You are currently looking at Flamebate, our community forums. Players can discuss the game here, strategize, and role play as their characters.
You need to be logged in to post and to see the uncensored versions of these forums.
Daggertips's Flamebate Posts
View Daggertips's Profile- « previous
- 1
- 2
- 3
- next »
Search Results | ||
---|---|---|
UM... i confused help pleasedude, go to sentrilion, im bumuming you have not done the court case, if you have, go to your bookmarks and start clicking on the tabs till you find it (view post) |
04/22/2009 | |
Contest: Last **** you win 100 BP**** you
Log in to see images! (view post) |
04/21/2009 | |
Kyoubai pbumes 200,000 Auctions! To celebrate, let's auction off a very Special Item (The Master Ball [Offense +23/Defense +33]) with NO RESERVEholy sh1t, i bought this item from the co-op a while back n now its worth already past 5 mill??? wtf? i should sell mine now lol (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!twotowner Posted: |
04/20/2009 | |
HAPPY BIRTHDAY EVIL TROUT **Post inside for Epeen**Oleg Posted: |
04/20/2009 | |
HAPPY 4-20!!!!!!!WOOOOOOHOOOOOOO!!!!! Been on helluva day since i first started this thread! gotta love 4-20!
F*ck all the haterz Log in to see images! (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!The Unknown Comic Posted:
lol have you seen the fake you-tube vid of the shooting? (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!Cheins Sanchez Posted:
lol make a thread celebrating his b-day Log in to see images! (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!_BeDhEaD_ Posted: |
04/20/2009 | |
HAPPY 4-20!!!!!!!LeeroyNorris Posted:
weed bro, 4-20 is the national potheads holiday (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!Cheins Sanchez Posted:
lol, horrible luck bro
Log in to see images! (view post) |
04/20/2009 | |
HAPPY 4-20!!!!!!!Anybody else celebrating? Log in to see images! (view post) |
04/20/2009 | |
LOL GUYS I FOUND BOD'S SUPER SECRET IRC CHANNELcongrats (view post) |
04/17/2009 | |
MOAR Files, All cheapLook for daggertips, all file reserves are lower than the base price
http://forumwarz.com/auctions/show/194121-jonemoney-_ouch-hear http://forumwarz.com/auctions/show/194122-r-kelly-8211-trapped-in-the-cupboard-tune http://forumwarz.com/auctions/show/194123-how-to-type-8211-26-easy-steps-sdoc http://forumwarz.com/auctions/show/194124-x-wing-fighter-8211-real-specs-pres http://forumwarz.com/auctions/show/194137-x-wing-fighter-8211-real-specs-pres http://forumwarz.com/auctions/show/194136-r-kelly-8211-trapped-in-the-cupboard-tune
thats it, enjoy… (view post) |
04/15/2009 | |
Suggestion: Remove all users' posting access to GOTO 10Sadly, very few hackers are on here
And those that are, are mainly Script-Kiddies
But I am still for the idea of their being a forum here that only real hackers can access. I myself would use a cookie stealer. (view post) |
04/14/2009 | |
BP RAFFLE! You only need to post!whoop wooo! (view post) |
04/04/2009 | |
My Beautiful Scars - No Profit - Low Reservehttp://www.forumwarz.com/auctions/show/173920-my-beautiful-scars-gawk
The base cost is 11,000 however i set the reserve for 10,000
This means I am making NO profit what so ever on this item. If you are a new character that needs Luck + Ego, than this is for you.
Buyout of 15,000 (view post) |
04/04/2009 | |
Only Hours away from Confiker Strain C.The Confiker worm – arguably one of the nastiest critters to be unleashed in quite a while – is reportedly set to morph itself on April 1.
According to SRI’s detailed analysis of Confiker, variant C uses a different domain generation algorithm and other tactics such as a peer-to-peer protocol to coordinate with other infected systems.
Looks like it’s about to wreak more havoc – on April Fool’s Day no less. If you want to know exactly what goes on under the hood then be sure to SRI’s extensive write-up.
Source: http://windowsitpro.com/article/articleid/101772/confiker-set-to-morph-on-april-1.html (view post) |
03/31/2009 | |
3BP awarded every 200 Posts, with a grand prize of 10BP every 2000 posts! Post today!Log in to see images! (view post) |
03/31/2009 | |
China Accused of Mbumive Global Computer Spy Ring...this is rather interesting…
GhostNet In The Machine Paul Maidment, 03.29.09, 04:25 PM EDT Expect suspicions that China is spying on the world’s computers to intensify. More From Paul Maidment
The Information Warfare Monitor, a Canadian cyber-espionage watchdog, goes to pains not to point the finger of blame at the Chinese government for a mbumive China-based cyberspy ring it has uncovered. “While our analysis reveals that numerous politically sensitive and high-value computer systems were compromised in ways that cirgreat timesstantially point to China as the culprit,” it writes in a report issued March 29, “we do not know the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole.”
Beijing has always officially denied undertaking such electronic espionage. But given that the IWM has identified at least 1,295 compromised computers in 103 countries, mostly in the foreign ministries or embbumies of various Asian governments; that its investigation was triggered by a request from Beijing’s adversary, exiled Tibetan leader the Dalai Lama, who was concerned the computers of his network had been hacked; and past accusations that Beijing has engaged in cyberspying, including against the U.S., the old suspicions will not only be reawakened but intensified.
The IWM comprises researchers from Ottawa-based consulting firm SecDev Group and the University of Toronto’s Munk Centre for International Studies. Their investigation took 10 months and revealed that the hackers were using malicious software, or malware, that let them send and receive clbumified data from computers belonging to several foreign ministries and embbumies, as well as those of non-governmental organizations and news media.
The IWM dubbed the system GhostNet, after the ghOst RAT Trojan horse malware at the heart of it and which the researchers traced back to commercial Internet access providers on Hainan, an island off China’s southern coast (not, it should be said, that that is conclusive evidence of its true origin).
Whoever is behind this spying operation, it is the largest to have been uncovered in terms of its reach. What should most concern the rest of the world is that diplomatic cyberspying on this scale could easily be replicated in the business world, where industrial espionage is already well established.
“Regardless of who or what is ultimately in control of GhostNet,” the IWM researchers say, “it is the capabilities of exploitation, and the strategic intelligence that can be harvested from it, which matters most. Indeed, although the Achilles’ heel of the GhostNet system allowed us to monitor and dogreat timesent its far-reaching network of infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind.”
Source: Forbes.com http://www.forbes.com/2009/03/29/ghostnet-computer-security-internet-technology-ghostnet.html (view post) |
03/29/2009 |
- « previous
- 1
- 2
- 3
- next »