exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

The Bastard Operator From Hell

The Bastard Operator From Hell
Bastard1.html
Posted Sep 3, 1999
Authored by bofh

Beginning Bastard (BOFH numbers 1 to 4)

tags | magazine
SHA-256 | 2032a7ee521410c1b3df1a98d57141b344edf1ba0562c03cbec07e3a5d634ab3
Bastard2.html
Posted Sep 3, 1999
Authored by bofh

The Real Bastard (BOFH numbers 5 to 8)

tags | magazine
SHA-256 | 8d89f51bf70c02a6280cbdb1614bdab084cc0c2eed310c2fcf3304f1c74687b4
Bastard3.html
Posted Sep 3, 1999
Authored by bofh

What a Bastard (BOFH numbers 9 to 13)

tags | magazine
SHA-256 | 3245f29d7a2d6c671137f355de2b8e50eb70e0cbc84098cf6a16cc4ab2b722d3
Bastard4.html
Posted Sep 3, 1999
Authored by bofh

Bastard Manages (BSMH numbers 1 & 2)

tags | magazine
SHA-256 | dfff16b0e4a950469d40db3ddab464e72cdee7da2ff2c48801e82c62b78aa689
Bastard5.html
Posted Sep 3, 1999
Authored by bofh

Quite a Bastard (BOFH numbers 14 to 15)

tags | magazine
SHA-256 | a615f5b0117d62736b2962c8f2e84acfc4081827dcd69fe962b4f89a06427a6e
Bastard6.html
Posted Sep 3, 1999
Authored by bofh

A Foreign Bastard (BOFB numbers 1 & 2)

tags | magazine
SHA-256 | 79141fe190dcc2d8aba8e4853d72c15d74ff9a3aa9a8cd14feed226b3089cc26
Bastard7.html
Posted Sep 3, 1999
Authored by bofh

The Last Bastard (The Last BOFH)

tags | magazine
SHA-256 | 49f4d5cccb7a1ea12351d3ce2ad9ee6752f35be19b95d0e28a182252df4f8a1e
Bastard8.html
Posted Sep 3, 1999
Authored by bofh

Bastard History (FAQ etc about BOFH)

tags | magazine
SHA-256 | 003cb94ee5ca3be5eefcadf057634dc3f004e0b072ae53a52a7761ced89eb416
BeforeBastard.html
Posted Sep 3, 1999
Authored by bofh

Before the Bastard (Intro & scripts that birthed the BOFH)

tags | magazine
SHA-256 | 01822518ba373ea66f0ed34da5858f7bad73ea8e1f588559687984bd31e78b6a
bib.html
Posted Sep 3, 1999
Authored by bofh

The Bastard is back

tags | magazine
SHA-256 | 0738bd2708a104bbec747ed85f961884b6895afa6a0251ff320930df4c8c8d10
bofh_where.html
Posted Sep 3, 1999
Authored by bofh

Where the bastard came from

tags | magazine
SHA-256 | ae6d98e688cd5de1ffbf8891fd1380d9b56652f7df7541c6c183baa3f7f3b82a
bofh-16.html
Posted Sep 3, 1999
Authored by bofh

The Bastard Operator from Hell goes Meglomanic - The Sealed Section

tags | magazine
SHA-256 | 5f7aea15550651c18b8576f33d7326a4acd9dcd77aeab52e90fe450b24b5d965
bofh-glossary.html
Posted Sep 3, 1999
Authored by bofh

Getting to Know Your Computer: A Short Glossary of Computer Terms

tags | magazine
SHA-256 | f10841f502571379460f956c9d5d70668db990f46153f7f8cd18ab62abc5f75c
bofhfaq.html
Posted Sep 3, 1999
Authored by bofh

The PreHistory of BOFH / The BOFH FAQ

tags | magazine
SHA-256 | d096efd625f4ea824ad08b2b1e04bea564ce25f7ffd1f19400a878d865d86ebd
brb.html
Posted Sep 3, 1999
Authored by bofh

The Bastard returns briefly

tags | magazine
SHA-256 | 47050024efa5378028a61db9d94ebdac988e6f80d1fbf9d8ec84d2facd66a1e6
bsa.html
Posted Sep 3, 1999
Authored by bofh

The Bastard's still about

tags | magazine
SHA-256 | 313599862c16e538dfba56bc1555179fb6d1ca6e34426bf16b7c7727cf4e71e1
Striped.html
Posted Sep 3, 1999
Authored by bofh

The striped Irregular Bucket

tags | magazine
SHA-256 | 80edd18ebf7b1746573da0acd795f2d62beaf4304a4641ef908177f4b3f7cd76
tradeshow.html
Posted Sep 3, 1999
Authored by bofh

The Bastard goes to the Trade Show

tags | magazine
SHA-256 | 4afe68bfe3df398df067775e4cdf9f71b023b4d97800325fc86a35db07a4eebe
xmas95.html
Posted Sep 3, 1999
Authored by bofh

The Bastard Celebrates Christmas 95

tags | magazine
SHA-256 | 2857ad71bacd33cef54a019afacc6a9063037095e52592beb9242fa4eb029b43
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close