Blog
Poda pays a visit...
|
|
...but realises who I am and runs away like a little girl, squealing! Back to Meltshit Pooda ![]()
Categories: None
Post a Comment
Oops!
The words you entered did not match the given text. Please try again.
9 Comments

Reply
Sub-Zero
4:43 AM on December 21, 2011
Sure is. Yang is the better duke play option. Meltdown is always "down".

Reply
Franz!
3:36 AM on January 18, 2012
Cyco, you need to see this:
It has been discovered that the unpopular Duke Nukem Online program Meltdown has an inbuilt Backdoor Trojan. This is malicious software that has the primary function of enabling a remote attacker to have access to or send commands to a compromised computer. Meltdown opens a covert channel through which a remote attacker can access and control a computer. The Trojan allows almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. Beware!
It has been discovered that the unpopular Duke Nukem Online program Meltdown has an inbuilt Backdoor Trojan. This is malicious software that has the primary function of enabling a remote attacker to have access to or send commands to a compromised computer. Meltdown opens a covert channel through which a remote attacker can access and control a computer. The Trojan allows almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. Beware!
Good find Franz. Yes it would not surprise me that that idiot Poda had a backdoor trojan built into Meltdown. Good thing I deleted Melt-shit ages ago.
Franz! says...
Cyco, you need to see this:
It has been discovered that the unpopular Duke Nukem Online program Meltdown has an inbuilt Backdoor Trojan. This is malicious software that has the primary function of enabling a remote attacker to have access to or send commands to a compromised computer. Meltdown opens a covert channel through which a remote attacker can access and control a computer. The Trojan allows almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. Beware!
Oops!
Oops, you forgot something.