Jump to content

FAO Geeks


CreamyC

Recommended Posts

  • CTW Members

Yeah, nice one Creamy.

Link to comment
Share on other sites

  • CTW Members

I know the theory.

 

But in practise.

 

Basically you've got no hope m8. Learning to hack is one thing, learning to hack and do it by covering up your own trace is another matter.

 

Takes years.

Link to comment
Share on other sites

  • CTW Promotors
Mr_Moo said:

I know the theory.

 

But in practise.

 

Basically you've got no hope m8. Learning to hack is one thing, learning to hack and do it by covering up your own trace is another matter.

 

Takes years.

 

Listen [censored] face, I'm not trying hack MI5, I want override the firewall so I can get some porn at work, thats all.

CreamyC™
Email:
CreamyC@ClubTheWorld.uk
MSN: CreamyCTW@Hotmail.com
Mobile: 07956 462 642 (T-Mobile)

Link to comment
Share on other sites

  • CTW Members

I don't know how to break firewalls but I have got masses of porn on my work computer I can lend you....

 

(I would now like to retract that comment - thank you)

 

 

Edited by GKB

Head of the Monkey Mafia.....

http://www.ajokes.com/images/pictures/0426.jpg

Link to comment
Share on other sites

  • CTW Admin
Link to comment
Share on other sites

  • CTW Members

Much, much more information would be required to even begin to help you.

 

- What firewall solutions are in place?

 

- What proxying solutions are in place?

 

- What monitoring/logging/reporting solutions are in place? From both a technical and a business perspective.

 

- At what level of proficiency are the people that implement IT security that you wish to compromise at?

 

- Do you want to run the risk of losing your job and committing a crime?

w: www.bukeytheloon.com
e: cunt@bukeytheloon.com
msn: msn@bukeytheloon.com

Other CTWers verdict of Bukey

Link to comment
Share on other sites

  • CTW Promotors
Bukey said:

Much, much more information would be required to even begin to help you.

 

- What firewall solutions are in place?

 

- What proxying solutions are in place?

 

- What monitoring/logging/reporting solutions are in place? From both a technical and a business perspective.

 

- At what level of proficiency are the people that implement IT security that you wish to compromise at?

 

- Do you want to run the risk of losing your job and committing a crime?

 

[censored]. I think I'll leave it then.

CreamyC™
Email:
CreamyC@ClubTheWorld.uk
MSN: CreamyCTW@Hotmail.com
Mobile: 07956 462 642 (T-Mobile)

Link to comment
Share on other sites

  • CTW Members

with a [censored] fire extinguisher you southern unsung twat

Edited by Phil_raa
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...