Prolly a repost but - according to this article we're all illegal hackers

AreaCode707

Lifer
Sep 21, 2001
18,447
133
106
The comments are hilarious - the article is so blatantly satire that I can't believe how far it goes over the heads of so many of the readers!
 

Zenmervolt

Elite member
Oct 22, 2000
24,514
44
91
Originally posted by: HotChic
The comments are hilarious - the article is so blatantly satire that I can't believe how far it goes over the heads of so many of the readers!
In shallowness there is great depth. Either that, or Twain was right when he said that no-one ever went broke underestimating the intelligence of the American public.

ZV
 

Spoooon

Lifer
Mar 3, 2000
11,563
203
106
Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".
lol :D
 

AgentBehemoth

Senior member
Jun 13, 2003
236
0
0
On a side note I've noticed that PCWorld is now calling "crackers" crackers instead of hackers.
On a side side note I just started getting this rag again so it may have been going on for sometime without my knowledge.
 

AgaBoogaBoo

Lifer
Feb 16, 2003
26,108
5
81
Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications.
 

AgaBoogaBoo

Lifer
Feb 16, 2003
26,108
5
81
3. Has your child asked for new hardware?

Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
 

AgaBoogaBoo

Lifer
Feb 16, 2003
26,108
5
81
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program.

LMAO