cRAZy profile picture

cRAZy

Pc Of tHE FuTuRe

About Me

Cursor by www.Soup-Faerie.Com
What Is Your Best Sexual Skill?
Name:
Age:
Sex:
Sexuality:
Flirting Skill Level - 70%
Kissing Skill Level - 9%
Cudding Skill Level - 40%
Sex Skill Level - 99%
Why They Love You You give much more than you receive.
Why They Hate You You take more than you give.
This Quiz by lady_wintermoon - Taken 844654 Times. New - COOL Dating Tips and Romance Advice! Personality Characteristics The most obvious common ‘personality’ characteristics of hackers are high intelligence, consuming curiosity, and facility with intellectual abstractions. Also, most hackers are ‘neophiles’, stimulated by and appreciative of novelty (especially intellectual novelty). Most are also relatively individualistic and anti-conformist.Although high general intelligence is common among hackers, it is not the sine qua non one might expect. Another trait is probably even more important: the ability to mentally absorb, retain, and reference large amounts of ‘meaningless’ detail, trusting to later experience to give it context and meaning. A person of merely average analytical intelligence who has this trait can become an effective hacker, but a creative genius who lacks it will swiftly find himself outdistanced by people who routinely upload the contents of thick reference manuals into their brains. [During the production of the first book version of this document, for example, I learned most of the rather complex typesetting language TeX over about four working days, mainly by inhaling Knuth's 477-page manual. My editor's flabbergasted reaction to this genuinely surprised me, because years of associating with hackers have conditioned me to consider such performances routine and to be expected. —ESR]Contrary to stereotype, hackers are not usually intellectually narrow; they tend to be interested in any subject that can provide mental stimulation, and can often discourse knowledgeably and even interestingly on any number of obscure subjects — if you can get them to talk at all, as opposed to, say, going back to their hacking.It is noticeable (and contrary to many outsiders' expectations) that the better a hacker is at hacking, the more likely he or she is to have outside interests at which he or she is more than merely competent.Hackers are ‘control freaks’ in a way that has nothing to do with the usual coercive or authoritarian connotations of the term. In the same way that children delight in making model trains go forward and back by moving a switch, hackers love making complicated things like computers do nifty stuff for them. But it has to be their nifty stuff. They don't like tedium, nondeterminism, or most of the fussy, boring, ill-defined little tasks that go with maintaining a normal existence. Accordingly, they tend to be careful and orderly in their intellectual lives and chaotic elsewhere. Their code will be beautiful, even if their desks are buried in 3 feet of crap.Hackers are generally only very weakly motivated by conventional rewards such as social approval or money. They tend to be attracted by challenges and excited by interesting toys, and to judge the interest of work or other activities in terms of the challenges offered and the toys they get to play with.In terms of Myers-Briggs and equivalent psychometric systems, hackerdom appears to concentrate the relatively rare INTJ and INTP types; that is, introverted, intuitive, and thinker types (as opposed to the extroverted-sensate personalities that predominate in the mainstream culture). ENT[JP] types are also concentrated among hackers but are in a minority.

My Interests

CHATTING, PLAYING BASKETBALL, SURF AT NET
C Cool
R Refined
A Amazing
Z Zany
Y Yummy
Freedom is good Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.(This isn't the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that's a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.)Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing — they only like ‘cooperation' that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.

I'd like to meet:


Crazy is poisonous! Induce vomitting if ingested.
N
POISON
Username:
From Go-Quiz.com

Music:

ROCK LOVE SONG JAZZ HIPHOP MORE..

Television:

fear factor extra challenge

My Blog

20 things that a perfect guy would do... ®

1. Know how 2 make u smile when you are down. 2. Try 2 secretly smell ur hair, but u always notice. 3. Stick up for you, but still respects your independence. 4. Give you the remote contro...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

COMPUTER ETHICS

Computer Ethics Ethics deals with placing a ?value? on acts according to whether they are ?good? or ?bad?. Every society has its rules about whether certain acts are ethical or not. These rules hav...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

125 things not to say during sex

"Is it in?" "That's it?" "You've got to be kidding me." (phone rings) "Hello? oh nothing and you?" "Do I have to pay for this?" "Do I have to call you tomorrow?" "Oh momma, momma!"...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

V I R U S

If you receive an email titled "It Takes Guts to Say 'Jesus' DO NOT OPEN IT. It will erase everything on your hard drive. This information was announced yesterday morning from IBM; AOL states that thi...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

hello

hello
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

H0mE NetWoRk SeCuR!ty

       Computer security What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer. Preventio...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST

computer and the future of man.....

Scientists are now inventing the "ultimate intelligent machine", a computer which will beat man in every way. If the machine can outstrip man, then what is man? What are you? What is the future of man...
Posted by cRAZy on Mon, 01 Jan 1900 12:00:00 PST