Boards Index General discussion Off topic chat Having a little smile at this video

Viewing 10 posts - 11 through 20 (of 24 total)
  • Author
    Posts
  • #365614

    “Then we have a little fruit” I bet he does :wink:

    #365615

    He squirms so much, I’ve watched programs about peados and they do just the same, trying to justify their actions. Grrr weirdo of the highest order!

    #365616

    “Im not aware of this i’m not a paedo so im not aware of these things”

    I’m aware of these things in those countries by his thinking then that makes me a paedo

    #365617

    Wonder if i can get to stay at Shania Twains house and tell her i’m afraid of ghosts

    #365618

    He had 4000 images of child porn … I don’t know how anyone can justify this!

    #365619

    research ?

    #365620

    Reserching how big it makes his knob grow! :twisted:

    #365621

    Published: 01 Aug 2003 15:40 BST

    A man accused of storing child pornography on his computer has been cleared after it emerged that his computer had been infected by a Trojan horse, which was responsible for transferring the images onto his PC.

    Julian Green, 45, was taken into custody last October after police with a search warrant raided his house. He then spent a night in a police cell, nine days in Exeter prison and three months in a bail hostel. During this time, his ex-wife won custody of his seven year old daughter and possession of his house.

    This is thought to be the second case in the UK where a “Trojan defence” has been used to clear someone of such an accusation. In April, a man from Reading was found not guilty of the crime after experts testified that a Trojan could have been responsible for the presence of 14 child porn images on his PC.

    Trojan horses can be used to install a back door on a PC, allowing an attacker to freely access the computer. Using the back door, a malicious user can send pictures or other files to the victim’s computer or use the infected machine to access illegal Web sites, while hiding the intruder’s identity. Infected machines can be used for storing files without the knowledge of the computer’s owner.

    Kevin Hogan, senior manager at Symantec Security Response, told ZDNet UK that he has known Trojans to pretend to be a game, picture and even a Windows folder. “It is technically possible for a Trojan to set up someone’s computer as a proxy machine. So you see a folder on your desktop, double click it and it executes.”

    According to Hogan, a Trojan back door can usually be dealt with by using an up-to-date antivirus software or a personal firewall.


    Now assuming thats true thats just sick to produce a “virus” that puts child porn pics on someones comp

    #365622

    @*Sian wrote:

    Most pedos are charismatic, they have to be to groom children… Smiley you are a disgrace, the coont is back in England, I wonder if you had children and he moved in next door to you, you’d feel the same. Mind you Smiley, you like young girlfriends eh? :roll:

    It’s true. 8) younger the better.

    #365623

    @smiley wrote:

    @*Sian wrote:

    Most pedos are charismatic, they have to be to groom children… Smiley you are a disgrace, the coont is back in England, I wonder if you had children and he moved in next door to you, you’d feel the same. Mind you Smiley, you like young girlfriends eh? :roll:

    It’s true. 8) younger the better.

    What was your last ones age? 15?

Viewing 10 posts - 11 through 20 (of 24 total)

Get involved in this discussion! Log in or register now to have your say!