Is Your Son Becoming A Hacker?
JimBowen
Join Date: 2003-05-30 Member: 16873Members, Constellation
This is old I know, but I just came across it again, and laughed even harder <!--emo&:)--><img src='http://www.unknownworlds.com/forums/html//emoticons/smile-fix.gif' border='0' style='vertical-align:middle' alt='smile-fix.gif' /><!--endemo-->
<a href='http://www.adequacy.org/public/stories/2001.12.2.42056.2147.html' target='_blank'>Is your son becoming a hacker?</a>
<a href='http://www.adequacy.org/public/stories/2001.12.2.42056.2147.html' target='_blank'>Is your son becoming a hacker?</a>
Comments
The one that made me chuckle was the hardware one. I guess if we ask for new video cards we'd be classed as hackers.
AOL is a good ISP!!
Spread the word!
" Is your son using the Hacker meeting Place "Quake"
<!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->f your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
I spend like 5+ HOURS per day on my computer, am I a 1337 h4x0r now? :o)
Have a look at the comments though. Too bad a lot of them are serious.
i only pirate games to see if there good without the demo restrictions, as soon as i got to the part where i had to look for Keys in the swamp i bought the game.
OMGWTHBBQHAX <!--emo&???--><img src='http://www.unknownworlds.com/forums/html//emoticons/confused-fix.gif' border='0' style='vertical-align:middle' alt='confused-fix.gif' /><!--endemo--> <!--emo&???--><img src='http://www.unknownworlds.com/forums/html//emoticons/confused-fix.gif' border='0' style='vertical-align:middle' alt='confused-fix.gif' /><!--endemo--> <!--emo&???--><img src='http://www.unknownworlds.com/forums/html//emoticons/confused-fix.gif' border='0' style='vertical-align:middle' alt='confused-fix.gif' /><!--endemo-->
My favorite line was
"Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone."
I also like how he spells 'Torvalds' as 'Torovoltos' <!--emo&:p--><img src='http://www.unknownworlds.com/forums/html//emoticons/tounge.gif' border='0' style='vertical-align:middle' alt='tounge.gif' /><!--endemo-->
h4x!
<!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->9. Has your son radically changed his appearance?
If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.
<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
lol
It's a jab at how ignorant parents can be/are about computers.
lol
the quotes from the coments ARE teh Winar!
LOL electromagnetic radiation causes meningitis (lies)...good thing i got vaccinated as a requirement into entering college...
Take this for example:
<!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
Or this one:
<!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->