Exploit the possiblities
Showing 1 - 19 of 19 RSS Feed

The Bastard Operator From Hell

The Bastard Operator From Hell
Bastard1.html
Posted Sep 3, 1999
Authored by bofh

Beginning Bastard (BOFH numbers 1 to 4)

tags | magazine
MD5 | 43e9be1132999794b69f557d6d9fc99e
Bastard2.html
Posted Sep 3, 1999
Authored by bofh

The Real Bastard (BOFH numbers 5 to 8)

tags | magazine
MD5 | e136f4f090840ac04a53ea4704c3a3b6
Bastard3.html
Posted Sep 3, 1999
Authored by bofh

What a Bastard (BOFH numbers 9 to 13)

tags | magazine
MD5 | 97bb8121c4e0dc9527b3237fe3736b09
Bastard4.html
Posted Sep 3, 1999
Authored by bofh

Bastard Manages (BSMH numbers 1 & 2)

tags | magazine
MD5 | ed53ff05f1b8f5e8c08da5bae867b452
Bastard5.html
Posted Sep 3, 1999
Authored by bofh

Quite a Bastard (BOFH numbers 14 to 15)

tags | magazine
MD5 | afad423bb9d435dff1bb71e4836971e0
Bastard6.html
Posted Sep 3, 1999
Authored by bofh

A Foreign Bastard (BOFB numbers 1 & 2)

tags | magazine
MD5 | 5aa88fa5eaa2dae485a4d799dc788fff
Bastard7.html
Posted Sep 3, 1999
Authored by bofh

The Last Bastard (The Last BOFH)

tags | magazine
MD5 | 513e8d0dc23fdbf15c2c9ccbe1655057
Bastard8.html
Posted Sep 3, 1999
Authored by bofh

Bastard History (FAQ etc about BOFH)

tags | magazine
MD5 | e74c825b05448c27ad73a09daec978d4
BeforeBastard.html
Posted Sep 3, 1999
Authored by bofh

Before the Bastard (Intro & scripts that birthed the BOFH)

tags | magazine
MD5 | 90f1e077acc4f562eca264411b44b749
bib.html
Posted Sep 3, 1999
Authored by bofh

The Bastard is back

tags | magazine
MD5 | 282d011819be717ba830fc0a92d52000
bofh_where.html
Posted Sep 3, 1999
Authored by bofh

Where the bastard came from

tags | magazine
MD5 | 937015862e899703bc1462a74d57ef3e
bofh-16.html
Posted Sep 3, 1999
Authored by bofh

The Bastard Operator from Hell goes Meglomanic - The Sealed Section

tags | magazine
MD5 | 647b2c76044475ad16b74eaefaeeca7c
bofh-glossary.html
Posted Sep 3, 1999
Authored by bofh

Getting to Know Your Computer: A Short Glossary of Computer Terms

tags | magazine
MD5 | f1cc00ee885762507133b97624f44b91
bofhfaq.html
Posted Sep 3, 1999
Authored by bofh

The PreHistory of BOFH / The BOFH FAQ

tags | magazine
MD5 | 7364dfb517f76886e492280a84369f87
brb.html
Posted Sep 3, 1999
Authored by bofh

The Bastard returns briefly

tags | magazine
MD5 | 5d239a6f944c35312dc29d730c3dfd81
bsa.html
Posted Sep 3, 1999
Authored by bofh

The Bastard's still about

tags | magazine
MD5 | bb938792959697d1fe8a60653fe414ba
Striped.html
Posted Sep 3, 1999
Authored by bofh

The striped Irregular Bucket

tags | magazine
MD5 | dcf965a2dcf28d768506bd6aa281ef54
tradeshow.html
Posted Sep 3, 1999
Authored by bofh

The Bastard goes to the Trade Show

tags | magazine
MD5 | 6bf8fba6c46100124e7474322a30e37f
xmas95.html
Posted Sep 3, 1999
Authored by bofh

The Bastard Celebrates Christmas 95

tags | magazine
MD5 | ee3474a4e4ed711ea7d5b2b8ead99474
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Triton Exploited Zero-Day Flaw To Target Industrial Systems
Posted Jan 19, 2018

tags | headline, hacker, malware, cyberwar, scada
Apple Sued Over Being Susceptible To Meltdown / Spectre
Posted Jan 19, 2018

tags | headline, flaw, apple, intel
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close