Altminer
Pular para o conteúdo principal
BitFun - Play and Earn free Bitcoin
Bitcoin Group on Telegram Bitcoin News on Telegram Youtube Group on Telegram Litecoin Mining Bot on Telegram Bitcoin Mining Bot on Telegram Ethereum
 Mining Bot on Telegram Monero Mining Bot on Telegram

Bored! Entry

im feeling very bored now..so here i am, blogging..lol..
i dont know what to write though..
any suggestions?

national day? nah, not interested..the celebrations are so similar all these years..cant they come out with something more interesting and different?

exams? nope, im not going to stress myself out again..

piano? well, im currently playing lizst and mozart..

food? my mum's cooking tom yam tomorrow..yeah! lol..=p

love? come on, i have so many things to attend to and there's no time for me to look for a girlfriend ya?

emotions? mixed? BORED!!! that is definite..ha..

ambitions? i want to be a great figure on an international level..it's fine if you doubt me now because i admit to my weaknesses..however, you will soon notice some changes in me..very soon..im going to be greater than you can ever imagine..

me? arrogant, ambitious, lazy, emotional, strict on others, bad at social interaction, greedy, easily provoked and horny?! lol..

am i a good lover? well, it's for me to know and for you to find out..why dont you come and gauge for yourself? lol..no offense..i was just trying to get a little cheeky..=p

someone in mind? im not denying but i currently have one in mind, AND IT'S A GIRL!!! (this is emphasized specially for some nothing-better-to-do people out there who always spread useless rumors around..you know who you are..lol..=p ) who is it? my ex-girlfriend? the girl next door? nah, im not going to tell you..lol..=p

*yawns*

im feeling tired now..cya..

The following message is just for a girl named Daphne Ding:

lol..i thought i was forgotten when i went to visit your blog and didn't see my name in the list of people you thanked..but in actual fact, my name was the BIGGEST and was in bold at the bottom of your entry..lol..glad you like the tune i transposed specially for you..=D let me think of what to give you for your birthday next year..hmmm..bring a bouquet of roses to your school and give it to you in the middle of your lessons? lol..=p that's it for now..take care ya? ha..

Comentários

  1. Haha. I'm bored too. That's why I'm here. Anyway, you are such a pot. You also belong to the group of "nothing-better-to-do people out there who always spread useless rumors around". You know what I'm referring to.

    RARRRRR. =)

    ResponderExcluir
  2. ooo now let sings
    "who's tt gal? lalalalalalalalalalala.."

    lol. trying to spastic over here. haha! since shuxian roared. i shld too!

    RAWRRRRRRRR!!!

    ResponderExcluir
  3. paiseh tt was me^ forgot to leave my name..

    ResponderExcluir
  4. LOL yes shuxian i noe what u are referring to. MUAHAHAHAHA

    ResponderExcluir
  5. Come on, I didn't spread the rumors and i've tonnes of stuffs to do too, it is for all to see your sexual preference. And the love part i abso-fucking-lutely disagree because it's a you-cant-find not a you-don't-want-to-find. Anw your post make my hair stand. Have a nice day!

    Your best pal =)

    ResponderExcluir

Postar um comentário

Postagens mais visitadas deste blog

MANUAL HACKER PORTUGUES - TECNICAS DE INVASÃO | RECOMENDO

INTRODUÇÃO Através dessa monografia pretendo mostrar as formas de ataque e defesa contra hackers na Internet, os programas mais usados pelos invasores, como eles agem com alguns programas, como conseguem invadir um sistema através dos protocolos de Internet tipo TCP/IP utilizando o Telnet do Windows 9X, invasão via FTP, ataques por Monitoração, criação de conta falsa, escuta pelo celular, formas de correção de problemas que vieram com o IE4 que facilitam a invasão do computador, as linguagens de programação mais usadas na rede(um breve histórico sobre cada uma delas), programas mais utilizados para ataque e defesa na rede (Trojans, Rastreadores, Desencriptadores, Nukes e E-mails Bomba), algumas dicas para quebra de senha da Bios do computador, formas de alterar a cor do MS-DOS 6.xx ou superior, Monitoramento de uma rede, como funciona cada protocolo da Internet, como encher o HD de porcaria, para que serve cada chave do registro do Windows 9x. Tenho como finalidade não a de ensinar com

MANUAL HACKER PORTUGUES - TECNICAS DE INVASÃO | RECOMENDO

INTRODUÇÃO Através dessa monografia pretendo mostrar as formas de ataque e defesa contra hackers na Internet, os programas mais usados pelos invasores, como eles agem com alguns programas, como conseguem invadir um sistema através dos protocolos de Internet tipo TCP/IP utilizando o Telnet do Windows 9X, invasão via FTP, ataques por Monitoração, criação de conta falsa, escuta pelo celular, formas de correção de problemas que vieram com o IE4 que facilitam a invasão do computador, as linguagens de programação mais usadas na rede(um breve histórico sobre cada uma delas), programas mais utilizados para ataque e defesa na rede (Trojans, Rastreadores, Desencriptadores, Nukes e E-mails Bomba), algumas dicas para quebra de senha da Bios do computador, formas de alterar a cor do MS-DOS 6.xx ou superior, Monitoramento de uma rede, como funciona cada protocolo da Internet, como encher o HD de porcaria, para que serve cada chave do registro do Windows 9x. Tenho como finalidade não a de ensinar com

Puro Desejo Com Frota e Rita Cadillac – Brasileirinhas

Clique Aqui para Assistir Filmes Porno Online. Obrigado Pela Visita!

Páginas