First up for Earl. Please explain, in detail.Quote :""If you can break WEP, you can sniff out source mac addresses and spoof allowed addresses trivially." There are so many fallacies in this statement, I don't know where to begin. This is not always true in most cases."Last I checked, I was not Bobby and I created this thread out of my own volition. So why don't you MAN UP and explain your amazing insight on this topic Earl? Bobby WILL NOT EDIT YOUR RESPONSE TO THIS QUESTION.
10/17/2006 3:35:53 PM
i wish i could edit his face
10/17/2006 3:51:15 PM
10/17/2006 4:17:19 PM
bttt
10/20/2006 2:38:45 AM
getting trolled (See : bobbydigital / noen)
10/20/2006 8:29:50 AM
and loving every second (see: Noen)
10/20/2006 10:01:47 AM
See, Earl starts shit with people, but your solution is to re-energize the situation.
10/20/2006 12:21:36 PM
^ shut up, get the fuck out
10/20/2006 12:33:57 PM
i vote for[/Earl][Edited on October 21, 2006 at 11:37 AM. Reason : ]
10/21/2006 11:36:59 AM