Tuesday, February 21, 2006

LEGAL FLiRTiNG

i have NEVER flirted in my whole entire life!

haha! kidding! of course i did. pero not flirting as in 'FLIRTING"! onti lang...

anyway, i went to my friend's house yesterday to do a project which i do not want to talk about because i am so damn tired of it! back to my story. me and a couple of my friends went to Gen's house. we stopped at the bakery to see someone named Mr. Baker. but un fortunately, Mr.Baker was not there and we had to go na. suddenly, Dave came and he asked us if he could come with us together with Anaceto. course we said yes.

we are SOCIAL people. (is there a thing such as this? cause people are really SOCIAL creat'res...)

so, we took a bus. lalalal...we all sang. Dave and Anaceto took off the bus. we went straight to Gen's house. we waited for Dave there. and at last after 13 reincarnations, he came. aba! at pumorma pa ang damuho! anyway.

Dave is a FLIRT person.

he flirted with one of my friends. haha! flirted.flirted.flirted. FLIRTED!

he is a certified FLIRTER.
kung maysex guru, meron na ring flirt guru ngayon.

goddamn it! if you saw him flirting...ohhhh...i tell you, you might want to kick his most-sensitive part cause i did, want to kick him i mean. i didnt kick his most sensitive part. ano ko? KABAYO?

K-4C

Virus Information Discovery Date: 06/01/1993 Origin: Sweden or The Netherlands Length: 737 Bytes Type: Virus SubType: File Infector Minimum DAT: 4002 (12/02/1998) Updated DAT: 4002 (12/02/1998) Minimum Engine: 4.1.60 Description Added: 06/15/1993 Description Modified: 06/15/1993 12:00 AM (PT)
Virus Characteristics: K-4C is a memory resident, file infecting virus. K-4C is a later version of the K-4B virus.
Symptoms The following text strings are encrypted within the K-4C virus:
"K-4C VIRUS by K"hntark*.COM"
"????????COM"
Files infected with the K-4C virus have a file length increase of 737 bytes. The virus is located at the end of the file. The file's date and time are not altered.

Removal Instructions All Users : Script,Batch,Macro and non memory-resident:
Use current engine and DAT files for detection and removal.
PE,Trojan,Internet Worm and memory resident :
Use specified engine and DAT files for detection. To remove, boot to MS-DOS mode or use a boot diskette and use the command line scanner:
SCANPM /ADL /CLEAN /ALL
Additional Windows ME/XP removal considerations
Users should not trust file icons, particularly when receiving files from others via P2P clients, IRC, email or other mediums where users can share files.
AVERT Recommended Updates :
* Office2000 Updates
* Malformed Word Document Could Enable Macro to Run Automatically (Information/Patch )
* scriptlet.typelib/Eyedog vulnerability patch
* Outlook as an email attachment security update
* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield
It is very common for macro viruses to disable options within Office applications for example in Word, the macro protection warning commonly is disabled. After cleaning macro viruses, ensure that your previously set options are again enabled

HAHA! sabi sa inyo puro virus na nasa utak ko ehh!

0 Comments:

Post a Comment

<< Home