The Best Kept Secrets of The Computer Underground

Discussion in 'Computer Security' started by Tracker, Jul 5, 2003.

  1. Tracker

    Tracker Guest

    THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:

    Remember, you heard this from me first. Installing a backdoor for
    future and continued access to your computer system is simple once a
    computer system is compromised. Here are the "Malicious Hackers Best
    Kept Secrets"!
    They install a Trojan Horse which disables your anti-virus and firewall
    protection; also, they install a second set of their own hidden firewall
    application(s) to protect their Virtual Private Network(s). The point
    that I am trying to make is this, you can check your system for a
    Backdoor, Trojan Horse, Virus, or Worm until your blue in the face, you
    wouldn’t find any. The hackers own firewall application(s) can be
    installed on your hard drive in a hidden folder and the only way you
    would know it’s there is by going to your Control Panel, Folder Options,
    View, Show All Files and Folders (Windows ME and earlier).
    Windows keeps files and folders hidden by default so you don’t make
    changes to their important files. You need to View all Files and
    Folders on your computer to reveal what malicious hackers have installed
    without your knowledge. This will open your eyes and show you all the
    files and software applications now sitting on your hard drive. If you
    want to learn more about computer security, if you’re a beginner, one
    avenue is to read-up on configuring your mail and browsing
    applications. Google and Yahoo also have Newsgroups and message boards
    pertaining to the aforementioned. If utilizing a Windows platform, do
    some reading on configuring your Windows Internet Options both Internet
    and Local Settings. Also, spend time learning what applications in
    Windows are running and on what port they run on.
    Tracker

    Interested in purchasing my book named "Security Minds versus Malicious
    Minds" visit:
    www.securityminds2003.com
    It will teach you to learn about Windows, the Internet and Hacking

    To view some kick butt artwork, visit:
    http://captiveimagery.com/index.cfm?fuseaction=home.main
     
    Tracker, Jul 5, 2003
    #1
    1. Advertising

  2. Tracker

    Tracker Guest

    Laura Fredericks wrote:

    > -----BEGIN PGP SIGNED MESSAGE-----
    > Hash: SHA1
    >
    > On Sat, 05 Jul 2003 22:50:42 +0400, Tracker wrote in post:
    >
    > >THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:

    > <snip silly stuff from the ferret lady>
    >
    > What happened to your "Beef's ol' lady/Beef's fiancee" sig? You and
    > Beef didn't break up, did you? <sob>
    >
    > He can't handle your <cough> success, can he? (<ggggrrrrr> Men!)
    >
    > P.S. How many copies of your book have you sold, so far?
    >
    > -----BEGIN PGP SIGNATURE-----
    > Version: PGP 8.0.2
    > Comment: Because I *can* be.
    >
    > iQA/AwUBPwfB+aRseRzHUwOaEQLntgCgjl9gJbiLyC+pNp5u1oKM6N5/xqQAoOTm
    > rykVJnEPpRdumgwwqBv6RZY2
    > =05mP
    > -----END PGP SIGNATURE-----
    >
    > --
    > Laura Fredericks
    > PGP key ID - DH/DSS 2048/1024: 0xC753039A
    >
    > http://www.geocities.com/queenofcyberspace/heathers.mp3
    >
    > Remove CLOTHES to reply.


    If you had a life it wouldn't matter.

    Tracker

    Interested in purchasing my book named "Security Minds versus Malicious
    Minds" visit:
    www.securityminds2003.com
    It will teach you to learn about Windows, the Internet and Hacking

    To view some kick butt artwork, visit:
    http://captiveimagery.com/index.cfm?fuseaction=home.main
     
    Tracker, Jul 5, 2003
    #2
    1. Advertising

  3. Tracker

    Don Kelloway Guest

    "Tracker" <"snailmail(invalid)222000"@yahoo.com> wrote in message
    news:...
    > THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:
    >
    > Remember, you heard this from me first. Installing a backdoor for
    > future and continued access to your computer system is simple once a
    > computer system is compromised. Here are the "Malicious Hackers Best
    > Kept Secrets"!
    > They install a Trojan Horse which disables your anti-virus and firewall
    > protection; also, they install a second set of their own hidden firewall
    > application(s) to protect their Virtual Private Network(s). The point
    > that I am trying to make is this, you can check your system for a
    > Backdoor, Trojan Horse, Virus, or Worm until your blue in the face, you
    > wouldn't find any. The hackers own firewall application(s) can be
    > installed on your hard drive in a hidden folder and the only way you
    > would know it's there is by going to your Control Panel, Folder Options,
    > View, Show All Files and Folders (Windows ME and earlier).
    > Windows keeps files and folders hidden by default so you don't make
    > changes to their important files. You need to View all Files and
    > Folders on your computer to reveal what malicious hackers have installed
    > without your knowledge. This will open your eyes and show you all the
    > files and software applications now sitting on your hard drive. If you
    > want to learn more about computer security, if you're a beginner, one
    > avenue is to read-up on configuring your mail and browsing
    > applications. Google and Yahoo also have Newsgroups and message boards
    > pertaining to the aforementioned. If utilizing a Windows platform, do
    > some reading on configuring your Windows Internet Options both Internet
    > and Local Settings. Also, spend time learning what applications in
    > Windows are running and on what port they run on.
    > Tracker
    >
    > Interested in purchasing my book named "Security Minds versus Malicious
    > Minds" visit:
    > www.securitymindless2003.com
    > It will teach you to learn about Windows, the Internet and Hacking
    >
    > To view some kick butt artwork, visit:
    > http://captiveimagery.com/index.cfm?fuseaction=home.main
    >
    >


    re: Remember, you heard this from me first

    None of which you offer is from you first! In fact *EVERYTHING* you
    recommend has been taken from other sources and regurgitated and fed
    through some sort of translator device. Usually the results are
    inaccurate, and/or misleading, and/or make no sense what so ever.
    Sometimes the words of wisdom you offer will actually do harm to the
    system in question! Maybe it's just me, but IMHO this is not helping
    others.

    re: Trojan Horse which disables your anti-virus and firewall protection

    While it is true that there are some viruses (not trojan horses) that are
    capable of deleting core files associated with various anti-virus and
    firewall applications. Very few (if any) Trojan Horse applications are
    designed to disable anti-virus and/or firewall software. In fact none of
    the 'Big Three RCT's' (BO2K, NetBus Pro, or SubSeven) will do this. They
    will however provide the ability to the remote administrator (i.e.
    'hacker') the ability to make the changes themselves, but only after the
    RCT has been installed and is capable of being accessed remotely.

    re: they install a second set of their own hidden firewall application(s)
    to protect their Virtual Private Network(s)

    While it is true that certain applications (AOL, etc) will install and
    make use of a VPN connectoid. As well as the fact that there are a few
    worms designed to transmit the captured data in an encrypted format (not a
    VPN) to a remote system. Very few (if any) hackers install a VPN. Most
    'hacking' is done in the clear to facilitate speed, acquire the
    information desired, clean up and get out. For a hacker to implement a
    VPN would only slow down the process and create unnecessary obstacles.

    re: you can check your system for a Backdoor, Trojan Horse, Virus, or Worm
    until your blue in the face, you wouldn't find any

    If you have the necessary applications, it is very easy to detect all of
    the above. Even if you do not have the applications, but have the
    experience. It is still possible to detect all of the above.

    re: The hackers own firewall application(s) can be installed on your hard
    drive in a hidden folder

    While it is true that a hacker will often make the folder that they've
    installed their app's to hidden as well as implement password protection
    and/or restrict access to their covertly installed applications, this is
    not the same as installing a firewall. In fact very few (if any) hacker's
    would have a need to install a firewall upon a PC that they've already
    compromised. Of course it should also be said that finding hidden folders
    on your hard drive does NOT indicate that the PC has been compromised
    either!

    re: If you want to learn more about computer security, if you're a
    beginner, one avenue is to read-up on configuring your mail and browsing
    applications. Google and Yahoo also have Newsgroups and message boards
    pertaining to the aforementioned.

    For once you actually offer some valuable advice. Though while using the
    'net is a great place to start, often what you may find is information
    (see first paragraph of reply) others like yourself offer.

    Instead I would suggest acquiring a book on the subject of TCP/IP or
    Internet Security. After all it's usually easier to learn something
    correctly the first time as opposed to learning something incorrectly,
    then have everyone in the world attempt to inform you differently, only to
    refute what you're being told. Does this sound familiar?

    --
    Best regards,
    Don Kelloway
    Commodon Communications

    Visit http://www.commodon.com to learn about the "Threats to Your Security
    on the Internet".
     
    Don Kelloway, Jul 6, 2003
    #3
  4. > THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:
    > Remember, you heard this from me first. [...]



    --


    (Quote from one who found just the right words)

    USENET POST WARNING
    ====================
    The User by the name "Tracker" aka "Debbie", VPNSISHACKERSSECRET, aka
    "snailmail" regularly posts incorrect, misleading and damaging information,
    to rely on the advice of this person could result in irreparable damage to
    your system. It is mypersonal advice not to listen to anything that this
    person posts andcertainly to not attempt or believe anything this person
    advises. The following link provides additional information

    http://www.sand-n-sea.us/debbiesdrival.htm

    See also (for her book):

    http://www.securitymindless2003.com

    (End Quote)

    Regards

    Tocis ()
     
    Thore Schmechtig, Jul 6, 2003
    #4
  5. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    On Sat, 05 Jul 2003 22:50:42 +0400, Tracker wrote in post:

    >THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:

    <snip silly stuff from the ferret lady>

    What happened to your "Beef's ol' lady/Beef's fiancee" sig? You and
    Beef didn't break up, did you? <sob>

    He can't handle your <cough> success, can he? (<ggggrrrrr> Men!)

    P.S. How many copies of your book have you sold, so far?

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2
    Comment: Because I *can* be.

    iQA/AwUBPwfB+aRseRzHUwOaEQLntgCgjl9gJbiLyC+pNp5u1oKM6N5/xqQAoOTm
    rykVJnEPpRdumgwwqBv6RZY2
    =05mP
    -----END PGP SIGNATURE-----

    --
    Laura Fredericks
    PGP key ID - DH/DSS 2048/1024: 0xC753039A

    http://www.geocities.com/queenofcyberspace/heathers.mp3

    Remove CLOTHES to reply.
     
    Laura Fredericks, Jul 6, 2003
    #5
  6. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    On Sun, 06 Jul 2003 00:00:27 +0400, Tracker wrote in post:
    >
    >Laura Fredericks wrote:
    >>What happened to your "Beef's ol' lady/Beef's fiancee" sig? You and
    >>Beef didn't break up, did you? <sob>

    >
    >If you had a life it wouldn't matter.


    "A bag of seaweed is more likely to be famous then you."
    - -Blooven in acv

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2
    Comment: Because I *can* be.

    iQA/AwUBPwfWqaRseRzHUwOaEQIa5QCeKaLmdwyedrndbKuReMLIVHzYidIAoLji
    S+Nm94wIfcCwFbdauQKHnH6p
    =hvy3
    -----END PGP SIGNATURE-----

    --
    Laura Fredericks
    PGP key ID - DH/DSS 2048/1024: 0xC753039A

    http://www.geocities.com/queenofcyberspace/heathers.mp3

    Remove CLOTHES to reply.
     
    Laura Fredericks, Jul 6, 2003
    #6
  7. Tracker

    Malev Guest

    On Sat, 05 Jul 2003 22:50:42 +0400, Tracker
    <"snailmail(invalid)222000"@yahoo.com> wrote:

    >THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:
    >
    >Remember, you heard this from me first.


    <snip - shit>

    Bollocks
     
    Malev, Jul 6, 2003
    #7
  8. Tracker

    Gunilla Guest

    I don't know what's happen between you two, Laura and Tracker, but I just
    have to say that attack someone personally is not in any way a mature
    behavior, or at least, it is very immature!

    Gunilla.

    "Laura Fredericks" <> skrev i meddelandet
    news:...
    > -----BEGIN PGP SIGNED MESSAGE-----
    > Hash: SHA1
    >
    > On Sun, 06 Jul 2003 00:00:27 +0400, Tracker wrote in post:
    > >
    > >Laura Fredericks wrote:
    > >>What happened to your "Beef's ol' lady/Beef's fiancee" sig? You and
    > >>Beef didn't break up, did you? <sob>

    > >
    > >If you had a life it wouldn't matter.

    >
    > "A bag of seaweed is more likely to be famous then you."
    > - -Blooven in acv
    >
    > -----BEGIN PGP SIGNATURE-----
    > Version: PGP 8.0.2
    > Comment: Because I *can* be.
    >
    > iQA/AwUBPwfWqaRseRzHUwOaEQIa5QCeKaLmdwyedrndbKuReMLIVHzYidIAoLji
    > S+Nm94wIfcCwFbdauQKHnH6p
    > =hvy3
    > -----END PGP SIGNATURE-----
    >
    > --
    > Laura Fredericks
    > PGP key ID - DH/DSS 2048/1024: 0xC753039A
    >
    > http://www.geocities.com/queenofcyberspace/heathers.mp3
    >
    > Remove CLOTHES to reply.
     
    Gunilla, Jul 6, 2003
    #8
  9. Tracker

    Jim Watt Guest

    On Sun, 6 Jul 2003 12:29:59 +0200, "Gunilla" <> wrote:

    >I don't know what's happen between you two, Laura and Tracker,


    a) Laura is a sensible person with a brain and clue.

    b) debbie aka tracker is not.

    >> "A bag of seaweed is more likely to be famous then you."
    >> - -Blooven in acv


    My money is on the seaweed too.
    --
    Jim Watt http://www.gibnet.com
     
    Jim Watt, Jul 6, 2003
    #9
  10. Tracker

    Frode Guest

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    Tracker" <"snailmail(invalid)222000 wrote:
    > THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:


    Good grief, not you again. And it's even the same drivel you posted a few
    weeks ago of which every single sentence got debunked as being complete
    bollocs.


    - --
    Frode


    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2

    iQA/AwUBPwgIHeXlGBWTt1afEQJO2gCcDN9obgPZzonkFj+HvouW4aWsfvIAoLwJ
    uQaMBJlo1JwRNKOd8ot5jpDm
    =/RuC
    -----END PGP SIGNATURE-----
     
    Frode, Jul 6, 2003
    #10
  11. Tracker

    Frode Guest

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    Tracker" <"snailmail(invalid)222000 wrote:
    > Don, your remarks will be addressed, but this babe hasn't had time to be


    That would be new. Of course, we all know you couldn't address any of his
    remarks since you have no knoweldge on the subject with which to reply.

    > "The Trackers" worked very hard composing my book and "no one" will tell
    > us less. We understand that no one in this world has accomplished what
    > we have, so thousands of people won't understand what we have
    > accomplished.


    Yet again you completely ignore the fact that there are hundreds of
    security oriented books out there with actual useful information in them.
    Or are you referring to your book, if it should ever be published, will be
    the very first "security" book that has absolutely no useful security
    information in it?

    > "fact". Been telling the world this for years now, so deal with it.


    And the world's been telling you for years that you are totally clueless
    when it comes to security. Start listening will ya.

    > Interested in purchasing my book named "Security Minds versus Malicious
    > Minds"


    Written by Ms. Support?-My-cupholder-broke!.


    - --
    Frode

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2

    iQA/AwUBPwgJWOXlGBWTt1afEQJ1YACdHjnU8LqZZlV+0KS4FIrkZAhDMd0AoPzg
    h3D/EcOiryOm4lyzQgDxwXhP
    =b4v6
    -----END PGP SIGNATURE-----
     
    Frode, Jul 6, 2003
    #11
  12. Tracker

    optikl Guest

    "Tracker" <"snailmail(invalid)222000"@yahoo.com> wrote in message
    news:...
    >
    >
    >
    > If you had a life it wouldn't matter.
    >
    > Tracker
    >

    See Laura, VooDoo works!
     
    optikl, Jul 6, 2003
    #12
  13. Tracker

    Robert Moir Guest

    optikl wrote:

    > Actually, I admit I had something to do with that. As a recent
    > convert to VooDoo, I've been testing the power of my new found
    > religion on their relationship. The hard part was getting those pins
    > though the CD.


    For cases like that I think you are allowed to use 6 inch nails.
     
    Robert Moir, Jul 6, 2003
    #13
  14. Tracker

    Don Kelloway Guest

    "Tracker" <"snailmail(invalid)222000"@yahoo.com> wrote in message
    news:...
    > Don, your remarks will be addressed, but this babe hasn't had time to be
    > online and let's see how we can show the world how my words have

    meaning.
    > "The Trackers" worked very hard composing my book and "no one" will tell

    us
    > less. We understand that no one in this world has accomplished what we

    have,
    > so thousands of people won't understand what we have accomplished. The

    world
    > will know us and my book will help millions of computer users and that

    is all
    > that matters to me. As this babe has said over and over, no one can get

    me to
    > change my mind and it's a proven "fact". Been telling the world this

    for
    > years now, so deal with it.
    >
    > Tracker
    >
    > Interested in purchasing my book named "Security Minds versus Malicious

    Minds"
    > visit:
    > www.securitymindless2003.com
    > It will teach you to learn about Windows, the Internet and Hacking
    >


    re: hasn't had the time to be online

    If you can find the time to be online and repeatedly post this nonsense.
    Then you should be able to find the time to correct your mistakes before
    reposting it a third time.

    re: "no one" will tell us less

    To possess such an attitude clearly indicates your unwillingness to learn.
    Whether it's something that calls into question your beliefs or whether
    it's something you have no knowledge about. On more than one occasion I
    have offered you helpful insight and advice. To date, I don't think
    you've heeded any of it.

    re: "help millions of computer users"

    In what manner do you think you're helping others? Would it be by
    convincing persons with your level of experience (or less) to follow your
    advices and turn their PC's into doorstops? If so, then I would gladly
    concur.


    --
    Best regards,
    Don Kelloway
    Commodon Communications

    Visit http://www.commodon.com to learn about the "Threats to Your Security
    on the Internet".
     
    Don Kelloway, Jul 6, 2003
    #14
  15. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    On Sun, 6 Jul 2003 12:29:59 +0200, Gunilla wrote in post:
    >I don't know what's happen between you two, Laura and Tracker, but I
    >just have to say that attack someone personally is not in any way a
    >mature behavior, or at least, it is very immature!


    I can live with it. ;-)

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2
    Comment: Because I *can* be.

    iQA/AwUBPwhTb6RseRzHUwOaEQLJqACfSKRWFSJEZYaGoBp6nxqdcGfjkg4AoLIC
    Z/1U86IOYP4jYgXIGGpXWjrb
    =5BKR
    -----END PGP SIGNATURE-----

    --
    Laura Fredericks
    PGP key ID - DH/DSS 2048/1024: 0xC753039A

    http://www.geocities.com/queenofcyberspace/heathers.mp3

    Remove CLOTHES to reply.
     
    Laura Fredericks, Jul 6, 2003
    #15
  16. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    On Sun, 06 Jul 2003 12:29:35 GMT, optikl wrote in post:
    >
    >"Tracker" <"snailmail(invalid)222000"@yahoo.com> wrote in message
    >news:...
    >>
    >>If you had a life it wouldn't matter.

    >
    >See Laura, VooDoo works!


    You're just jealous because the voices in my head talk to *me*! ;-)

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2
    Comment: Because I *can* be.

    iQA/AwUBPwhTuqRseRzHUwOaEQKy1gCg/vNA5cakQirLnRjqXpVtoc2KYa0AoOfB
    SuVPZUXgP5wemhoC3Rkc/hwK
    =zJLh
    -----END PGP SIGNATURE-----

    --
    Laura Fredericks
    PGP key ID - DH/DSS 2048/1024: 0xC753039A

    http://www.geocities.com/queenofcyberspace/heathers.mp3

    Remove CLOTHES to reply.
     
    Laura Fredericks, Jul 6, 2003
    #16
  17. -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    On Sun, 06 Jul 2003 12:28:37 GMT, optikl wrote in post:
    >Actually, I admit I had something to do with that. As a recent
    >convert to VooDoo, I've been testing the power of my new found
    >religion on their relationship. The hard part was getting those pins
    >though the CD.


    Whew! For a second, I thought you were gonna say you were sticking
    pins in the ferret! ;-)

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0.2
    Comment: Because I *can* be.

    iQA/AwUBPwhUEqRseRzHUwOaEQKvpwCgm8s/uYnH9XTbRFGzZzCyxuUUT1kAoPrE
    ww6Ktwdy3U4qTr2KT5auD6LN
    =g9YP
    -----END PGP SIGNATURE-----

    --
    Laura Fredericks
    PGP key ID - DH/DSS 2048/1024: 0xC753039A

    http://www.geocities.com/queenofcyberspace/heathers.mp3

    Remove CLOTHES to reply.
     
    Laura Fredericks, Jul 6, 2003
    #17
  18. Tracker

    neopolaris Guest

    "Tracker" <"snailmail(invalid)222000"@yahoo.com> wrote in message
    news:...
    > THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:
    >

    Ya, it's 2003 and she's making a security book for WinMe and earlier... Sad
    really.
     
    neopolaris, Jul 6, 2003
    #18
  19. Tracker

    Chuck Guest

    <spam>
    <title>THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:</title>
    <drivel>
    <body>
    >SNIP<

    </body>
    <signature>
    Tracker
    Interested in purchasing my book named "Security Minds versus
    Malicious
    Minds" visit:
    www.securityminds2003.com
    It will teach you to learn about Windows, the Internet and Hacking
    </signature>
    </drivel>
    <advertising>
    To view some kick butt artwork, visit:
    http://captiveimagery.com/index.cfm?fuseaction=home.main
    <advertising>
    </spam>


    Chuck Croll

    Spam sucks - PLEASE get rid of the spam before emailing me!
    Trusted Computing? Right! http://www.againsttcpa.com/
    WHAT IS THE CBDTPA? http://www.stoppoliceware.org/
     
    Chuck, Jul 6, 2003
    #19
  20. Tracker

    n1pop Guest

    On Sat, 05 Jul 2003 22:50:42 +0400, Tracker
    <"snailmail(invalid)222000"@yahoo.com> wrote:

    >THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND:


    You know, you keep posting this obvious advertisement, which probably
    violates one or more terms or policies somehere, but you have yet to
    answer my questions. Why is that?
     
    n1pop, Jul 6, 2003
    #20
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. John Elsbury

    Re: THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND

    John Elsbury, Jun 22, 2003, in forum: Computer Security
    Replies:
    0
    Views:
    1,400
    John Elsbury
    Jun 22, 2003
  2. Peter M
    Replies:
    0
    Views:
    1,403
    Peter M
    Jun 23, 2003
  3. Daniel Billingsley

    Re: THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND

    Daniel Billingsley, Jun 23, 2003, in forum: Computer Security
    Replies:
    9
    Views:
    1,014
  4. Cap
    Replies:
    2
    Views:
    1,009
  5. Chuck
    Replies:
    0
    Views:
    1,079
    Chuck
    Jun 23, 2003
Loading...

Share This Page