this is THE joke of the year!!!

From: DuhVille (duhville@hotmail.com)
Date: 12/13/01


From: "DuhVille" <duhville@hotmail.com>
Date: Fri, 14 Dec 2001 05:17:31 +0800

hello
i came across this post and oh mi god it is too funnie...

http://www.adequacy.org/?op=displaystory;sid=2001/12/2/42056/2147

      Is Your Son a Computer Hacker?
      By T Reginald Gibbons
      Posted on Sun Dec 2nd, 2001 at 11:00:21 AM PST

      As an enlightened, modern parent, I try to be as involved as possible
in the lives of my six children. I encourage them to join team sports. I
attend their teen parties with them to ensure no drinking or alcohol is on
the premises. I keep a fatherly eye on the CDs they listen to and the shows
they watch, the company they keep and the books they read. You could say I'm
a model parent. My children have never failed to make me proud, and I can
say without the slightest embellishment that I have the finest family in the
USA.
      Two years ago, my wife Carol and I decided that our children's
education would not be complete without some grounding in modern computers.
To this end, we bought our children a brand new Compaq to learn with. The
kids had a lot of fun using the handful of application programs we'd bought,
such as Adobe's Photoshop and Microsoft's Word, and my wife and I were
pleased that our gift was received so well. Our son Peter was most entranced
by the device, and became quite a pro at surfing the net. When Peter began
to spend whole days on the machine, I became concerned, but Carol advised me
to calm down, and that it was only a passing phase. I was content to bow to
her experience as a mother, until our youngest daughter, Cindy, charged into
the living room one night to blurt out: "Peter is a computer hacker!"

      As you can imagine, I was amazed. A computer hacker in my own house! I
began to monitor my son's habits, to make certain that Cindy wasn't just
telling stories, as she is prone to doing at times.

      After a few days of investigation, and some research into computer
hacking, I confronted Peter with the evidence. I'm afraid to say, this was
the only time I have ever been truly disappointed in one of my children. We
raised them to be honest and to have integrity, and Peter betrayed the
principles we tried to encourage in him, when he refused point blank to
admit to his activities. His denials continued for hours, and in the end, I
was left with no choice but to ban him from using the computer until he is
old enough to be responsible for his actions.

      After going through this ordeal with my own family, I was left
pondering how I could best help others in similar situations. I'd gained a
lot of knowledge over those few days regarding hackers. It's only right that
I provide that information to other parents, in the hope that they will be
able to tell if their children are being drawn into the world of hacking.
Perhaps other parents will be able to steer their sons back onto the
straight and narrow before extreme measures need to be employed.

      To this end, I have decided to publish the top ten signs that your son
is a hacker. I advise any parents to read this list carefully and if their
son matches the profile, they should take action. A smart parent will first
try to reason with their son, before resorting to groundings, or even
spanking. I pride myself that I have never had to spank a child, and I hope
this guide will help other parents to put a halt to their son's misbehaviour
before a spanking becomes necessary.

      1. Has your son asked you to change ISPs?

      Most American families use trusted and responsible Internet Service
Providers, such as AOL. These providers have a strict "No Hacking" policy,
and take careful measures to ensure that your internet experience is
enjoyable, educational and above all legal. If your child is becoming a
hacker, one of his first steps will be to request a change to a more hacker
friendly provider.

      I would advise all parents to refuse this request. One of the reasons
your son is interested in switching providers is to get away from AOL's
child safety filter. This filter is vital to any parent who wants his son to
enjoy the internet without the endangering him through exposure to "adult"
content. It is best to stick with the protection AOL provides, rather than
using a home-based solution. If your son is becoming a hacker, he will be
able to circumvent any home-based measures with surprising ease, using
information gleaned from various hacker sites.

      2. Are you finding programs on your computer that you don't remember
installing?

      Your son will probably try to install some hacker software. He may
attempt to conceal the presence of the software in some way, but you can
usually find any new programs by reading through the programs listed under
"Install/Remove Programs" in your control panel. Popular hacker software
includes "Comet Cursor", "Bonzi Buddy" and "Flash".

      The best option is to confront your son with the evidence, and force
him to remove the offending programs. He will probably try to install the
software again, but you will be able to tell that this is happening, if your
machine offers to "download" one of the hacker applications. If this
happens, it is time to give your son a stern talking to, and possibly
consider punishing him with a grounding.

      3. Has your child asked for new hardware?

      Computer hackers are often limited by conventional computer hardware.
They may request "faster" video cards, and larger hard drives, or even more
memory. If your son starts requesting these devices, it is possible that he
has a legitimate need. You can best ensure that you are buying legal,
trustworthy hardware by only buying replacement parts from your computer's
manufacturer.

      If your son has requested a new "processor" from a company called
"AMD", this is genuine cause for alarm. AMD is a third-world based company
who make inferior, "knock-off" copies of American processor chips. They use
child labor extensively in their third world sweatshops, and they
deliberately disable the security features that American processor makers,
such as Intel, use to prevent hacking. AMD chips are never sold in stores,
and you will most likely be told that you have to order them from internet
sites. Do not buy this chip! This is one request that you must refuse your
son, if you are to have any hope of raising him well.

      4. Does your child read hacking manuals?

      If you pay close attention to your son's reading habits, as I do, you
will be able to determine a great deal about his opinions and hobbies.
Children are at their most impressionable in the teenage years. Any father
who has had a seventeen year old daughter attempt to sneak out on a date
wearing make up and perfume is well aware of the effect that improper
influences can have on inexperienced minds.

      There are, unfortunately, many hacking manuals available in bookshops
today. A few titles to be on the lookout for are: "Snow Crash" and
"Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson;
"Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The
Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland;
"Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S.
Raymond.

      If you find any of these hacking manuals in your child's possession,
confiscate them immediately. You should also petition local booksellers to
remove these titles from their shelves. You may meet with some resistance at
first, but even booksellers have to bow to community pressure.

      5. How much time does your child spend using the computer each day?

      If your son spends more than thirty minutes each day on the computer,
he may be using it to DOS other peoples sites. DOSing involves gaining
access to the "command prompt" on other people's machines, and using it to
tie up vital internet services. This can take up to eight hours. If your son
is doing this, he is breaking the law, and you should stop him immediately.
The safest policy is to limit your children's access to the computer to a
maximum of forty-five minutes each day.

      6. Does your son use Quake?

      Quake is an online virtual reality used by hackers. It is a popular
meeting place and training ground, where they discuss hacking and train in
the use of various firearms. Many hackers develop anti-social tendencies due
to the use of this virtual world, and it may cause erratic behaviour at home
and at school.

      If your son is using Quake, you should make hime understand that this
is not acceptable to you. You should ensure all the firearms in your house
are carefully locked away, and have trigger locks installed. You should also
bring your concerns to the attention of his school.

      7. Is your son becoming argumentative and surly in his social
behaviour?

      As a child enters the electronic world of hacking, he may become
disaffected with the real world. He may lose the ability to control his
actions, or judge the rightness or wrongness of a course of behaviour. This
will manifest itself soonest in the way he treats others. Those whom he
disagrees with will be met with scorn, bitterness, and even foul language.
He may utter threats of violence of a real or electronic nature.

      Even when confronted, your son will probably find it difficult to talk
about this problem to you. He will probably claim that there is no problem,
and that you are imagining things. He may tell you that it is you who has
the problem, and you should "back off" and "stop smothering him." Do not
allow yourself to be deceived. You are the only chance your son has, even if
he doesn't understand the situation he is in. Keep trying to get through to
him, no matter how much he retreats into himself.

      8. Is your son obsessed with "Lunix"?

      BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker
operation system, invented by a Soviet computer hacker named Linyos
Torovoltos, before the Russians lost the Cold War. It is based on a program
called "xenix", which was written by Microsoft for the US government. These
programs are used by hackers to break into other people's computer systems
to steal credit card numbers. They may also be used to break into people's
stereos to steal their music, using the "mp3" program. Torovoltos is a
notorious hacker, responsible for writing many hacker programs, such as
"telnet", which is used by hackers to connect to machines on the internet
without using a telephone.

      Your son may try to install "lunix" on your hard drive. If he is
careful, you may not notice its presence, however, lunix is a capricious
beast, and if handled incorrectly, your son may damage your computer, and
even break it completely by deleting Windows, at which point you will have
to have your computer repaired by a professional.

      If you see the word "LILO" during your windows startup (just after you
turn the machine on), your son has installed lunix. In order to get rid of
it, you will have to send your computer back to the manufacturer, and have
them fit a new hard drive. Lunix is extremely dangerous software, and cannot
be removed without destroying part of your hard disk surface.

      9. Has your son radically changed his appearance?

      If your son has undergone a sudden change in his style of dress, you
may have a hacker on your hands. Hackers tend to dress in bright, day-glo
colors. They may wear baggy pants, bright colored shirts and spiky hair dyed
in bright colors to match their clothes. They may take to carrying
"glow-sticks" and some wear pacifiers around their necks. (I have no idea
why they do this) There are many such hackers in schools today, and your son
may have started to associate with them. If you notice that your son's group
of friends includes people dressed like this, it is time to think about a
severe curfew, to protect him from dangerous influences.

      10. Is your son struggling academically?

      If your son is failing courses in school, or performing poorly on
sports teams, he may be involved in a hacking group, such as the infamous
"Otaku" hacker association. Excessive time spent on the computer,
communicating with his fellow hackers may cause temporary damage to the eyes
and brain, from the electromagnetic radiation. This will cause his marks to
slip dramatically, particularly in difficult subjects such as Math, and
Chemistry. In extreme cases, over-exposure to computer radiation can cause
schizophrenia, meningitis and other psychological diseases. Also, the
reduction in exercise may cause him to lose muscle mass, and even to start
gaining weight. For the sake of your child's mental and physical health, you
must put a stop to his hacking, and limit his computer time drastically.

      I encourage all parents to read through this guide carefully. Your
child's future may depend upon it. Hacking is an illegal and dangerous
activity, that may land your child in prison, and tear your family apart. It
cannot be taken too seriously.

--
----------------------------------------------------------------------------
---------------------------------------------------
"From an ocean liner
to a chinese junk
there is nuthing out there
that can't be sunk"

Rudi Irawan Seah a T.R.Y.I.N.G 2b N Engineer

begin 666 10x10trans.gif M1TE&.#EA"@`*`)'_`/___P```,# P ```"'Y! $```(`+ `````*``H`0 (( *E(^IR^T/8RL`.P`` ` end

begin 666 internet-idiocy.gif M1TE&.#EA/@!*`/<``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`````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M```````````````````````````````````````````````````````````` M`````````````````````"P`````/@!*```(_P#_"!Q(L*#!@P@3*ES(L*'# MAQ#_'&!PD(&#B 8M8D0X\6#'C0,_@B38\< "! W^)#APP(&!E0D,2#PY$Z7 MEP=BKFPYDB3%`PH6'!#8$4$"!PH22%1 -.C0/T:1*A794^)/!@R>EF3)TBI1 MK%JY#J7:LR38KRH5.,#JU6I6@0G4LB4[TNQ;E2T-*,@I\^/$NWKYXKU8M;#A MPX@3*U[,.**1.G>0Y)FL9P\?/WWX["F0IT 2/DDV;]:3!XEI)'?NV*DSQX@1 M)G'@R(;CQ@V<.'+F0+Y#8,-K)K#E"#1"YTCDR07V)/&#.70!STF2/-]<&D]J M/-8)L)8#G(D<[G%B`_\WHCOUZCG?NPMDHMO.G<Z>+Z?QPP=T].B;GY>^'OE. M'3KH?4<<':X!)\> =1Q!P!&L&?$==^L9H2 >G5GF1QH8IL&''@3,L4$=[MEA MQQQ T 9;'!OX1MP&=("H'8$'MLA@'?^U]B!PPQFQ`0%XZ.'9:G?@<<0/*I"A MP@] &"$%ADI$$40.+\Q@P@L_"'#@!@JZ=\<1&[3FVH==HM?=F +10<<&QR5Q MA!!I-%%##4L8$<849FRQ!9UF:.&$$VE<<4('+/! A&MT$! D=JMUZ9J7OS$A M6QSC"82EH7;DD80=0ES!`@DDZ##&%*"FH802&BK1Q*DO9''%#B\`0<2!<YC_ MQL02<-2Q8)<`OA9>'+7)QIZDAM(!1!QY;*!"'B^\@(8:S*H11A!1O'#%%3C4 M0(4,,MA@`PLK>) &$3TP@606-.3AQAQ$_+#$#QXZ*ENON,TQ'&1Q`$$&%RI( M\4(833:+QA,LL# #"B+<<$()%D!0P0056' ##4.HH$4.3:!P@A4JJ#"%%$X@ M0081*@SQ0VQP="?<'P-R`8893'@QAA1CE&'%#"YL.D$$$4A0P<X=D("!""BP MD$(+.%@11!!78&'%%4T$8><49\P<AA=<#/&J@=PQ,=P<`A!!AAEE@%'$&T44 M8<0%#U!@`08KH."!"S*T\$0+5-0`!:I!I+%G&%L@_R&&&'F^$+88471!)!?L MS6&F@T9LO8$<7(Q!QA1<%$$$$U/48,4..V"111-11.&$%EN(`>K&4DQ!JA88 M.B&Z$UU4P8(,-%A!0Q/$6B>B'5RR*- 1L"&I`QA3=!%%&F X6:>G9Y1NA@Y2 MZ$!XJEBD80845*@ZK16VVS###22L(' :1DQ6&A)X\)Z@0!D30806,(31Q1=> ME.V$&63\D'\:6& !>!98N$(5<)"%+(C!"U,(G;6H8 ,/W. #%K! !SX@@B6H M0#//(4T>TD<C@7 A#THPW1C&D(,S@($(//A"&*2@A"^\H 95P,*>5L4J`-Z/ M#&1P@@PLUK8'=J $,9C `_\N4#7S[>&(G$&"=MBG!1HP30Q,,((9OA"%)B@A M"ROXP =,T()I58L&,G !"BYP@2JL( LZ: $(/@`!"\Q@8#.P@0MNT $+9$$* M0B "%^B@(>GD84L"(0(24H""++# !% (`QB^@((5I$ &%[ `!]H8R0AR@ ,2 MP%D%'K"#'S@A`FN\@ @P@((;N. %,OC !$N @AKDP37*V4-I[/ [(BA!!"[( M8@E:, 4:Q( $)E@!!%S@`@D\X $X2^8$EAF!$MB !BS@0,.V>((5E, %FBH! M#4P`@BP(@48J$$(?9(D^@>!!#D!H`0U>*,<4S(X&*T ;"G `S1- 8)F9Q)G. M9D#_`F1&T (EX%30K#D!$VS!`P_@P0:"D <>,,$/22 -$@1RASDLH0I\^($. ME( %=7J."BPHP0KL5@4JH$ "$@A8)"% @A(P3((=$($-3F "%CP!;1&H``8: M!@0^*($)9."!'\B)A]^AZP5;\)H.TA"M9-' >S-@@0=0, ,/=( #5*B"#D4P M`X61()(7>"956> ""$1@`L8$00EZ@)G\U:<`Z*/E'QBD@B1 H08Y$(*ED+"% M**1@!3<P`<(L\(& EN $-\@"%>)9@0M L 2XI!D*4& "M")39R<P0A_\P(0" M@$8/J#F"0!)4+QF(- M)V (/DB #$G2@`PN3P 0X$,$2_UR@C@F;`!DO8 (1 M"/8&+!!!"19F@15$X $AP `3+M.<S2"!=Y(Z$QQH4((;E( %5]!"$%A0@1 L M;)D,@P`'KEH!35K L=4EF ED, ,16."8+S""$ZK@LSLP)S/.X6"9YC ')HR M`RLP00@X< (95.$"9P4O>!<VWO->@%,ME6FVL#"##@AQ!7C8PP^X$-(CS(<^ MU.%-'<KT(3@T(01N`@$RSRB"G*)4P<M<V 6H.H,5.+(%56B!"]QK3!0PX0YI M0 (74G"#.6 (Q*3!PQ+_D" [P"$*%?#!#T3P``A@`(L@X$ )2G!/&,NVN"Y0 M9PV>@ (NYPQG>X!#`2Z$A!W*@?]4:>B#'W4GJ02Y(0@=2$,1KJ#B"UQA!5F& M; DX`&-\3@`")<" :]&:X A P A(8(X?[-""&= !SLT!;?KJ/ `W*,$$*("T M#"#P@1T`>H*TM7"A;Y9,?8(WDP]H@ALVZX<CM `%!< T9L@IUS/5`0Y*F $' MKC"%)K#@!#M 00AB0&@(0" $LEVU@F6;20F$( (D< (/(B,';>&!5)*F#V@) M(!#^TB$.2JAT@"E[`BQX( 0A4*M+*R!-0X.7`M3&V03:$ ````"R*VA!#Y3 M@C!PH0#SZ8/"D[#!$:.,/'%P@A5PX()KQT $9F1E8$OP`6!B$JV,IL QL1W/ M?OL;`,[_G@`(;-"%D5XPX9_]XP9R9"6D.0$'+9#D#'# U29('*0DD.2K45J! M``0@!C1 `P#6```VM '4SOQ"%KY@`@LPX0CW93CZ>E.FXC"A3TB $@UF((,L MH, &3W(=#3[0,(8QK-\FO\$,J+"&'Z) !CB80A5F`(46'(P*:="!9.X@T43] MC@!V, (07C %(@`A"540P51E@ 8M[%VP"%O8/=O !C:L87Y4"(,31-#2-SJA M#'=S`F6Y>0&:;6$)V&&0:/\0)/<L071$(@(?;(""7%)6[B; 0 DZ<-P(G,!M M+VC!%Z8@`]^2P 4U*$,8:- %&=Q N+NT@17"X (+X.!<(KJ#_T#0I^0?=*$) M4CY2&JZ%M@><8+&VO< 3<(""TY.KQC6F?M)Q4-(8@!*96- %HB<#-; "#V " M3K $D3%1?V ^&Y #5. "06 $Z])3-6 !.5,"'E!U'7 "=,)>((4"*? %9> $ M88!Z-W !(3 !!J9\5\![)D "(!!!)C %8* $_:4'`G%$ES(%.)<&0!"$2\ $ M6/!>$Q!!L"4!$&!C%6 "3R #85!%TR=8$50#8M $83 &5Q [QW4"-!!Z:% " M,T #'= "%"@0"@=1<O A=/ #@[($BW<#.\-@F&0!M[,"7P`&3K!8XE5<SF0& M`G@%-W #M74#56! 7W %-8 "[X5,-O^0!@)Q(4>6&:#A*D$8!560`A90`1/T M7AX`!E[P!#-@!2CP`!\@`RQ `UY0!C3P!2<``B%@`2?P`54P!5OX!"X`!5G0 M`C7@`A$P8P$C$*(R*O-1'YNQ!(,2!"\0!3804!> ,"7 0$%'`B(`!2] /"E@ M!35P`1QP`R#5!&.@6%=@4F^$+366`E= `\0T`P(Q*D% C')6`*2A`K?W`EH0 M)2LP,!]P7"LG!DYP!66@+3:P2;_X! `9!MIB33+0!360D!Q0`U&@`D5 ?V'4 MCD=#C)GV1TN0`U:0`TM%!1'T`2S@=Q? 0"L@1E^ !E2 !E_0-E30!5W@`C$0 M`S<0D653!#[_(%/JI $NL$Y-8)$7>61\P!EY``=;0 -I( 3R=0(1( -A4X B M$ ,H\ 6UB :S<VLH4 6V0P5!\ -E\P9O, 0PL(AM$X/8M 5:\P?N&)3-P1G< M805.X - T ,O$$Q=4 94\P4<8 -AP"U"PP($LP)5H -#,#9@:3::> $GP (U M$$8TX -WL =*T([N."K@-I1(L %+@ 518 9C``1YD $6( )30 9>< 6]-7<M M@(HE$ (HX .&239$D 4B\ 'B\T:IB'Y&H >6*8R6:9EQIG5QH .'J 4Z`!Q\ M$(-/0 4S4 (FX$XU=C"/&9MD\ +!=5@K@ ,[D(I2X"@$0&L8(HQ,_X)IXV0: M2Y 'BG@%.2"7/$!=A)0&<* W.> !+?8"AED$0<![K$2 O4@#,+ !</ #&?89 M?$!K:,@<'X890UD:2R %.!!&028$0) #5= $>@:6.H Q0[ "5U $/\!S%1 # MV)2.S^0$( ,'1D `DN$C]]$'`E&@"I<9^)5$P"%U29 N/B $2+ G0T VZ?0! M/3 $U#4#%P`"(& "+O $*6 #6( $R$@K4;0;QY$<22 0\1$=QBB/^Q&@/_ # M&^ &<2($2: %>0)/P)0"1,8!$0!@8N0!,I $KJ("D&(@'I(@J?$>/B(0G>$< M2%0:^R%["G('1@"F?45FBXD#%5-8-54#2?]P=77 !.FR!$O@!G-*'*U1*(A' M(7E@3GF@!YZ:07Z*&MI!(X9"&D2P!2\`4BV0!&80!3;6`EI &W%B!+LBJ9-Z M&[D!(SI"JMAA3J;1J: Z&>C#&T?@'A229IF"BC(0!%; `N1#&Q["7[_!*[0R M&[G*.&9R)H;BJ\B109XJK,.*!RNJ'$S@!+GD2%#@I'3 .P3B&MP!'K-1,E'$ M*(0"(N)'>Y+AK9^J'^<CKE0ZE';@`SW@`TC0&NG#)>CAKG/**X\R'HNR*!^R MK4P6&3[R'-.A'$0I&7L*HWU0`$RP`=:A&@3P(EG#L(Y2K9!R(.3!(HH#(&<B M*<5:(9N!I:"AI2Q'^AGX%1H;I!IW:@=T`*^]`J:VD;(KJQW\Q2AE8AS *H]) HL%DU^ZF681_XD42H81X$\+,G`@>T`J:T`BDZ@GCGX2#OVAB,$1 `.P`` ` end



Relevant Pages

  • Re: this is THE joke of the year!!!
    ... > Is Your Son a Computer Hacker? ... A computer hacker in my own house! ... > I provide that information to other parents, in the hope that they will be ... > able to tell if their children are being drawn into the world of hacking. ...
    (comp.os.linux.security)
  • Fw: Hacker Alert!!!
    ... I think my child might be a hacker! ... Our son Peter was most entranced by the ... Perhaps other parents will be able to steer their sons back onto the ...
    (alt.linux)
  • Re: Oh no!!! Were all going to jail!!!! ROFL!!
    ... maybe your son wants to play a game or something... ... "BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker ... Torovoltos, before the Russians lost the Cold War. ... Yeah, UPS, Usenet Performance Stupidity. ...
    (alt.2600)
  • Re: Democrats SHAME Top Dem Involved in Hacking Sarahs Email!
    ... The hunt for the hacker who broke into Republican ... David Kernell, 20, has not returned repeated phone calls or e-mails ... best for their son," said attorney Wade V. Davies of Knoxville. ... "I had nothing to do with it, I had no knowledge or anything," Mike ...
    (alt.politics)
  • Re: Democrats SHAME Top Dem Involved in Hacking Sarahs Email!
    ... The hunt for the hacker who broke into Republican ... David Kernell, 20, has not returned repeated phone calls or e-mails ... best for their son," said attorney Wade V. Davies of Knoxville. ... "I had nothing to do with it, I had no knowledge or anything," Mike ...
    (alt.politics)