An analogy for an exceedingly loose girl, most likely used and abused by many men, in various manners, creating a frictionless tube of whoreness. This term is considered to be significantly worse than a four-finger girl.
Ryan, “Screwing a Moffat is like throwing your hotdog down a hallway.”
Matt, “No kidding I was using both fists until my class ring came off and got lost.”
A virus is created from those social pariahs known as Hax0rs. These exiled individuals have been excreted from societys lowly depths and have evolved into the robust, 200 pound entitys that remain undisclosed in there parents basments forced to a life of sitting in a chair in dark surroundings with the simpsons on. They reject the sun for fear of skin pigment. With there knowledge of DOS and Visual basic they create what the bielve to be Godlike Programs called viruses. These viruses are designed to travel through the use of either direct ip connections or the spread through email, p2p, and other network connections. They in entity are simple and small programs with the command to infect registry files most commonly hidden files such as the WIN 32 Directory. once established they replicate themselves in emulation to a real viral infection but this virus does not attack the immune system. It instead becomes a memmory hog by sucking system power and changing system settings in order to protect itself. The best way to protect yourself against a virus is to not get infected in the first place. Do not download attachments from email even if it says its from somone u know as it could be a virus sent through that contacts address book. If you simply must use a p2p application create a seperate share file in which ur files downloaded go then use a virus protection software to monitor, and quarintine that folder. If you bielve you have downloaded a trojen virus (which is a program created so a the person on the other end can interact with your computer) then pull out your network connection imiedietly as to prevent that person on the other end from doing any further damage. A trojen is most of the time harmless because rarley do other people know how to use them. They are set up in this standard: Client and server. You are sent the server and the hacker has the client sort of a master and slave theory.
heres a tip: Do not run multiple virus software as they will try to compete with eachother and essentially do not work propperly. I suggest visiting www.download.com and try AVAST. You could also get a subscription service like norton and mcafee. also remember that virus software always needs to be updated and quite freqwently or else its ussless as viruses constanly change and new definitions are added.
Also keep firewalls active but just like software do not have competing firewalls. Windows xp sp2 has an integrated firewall but if that doesnt fit your bill you could try zone alarm.
Install a router, seems like everyone has em now anyway but it does keep you hidden. For those who know how to port forward be weary of your virtual ports. check them freaqwently to see if theres any activity. Theres reports of viruses being active in bittorent protocal also.
MOST IMPORTANT: never giv your I.P. to anyone.
"I am a maligment program created for the purpose of infection and replication"