02-02-2007, 02:52 PM
I can see two uses to this information.
1) We could get him to hack us, then use this to get his internet terminated.
2) We hack him ourselves.
I personally would go for option two. Quite possible, but it makes no neverminds to me.
1) We could get him to hack us, then use this to get his internet terminated.
2) We hack him ourselves.
I personally would go for option two. Quite possible, but it makes no neverminds to me.


![[Image: ubd7122od0.png]](http://img134.imageshack.us/img134/3527/ubd7122od0.png)