|
|
Spammer terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
|
|
|
Spammer terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
|
Spammer terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
|
Surviving spammer terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Spammer: Ravi Kumar - Professional Profile[^]
Spam: Member questions & answers[^]
Spam: Latest Messages[^]
One QA answer to an already answered question from 2011 which is nothing more than a link to his blog.
Two messages on articles which are nothing more than links to his blog.
@CHill60 may want to give him the benefit of the doubt, but to me this is blatant spam.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I'd been on a course...I was in touch with my yellow and green I'm almost ashamed
|
|
|
|
|
|
|
Did you forget to report the user? Mine was the first vote.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Didn't think so - but there have been some odd things happening today.
I had to post an answer three times to one question before it would "stick".
I'm guessing one of the web servers needs a swift kick in the hamster wheel.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
|
|
His post:
Quote: I require a Python or c++ coded Microsoft Word (extension .doc) exploit builder/Tool to convert executable files extensions to .doc file extensions that can be opened with any version of MS office Word.
The doc exploit must be SILENT not (Macro). The word document when opened must silently and automatically install the exe/dll/bat/pif file in the background unknown to the target host machine. The doc exploit must be completely undetectable to runtime and scan time Anti-virus software and anti-exploit scanner software. The word document when opened must be editable
It's this wonderful example of humanity: Member 13606729 - Professional Profile[^]
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
.
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
|
|
|
.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|