Page 2 of 3 FirstFirst 123 LastLast
Results 31 to 60 of 68
  1. Collapse Details
     
    #31
    steveyos
    king steveyos
    Quote Originally Posted by clay View Post
    i thought stevey had a $1500 netbook thats overpriced because the screen turns around
    no I basically have the same desktop as ruby except a bit better but we can both run every game maxed at least I think he can too idk he doesn't have windows 8 but he still should be able to 7 isn't that bad

    Quote Originally Posted by m0nde View Post
    waiting for stevey's "super overclocked" thing to overheat becasue of the 6 sli graphics cards he has in it
    ummmmm idk I guess you never built a computer before, but the "super overclocked" thing is the graphics card, there's only one you see, it's a geforce titan by a company called nvidia

    my motherobard, you can google what a motherboard is, can hold three of them but I only need one because it runs everything out with every single setting maxed including things like AA and AF and FJS
    Reply With Quote
     

  2. Collapse Details
     
    #32
    internet hero rubycalaber's Avatar
    Join Date
    Dec 2011
    Location
    the mysterious land... of scotland
    Posts
    6,331
    well I put fanfare as the redheaded girl closer to me in the iron man pic I made for my gta rap thread because I still have feelings for her ok

    Reply With Quote
     

  3. Collapse Details
     
    #33
    Moonman
    king steveyos
    my 2gig stick is so small and pathetic, i brought a girl over but when i whipped out my little 2 gig, she laughed and left
    Reply With Quote
     

  4. Collapse Details
     
    #34
    internet hero rubycalaber's Avatar
    Join Date
    Dec 2011
    Location
    the mysterious land... of scotland
    Posts
    6,331
    what does AA mean there is an AA on my motherboard, like on a digital display

    Reply With Quote
     

  5. Collapse Details
     
    #35
    steveyos
    king steveyos
    I can run second life maxed including its intense lighting and shadows, and second life doesn't sacrifice graphics for performance the lighting and shadows are used on every single pixel every single strand of hair etc and now the new normal mapping and all that too it's fucking amazing looking, I can't max my view distance though but you need a government supercomputer to do that
    Reply With Quote
     

  6. Collapse Details
     
    #36
    le Gentleman Doli's Avatar
    Join Date
    Mar 2012
    Posts
    9,939
    Secknond life Second Life SECOND Life
    Reply With Quote
     

  7. Collapse Details
     
    #37
    steveyos
    king steveyos
    Quote Originally Posted by rubycalaber View Post
    well I put fanfare as the redheaded girl closer to me in the iron man pic I made for my gta rap thread because I still have feelings for her ok
    you should join the fjs art crew and get back in touch

    Quote Originally Posted by rubycalaber View Post
    what does AA mean there is an AA on my motherboard, like on a digital display
    anti-aliasaing, you should to just be letting geforce experience set your graphics settings though but I bet you didn't listen to me for that either and set them all manually yourself
    Reply With Quote
     

  8. Collapse Details
     
    #38
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    you gotta put double a batteries in your computer holes to make it run faster ruby that's what the AA thing means
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  9. Collapse Details
     
    #39
    steveyos
    king steveyos
    because you're a fucking ASSHOLE ruby
    Reply With Quote
     

  10. Collapse Details
     
    #40
    steveyos
    king steveyos
    Quote Originally Posted by Autistic Spectrum View Post
    you gotta put double a batteries in your computer holes to make it run faster ruby that's what the AA thing means
    lol'd
    Reply With Quote
     

  11. Collapse Details
     
    #41
    DogManz maks's Avatar
    Join Date
    Dec 2011
    Location
    Lud, Midworld
    Posts
    99,256
    Quote Originally Posted by rubycalaber View Post
    what does AA mean there is an AA on my motherboard, like on a digital display
    it's a status thing that tells you what state the board is in and whether it has any problems. without the manual in front of me I'd guess AA means 'booted up and functioning properly"

    if you watch it while the machine is firing up it'll probably change a few times
    Reply With Quote
     

  12. Collapse Details
     
    #42
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    want's batteries, in it's hole pretty obv, when it says 69 on there stick your dick into it's pci slot
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  13. Collapse Details
     
    #43
    my weapons turn me into a m0nde's Avatar
    Join Date
    Dec 2011
    Location
    every once in a while
    Posts
    29,860
    Quote Originally Posted by rubycalaber View Post
    what does AA mean there is an AA on my motherboard, like on a digital display
    he's taqlking ablout antialiasing or an aa battery i'm not sure

    Reply With Quote
     

  14. Collapse Details
     
    #44
    my weapons turn me into a m0nde's Avatar
    Join Date
    Dec 2011
    Location
    every once in a while
    Posts
    29,860
    ACPI APIC

    Reply With Quote
     

  15. Collapse Details
     
    #45
    poor mans motlated nboar Boar's Avatar
    Join Date
    Aug 2013
    Location
    :what:
    Posts
    1,020
    lets get back to the discussion at hand which is deleting this forum well heres my opinion we should do it
    Reply With Quote
     

  16. Collapse Details
     
    #46
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    regretting that i did not do it, won't make the same mistake next 0 day expolit
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  17. Collapse Details
     
    #47
    steveyos
    king steveyos
    did my post about anti-alisaisng not post
    Reply With Quote
     

  18. Collapse Details
     
    #48
    steveyos
    king steveyos
    how can you guys not know AA and AF am I the only gamer here
    Reply With Quote
     

  19. Collapse Details
     
    #49
    friends with english jon's Avatar
    Join Date
    Dec 2011
    Location
    alcatraz
    Posts
    4,510
    forums don't have root
    Reply With Quote
     

  20. Collapse Details
     
    #50
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    Hacker terms


    2600 - A hacker organization who publishes 2600 magazine.

    8lgm - 8 Little Green Men hacker group that puts out security tips.

    Abuse of Privilege - When a user performs an action that they should
    not have, according to organizational policy or law.

    Access - The ability for a computer user to view, change,
    communicate with a file or record in a computer system.

    Access Control - Restriction on a computer user to use a
    computer system or a file or record on the computer system.

    ActiveX - Microsoft scripting language used for their Internet browser.

    Anonymous ftp - An anonymous file transfer protocol that will
    accept any user name and an anonymous or no password. This is a common
    way for hackers to gain access to a computer.

    ASIM (Automated Security Incident Measurement) - Automated security
    tool that monitors network traffic and collects information on
    targeted unit networks by detecting unauthorized network activity.

    ATM (Asynchronous Transfer Mode) - A high-speed form of
    networking that supports data communications, video, and
    voice communications on the same line.

    Attack - An attempt to bypass security controls on a computer.
    An active attack alters data. A passive attack releases data. Whether
    an attack will succeed depends on the vulnerability of the computer
    system and the effectiveness of existing countermeasures.

    Audit - To record independently and later examine computer
    system activity such as logins, file accesses, and security violations.

    Audit Trail - An audit trail may be on paper or on disk. In
    computer security systems, a chronological record of when users log in, how
    long they are engaged in various activities, what they were doing, whether
    any actual or attempted security violations occurred.

    AUSCERT - Australian Computer Emergency Response Team.

    Authenticate - In networking, to establish the validity of a user
    or an object (i.e., communications server).

    Authentication - The process of establishing the legitimacy of a node
    or user before allowing access to requested information. During the process,
    the user enters a name or account number (identification) and password (authentication).

    Authorization - The process of determining what types of activities
    are permitted. Usually, authorization is in the context of authentication.
    Once you have authenticated a user, the user may be authorized different
    types of access or activity.

    Back door - A hole in the security of a computer system deliberately
    left in place by designers or maintainers.

    BIP - Base Information Protection office.

    Browser - A program designed to help users view and navigate on the
    Internet (World Wide Web). Browsers are sometimes also called Web clients,
    since they get information from a server.

    Bug - An unwanted and unintended property of a program or piece of
    hardware, especially one that causes it to malfunction.

    C - The name of a programming language used often in the Unix environment.

    C++ - An object-oriented programming language. An improved
    version of the C programming language.

    Callback - A security procedure used with modems connected to
    terminals dialing into computer systems. When a computer system
    answers a phone call, it does not allow a direct login at that time.
    The computer calls back the telephone number associated with the
    authorized user's account.

    CDS: CSAP Database System - An AFCERT relational database system
    containing information ranging from detailed computer hardware and
    software specifications, vulnerabilities and countermeasures, malicious
    logic, and system connectivity descriptions.

    CERT - Computer Emergency Response Team.

    CGI - Common Gateway Interface. CGI is the method that Web
    servers use to allow interaction between servers and programs.

    Chat Group - A virtual meeting place where you can converse with
    other users from all parts of the globe. The chat groups are "live."

    CIAC - Computer Incidnet Advisory Capability. An organization of
    the Depeartment of Energy which provides computer security services.

    COAST - Computer Operations, Audit, and Security Tools.
    Organization at Purdue University which collects computer security tools.

    Communications Security - Procedures designed to ensure that telecommunications messages maintain their integrity and are not accessible
    by unauthorized individuals.

    Computer Security - Technological and managerial procedures applied
    to computer systems to ensure the availability, integrity and confidentiality
    of information managed by the computer system.

    Computer Security Incident - Any intrusion or attempted intrusion
    into a computer system. Incidents can include probes of multiple
    computer systems.

    Computer Security Intrusion - Any event of unauthorized access
    or penetration to a computer system.

    Cookie - A handle, transaction ID, or other token of agreement between
    cooperating programs.

    COPS - Computer Oracle and Password System. A computer network
    monitoring system for Unix machines.

    Core - The main storage of a computer system. A core dump captures
    data and files in memory.

    Countermeasure - Action, device, procedure, technique, or other
    measure that reduces the vulnerability of an automated information system.

    Crack - a password cracking program.

    Crack Root - To defeat the security system of a Unix machine.

    Cracker - One who breaks security on a computer system.

    Crash - A sudden, usually drastic failure of a computer system.

    Crytographic Checksum - A one-way function applied to a file to produce
    a unique "fingerprint" of the file for later reference. Checksum systems are
    a primary means of detecting file system tampering on Unix.

    CSAP (Computer Security Assistance Program) - Program to implement
    information protection operations capabilities using a combination of
    administrative controls, reporting procedures, specially developed
    automated security tools, incident response, intelligence threat data,
    and special survey and analysis capabilities.

    CSET (Computer Security Engineering Team) - The CSET focus on specific
    systems and networks. The team overtly surveys policy, procedures,
    training, awareness, connectivity and physical security of a specific
    system. CSETs document problems with policy and directives, operating
    procedures, configuration management, training and awareness, system
    connectivity, physical security, and unauthorized software.

    Cyberspace - Information space loaded with visual cues and navigable
    by computers.. The Internet is considered as a crude cyberspace.

    Daemon - A program that is not invoked explicitly, but lies dormant
    waiting for some condition to occur.

    Data Encryption Standard (DES) - An encryption standard developed by
    IBM and then tested and adopted by the National Bureau of Standards. This
    is a private key encryption algorithm adopted as the federal standard for
    the protection of sensitive but unclassified information .

    DNS (Domain Name System) - A distributed networked-based
    naming service on the Internet.

    DNS Spoofing - Assuming the DNS name of another system by
    either corrupting the name service cache of a victim system, or by
    compromising a domain name server for a valid domain.

    Dump - An undigested and large amount of information routed to
    an output device. Usually it is a backup of computer files and data.

    Email - Electronic mail automatically passed through computer
    networks and/or modems over common-carrier lines.

    Encryption - The process of scrambling files or programs, changing
    one character string to another through an algorithm (such as the
    DES algorithm).

    FAQ - Frequently Asked Question. A collection of common questions.

    Filter - A program that processes an input data stream into an
    output data stream in some well-defined way.

    Finger - A program that displays information about a particular
    user or all users logged on a computer system.

    Firewall - Computer on a network used to isolate, filter, and protect
    local systems from external connectivity by controlling the amount
    and kinds of traffic that will pass between the two.

    Fix - A patch or solution to a reported computer problem.

    Flame - An online message intended to insult or provoke other users.

    Flooding - Sending lots of text to the screen at once.

    Freeware - Free software distributed by email or bulletin boards.

    FTP - file transfer protocol. Used to get or put files from
    one computer to another.

    Gateway - A bridge between two networks.

    GIF - Graphical Image Format. An image file.

    GNU - A Unix-woralike development effort of the Free Software
    Foundation.

    Good Times - A hoax virus.

    Guru - A computer expert.

    Hack - Any software in which a significant portion of the code
    was originally another program.

    Hacker - A person who enjoys exploring the details of computers and
    how to stretch their capabilities.

    Home Page - A World Wide Web (WWW) repository for information.

    HTML - Hypertext Markup Language. Computer language and tags
    used by web browsers.

    Incident - Any intrusion or attempted intrusion into a computer
    system. Incidents can include probes of multiple computer
    systems.

    Internet - A collection of worldwide computer networks.

    Intrusion - An unauthorized access or penetration of a
    computer system.

    Intrusion Detection - Detection of break-ins or break-in attempts
    either manually or via software expert systems that operate on logs or
    other information available on the network.

    IP Spoofing - An attack whereby a system attempts to
    illicitly impersonate another system by using its IP network address.

    IRC (Internet Relay Chat) - A worldwide "party line" network
    that allows one to converse with others in real time.

    ISDN (Integrated Services Digital Networking) - A network
    that shares high-speed data communications along with voice
    communications on the same wires. It splits basic service into
    shared channels, each of which can be used for different calls.

    ISP - Internet Service Provider. An ISP is a company that
    sells Internet access.

    Java - A computer language developed by Sun for web browsers.

    Joe Password - A type of logging into a computer system where the
    password is the the same as the user name.

    JPEG - An image file.

    Letterbomb - A piece of email containing data or a program intended
    to do bad things to the recipients's machine or terminal.

    LAN (Local Area Network) - An interconnected system of computers
    and peripherals. LAN users share data stored on hard disks and can
    share printers connected to the network.

    Link - A word or picture you select on a Web page, usually
    by clicking your mouse on it, leading to a new page.

    Linux - A free Unix workalike program available on the Internet.

    Logic Bomb - A type of programmed threat. A mechanism for
    releasing a system attack of some kind. It is triggered when a
    particular condition, such as a certain date, occurs.

    Mailbomb - To send, or urge others to send, massive amounts of email
    to a single system or person with intent to crash the system. This
    is a denial of service attack.

    Malicious Logic - Hardware, softwae, or firmware that is intentionally
    included or introduced into a system for unauthorized purposes.

    MUD (Multi-User Dungeon) - A virtual reality adventure game
    played over the Internet.

    Network - A data communications system that allows a number of
    systems and devices to communicate with each other.

    Operational ASIM site - ASIM has been installed, is capturing and
    analyzing data, and is sending the data to the AFCERT.

    Packet - A group of data elements transmitted together that
    generally form part of a larger transmission made up of a number
    of packets.

    Packet Sniffer - A device or program that monitors the data
    traveling between computers on a network.

    Password - A secret sequence of characters that is used to
    authenticate a user's identity, usually during a login of a computer.

    Patch - A temporary addition to a piece of code to fix an
    existing bug or misfeature.

    Perl - Practical Extraction and Report Language. An interpreted
    computer language used mostly with Unix systems.

    phf Hack - Phonebook file demonstration program that hackers
    use to gain access to a computer system and potentially
    read and capture password files.

    PGP - Pretty Good Privacy. An encryption program.

    Phreaking - The art and science of cracking the phone network.

    Ping - Slang term for a small network message (ECHO) sent by
    a computer to check for the presence of another computer.

    Pkzip - A program to compress a file or files.

    Probe - Any effort to gather information about a machine or its users
    on-line for the apparent purpose of gaining unauthorized access to the
    system at a later date.

    Protocols - Agreed-upon methods of communications used by computers.
    It is the set of rules and formats for the exchange of information,
    particularly over a communications network.

    Proxy - A software agent that acts on behalf of a user. Typical
    proxies accept a connection from a user, make a decision as to whether or
    not the user or client IP address is permitted to use the proxy, perhaps
    does additional authentication, and then completes a connection on behalf of
    the user to a remote destination.

    RFC (Request For Comment) - One of a long-established series
    of Internet informational documents and standards.

    Root - The superuser account in a Unix system.

    Rootkit - A hacker security tool that captures passwords
    and message traffic to and from a computer.

    SATAN - Security Administrator Tool for Analyzing Networks. A tool for
    remotely probing and identifying the vulnerabilities of systems on
    Internet Protocol networks.

    SCSI - Small Computer System Interface. A bus-independent
    standard that interfaces a computer with peripheral devices.

    Sendmail - A Unix mail program with lots of known vulnerabilities
    to hack into a computer system.

    Server, Web - A computer which feeds documents and media to
    the browsers that request them.

    Shell - A computer command interpreter used to pass commands
    to an operating system.

    Snarf - To grab a large document or file for the purpose of
    using it with or without the author's permission.

    Sneaker - An individual hired to break into computer systems to
    test their security.

    Sniffer - A program to capture data across a computer network.
    Used by hackers to capture user id names and passwords.

    Spam - To crash a programm by overrunning it with large data.
    Also, to cause a person or newsgroup to be flooded with
    irrelevant or inappropriate messages.

    SPI (Secure Profile Inspector) - A network monitoring tool
    for Unix, developed by the Department of Energy.

    Spoof - A trick that causes an authorized user to perform
    an action that violates system security or that gives away
    information to an intruder.

    Superuser - The account with all privileges. Root account.
    System Administrator or System Administrator-level privileges

    Surf - To traverse the Internet in search of interesting stuff.

    TCP/IP - Transmission Control Protocol/Internet Protocol.
    This is the wide area networking protocol that makes the
    Internet work.

    Telnet - A communication protocol to Internet hosts.

    TFTP - trivial file transfer protocol.

    Token - A physical item that is used to provide identity.
    Typically an electronic device that can be inserted into a
    computer system to gain access.

    Trojan Horse - Computer program containing an apparent or actual
    useful function that contains additioal (hidden) functions that allows
    unauthorized collection, falsification, or destruction of data.

    Troll - An online message whose purpose is to attract responses
    and make the responders look stupid. People who troll want to make
    you waste your time responding to their pointless statements.

    Unix - A computer operating system. It is the most widely used
    multiuser general-purpose operating system in the world.

    URL (Uniform Resource Locator) - This is the address that
    identifies a document or resource on the World Wide Web.

    Virus - A cracker program that searches out other programs and
    infects them by imbeding a copy of itself in them. A
    virus cannot infect other computers without assistance.

    Vulnerability - Hardware, firmware, or software flow that leaves
    a computer processing system open for potential exploitation. The
    possible exploitation can be either from an external or internal
    source, thereby resulting in risk for the owner, user, or
    manager of the system.

    War Dialer - A cracking tool that calls a given list or range
    of phone numbers and records those which answer to identify
    computer systems.

    Warez - Cracked versions of commercial software with their
    copy-protection stipped off. Warez sites usually contain
    illegal, pirated software or games.

    Webmaster - The person at a site providing World Wide Web
    information who is responsible for maintaining their web site.

    Worm - A program that propagates itself over a network,
    reproducing itself as it goes.
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  21. Collapse Details
     
    #51
    friends with english jon's Avatar
    Join Date
    Dec 2011
    Location
    alcatraz
    Posts
    4,510
    sorry, can't read your reply, busy obtaining root on my xbox
    Reply With Quote
     

  22. Collapse Details
     
    #52
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    you can get root on your xbox, and when you do u should install xmbc,,, it owns
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  23. Collapse Details
     
    #53
    ส็็็็็็็็็็็็ส็็็็็็ ็็็็็ Autistic Spectrum's Avatar
    Join Date
    Dec 1969
    Location
    ส็็็็็็็็็็็็ส&#
    Posts
    50,841
    http://wiki.answers.com/Q/What_does_...ing_a_box_mean

    jon maybe u should stay away from the hacker world of 0 day expolits and wiki awnwers it's way too shadowy for u
    I am the owner of http://www.ezmangaforum.com
    Reply With Quote
     

  24. Collapse Details
     
    #54
    Senior Member
    Join Date
    Jul 2013
    Posts
    525




    z5mm4yGRtXgE5cNcSToh
    U0oEsRhabBr4cDPrr5Hb
    5kU4NEPabiKlOzBxOsKK
    MD1Qb8fvFxY7YekWqwhk
    9Dn7BSsOKNTtKUvEHQrL
    gqJIZSjjRcZAsd044NS3
    jXeXofBz5hlrT02oUtPn
    ReaiqHyCYTOc5Jh88zqK
    BuCasftSqeAJDO5nkjfo
    AZuhUt0nxKmSiJe5rqfm
    iCeiRGl4PKL8Ojf0BckV
    Oi7bP6uge72PMpBc1sBy
    ok5MmNEGXVhWMK1MSTBo
    jJ7fSfgYxEcGq1Ig3PnO
    BKAhaUWfHYMgkovPDUMe
    hKMytxzjc9z3QVs4cYdT
    SS3as6S9pWxlGfSx2Jnt
    9xz7RJbxAw0vor2R6TVc
    xvEVD45QZjcNDIHzjxWh
    43VMgG1ahhhNJ3QrJKNF
    nKIMfYi1HkjsezjSIZT4
    QKSN1QSeApkztK5unZqH
    9q0TQBqZDjfFlxl23sLM
    JRs5KlPCKdj5HQ892Xfa
    jJzjOTV9rXEICCpWDfFb
    YmzQl4RyKB4s9t9WA4KX
    NGXDEdyamUHZbyCB45X0
    jRKvKTnalVAsZxPSq45H
    wrr8kB1lTeHqZQZMN88s
    zlaKlcClxczpEqxnqETP
    AoI2uynhH7OGvnfxiMRG
    A2M5XAmQMXJZCFZvemdD
    X5RnA0jQFpoWIkbCYVO3
    cUmAzxwV7idCpimSag3s
    6RtYVQazm8ajaeR4U4M5
    WlP8ghI7OP89CWWsIUIv
    JgWXXopeers6VCFeMLHj
    9b2MdV9y4PrDqA1TgdZG
    inmXMEBQMWApZyT7wR7F
    1710Bf55hBcSCrGjmr5v
    0RsZF1qV47ebhOxI61XQ
    y5Ghwjhh9BCrjHrHHazR
    gSFoRoNhjYfwQQBxKEQ8
    PYu9wXelsHvU0lelFVz9
    LQL8znP4mSRtZ0f1YVgL
    kn67TXjDYgGAnqGsRpGa
    qop6FYjamssAbSr94wdQ
    MPIZSsY3AxltkPAk1zW2
    xpXvPs97Nixec0bUX5pf
    H0QVteV4WIcRfrTDEvnG
    Jv9sS42BK4z37irxJ0Og
    KuzedAarEZzpTtZC1Wo7
    NpSe3eLAxcy7BAeNh69I
    4ha85zEOfD5ESKRC9Rgy
    H7PntRPRPmReszjHuLdU
    CqBhntn2gKPsRantUL11
    Av66TQxqlXvLOdWgTEPg
    tyvFUL73IUS2Zvg3Lotz
    WETpXDY4vuYP5ancvgBn
    ZTVMmOIkB5WllV6ECeiq
    5bne7K7NEggkdWVOpFna
    GLeqLWdHhgXyEkXJdU2y
    VjfD0y2UG3JeYYRZczEz
    nQPHUdNHe5ebbjHBuk80
    3Pps2PSzHTxhNgg6ab8R
    U9IOSxDHxWXgODIiPonO
    IIKeuPGf7czBvfDhi2xT
    WBBdPLIWVwPJhwA8pRWS
    SMBCDC95vN3Lppm20Hob
    USNyqS3kH3H5ZJtRdPsR
    jdONWUd076ZMw07J0Dse
    tZUKt98vpNThTuDNJ2V9
    xExv9tmtBZtOKCANKm1G
    rDVvMwmDEFNM9oAc4K8D
    o5Tae5pJnReA0CGRlBU5
    T8KeDassorsMejwlANFU
    OGRe64ewDDJI85c0idz0
    tcPcegoupOMKDgHZtCzi
    VBJ2RZpkcrc7IdS4nCqd
    PtsgspJ4IoRSqJTSUzEr
    hgAfMcfqYbwPkBnFD9Jj
    eDkCPhg48X9WMo0KWknE
    KVHklvqe9D373WrmLtVy
    zEhD7obl87tSUQegtbIG
    afbHq3uszgISlUqc0g6E
    T3nznM5lyjbqIBesYF0w
    bJAopYHmlyCPRHcbYk2D
    i8DGs6BQdGNlhsd8rUYF
    rK5qtfAfTIXVOf2Pw4vG
    46YcUjk5IGs0FgDbahlC
    aV3ENkUftQRw2MwtOFTw
    oCgc1HKK1BxbwKFov9GV
    WhnPtqiLgVieGzCOki8O
    16vhBMqBniPTghiA3z3T
    ph9eq5Vj50ZV0pByKLxy
    spIftMgAZlTB66Wqh1g0
    Cnu9ThyAaCSdW3E1lu3n
    tyaXfAzvx7EnwKTK1YCj
    FkDL57CFQm0C0km2G1Zc
    pTbCc85rVFdimD7RdIi4
    1G4cyVhU0pjIi52FrlSp
    nr7kzPrz0gEbo7mj50wX
    xNxUgx036nvAO5OyJdTd
    7NoXIH5d9lY17A8XuW7R
    aKe12ccvuv9yHv69uoWW
    oz71gtNNyFqypBNIf2yW
    CqjgfqvkF3Vl8juUoTxP
    whbPKjDeuQ7vUZMHdTHj
    UVWXB1PJSL4fkvcofNg5
    NVm1rlcMpNHVGg23CWqB
    DtNMPr8qOv4NkcEymVWq
    9BlDE1AOuLqbm3uD1NEZ
    B0ow7EWYkoxlU8Zx0O6p
    xhsmtAWX70b84Q7ej14v
    lX0TE7q3VAQMWdWsmzWR
    ETiJQSCVoLDhI9xsxEVK
    fflR4RRGeJ65Y8rzozVT
    mzpnj9TtLeG7DhcGelns
    37nm3HgqFUyQkczId8iN
    ji5GilN9a1O3pBvqxMIA
    snEz908YUFfhPGOZSX7N
    5g3f2eoeltybd7Fc7TeM
    I4BCQlXHLrxJuLXrdUEq
    s5aH3nis6R6IFdZYS3eM
    UGtNF0EOKwud3ApSJMbC
    vO5Q3mbyNUTO0LrgCBjD
    Mp2Bm7WhBmRQxJvtzL79
    ZZALhXVLDan4rHsZKqSq
    doxzuklIPlEmSBfBB07C
    SsRtP33UxJnNEw7gRFoT
    y2Pe3kMEcZ1WXg0cONhj
    0Byx9emBfvodJM8c7wos
    EyP3FckEy0xdRZ4o0b8n
    ZiTXQTbq7nQpjAWno9lU
    86dqr2aQIZoXwGH1o3Zq
    LR39afNcrUSsJNpaWP7w
    2pBzijY77RcERCr8UbYS
    6v9IFPhjBBwv3HlFRsjU
    nY7k5ucVD1DXtbcyKHKP
    tBRTcyE7vIvjvuHPxZcQ
    7Somqs084iRRJclQQV8q
    dRCvNrmWvdyDsb8xzhrD
    rDC4EeNwWf1HaTgWBP53
    jbqthQlOhwvkzqR73hPi
    nghXWXP2FrHnBpP87V3J
    YDW1cfkPUI4k3j1HAW8z
    FLkjPTKV0m0Tn0SC0FT2
    IQtcaCHclY9nPiDqhjem
    5h8IvMaq0KmHp4RUms4h
    hGxxhJZUirUra9FLsqY1
    12ZhiKOkcFobLS4UMoXc
    Pp7rVp4X3AN3A5AwbnKX
    1ZoYhRXOpYR1HGXKKtAn
    2vEzmoz0w5tsW9Sv7LXs
    4OCbhyd3bwCp9klzoyHy
    wJdTwaHdM5jtLlPXDG2W
    dMmaCUEuKXZGGw6r31Z1
    zCNPSEu9R0ej7cp7LrEt
    ON9SKVnpbk8NLS4Esh2j
    V9LaA1aeVuwbnAJoDtUh
    LzxtI6qhOoxZhOtMo7Es
    buqLHe5SQYTMcQuW9nDB
    p600WskJUiyR0hHtC7yW
    BahuZfyfRI9rLjOMRIL0
    yGWEE3asLbrzB4yb68Uj
    64lI8p8af1AFM624yHmU
    xiIqfCAngzh3frVNuFZZ
    8I3nYTiAuLlpWrLZCFiQ
    TJJXiGY4g8oFCX00kOZq
    WbN8T5MZi061pkslfwE0
    nK6NZJbO0lKa48OK7s22
    gqd9wZuDJNChGOsJe4M0
    63wt9Etk2rw0cfIom4Xa
    cuFE4QfoEFuhVj2ejcD9
    oOZL1s2ThMZfjWSI29EV
    DxsJUK8ezr6ztlz0F2Q6
    t1uocorhP2E28aTouD9X
    OaVqKQ8HjwPkkJTPD1s1
    mUxfWXNDOujoynRBaQke
    Qem484JmGAq1JTiXDbEJ
    XJCyYwWQKWCo6yRNUoHz
    wzDqwcWObOPcSNNkBjCM
    YLuzbYuVf9rTFpFtW8K0
    rJuFfrL94iiPxYTwJNPo
    cFRkV2ehKk8CURN9c2Bb
    Prsu5WWrtV1zZPLIzAjV
    0Z1CIjR7wWaWWIUVw1vo
    nXm2KTdWiCzpZBf7qUWe
    byJm9vHOrqfTkoDTJmOZ
    JXHZ0pc4SgQk6DWzS7TO
    3SqFl8gdFIvfb5qc0pOY
    ZoaDwaMRpDOovCS2pVss
    BFUGgg2jMjXEblYTx2qa
    yR9lPqPtZPJL57xkBVd3
    LJad9LvxEflT9rjmIhnS
    lfgMnTELjb7jTdBswNHs
    pb0oHahvvaLm1zh1Ghxk
    CwhQqwE1XL9H8ePFJNca
    BYUVM0cXKqiaQ3RoOnuy
    6WDwmCsZZhuIYBO16cjE
    nJcpNsrMXW2Rt5hRUA1H
    wDiA5cxBgQDDqVjWOOHy
    c8YAnfqsgg9oWwSpz360
    qKJ9PGfoHQURUMLDFeZu
    9yTUow9VwCBt4j8LKBFo
    HcKtKboJrkEfVg0wCram
    pOtQZfahuiFvjNdFbxf8
    8MCsFVWEeyR4Gybjjfgw
    xMUSAtXPVy02tRCsB4aM
    7WowRqiekJoMoVbCUc7l
    6LlNDb0BmdeztFkLVqsq
    cxaQPCBhoAEQZRQQAKon
    p7Z6ETlJd7BKp88iW8gy
    RgcLfejKa277nmU2fflc
    OrQzFcyoJH1B2vgDRnHP
    heymgI7sfvgkEygXGw2m
    FIEXIrhrE4tA6CNpf2kn
    CrGcQkcrCudmz0lcq4NG
    ZE8UlwCbW5LxXjq6kMtN
    MYFXaiCePtQaKWvvTcCb
    NGLHRc40av6mOs07jYvV
    DQrroF1IBAO8uqmi9aJ5
    5zL5IDV3ZytOZTSGFHCW
    JJAyOWA5ZysvOzNcnHki
    isR3PUC84eCCKxD0ddX2
    Bm9Co68tilAPCZPID3SR
    sdD6Gu6Wp5rTHH9DjAQI
    JL0lnvCwbxjlyL2js5ws
    L6ee9UylwQ0gAm0UIySI
    NHtpmPn9XCt9of8Zh5Yk
    2ZPxIFLaZY8mgTF4yG7y
    LvnOlEqeLh7kUF7FUHyD
    H0q8jtn6CsmzCGymW9uV
    rIYubHYrz6FRZKv6ru7R
    NBhFLxIsEP9OHoYyG6N2
    us3SU2wGG9dWYpMCvCzM
    LUgPuI9GNmVT0dqmxWWb
    IoAFBbsVQ5a7IT8DtaFK
    2myRZN31Sls1R36RDQFT
    xEARJsIeZ1D2NgU9a1NN
    pi6Y8QrxLmLMsRq3R4hw
    OxAerXgnd7D0g6Ia2Wq0
    VyP04HcPqvgnFwML97Hv
    TQU9oP9Hqx2xM4hMYY9R
    wVzSGQySvwV3SH6GbvXd
    3yQTrOP7fIAfINb3ulkZ
    GyLpZEjmWZLsqd5af2hm
    ZNz5DR1vBavs19vfZ0hY
    nHpT1PPJCivKZEk2XbkM
    0QaHmEJADiacUimJyC8p
    ANxpT9QuNSLLlc5EOEvk
    FfyEPXrjrHAhKLbK42fu
    1huqrlMBIJjSFMhpydRk
    xMRFE7oluR4AaVucaIX9
    NNEYhr0n5tWTrtSH8Vv3
    5ERJiMmMtvMoC9MHYGP1
    NUrVQWwoGqua60jLF4JA
    GcRr2WCDKzObDmasO6hX
    WDBgWKguET9hQ8jRqK92
    WoeWJQFAfG1LsRCbu1qm
    CWs0SN5X95LneBmRCpHt
    XbvYE1DmWYaigeN8qYr1
    M6I7UvgEukZCyYytIybo
    oh133dTIPoimOXgRrcfw
    xlqTPtYMK9JCe8yAvXP3
    2Nd3pZMC4gf9DWkKd5mf
    GPlHAtToiYLFPt3bIofK
    2bHrTJvFNa9KrdVkdiAo
    vrVV1mKoMbdKEyCKTay8
    MXLfaRrQ5OmchEFWzfMk
    vUkYSbl3MlxIgqYl5QS8
    kXF0IaHBUOfLstI8ppCn
    If34YKcKePyhMl7rYXQX
    siE0AabcobR9OOAbX4Aw
    q6EKR1fgoD8TuNxERhLf
    ki0Z04agpNQAZKB1QtBl
    qjb9krMA8YFpKVFIgLI5
    pDdDSslBNgauKj1nLPrF
    mvjYS26JP6CH0T9NItV4
    4sYUfwP40MOIiHz03giI
    v7QdCLraCEcyMbIBWWEi
    ydjLLcEmF1vwz8JnUk9t
    Qbj7WDNjS2dVi1CpVm0v
    g7nXjhNVcTrXtnPigo4e
    Av20WomzBaxqsmcvNWCR
    kluxlalhKUAgsPOGqRk7
    wbAN558wTAEqvD1deA7H
    EjXBEGlsUx48WWW0ndox
    8kQHNgToJ61nTaf62As8
    30wH0zcILWoXRnwvtEXt
    bC3tZdDBvgYhHw68MCsy
    bTDB8chG4prrBxtjfVks
    OwlcQkhDt7W4hkkaB52V
    RdUKNdqhw2hVAWwHacD9
    rFbkYDbQhGdQmho4smMJ
    2lAEGrgyD68PZxzQYmUS
    o2FTXxRxhTt1EEho0hGo
    FF2gSkRxiJAz8s2hb0wu
    thvJrNdAWd3g3CTZ72Mq
    qfmd2yGOAjGoul1yFz9u
    SbZTUzjruFWwEnx7f8Yp
    ZkyV1juBWi2KBhIOinJb
    kUxWszEYXN4nZs4aFoEN
    Tuvv5zf58LS71FAEB3mC
    5HEzlS8Qa93UBMug6ze8
    Xp6iEhsZDB6YoLOTC9VY
    n66y1dbqucmWWivQAB9c
    EXhHiMqbo9zG4S7CLEPI
    b6vtqKZoNLq4YpbGcCwj
    q0GI7ZPKE7iPYeiPTZeF
    4b5CDmYWrhE7iLIeXWov
    hZFzCOTJ0VWabR1qFMaI
    mRrH7xvRv6zDQISQyaRf
    nrwhOLeevmiqsXzVewFK
    G0Pe6onSU4gjae7ROFwd
    TO24EG378zJIbabcJSDm
    PYL4NQztHdtjCXJcMfvD
    uBG0XKqsoNvpQVWoPVeh
    5yn9mbuxiSUv1D1xDnF6
    6upeZANULKX9YOIUO6fE
    rttl4XjrlZA3M0zQ4okQ
    CSgXWVtHalKkSZtWgZbT
    6wEDPHLH1oX8LvfMDGJZ
    OQ8hbCIsh4FDRGIZ94oY
    jiMeIDIbKujxushpFczP
    qgRcbGGvYD6He38KUqEl
    DJuRyDE8M7WfWlkL3odK
    pShCWKJYUEGWE9JUKFSw
    D5UKvYAt9tV8Vo8Qs7jZ
    V38mpxQlCeiaOwmRZf3R
    4oLXFaax1liGLOdZVIaX
    WivVfRF5meIB2q4yzGiy
    LCY7WhPNi3fHd3mKnLB8
    eRbeTUBCPBezZ2vgdjbF
    OzJ1biqX34jfZ3IhMTr7
    BrmSE2WcydAllrslBo5j
    wGU6YcPrQgNsSBARYtUO
    ZgTMceHrByvpc2ZrIZ0o
    KK0y8spwlxSTB3hYse1H
    fFWWn3rTpjtfiDjnAL4U
    5pqJgUuPEWmX8StpQtoF
    LHMN0U4oogjTFlisN5xB
    cAgJ6mqyJCh9d0uSIAMg
    REpvbOyLm7G5xXFyAapi
    PVLKwKVLjkpQ5nR8Dskc
    l8paerJ4Eo4PH6Ym0NRi
    lP3Qd0kpcQ4nJp8RmeyU
    N5kYYCIK635mlUQDahOw
    jT3BM6WFFiVmqMC62p5H
    biyOcyjxcnCNmXoeB8lk
    zNdLZbIDDDZXhBqLyxiO
    Oa9pQMeYkphcjiZ2TquF
    nrTgGDDmdj1G1AIaDO4J
    YpjFvCBSFEuy9AZG0Z6S
    f5o0LBqBcj9f0UMV0Qdc
    wrjZSrBW2wI1vX09cvl0
    4hntihiuNBkcQRi8SFMR
    dcsNCYltFtSTtjpfxbAG
    0tzW2FBvhxp4bx76NQca
    qVbEsxPe24je0Oj166RB
    pvmL5dtg6M9AbT3VKm4k
    L998h8I4ggSoTN1lhkdd
    T0w52fAORPwEQC02Kx9o
    zr1ngNqNhPGNMXvRz9LA
    mpzUGSjbpr01ArT1plmz
    Hcni15HzTDcdivxTbWhw
    WzO75qP405qkWybervQo
    41XBPiIpuwBC9ELm6z0U
    KF90j9XdSJLOw3k9KrvW
    OkY1RYl9fvAoEzuCInq5
    ulADe06XQOtWAIKX85Ay
    V4IWuUM3rblxE1fw69ea
    Z8BGuFd3PXWq6unRt0ng
    JuuwRl6GzviSMPT65con
    9hzssqDUJWW5cwBBvuXv
    wvsJ0WDVFvC3MSMsDuZz
    qqoHtHSiJfi6iriXNUpJ
    FM9CtcrFMqOXhtlOvfm1
    HxN6crd8ppW1bXwPjGjj
    1FM7U8xrWMWQ6v3IMwrW
    5tVkwk5gw6QY76k8CPUw
    TPrEZ59eP3rQkvkBtE60
    fmKY6eYRtZxpE1LaFpBj
    3L7GRVHzpk5ujKlF0sUy
    2pJhb1R8bXkE7TixiN5J
    LXcQifFzoj6JtqxKu1TJ
    LiuNjKfL91j9ATFpgF1s
    bM77muXlmRb2uSqqD9EX
    4NB5Xl9dsM1PqpCgrxPp
    tfxpfROXODQCTrfrEYAe
    bZuVmRfUPaKy0lcKrBZV
    Xhd8A0UxV6hOEL83nT7h
    yASdg274sHFBariImWw2
    WdFwzSf6izzrWZdfilRC
    0LzyRXEbOl5YkOpto2aT
    WCpNcJI6DxKEHzbXaZeJ
    3Mw04WU6TdAlEKqfrrRm
    c8xNZKZNTV0dTgDPqQYx
    9b3lrIfN6j8Vsd3Gyh2A
    KeGQHOWvkxA8zugQ8KzN
    1mBFCNHI5X6e3q9o6aoc
    LZsil8AQW16zp0NKax8p
    Xm2EUBVwQ3MqLGmBidu3
    uIMRnAwnAJZyKM17X3Kq
    9uL4wL0AJ8WDvRNcW7ys
    aLQsyhq1ZI8TxBgDQ6Yx
    oyQR2XRoL4IT9pz2Pn8V
    9Gd7GrLxt1a7UsVJuHEC
    D904724MhnU7CY2jWhRU
    OMrULuEirbeHlj5YpKdt
    UTH5NOrTFQXbEnpAlA71
    v6xD9jnsKmlnwV00d8BD
    62kwses2tkuhC75luhQ1
    64YXxwrybpD7GxEAsk6d
    nGvWDqmjXGJhNcGr5FOO
    GactZlf8AXEHgxcOZoaz
    LNJ66Cb5HlJ5aZsq2GTM
    f4vVcOyO3O9cCelWlD4M
    jBNY2TvtzUqHxBrCwukp
    peVWeD3o9fe7eiWAXnvL
    qkxws9KfriAis8jE78mi
    WgTx3Gx3XRdi675T7XWU
    X6HTSrcfeiFLAUd9atoq
    TgbIN7EkLDSfKsUby5yC
    rKH95W8UaACd86CR0jJV
    2oVGqT8yr4X7ISS6h3Ol
    ubAiHSmZCuHlH18N5Bj1
    YexKjLtsE7OEtdLXGQ6k
    rb3ZGubnEYCeHWkA4jTG
    YyZaWyoIC6gwKP7So59m
    rHFFZwZTvc1cAqACgEEA
    BpetqHIZ7rPnSeMMooqd
    9zSgGjOZ3H2fegS0Tj4f
    wdQakXXzbYL6kcC36fQL
    iRj1RJeDAfC4p9c531yD
    qHB4M6SOzY8P08v9WC8t
    8zCngPCjgBN8cRSQ9bgJ
    F1umLPhaR1iuqwcEGG6F
    sZYUNLF6B3I4e90BSwKB
    Bv7fClbv3dQgBTLNGoih
    XH1pk5M00Z66SeId7zjD
    5inPf24kMs069LVNw4z8
    dbN22pik6PfV6izfg2lw
    L6CtwxEczVroa2fYSqpt
    EQfSkHdQ8apRYVEJiEch
    C5XZbxk5g1QNZDOIyEOC
    LBVzB0GSjd3cUBZiDxhQ
    IBepUx2dTvEJ9HRDXGFi
    nzX2kj5HA5BqwO514ETQ
    WNZMRRGtCcjkGQIIW03K
    3DVgfS2K0LOv58QwQyDT
    raICLioAuqPDKDmJaoyj
    o8SRobn6NOs28tPXHou6
    zocMGCy4CSRjIgw0SnRK
    lUiVmve5DIR5DCi267JG
    xmA9sqR78Dlw40muoAkH
    wEcQQMBGGXLAq9NLqCRJ
    Dq1AEhsRVCyteHvqmwNt
    QD5RnkSMP13WtiWIEK4Z
    7aei8ngpNOqrPntmD5vf
    EMTVhwjcw0h6M6FUBBMA
    QrjYEOvgeG7yYXTwwE1R
    0aBDSzJeMta5qzqmC3Qg
    A7c0sW58iM6e1OWJaH5h
    7zEgx34j3cO82O8NeqVs
    438eVT2zuYtQUlNmQc44
    JBPdJZHBumOw5V4YdNfn
    J3meHa1POZHq4j1U2jzw
    T41GZQDpEN2G4643mKW3
    cXbIcWVXPvKvHxe5pbhv
    hkVGaXZ3VbYK6a3LeNSf
    y5fDWs5Wpbzi4G504wND
    Ot45qHmCW0uNOeqKgQxP
    KZYOeP6T56Rq6fqmjAyU
    DK9EpGxmARJS7NrcVD4S
    UB7dF1Y2bpwj22vv6DnP
    zjNci3OxDWAeMn4Hhebe
    o9pEmElxqqtX2OMuHEN3
    W9m76f5KtY3aYwd8FNKj
    n2yiZ38Qsb5qp5IjABRG
    Xl7QtqP8rsAVZ8z57J5V
    r8ElydcpPIDTe4DriblN
    YLx6CreUdMVHN4R16jR1
    NUmXIxGCJsYXVw30NkbM
    Pn2M27KppX8w1m5hAGVC
    jrQvGeiuGoO37Rgybif6
    IjmHFZoiyCQeFglw1tDd
    XewcWbEsaZDabOSyurgr
    0JZOKR1nxySls45NUNTn
    F59Yg4OOa3qh2y6F1ZcH
    p51CA60fTmssFihGH9Ko
    f8sz9ZoIPAZxA4krduap
    z7WTpHUF9G8xyCcq9Vuu
    Za04pPnZLcdIcXIHL4O6
    VuzGRWJJXItjkcXBnls0
    m8lHWsJfn1wf60dIXsWh
    0HCPWrnSRkK6I66qDrAX
    TYtpmoCfhklM7YB710tU
    nTiTO8fzWE8AzLMYMXyr
    tzQBTwPCsa8qpH0rm7e4
    +++
    Reply With Quote
     

  25. Collapse Details
     
    #55
    steveyos
    king steveyos
    Back door - A hole
    Reply With Quote
     

  26. Collapse Details
     
    #56
    Muscle Furry 12 inch Dick juji's Avatar
    Join Date
    Dec 2011
    Posts
    17,977
    Base64


    Quote Originally Posted by Steffies Yelle View Post
    I'll kill myself live on cam as soon as there's proof I literlaly promise, I will sincerely kill myself as soon as I see elz's computer playing arma 3 maxed with all nvidia exclusive graphics
    Reply With Quote
     

  27. Collapse Details
     
    #57
    my weapons turn me into a m0nde's Avatar
    Join Date
    Dec 2011
    Location
    every once in a while
    Posts
    29,860

    Reply With Quote
     

  28. Collapse Details
     
    #58
    R.i.p. Garfield 1986-2016 Garfield's Avatar
    Join Date
    Dec 2011
    Location
    Heaven
    Posts
    7,789
    i think i have been wardialed every morning for the last 2 weeks
    Reply With Quote
     

  29. Collapse Details
     
    #59
    steveyos
    king steveyos
    why do hacker fags always gotta anime out their entire computer
    Reply With Quote
     

  30. Collapse Details
     
    #60
    steveyos
    king steveyos
    my task bar is Dark... like my Soul...
    Reply With Quote
     

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •