Вы находитесь на странице: 1из 10

{HOT} The COMPLETE beginners guide to hacking {HOT} - Yesterday, 08:58 PM

Hi there. Thanks for taking the time to view this thread. I'm sure you will lear
n something new from it :)
Sections:
1) Introduction
2) The hacker manifesto
3) What is hacking?
4) Choosing your path
5) Where should I start?
6) Basic terminology
7) Keylogging
8) RAT's
9) Java Driveby's
10) Crypters
11) Dosing and DDosing, what's the difference?
12) Staying anonymous
13) Proxies
14) VPN's
15) Alternatives, tips and tricks
16) Extending your knowledge
17) Closing section
SECTION 1
Introduction
Hi there. If you are reading this, you're either an eager to learn beginner hack
er, or an upgraded member here to judge my work. Well, in either case, I'm sure
you will enjoy this thread and increase your knowledge of hacking. I will be goi
ng over ALL the basics of hacking, and a lot more. I've included tutorials aswel
l, so you could say this is an all-in-one guide.
SECTION 2 - The hacker manifesto
The hacker manifesto (also known as the conscience of a hacker) is an essay writ
ten by a hacker known as 'The Mentor'. It is often said to give an insight into
the psychology of hackers. If you are hoping to start learning the art of hackin
g, this will certainly give you the right mindset for the job. "The Hacker Manif
esto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, i
t's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker
Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in
your three-piece psychology and 1950's technobrain, ever take a look behind the
eyes of the hacker? Did you ever wonder what made him tick, what forces shaped h
im, what may have molded him? I am a hacker, enter my world... Mine is a world t
hat begins with school... I'm smarter than most of the other kids, this crap the
y teach us bores me... Damn underachiever. They're all alike. I'm in junior high
or high school. I've listened to teachers explain for the fifteenth time how to
reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I di
d it in my head..." Damn kid. Probably copied it. They're all alike. I made a di
scovery today. I found a computer. Wait a second, this is cool. It does what I w
ant it to. If it makes a mistake, it's because I screwed it up. Not because it d
oesn't like me... Or feels threatened by me.. Or thinks I'm a smart ass.. Or doe
sn't like teaching and shouldn't be here... Damn kid. All he does is play games.
They're all alike. And then it happened... a door opened to a world... rushing
through the phone line like heroin through an addict's veins, an electronic puls
e is sent out, a refuge from the day-to-day incompetencies is sought... a board
is found. "This is it... this is where I belong..." I know everyone here... even
if I've never met them, never talked to them, may never hear from them again...
I know you all... Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at school wh
en we hungered for steak... the bits of meat that you did let slip through were
pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apa
thetic. The few that had something to teach found us willing pupils, but those f

ew are like drops of water in the desert. This is our world now... the world of
the electron and the switch, the beauty of the baud. We make use of a service al
ready existing without paying for what could be dirt-cheap if it wasn't run by p
rofiteering gluttons, and you call us criminals. We explore... and you call us c
riminals. We seek after knowledge... and you call us criminals. We exist without
skin color, without nationality, without religious bias... and you call us crim
inals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us a
nd try to make us believe it's for our own good, yet we're the criminals. Yes, I
am a criminal. My crime is that of curiosity. My crime is that of judging peopl
e by what they say and think, not what they look like. My crime is that of outsm
arting you, something that you will never forgive me for. I am a hacker, and thi
s is my manifesto. You may stop this individual, but you can't stop us all... af
ter all, we're all alike."
Taken from http://www.mithral.com/~beberg/manifesto.html
That is the essay. It's quite impressive isn't it? After reading it you should h
ave an idea of the mindset any hacker should have. I read it about 5 months ago
and it has certainly sent me on the right track.
SECTION 3 - What is hacking?
What is hacking? Well, whatishacking.org defines it as "the practice of modifyin
g the features of a system, in order to accomplish a goal outside of the creator
's original purpose. The person who is consistently engaging in hacking activiti
es, and has accepted hacking as a lifestyle and philosophy of their choice, is c
alled a hacker. Computer hacking is the most popular form of hacking nowadays, e
specially in the field of computer security, but hacking exists in many other fo
rms, such as phone hacking, brain hacking, etc. and it's not limited to either o
f them." - Taken from whatishacking.org That's a great definition but in my opin
ion hacking is much more than that. In my opinion, hacking isn't something you c
an just 'learn'. It's not just a skill, it's an art. Hacking requires knowledge.
Knowledge is power. In order to gain said knowledge, and the power that comes w
ith it, a change of lifestyle is required, along with a certain amount of secrec
y. Learning 'how' to hack takes time and dedication. There's no easy way to get
better at it. That's right, no shortcuts and its unlikely you're going to get a
helping hand. Like everything else in life, it takes practice. Don't go crying t
o others if it doesn't work out, just keep calm and carry on. If you are serious
about becoming a hacker, you will need to be willing to change your lifestyle,
and dedicate yourself to the task. With enough dedication and hard work you will
excel at hacking.
SECTION 4 - Choosing your path
Ask any stranger what a hacker is, they will probably give you a really negative
answer; identity theft, hacking accounts, stealing, to name a few. The reality
is actually quite different. There are a few kinds of hackers, you probably only
know about the bad ones. This section should give you a better understanding of
the different kinds of hackers, and help you decide which kind you should becom
e.
Black hat hackers: These are the bad guys you always hear about. These are the p
eople giving other hackers a bad name. Black hat hackers are the ones who commit
crime. They steal identities, hack accounts, ddos sites and just go about causi
ng havoc.
Grey hat hackers: Grey hats are basically good guys. They still do illegal stuff
, but they report it to the person/company they are targeting. So... Basically t
hey do bad stuff and help people to fix it.
White hat hackers: White hat hackers are the good guys. They fix stuff and help
people. They don't do illegal stuff. You've probably never heard of an event whe
re a hacker does something good but these guys do that all the time.
Examples of white hat hackers are:
Technicians
Cyber security teams
IT consultants

Now that you have a better understanding of the 'types' of hackers, you need to
choose your path. This requires a lot of thinking, because you need to consider
the possibilities of each path. Black hat is the easiest path to choose. It's 'f
un' and it has the most benefits. It also is the only one that will get you in t
rouble and maybe even arrested. Grey hat is a slightly more difficult path. You
(technically) are a good guy but most people won't see you as such. Grey hats ha
ve a hard time because although they are trying to help, the method they are usi
ng isn't really that legal. If you do choose to be a Grey hat, be aware that som
e people won't believe you are really trying to help, and you may still get in t
rouble. The last and most difficult path is White hat. As I mentioned before, Wh
ite hats are the good guys. Their job is to help. Becoming a White hat may seem
boring but you are helping people, and that should be a reward in itself. The on
ly problem with becoming a What hat is that you will have to start out as a Blac
k hat. I personally would recommend that you start out as a Grey hat. You'll get
more out of it.
SECTION 5 - Where should I start?
This is the question that most people ask. I honestly don't think there is any o
ne place to start. Ask around on any forum and people will always tell you to le
arn to use RAT's and keyloggers. To be honest I wouldn't recommend doing that st
raight away. I would advise to learn the basic terminologies of hacking (see sec
tion 6) and try to get an idea of exactly what everything means. It's really imp
ortant to understand stuff before you go downloading random hacking programs fro
m the Internet. It you don't know how to use them, or if they are viruses, you o
nly have yourself to blame.
SECTION 6 - Basic terminology
As I mentioned in the previous section, it is important to have a decent amount
of knowledge about hacking before you can start. So I've taken the liberty of ty
ping up a list of common terminologies you should know.
Common terminologies:
Ddos - Distributed denial of service attack. This is where a website is flooded
with packets of data from multiple sources and the server basically overloads. D
dos attacks are often confused with Dos attacks.
Dos - Denial of service attack. This is where a site is flooded with packets of
data from a single source. A Dos isn't as effective as a ddos, but it is a lot e
asier, as you can Dos straight from cmd.
404 Error - The error you are given when a site is down. If you have attacked a
site and don't see this, your attack wasn't successful.
cmd - Command prompt. This is basically MS-Dos, except it's now just a program w
ith some commands rather than an OS. Cmd can be used to perform tasks using comm
ands.
.bat - Batch file extension. This is the file type which is opened in cmd. Most
.bat's that you will see online will be malicious. Some are good though.
RAT - Remote Administration Tool. RAT's are the most commonly used tools by begi
nner hackers. RAT's are favored because they are easy to use and they perform ma
ny functions. They also allow control over of the infected computer, which makes
them very popular. Slave - A user which has been infected with your keylogger/R
AT.
Keylogger - A program which logs the keystrokes of a computer. These are usually
the first things that beginner hackers learn to use. They have a lot of functio
ns but they aren't as good as RAT's.
Crypter - A program used to change the hash sum of a malicious program so that i
t is undetectable by anti-virus programs.
FUD - Fully UnDetectable. A program which is FUD cannot be detected by ANY antivirus program. UD - UnDetectable. A program which is UD is mostly undetectable b
ut can be detected by some anti-virus programs.
JDB - Java Driveby. A fake site which contains a java applet. This java applet i
s used to download and execute (run) a certain program. The victim as to click t
he 'allow plugin to run' button to start the applet.

Silent Java Driveby - A java driveby that's downloads and executes a file withou
t the user seeing any pop-ups. These are more effective than normal java driveby
's as they are less suspicious.
Direct link - The direct download link to a certain file. When you download a fi
le from a site (e.g. Mediafire), you are given a download link which redirects y
ou to a page with a download button. However a direct link is a link which leads
directly to the file. There is no download button, the download starts straight
away.
FTP - File Transfer Protocol. An FTP server is a server used to store and send f
iles.
OS - Operating system
vb - Microsoft Visual Basic. This is a coding language used to make a lot of pro
grams.
.NET - Microsoft .NET framework. This is another coding language made by Microso
ft. It is used to create programs.
C/C+/C++/C# - Commonly use coding languages. They are often used to code games.
IP address - The address used to identify your network while on the Internet. Ev
ery computer has a different IP address, and therefore every IP address is uniqu
e.
VPN - Virtual Private Network. This is a network you can connect to on a compute
r. It will give you anonymity while online. A VPN will hide your IP address by t
ricking sites and programs into thinking you are somewhere you are not.
Proxy - A proxy redirects web traffic through a virtual tunnel to another IP add
ress. A proxy is like a VPN but only tricks websites, not the whole computer. Th
at may seem like a lot of things to remember, but it's not that much considering
those are just the basics. Don't let that put you off learning though, once you
start to learn one thing, another will follow and so on so forth.
Keylogging
Keylogging is one of the most basic things in hacking. I explained what a keylog
ger is in section 6. Downloading a good, free keylogger isn't that hard to do. J
ust search around HackForums and you will find one in about 30 seconds. I would
recommend using SysLogger as it is free and really easy to use. It has many feat
ures and allows for the logs to be sent via Email or an FTP server. SysLogger ha
s a really nice interface, so you should be able to figure out how to use it. Ho
wever if you can't figure it out, or would like to know how to use it before get
ting it, here is a tutorial I typed up a while ago:
Are your friends bothering you? Need to get back at someone? Or do you just want
to learn some of the basics of hacking accounts? In any case, this thread will
be INCREDIBLY useful to you.
First of all, heres what this method will require and what it will involve:
-

Computer (duhh)
Internet connection
Keylogger, we will be using one called SysLogger
Target
Making a fake program that the target will want to open
An email (preferably a Gmail)

So, lets get started.


First thing you will need is SysLogger. You can download it at the bottom of the
thread.
Open it up. You will be given a message, just click 'OK'.

It should open up the GUI.

Tick the following boxes:


- Encrypt email
- Stealers
- Delete cookies
- Block AV sites
- USB spread
- Startup
- Kill Taskman (optional, leave blank if you want this to be more stealthy)
- Force steam
- Clipboard logger
- Screen logger

Those options will do the following:


Stealers = Sends you saved passwords for internet browsers
Block AV site = Stops the victim from checking an antivirus site if they get sus
picious
USB spread = Infects any USB devices plugged into the machine, so if they are pu
t into other computers they will infect them
Startup = Runs the keylogger every time the machine is switched back on
Kill Taskman = Stops the victim opening task manager
Clipboard logger = Saves anything copy/pasted
Screen logger - Sends you a screen shot of the victims PC
Next we have to tick the box called 'Enable Error'. This will give the victim an
error message when they open the file, make sure you put in something creative,
but relevant the fake program.

Click 'Test Error' to make sure it is working.

Now we need to fill in the mailing options. I recommend using mail as opposed to
FTP because it is more secure and its a lot easier. Put in your email address a
nd password. If you are using a Gmail you don't have to change the 'SMTP' option
s, if you aren't google the SMTP options for your email provider. Click 'test em
ail', if a box pops up saying success, you've done everything right, if not, go
back and do it again. There should be a box below that which says 'Interval'. Se
t that to whatever time you want.

Now click 'Change file properties'. This will open up another GUI. Find an icon
that suits your fake program here
The icon changer might not work for everyone. If it doesn't, download a free ico
n changer from google.

Close the properties window.


Click 'Build Server'. This will build the keylogging file. Make sure you have yo
ur antiviruses disabled as they will delete the file. You can reactivate them wh
en you are done.

Congrats, you've built the keylogger!


Now all you need to do is send it to your victim and get them to open it!
If you accidentally open your keylogger, just open up SysLogger and click 'Cure'
. Type in the name of the file and you will be cured.
I hope you guys find this useful!
If you do, please post a thanks.
Hope this helps you guys
SECTION 8 - RAT's
RAT stands for Remote Administration Tool (though some people say it stands for
Remote Administration Trojan). You can find a definition of what a RAT is in sec
tion 6. As I mentioned in that section, a RAT has a lot more functions than a ke
ylogger. Using a RAT can also allow you to get photos of your slave if they have
a webcam. I don't currently have a tutorial on how to use a RAT, so you will ha
ve to search for one yourself, sorry about that.
However I do recommend the following RAT's:
Dark comet (free)
Blue banana (paid, but very cheap)
They are very easy to use and have many useful functions. In my opinion I think
those are the best RAT's around (that don't cost too much).
SECTION 9 - Java Driveby's
Java driveby's (often referred to as JDB's) are the easiest way to infect people
with your RAT/keylogger. A detailed definition of a JDB can be found in section
6. But to sum it up in a few words, a JDB is a fake site that uses java to infe
ct people. JDB's are incredibly easy to set up. All they need is a webhost which
allows you to upload files. Some good free ones are 000webhost.com and dolphhos
t.com. I recommend 000webhost because it is easier to use. It also offers free d
omains.
SECTION 10
Crypters
Crypters are programs which are used to change the hash sum of a malicious file
so that they are not detected by anti-virus programs. Crypters which are FUD are
better because they make files completely undetectable. UD crypters make the fi
le mostly undetectable but some programs can still detect it. If you are thinkin
g about setting up a JDB or any other method of spreading your RAT/keylogger, I
recommend making your server FUD as it will increase the chances of actually get
ting slaves. If you want to get a crypter, there are a lot of free ones and paid
ones around. I recommend getting a paid one as it will stay FUD for longer.
SECTION 11 - Dosing and DDosing, what's the difference?
People often get confused when they are asked to explain the difference between
a dos and a ddos. It even confuses me a little bit but I will try my best to exp
lain it. A dos is a simple denial of service attack. It takes a web page offline
for a moment but the attack isnt distributed, so it won't affect everyone. It i
sn't that effective. However a ddos attack distributes the attack, meaning it wi
ll affect other people aswell. This is a much more effective way of taking down
a site as it will affect more people.
If you want to know how to do either of these, there are a few different methods
:
Dosing program
DDosing program
Use cmd to ping the site
Host booter
Refreshing the page
I will be going over the following:
- Using a DDosing program (DDos)

- Using cmd to ping the site (Dos)


- Refreshing the page (Dos)
Using a DDosing program: There are a lot of programs that can do this. I recomme
nd one called Goodbye. It's hard hitting and free. To download it go to: http://
www.mediafire.com/download.php?9jy6y8t9rjcj4fu
How to use Goodbye: Find the URL of the site you want to DDos. Type in the site
and then the page you want the traffic to go to.
Example: Site - website.com Page - /example.htm
Press "Start " to start the attack.
Once the number of blocked packets is above 400 you should stop the attack as an
ything after that will be redundant (won't have any further effect).
Pinging the site: I couldn't remember this method off the top of my head so I ha
ve referenced a post made on NextGenUpdate.
1. Open cmd and type 'ping example.com' ^Replace example.com with the site you w
ant to attack
2. Write down the IP address that shows up.
3. So you would type this in ur cmd: ping XX.XXX.X.XXX -t -l ##
^Replace XX.XXX.X.XXX with the IP address you want to attack
^^Replace ## with the amount of time you want to send the attack for. The longer
the attack, the more effective it will be.
4. Allow the process to finish. Check back a bit later to see if the site is dow
n.
Refreshing the page: You are probably thinking I'm an idiot for posting this met
hod, but it's probably not what you expected it to be.
I'd like to point out that this method does not involve:
Pressing F5
Clicking refresh
So... You guessed it. We will be using an auto-refresher. I recommend Auto-Refre
sh Plus in the Chrome webstore. Download it and select custom time. Set it to 1
second. This will reload the page every second, and eventually overload the serv
er. This may take some time.
SECTION 12 - Staying anonymous
Staying anonymous while online is something that many people can't seem to do. E
very day, I go on HF and look through the beginner hacking section. And every ti
me I see 10-20 threads all asking the same sort of thing. "How to hide IP?" "Cha
nge IP?" "Free VPN?" "How to staying anonymous?". And I always see the same repl
ies. "Damn kid. Doesn't even know how to use a proxy" "We are not your army" "Ev
er heard of this magical thing called Google?" "Use the search button before pos
ting". For those of you that encounter that sort of thing, I hope the following
sections answer your questions. First off, why is it important to stay anonymous
? Well, this question shouldn't really need answering. If you don't stay anonymo
us, your effectively allowing people to steal your identity. It's important to c
over your tracks while online because there will always be somebody there, waiti
ng to exploit even the first slip-up they see. Moral of the story: STAY ANONYMOU
S!! The following 4 sections will teach you how to do that.
SECTION 13
Proxies
Everyone has heard of proxies. Thing is, most people have no idea how to use the
m. Before I show you how to use a proxy, I will explain a little bit about what
a proxy is and what it does. Every network has its own IP address. When you visi
t a website, it logs your IP address. Now, some websites don't like certain IP a
ddresses to access them. So they block that IP address from accessing the page.
What a proxy is, is basically a tunnel that all the traffic from that page goes
through. The tunnel sends the traffic to another IP address. This tricks the web
site into thinking that the IP address at the end of the tunnel is yours, and al
lows you access to the page. Now that you know what a proxy is, you can set one
up. First off, find a proxy (free proxies can be found at http://hidemyass.com).
Every (common) browser has proxy settings, so find your browsers proxy settings
area. For Google Chrome, go 'Tools'-->'Advanced'-->'LAN options'-->'Proxy setti

ngs'. Type in the proxy then select the appropriate settings (e.g. HTTPS or Sock
s5). Then you need to restart Chrome (just close it then open it again). Go to h
ttp://whatismyip.com to check if the proxy is working properly. If it is, it sho
uld display a different IP to your actual one.
SECTION 14 - VPN's
Many of you have probably heard of VPN's before. For those of you who don't know
what they are, VPN's are VirtualPrivateNetworks. A detailed explanation of what
they are can be found in section 6. Connecting to a VPN is really easy.
I will teach you how to connect to a VPN on:
Your PC
Your iDevice
Before I teach you how to do that, you will need to find a VPN to use. Here is a
list of VPN's you might want to try.
Free VPN's:
http://bestcanadavpn.com Best Canada VPN
http://hideme.ru HideMe.ru
http://hotspotshield.com Hotspot Shield
Paid VPN's:
http://hidemyass.com HideMyAss
http://nvpn.comn VPN
http://openvpn.net OpenVPN
How to connect to a VPN on your PC:
This will teach you how to connect to a VPN on your PC.
- Click on the WiFi icon on the taskbar.
- Select the option Open Network and Sharing Center
- Click Connect to a new connection or network - Select Connect to a workplace and t
hen click next
- Click next - Select Use my internet (VPN) - Type in the address of the VPN you w
ant to connect to
- Type in the username and password then click Connect - You should see the scre
en
You re done! This should appear.
How to set up a VPN on your iDevice:
Heres how to connect to a VPN using your iDevice. For this tutorial we will be u
sing the free VPN, BestCanadaVPN. I will be going over all the steps needed to s
et this up and a few other things. First off, you need to open up settings. Now
go "General"-->"Network"-->"VPN" Now tap the "Add VPN configuration" button. It
will bring up this menu. Now fill in the boxes with these. Description: VPN Serv
er: bestcanadavpn.com Account: free Secret: (put anything here) Now we need to g
et the password. So open up safari and head over to bestcanadavpn.com You will s
ee the password on the homepage. Now type the password into the "Password" box i
n the VPN configuration. Now tap "Save". Congratulations! You have just set up t
he VPN on your iDevice! Now you need to connect to it. To do that just press the
"On" button. Once you are connected, it will say so and a VPN icon will appear
in the status bar. ***PLEASE NOTE*** The VPN password changes every 24 hours. Us
ing a VPN will provide a significant amount more protection that a proxy, but wo
n't make you completely untraceable.
SECTION 15
Alternatives, tips and tricks
This section will cover some of the alternatives to proxies and VPN's. These met
hods are probably a little bit harder to use, but they are just as good (if not
better).
Change your IP
Most routers have a setting which allows you to clone your MAC address and set i
t as your IP address. This allows you to hide your location and disguise it as.
Use anonymous web searches Some sites offer anonymous web searches. This doesn't
offer very good anonymity, but hey, it's better than nothing.

Ctrl+Shift+Delete
This amazing little shortcut can clear cookies and data, web history and autofil
l data incredibly quickly! It's great and takes almost no time to do.
Put Tor on a USB
Tor is a network which provides anonymity while on the Internet. Most schools wi
ll not allow you to download it and install it. So just download it onto a USB a
t home and run it when you get to school. Your school won't have a clue what you
are doing online!
Use private browsing
Most browsers have a private browsing option. This opens up a ******* which does
n't save cookies, and can't be tracked in an administrator system. Its great bec
ause anyone can use it.
Double Desktop Switcher
Yup, everyone knows this one, but it does work! Download Double Desktop Switcher
onto a USB and bring it to school. You can do whatever you want and when a teac
her walks by just press the hotkey to change screens.
Use your mobile/iPod
Most schools think they are smart an monitor all the traffic on their computers.
The reality is that they are dumb idiots as they don't monitor mobile traffic.
I have downloaded torrents and done a whole bunch of stuff on my iPod and my sch
ool hadn't had a clue!
Use public computers
Don't do hacking stuff from home. Go to an Internet cafe or the library. Bring a
ll your stuff on a USB and run it from that.
Combine methods
If you seriously
and use a public
Go online using
b proxy. Open up
ing.

want to stay safe while online, try this: Go to a public place


computer. Sign in with fake information. Connect to a paid VPN.
private browsing. Then set up your browser so it used a paid we
Tor on your USB. Go to a site which offers anonymous web search

With all of that, your Internet will probably be so slow it's unbearable, but yo
u will be anonymous!!!! Oh yeah... did I mention that all of these will slow you
r internet connection speed? No? Too bad.
I m kidding. They will slow down your connection, but not by very much, so the tra
de-off is worth it.
SECTION 16
Extending your knowledge
Don t learn to hack, hack to learn . You ve probably seen that posted all around the in
ternet. To a certain extent, it s true. Hacking is often used to gain knowledge yo
u wouldn t otherwise be able to know. However if you don t learn to hack, how can yo
u hack?
This section will help you discover ways to extend your knowledge of hacking. No
w, in order to do this, you will need to spend extensive amounts of time browsin
g the internet. There s no other way. There are also no shortcuts. If you don t put
in the work, you won t get the results. End of story.
Now that we ve got that out of the way, let s begin.
Since you re probably too lazy to use google, here are some useful sites
Those are pretty much the only sites you will need to start off with. They have
almost ENDLESS supplies of knowledge, and have relatively friendly members. Sign
up for those sites and you ll be well on your way to becoming a successful hacker
.
SECTION 17

Closing section

Congratulations, you ve finally reached the last section! I bet it took you a whil
e to read through all of that, but you ve probably learned a lot too. Now most of
my knowledge has been passed down to you. I put a lot of time and effort into ty
ping this up (7 hours to be more precise), and spell-checked this over 50 times.
I even added images in (lucky you) so this guide would be easy to follow. So pl
ease, post a short thank you message in the original thread. That takes 30 secon
ds, this took 7 hours.
Remember, knowledge is power. But if you misuse that power it will be taken away
from you. Stay true to yourself and the world will do so aswell.
ccvabh[at]yahoo[dot]com

Вам также может понравиться