Is Your Son a Computer Hacker?

From Encyclopedia Dramatica

Jump to: navigation, search
OMG Dramouted!

Is Your Son a Computer Hacker? is the name of a six year old magnificent essay on Adequacy.org. Written by a wonderful human being with many redeeming qualities, the lulzy article is infamous for exposing hackers as they are. 13 year old boys who aren't really hackers however, thought that this article was a lie and hackers weren't really evil at all. They were, of course, wrong and posted hate mail, proving themselves to be idiots.

Contents

Ten signs little Billy is a computer hacker

  1. Child asks to change ISP's.
  2. Child installs programs which aren't AOL or Calculator as all others are Autorun.gen.
  3. Child wants to upgrade his computer.
  4. Child wants to read books without the words Playboy or Bible in the title.
  5. Child wants to waste more than 30 minutes on the computer.
  6. Child plays Quake.
  7. Child swears.
  8. Child installs Lunix.
  9. Child dresses differently from others.
  10. Child sucks at school.

Quotes

Proof that AOL is trusted and responsible.
Proof that AOL is trusted and responsible.
I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent.

T. Reginald Gibbons,


Most American families use trusted and responsible Internet Service Providers, such as AOL.

T. Reginald Gibbons,


Someone up this man's dosage.
Someone up this man's dosage.
Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

T. Reginald Gibbons,


You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

T. Reginald Gibbons,


Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

T. Reginald Gibbons,


Top secret hacker assembly
Top secret hacker assembly
[...] If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

T. Reginald Gibbons,


Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school. If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

T. Reginald Gibbons,


DO NOT FALL FOR THE COMMUNIST PLOT.
DO NOT FALL FOR THE COMMUNIST PLOT.
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government.

T. Reginald Gibbons,


They may also be used to break into people's stereos to steal their music, using the "mp3" program.

T. Reginald Gibbons,


In your internet, corrupting your children.
In your internet, corrupting your children.
Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to YouTube on the internet without using a telephone.

T. Reginald Gibbons,


If you see this image, your computer is FUCKED.
If you see this image, your computer is FUCKED.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

T. Reginald Gibbons,


If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association.

T. Reginald Gibbons,

Responses

 
 
~*~*~*WTF!?~*~*~*

j00 5700p1d musca domestica! A 'son' raised by a control freak like you CANNOT be a haxor!!!

~*~*~

This is the BIGGEST LOAD OF ROTTEN SLUG INTESTINES I HAVE EVER F***ing READ!!!

Go castrate yourself!!!

You are a lying, self-serving hypocrite that does not deserve any bandwidth!!! Wait, isn't BANDWIDTH a hacker tool?!

And you should RESPECT the intellectual BRILLIANCE of a true haxxor, you moron!

Oh, and tell your son the EASTER BUNNY IS NOT REAL!!!

-Hexxen

~*~Haxxor the World ^_^~*~

jo 7o 4ll (v)4 1337 |-|4xx0rz !!!
 


 

—Anonymous Reader, [1]

 
 
The author of this article must be a jew.
 

 

—Anonymous Reader, [2]

External

Personal tools

Bookmark