http://www.adequacy.org/public/stories/200...42056.2147.html
Great stuff:
QUOTE |
Most American families use trusted and responsible Internet Service Providers, such as AOL. |
QUOTE |
Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash". |
QUOTE |
If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well. |
QUOTE |
I am scared of hackers because They smell bad 58% |
QUOTE |
since when was every bean head that listened to techno music and played with glowsticks a hacker? I hope you all realize how misinformed you are and might actually take time to research your assumptions before crucifying your child for the good of the moral majority. People like you make me sick. |
QUOTE |
First I must compliment the gentleman for taking an active part in his children lifes, but... BSD... If Berkeley is a communist organisation then the guy is right. |
QUOTE |
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone |