Jump to content

Tech 425

Staff Leaders
  • Content Count

  • Donations

  • Joined

  • Last visited

  • Days Won


Everything posted by Tech 425

  1. Hitler-owned book hints at Nazi plans for North America A book once owned by Adolf Hitler provides a chilling look at what may have been his interest in extending the "Final Solution" to North America. The book was written by a Nazi researcher who spent time in the US before the outbreak of World War Two. It has been acquired by the Library and Archives of Canada, and was once owned by a Holocaust survivor. The Final Solution was a code name for the Nazi's goal of committing genocide against the Jewish people. The Nazis killed about 6 million Jews during the Holocaust, mostly from Europe. The book - Statistik, Presse und Organisationen des Judentums in den Vereinigten Staaten und Kanada (Statistics, Media, and Organisations of Jewry in the United States and Canada) - provides details on the Jewish population of large cities such as New York and Montreal, as well as small Jewish communities throughout North America. "This invaluable report offers a documented confirmation of the fears felt so acutely and expressed by so many Canadian Jews during the Second World War: that the Nazis would land on our shores and with them, the annihilation of Jewish life here," said Rebecca Margolis, who is president of the Association for Canadian Jewish Studies. "While these fears may seem unfounded given the geographic distance of Nazi Europe to Canada, this handbook offering detailed statistics of Jewish populations across North America underlines their nightmarish potential." The book was compiled in 1944 by Heinz Kloss. Kloss was a Nazi researcher who lived in the US between 1936-1937, and it likely his research on American and Canadian Jews was aided by Nazi sympathisers living in North America. Hitler is said to have had a vast library containing anywhere from 6,000 to 16,000 books. The Library believes the book was brought to the US as a war souvenir by a soldier who raided Hitler's alpine retreat outside of Berchtesgaden in 1945. It was acquired from a respected Judaica dealer, who obtained it from the personal collection of a Holocaust survivor. Well I'm Extremely Happy Hitler and the Nazi lost WWII
  2. Anatova is a Nasty New Ransomware that Targets Gamers A new strain of ransomware has been discovered, and it’s a nasty one which is apparently targeting gamers as well as PC users in general. McAfee has dubbed the fresh threat Anatova, and it’s a sophisticated piece of ransomware deployed by experienced malware peddlers. Anatova apparently employs the icon of either a game or application in order to entice the user to double-click it. McAfee discovered the threat lurking on a peer-to-peer file sharing network, and not only does it boast strong protection techniques to defeat analysis, it’s also built with modular extension in mind. In other words, malicious actors can easily bolt-on fresh malware capabilities to the strain, meaning it could potentially evolve quickly, and spread further online as multiple different threats. Worryingly, McAfee also notes that Anatova is sophisticated enough that typical anti-ransomware tactics could prove ineffective, and it cleans up after itself, including taking measures to “prevent dumping memory code that could assist in creating a decryption tool”. Dash demand Anatova encrypts as many files as it can on the target PC – or connected network shares – before demanding the payment that gives ransomware its name. In this case, victims are expected to pay up in the form of cryptocurrency, as ever: 10 Dash is required to (theoretically) unlock files, which equates to about $700 (around £540, AU$980). This strain of ransomware has been discovered most prevalently in the US, but also in the UK, and across Europe. As ever, use common sense when downloading files to your PC, and try to avoid any dodgy-looking sources – stick to official stores where possible – or ‘offers’ that seem too good to be true (they almost certainly are). It doesn’t hurt to have a strong antivirus solution on your PC, either, which may warn you if you happen to navigate to a suspect website. Equally, when it comes to cure rather than prevention, you should keep regular backups of all your data, so if the worst happens and some kind of ransomware strikes – or indeed even a critical hardware failure – you have a fall-back solution.
  3. Tech 425

    The End of Net Neutrality: Why You Need a VPN

    I have 3 VPN's and I live on Pluto, So that = Screw them ISPs
  4. Massive breach leaks 773 million email addresses, 21 million passwords The best time to stop reusing old passwords was 10 years ago. The second best time is now. It emerged that more than a billion unique email address and password combinations had been posted to a hacking forum for anyone to see in a mega-breach dubbed Collection #1. The breach was revealed by security researcher Troy Hunt, who runs the service allowing users to see if they’ve been hacked called Have I been Pwned. He has now loaded the unique email addresses totalling 772,904,991 onto the site. The data includes more than a billion unique email and password combinations – which hackers can use over a range of sites to compromise your services. They will do so by utilizing so-called credential stuffing attacks, seeing bots automatically testing millions of email and password combinations on a whole range of website login pages. The data originally appeared briefly on cloud service MEGA and was later posted to a popular hacking forum. The Collection #1 folder is comprised of more than 12,000 files weighing in at 87 gigabytes. Most concerningly, the protective hashing of the stolen passwords had been cracked. This means they are easy to use because they are available in plain text rather than being cryptographically hashed as they often are when sites are breached. Should I be worried? In a word: Yes. It’s a massive concern, not least because scale of this breach is huge: Yahoo’s breaches saw 1 billion and 3 billion users affected but the stolen data hasn’t actually resurfaced yet. And unlike other huge hacks such as Yahoo and Equifax, this breach cannot be tied down to one site. Instead it appears to comprise multiple breaches across a number of services including 2,000 databases. Hunt says there are many legitimate breaches in the directory listing, but he cannot yet verify this further. “This number makes it the single largest breach ever to be loaded into HIBP,” he adds in a blog. What’s more, his own personal data is in there “and it's accurate”, he says. “Right email address and a password I used many years ago. Like many of you reading this, I've been in multiple data breaches before which have resulted in my email addresses and yes, my passwords, circulating in public.” Finding out if you’re affected If you are one of the 2.2 million people that already use the Have I Been Pwned site, you should have received a notification: Nearly half of the site's users – or 768,000 – are caught up in this breach. If you aren’t already a member, you need to visit Have I Been Pwned now. Once on the site, you simply need to type in your email address and search, then scroll down to the bottom of the page. The site will let you know if your email address is affected by this breach – and while you are there, you can see if your details were stolen in any others too. https://haveibeenpwned.com/ To find out if your password has been compromised, you separately need to check Pwned Passwords– a feature built into the site recently. This feature also helps you to use strong passwords: if yours is on there, it’s safe to assume others are using it and your accounts could be easily breached. https://haveibeenpwned.com/Passwords What if my details are there? Hunt says in his blog: “Whilst I can't tell you precisely what password was against your own record in the breach, I can tell you if any password you're interested in has appeared in previous breaches Pwned Passwords has indexed. If one of yours shows up there, you really want to stop using it on any service you care about.” If you have a bunch of passwords, checking all of them could be time-consuming. In this case, Hunt suggests 1Password's Watchtower feature which can take all your stored passwords and check them against Pwned Passwords in one go. https://1password.com/ Most importantly, if your password is on the list, do not ignore it as it can be used in credential stuffing attacks mentioned earlier. Hunt says: “People take lists like these that contain our email addresses and passwords then they attempt to see where else they work. The success of this approach is predicated on the fact that people reuse the same credentials on multiple services.” More generally, as the number of breaches and their sheer scale increases, it’s time to clean up your password practices. In addition to using two-factor authentication, passwords should be complex – such as a phrase from a favourite book or a line from a song. At the same time, security experts don’t rule out analogue books containing your password – as long as these are not stored on your device or with it. If you take these measures into account you should be able to avoid using the same password across multiple sites. Ideally, start using a password manager to ensure you can remember these. Have I Been Pwned https://haveibeenpwned.com/ Pwned Passwords https://haveibeenpwned.com/Passwords 1Password https://1password.com/
  5. Yea wait until I found out who pwned me, They think I'm at War with Uranus, Well I shove them up Uranus A$$
  6. Judge orders Net Neutrality lawsuit to go ahead Despite Shutdown This week the possibility emerged that the ongoing government shutdown could delay net neutrality’s day in court — but the court was not sympathetic to the FCC’s request that the lawsuit be put off. Oral arguments for this major challenge to the agency’s rollback of 2015’s internet regulations will go ahead as planned on February 1. During a shutdown, federal employees — including government lawyers — must have specific authorization to continue working, since it’s illegal for them to do so without pay. In this case a judge on the case must effectively make that authorization. The FCC is among the many agencies and organizations affected by the shutdown, and many employees are stuck at home. As such it requested a postponement of an upcoming court date at which it and several companies and advocacy groups are scheduled to argue over its rollback of net neutrality. A counter-argument filed immediately by industry group INCOMPAS pointed out that during previous shutdowns, the court had not granted such requests and should stick to that precedent. The judges of the D.C. Circuit Appeals Court appear to agree with the latter argument; the FCC’s motion was denied and arguments will go forward as planned on February 1. This is definitely not good news for the FCC. While it no doubt has its ducks in a row as far as defending its net neutrality rollback and new rules in court (it has done so before and will again), it’s far from ideal that the case will take place after a prolonged absence of all the pertinent experts from their posts. Briefing the lawyers, updating arguments, responding to industry concerns — it’s not easy to do when all your staff is sitting at home watching “Bandersnatch” over and over. The lawsuit against the FCC has lots of good points to make about the rules it has established and the process by which it approved those rules, so this is no mere formality or frivolous suit. And net neutrality champions are likely happy to hear that they may very well catch the agency flat-footed. The judges of the D.C. Circuit Appeals Court appear to agree with the latter argument; the FCC’s motion was denied and arguments will go forward as planned on February 1.
  7. How This Small Piece of Metal Can Destroy the Invincible 5.9l Cummins Turbo Diesel Let’s talk about an engine that has earned the reputation of invincibility - the Cummins 5.9L Turbo Diesel. It’s a powerplant that has gained notoriety among the auto community unlike any other engine from its category. Quite frankly, it maintains one hell of a cult following. I’ve even taken a few sips of the holy water. But one little part can make it all go wrong. Call it a guilty pleasure if you must, but there is just something about the second-generation… Back in the late ’80s, American truck manufacturers were upping the ante for the heavy-duty pickup market. Ford and Chevrolet were offering diesel engines that began redefining what “heavy duty pickup” truly meant. Chrysler, in a rare stroke of genius, decided to join the race by using an industrial-grade engine from a manufacturer known for reliable and powerful oil burners: Cummins. No diesel engine on earth is as legendary as a 12-valve Cummins. Not only is the inline-six known… Now, fitting an iron-block, 1,100 pound inline-six diesel behemoth engine into an otherwise standard 3/4 ton Dodge Ram led to all sorts of issues that could effectively write off the truck that surrounded it. Even still, the engine’s overbuilt nature meant it was more than capable of chugging along way past the chassis’ expiration date. That is until a piece of metal the size of a pebble had its say in things. This little piece of metal is so villainous it’s been given a name that is whispered in secrecy during moonlit Ram pickup owner gatherings: the Killer Dowel Pin. (That’s KDP for short.) What’s The Problem? You’ve probably heard of dowel pins before, but if not, here’s what they do. These small metal cylinders align precision-fit engine components to one another. In the example of the Cummins engine, a series of dowel pins ensure that the timing case at the front of the engine perfectly aligns with the cylinder block. Dowel pins serve an important but innocent purpose. That is because in nearly every engine ever created, dowel pins are captive within the components they are aligning; they are closed-off with no way to escape. However, in the 5.9L Cummins engine, there’s a dowel pin that isn’t captive; it can wiggle its way right on out of place. Normal engine vibration is all it takes for this to happen. There is no warning and there are no symptoms. One second the engine can be purring right along, the next the sounds of metal mashing and snapping fill the air. The failure can go down in many ways, but usually the end result is the same. That little dowel pin does its fair share of damage when it falls directly down into the timing gears at the front of the engine. Imagine, if you will, one of those penny press machines. You know, the ones that turn valuable, circular copper currency into an oval picture from a vacation you’re going to forget? That’s basically what the dowel pin is doing when it hits the timing gears. However, pennies are soft and malleable and the dowel pin is not. It’s made of the same steel the timing gears are, and neither of them are going to give up the fight until both are destroyed. A cracked timing case, a snapped camshaft, and mutilated valves and pistons represent some of catastrophic results that could occur when the timing gears are forced in unintended directions. Ultimately, the invincible engine can be taken down for good. The Fix: Luckily, there is a way to permanently fix the issue before it ever happens. It’s done by closing off the dowel pin’s exit. There are many vendors offering an inexpensive retrofit kit that consists of a small metal tab that covers the dowel pin’s hole. The tab is secured in place via a nearby timing case bolt. It’s a simple fix to a simple problem, so long as it’s caught before the carnage occurs. The problem is that a decent amount of disassembly is required to get to the dowel pin. You’ll first need to drain the coolant system and yank out the radiator and cooling fan. Then it’ll be time to pull out the serpentine belt and remove the massive harmonic damper from the crankshaft. At this point you’ll be met by the 20 bolts securing the timing cover to the timing case. Once the cover is out of the way, the killer dowel pin will be completely exposed. If you feel like taking this on yourself, be sure to study this much more thorough how-to here. At least proactively fixing the issue is less headache than requiring a new engine. Which Trucks? It’s important for me to state that the issue described above predominantly applies to the 6BT 12 valve 5.9L Cummins engines most notably found in 1989-1998 Dodge Ram pickups. There are a few reports of dowel pin issues in the 1998.5-2002 24 valve ISB-series of Cummins 5.9L engines as well, but these are rare. If you just bought a brand-new, $80,000 Ram diesel pickup, don’t worry. This issue doesn’t apply to you. The venerable Cummins 5.9L engine is certainly deserving of its robust reputation, but nothing is without faults. With this proactive repair you can have the invincible diesel engine you’ve always dreamed of.
  8. Google dropping Android apps who have no business reading SMS, call logs As open as the Android platform may be, it is also criticized for being just as open to abuse. Google has been trying to plug up holes that it may have left open in the past, though sometimes it accidentally also shuts the door on well-meaning developers’ faces. One recent example of that is its new policy on SMS and Call Log permissions which almost spelled trouble for Tasker. While the popular automation framework managed to dodge that bullet, Google is now reminding other developers that the hammer will be falling soon. The history of Android app permissions is a messy one but hindsight is always 20/20. All Google can really do damage control and try to curtail the broader permissions it allowed apps to have before. Unfortunately, sometimes such changes are bound to break things and ruffle a few feathers. That happened last November when Google announced that apps that currently have permissions for SMS and Call Logs but are not actually SMS apps or phone apps would be banned from Google Play Store. The idea was that those apps wouldn’t have any business being able to read what should be private data. In fact, those permissions have indeed been misused and abused to violate user privacy. Unfortunately, that new policy also hit apps like Tasker that, while not necessarily SMS or phone apps, allow users to automate the sending of messages or making calls. Accessibility apps also fell afoul of the policy so Google has given them some reprieve by letting them apply for an exception subject to review. That period for applying exceptions is now over and offending apps will soon be removed from the Google Play Store. Google isn’t closing the door, however, and developers can either remove the unnecessary permissions from their apps or submit a permission declaration to be reviewed. Hopefully, this could lead to a significant reduction in wayward apps, at least until some new permission becomes the new security hole.
  9. Tech 425

    How to defrag your Linux System

    How to defrag your Linux System There is a common misconception among GNU/Linux users that our systems never ever need to be defragmented. This stems from the success of the journalized filesystems used by most distributions including EXT2,3 and 4, JFS, ZFS, XFS, ReiserFS and BTRFS. All of these boast smart ways and techniques in regards to the files allocation in the disks, minimizing the fragmentation problem to a point that there is practically no reason to defrag even after many years of installing and uninstalling applications and libraries in the same system. Fragmentation though can still be an issue though, especially for users that use space limited disks that may not offer many file allocation options. Here's a bulk description of how the (Linux) file allocation procedure works: files are stored in multiple places in the disk, leaving huge unwritten space between them, allowing them to grow unobstructed over time if needed. This is in contrary to filesystems like the Windows' NTFS which places files next to each other consecutively. If the disk gets more crowded and a file needs more space to grow by staying in one piece, Linux filesystems attempt to re-write it completely on another sector that has enough space to store it as a whole. This way, everything is kept clean, tidy and in one piece each. Confined space though, causes this file “maneuvering” to get more challenging with time. Here's how to deal with this problem and how to actually defrag your Linux system. Now, the first thing that you'll need to do is get a defragment tool installed. There are many defragmenters available for Linux filesystems but I will use “e4defrag” as it is one that will most probably be already installed in your system. Using this tool, you can determine if you have fragmented files and how serious this fragmentation is. To do this, open a terminal and type: sudo e4defrag -c /location or /dev/device. Below, I have scanned my /home folder for fragmented files and actually found five of them. My fragmentation score though is quite low so defragging won't do much different in my system's performance in that case. If this outputs a score over “30”, then defragging would be a good idea. At first, I will demonstrate how to defrag using e4defrag, by defragging my fragmented files one by one. The e4defrag program is part of the e2fsprogs package which should already be installed on your computer. In case the program is missing, install it with this command on Ubuntu: sudo apt-get install e2fsprogs To do this I use the following command: sudo e4defrag Followed by the location and name of the file as shown in the screenshot below: This is good when you have to defrag just a couple of files like I did, but if you want to defrag your whole system then you should first unmount all partitions and run the following command: sudo e4defrag /dev/* If you want to perform defrag without unmounting, then: sudo e4defrag / Would be a safe choice. Since many users nowadays use SSDs and not HDDs, it is important to note that the defragmentation procedure is only beneficial for the later. If you own an SSD, there is simply no point in worrying about fragmented files as those disks can access their storage randomly, wheres HDDs access sequentially. Defragging your SSD will only increase the read/write count and thus reduce the lifetime of your disk.
  10. Tech 425

    Post Videos and .Gifs Here

    Homeowner snags purse from package thief's car
  11. Tech 425

    Post Videos and .Gifs Here

    A Mathematician on Valentine Day
  12. Tech 425

    Funny Pictures

    Hmmmmm is this Trailer Park Trash
  13. Tech 425

    Funny Pictures

    Worlds Best Haircut
  14. Tech 425

    Funny Pictures

    Womans Best Friend
  15. How to get the classic Windows Solitaire game on Windows 10 Solitaire has been part of Windows for a long time, and for many years, it has even remained one of the most popular games you can play on PC. The game was originally released with Windows 3.0, and since then, it's received a number of minor updates until Windows 7. Then on Windows 8.1, Microsoft replaced the classic with a modern version, which is known as the "Microsoft Solitaire Collection," and it remains until Windows 10. Although the new version of the game is free and bundles several other classic card games, you have to pay a subscription to unlock additional features and remove the advertisements. Whether you miss the classic, or you don't like the idea of paying for a game that once was absolutely free, there's a way to bring back the good ol' Solitaire to Windows 10. In this Windows 10 guide, we'll walk you through the steps to bring back the classic Solitaire game from Windows XP to your Windows 10 device. How to bring the classic Solitaire game to Windows 10 The process to bring back Solitaire is straightforward, but there's one little obstacle: You must have access to a Windows XP installation to download the files to run the game on Windows 10. Although you may be able to download the files from various sources, it's recommended to get the files from an old computer. If you don't have a Windows XP device, then an alternative option includes creating a virtual machine to extract the files. If you don't have an installation media, you can download the ISO using an MSDN subscription. Finding classic Solitaire files on Windows XP If you're using an old computer or virtual machine running Windows XP, use these steps to download the files on to a USB drive: Open Windows Explorer. Click on My Computer in the left pane. In the address bar, type the following path and press Enter: C:\WINDOWS\system32 Click the Search button. Click the All files and folders option in the left pane. Type the following search query and click the Search button: cards.dll, sol.exe Select the cards.dll and sol.exe files. Right-click the selection and select the Copy option. Open the USB flash drive. Right-click and select the Paste option to copy the files. Once you've completed the steps, you need to bring the files to your Windows 10 device. Installing classic Solitaire on Windows 10 To set up the Windows XP Solitaire game on Windows 10, connect the USB flash drive with the files and use these steps: Open File Explorer. Click on This PC in the left pane. Under the "Devices and drives" section, double-click the Local Disk (C:) drive. Click the New folder button in the ribbon menu to create a folder and name it Solitaire. Open the USB flash drive with the game files. Select the cards.dll and sol.exe files. Right-click the selection and select the Copy option. Inside the "Solitaire" folder, right-click and select the Paste option to copy the files. After completing the steps, double-click the sol.exe file to start playing the classic Solitaire game on Windows 10. And, yes, your game settings will be preserved. Creating a shortcut If you want quick access to the game, you can create a shortcut to Solitaire on your desktop with these steps. Right-click the sol.exe file. Select the Send to submenu, and click the Desktop (create shortcut) option. Once you've completed the steps, you can quickly start playing the classic Solitaire game from the desktop. Microsoft has also released updated versions of the classic Solitaire game for Windows 7 and Windows Vista, but it won't install as easy. If you want the real classic, then the Solitaire bundled in Windows XP is the one you want.
  16. Get Your Popcorn Because Nearby Galaxy to Collide With the Milky Way and Open Supermassive Black Hole Kiss Uranus goodbye because there is a cataclysmic space event a-comin’. The Milky Way galaxy is expected to be changed forever when a nearby galaxy collides with our galaxy and rips open a supermassive black hole. But on the bright side, the catastrophe that will end worlds will look really cool in the process. So there’s that, which is nice. On January 4th, a new scientific paper was published in the journal Monthly Notices of the Royal Astronomical Society that predicts were are on a collision course with the Milky Way’s nearest cosmic neighbor and that is a teensy problem. The Large Magellanic Cloud (LMC) is a dwarf satellite galaxy that is near our Milky Way galaxy and it could nudge us in a real bad way. The spiral of dust and stars is about 1/20th of the size of the Milky Way, but that doesn’t mean that it can’t end our precious existence in a split second. The Large Magellanic Cloud is approximately 160,000 light-years away and has a mass of about 10 billion suns. Scientists believe that the LMC will collide into the Milky Way which will rip open a dormant black hole. The Milky Way’s dormant black hole is known as Sagittarius A*, but if it is awakened it will disrupt anything and everything in the vast nearby area. By using a supercomputer collision simulator called “EAGLE,” scientists predict that the black hole will release cosmic radiation and will instantly obliterate some stars while tossing other stars quadrillions of miles out of orbit according to a team of astrophysicists at Durham University in Britain. Some stars could crash into each other causing unimaginable cosmic explosions that vaporize planets and anything else in the vicinity. Some stars will be flung into the center of the Milky Way. The black hole will devour all of the gas in the area and expand to 10 times its original size. “The destruction of the LMC, as it is devoured by the Milky Way, will wreak havoc with our galaxy, waking up the black hole that lives at its center and turning our galaxy into an ‘active galactic nucleus’ or quasar,” the study said. If the supermassive black hole transforms into a quasar, one of the brightest objects in the universe, we would get quite the light show. Quasars occur when a supermassive black hole consumes and then regurgitates celestial matter at near-light speed and it would “spew out immense amounts of energy at all wavelengths.” Quasars emit light that is up to 100,000 times brighter than the entire Milky Way galaxy, which would make for quite the show. Grab your telescope and popcorn because this cosmic event will be a magical sight to behold. The collision will be “a spectacular display of cosmic fireworks as the newly awakened supermassive black hole at the center of our galaxy reacts by emitting jets of extremely bright energetic radiation,” according to co-author Carlos Frenk. Now don’t get too worried because you won’t be around when all of this cosmic chaos goes down. Astrophysics believe this celestial collision won’t happen for another two billion years. “While two billion years is an extremely long time compared to a human lifetime, it is a very short time on cosmic timescales,” said lead author Dr. Marius Cautun, a postdoctoral fellow in Durham University’s Institute for Computational Cosmology. If you are alive in two billion years, you can rest easy to know that this massive collision probably won’t affect our sun or endanger life on Earth or whatever is left by then. That impact is roughly two to three billion years sooner than the expected collision between the Milky Way galaxy and Andromeda Galaxy, our nearby neighbor. The collision between the Milky Way and Andromeda is expected to be a very dire situation for everything in both galaxies. So relax, you’ve got at least four billion years until everything is obliterated.
  17. Tech 425


    I'm happy you are good 99.9% of the time if you pay they won't decrypt any thing as they are Big Time Scammers Please make sure you use a Anti-virus and be careful I have been using warez for a ton of years and I have yet to get infected But if this ever happens again use Boot Scanners to find out what you have and then look at the removers for that infection and you will find the best remover If you need any Help Please ask and I will do my Best to Help you
  18. Tech 425


    So are you still infected wit the Ransomware ? Because they are used to try and un-infect you Also what would be nice to know which Ransomware got you as there are different ways to handle this problem
  19. Tech 425

    plz leave win and all win

    Yes English Only and if you need help translating then you this: https://translate.google.com Sorry I only understand English and Plutonium and Not Gibberish
  20. Tech 425

    Sexy Girls & GUNS!!

    Yep Hot Girls can take all the Bad Guys down
  21. Tech 425

    Funny Pictures

    Dang then my Red Head Ex-Wife Witch (Well you know there is a B) will get off the hook as she is to High (Drugs)
  22. Tech 425

    Funny Pictures

    Yes Funny Neo and I really liked went MS asked me why I use Firefox and Opera instead of Edge and my reply was that the only thing Edge is good for is Bing searches so I can get MS Points to get free crap from y'all Dumba$$