n/a
    Posts: 12,761
    Quote Originally Posted by rosskata
    Âñúùíîñò AMD = Advanced Micro Devices
    Ñåðèîçíî?
    Òîâà ñèãóðíî ñà òè ãî êàçàëè íà óøå íà êîëåäíîòî ïàðòè íà êîìïàíèÿòà...

  24. #24
    |<o>| rosskata's Avatar
    Join Date: Feb:2005
    Location: the-emptyness-that-blinds
    Posts: 263
    Quote Originally Posted by Valeri
    Ñåðèîçíî?
    Òîâà ñèãóðíî ñà òè ãî êàçàëè íà óøå íà êîëåäíîòî ïàðòè íà êîìïàíèÿòà...
    ú?
    Çà AMD ñúì ñèãóðåí, âèæ IBM îùå íå ìîãà äà ãî ðàçãàäàÿ
    Italian Branch of the Mafia?
    Itsy Bitsy Machines?
    îáúðêâàùî å, ïúê è îùå íå ñà ìå êàíèëè íà òÿõíîòî ïàðòè
    îñíîâåí ïðèíöèï íà òåðìîäèíàìèêàòà :íåùàòà, îñòàâåíè ñàìè íà ñåáå ñè, ïðîÿâÿâàò òåíäåíöèÿ äà ñå ïðîìåíÿò îò ëîøî êúì ïî-çëå Áëîãúò íà Ðîñêàòà

  25. #25
    P.I.M.P. alphonse's Avatar
    Join Date: May:2005
    Location: Sofia Prison Cell#38
    Posts: 1,319
    Quote Originally Posted by gaburko
    pichovee....tva e edna ot nai-dobrite humoristichni eseta koito sum chel, ama naistina. i picha hich, ama hich ne e tup. vijte ironiata v tona i v "pismoto".
    aide
    RE5PECT [bg][/bg]
    Ryzen 5 5600X + TT Silent 12, GB B550M Aorus Pro, Asus Strix GTX1070ti, 16GB 3600Mhz, Dell U2713 1440p
    Ryzen 3 1300X@4Ghz + ÒÒ Frio 14, AsRock B350 Pro4, Palit GTX1060 DualFan, 16GB 2400Ìhz, CM Elite 335U w. 500W PSU, 1080p.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 1999-2011 Õàðäóåð ÁÃ. Âúçìîæíî å ñúäúðæàíèåòî íà òàçè ñòðàíèöà äà å îáåêò íà àâòîðñêè ïðàâà.
iskamPC.com | mobility.BG | Bloody's Techblog | Êðèïòîâàëóòè è ìàéíèíã | 3D Vision Blog | Ìàãàçèí çà åëåêòðîííè öèãàðè