What's new
Fantasy Football - Footballguys Forums

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Lyndsey Vonn- How Hot (1 Viewer)

Ranking

  • 1

    Votes: 2 1.4%
  • 2

    Votes: 1 0.7%
  • 3

    Votes: 0 0.0%
  • 4

    Votes: 5 3.5%
  • 5

    Votes: 9 6.3%
  • 6

    Votes: 15 10.6%
  • 7

    Votes: 37 26.1%
  • 8

    Votes: 39 27.5%
  • 9

    Votes: 24 16.9%
  • 10

    Votes: 10 7.0%

  • Total voters
    142
You and I would be perfect wingmen for each other at a bar. :lmao:

Man, you haven't lived until you've ridden a women with dimensions like this. I know spinners are popular, but they are oh so ever fragile. A girl like this you could have sex with Basic Instinct style and later ask her to move your furniture.

I would absolutely tear me up some Lindsey Vonn.
I had you penciled in as a big "Vonn" fan.
The older she gets, the better she ages.  Like a fine wine or a fancy cheese.  Man, could I have some fun with those legs.

:wub:

 
You and I would be perfect wingmen for each other at a bar. :hifive:

Man, you haven't lived until you've ridden a women with dimensions like this. I know spinners are popular, but they are oh so ever fragile. A girl like this you could have sex with Basic Instinct style and later ask her to move your furniture.

I would absolutely tear me up some Lindsey Vonn.
lol

 
Pretend I am in 6th grade.  Could someone please explain to me how people are still hacking into iclouds/iphones?  I honest to God do not understand how this is still a thing.

 
Pretend I am in 6th grade.  Could someone please explain to me how people are still hacking into iclouds/iphones?  I honest to God do not understand how this is still a thing.
Everything that connects to the internet can be hacked. Think of it like a door or a safe. The manufacturers build something new and the bad guys work to circumvent it.

 
Everything that connects to the internet can be hacked. Think of it like a door or a safe. The manufacturers build something new and the bad guys work to circumvent it.
Alright fair enough.  Follow up question.  Apple is one of the richest companies in the world and they are sitting on billions in cash.  How do they let this happen?  Surely there has to be a way to safe guard this.

One last question.  What is needed to hack an account?  Does someone need Vonns email, ph #, etc?  How does this work?

 
Alright fair enough.  Follow up question.  Apple is one of the richest companies in the world and they are sitting on billions in cash.  How do they let this happen?  Surely there has to be a way to safe guard this.

One last question.  What is needed to hack an account?  Does someone need Vonns email, ph #, etc?  How does this work?
The U.S. government has more cash than Apple (or at least trillion dollar coins) and they are still apt to be hacked. Everything is protected by a code. If you built a box and put something in that box, you would have to make it without a door. But, without the door there would be no way for you to retrieve the item. Same thing applies to data. People want to have access to it, usually via multiple avenues. 

I don't know exactly what is needed. But I would assume it revolves around the servers IP address. 

 
Last edited by a moderator:
The U.S. government has more cash than Apple (or at least trillion dollar coins) and they are still apt to be hacked. Everything is protected by a code. If you built a box and put something in that box, you would have to make it without a door. But, without the door there would be no way for you to retrieve the item. Same thing applies to data. People want to have access to it, usually via multiple avenues. 

I don't know exactly what is needed. But I would assume it revolves around the servers IP address. 
It's almost always social engineering of some sort. Figure out personal details that the person may use for their password, talk to a customer support person and convince them to send a password reset to your email instead of the correct one, trick someone into installing malware that steals passwords, etc.

Nobody is brute hacking Apple to get into accounts.

 
It's almost always social engineering of some sort. Figure out personal details that the person may use for their password, talk to a customer support person and convince them to send a password reset to your email instead of the correct one, trick someone into installing malware that steals passwords, etc.

Nobody is brute hacking Apple to get into accounts.
As I mentioned, I don't know what is needed. How are they doing it when you hear about millions of accounts being compromised at once?

 
KCitons said:
As I mentioned, I don't know what is needed. How are they doing it when you hear about millions of accounts being compromised at once?
When lots of accounts are compromised at once, it's typically either that the company was downright negligent and stored all passwords in clear text (rather than being encrypted), or the decryption key being left somewhere accessible. The other possibility would be unlatched systems with known security flaws that get hacked.

In Yahoo's case, an employer that was fairly high up was either socially engineered or spear-fished and had their computer compromised. Once that happened, the hackers were able to explore Yahoo's systems and found tools that allowed them to generate cookies that faked accounts into allowing them access. Yahoo never should have had those tools accessible via the web and, in fact, never should have had tools like that that allowed backdoor access in the first place.

 
she looks good in those...better than i had envisioned. i love that she did the close-up "splits lips with fingers" shots

 
Shes quite lippy.  Gotta hankering for Arby's now.

Speaking of roast beef, Katherine McPhee.

 
Last edited by a moderator:

Users who are viewing this thread

Back
Top