I understand why you would disagree, but if you don't know how they work, that makes them that much harder to stop....
I understand why you would disagree, but if you don't know how they work, that makes them that much harder to stop....
"Best to keep your mouth shut and be thought a fool than to open your mouth and remove all doubt."
"Honesty is the First Chapter in the Book of Wisdom" - Thomas Jefferson
Desktop:
AMD Phenom II x6 1100T @ 3.3Ghz
MSi 890FXA-GD70
16GB G.Skill DDR3-1600
Asus HD6950 2GB GDDR5 PCI-Ex16
4x 1.5TB WD SATA w/64MB cache in RAID10
2x Asus 22x DVD/CD +/-RW DL SATA
Rosewill Xtreme Series 950W PSU
2x 23" 5ms Asus Widescreen LCD
Laptop:
15" Aluminum MacBook Pro
Intel Core 2 Duo 2.53Ghz
4GB DDR3 @ 1067MHz
320GB SATA 7200RPM HDD
**View My Forum**
That's true - Still, it doesn't help when people make DIY "tutorials" readily available. It's bad enough that they are selling rootkits and trojans these days. That BS about not taking responsibility for how they are used is just that - BS.
-- I do agree with F11 that the Net Tools package is quite interesting and worthy of a post![]()
There are currently 1 users browsing this thread. (0 members and 1 guests)