df1.JPG (34634 bytes)

"Where the weak help to justify the Strong"

I hear by disclaim myself, and my provider from the consequences of anything stupid u do,with the resources u find on this website.

-Point ()

On to the fun stuff

In the beginning there were memory locations and we manipulated what
our computer did by peeking and poking. And it was good. But this
was not to last, for on the horizon was the "port" and slowly we
learnt to communicate with attached devices by puting values in, and
pulling values out, of specific ports.

--� Quantum / VLAD

Virii�Hacking

View my GuestbokSign my Guestbook