A Parenting & kids forum. ParentingBanter.com

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » ParentingBanter.com forum » alt.parenting » Solutions
Site Map Home Authors List Search Today's Posts Mark Forums Read Web Partners

John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws



 
 
Thread Tools Display Modes
  #1  
Old February 6th 07, 03:48 PM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws


Be it known to all that would conspire with John Wolf to hack into
privaely owned computer systems (specifically mine, you will be
charged with conspiracy to violate US Federal Anti-Hacking laws.

In addition to the above, Wolf will be charged with violation of
Federal Hate Crimes. To wit; Wolf has been acting in violation of
Public Law 101-275 by committing bias-motivated offenses based on
hatred of victims because of their religion.

Documentation to support the charges was submitted to the FBI at 10:38
AM EST, this date.

Anyone desiring to file a complaint against John Wolf may fill out the
form provided by the FBI at the following location:

http://www.ic3.gov/complaint/

According to the FBI web site:

The FBI Civil Rights Program
The Federal Bureau of Investigation takes a very aggressive approach
to investigations regarding violations of Civil Rights. The primary
areas of investigations are listed below:

1. Color of Law (Excessive Force and/or Misconduct)
2. Hate Crimes: Racial, Religious
3. Housing Discrimination
4. Violence against Reproductive Health Clinics
5. Involuntary Servitude and Slavery


According to my firewall log 6,965 port attacks have occured over the
past two days and all were refused. Of course most of them are the
usual ones out of Amsterdam and Australia but there are bunches of US
IP addresses. A copy of the log has been forwarded to the FBI.

Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.




......
BB
http://www.biblebob.net
  #2  
Old February 6th 07, 04:34 PM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
johnw
external usenet poster
 
Posts: 1
Default John Wolf To Be Charged With Religious Hate Crime and ConspiracyTo Violate US Federal Anti Hacking Laws

Bible Bob wrote:

Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.


207.213.216.100
SBC Internet Services PBI-NET-3 (NET-207-212-0-0-1)
207.212.0.0 - 207.215.255.255
Coastside Net, Inc. PBI-CUSTNET-1269 (NET-207-213-216-0-1)
207.213.216.0 - 207.213.217.255

Domain ID13485309-LRMS
Domain Name:CERM.INFO
Created On:20-May-2006 07:48:23 UTC
Last Updated On:19-Jul-2006 20:31:17 UTC
Expiration Date:20-May-2007 07:48:23 UTC
Sponsoring Registrar:MIT (R141-LRMS)
Status:CLIENT TRANSFER PROHIBITED
Registrant ID:C114805831326044
Registrant Name:John Wolf
Registrant Organization:John Wolf
Registrant Street1:Box 584
Registrant Street2:
Registrant Street3:
Registrant City:Shasta Lake
Registrant State/Province:CA
Registrant Postal Code:96019
Registrant Country:US
Registrant Phone:+1.5302090352
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant
Admin ID114808093275216
Admin Name:John Wolf
Admin Organization:John Wolf
Admin Street1:Box 584
Admin Street2:
Admin Street3:
Admin City:Shasta Lake
Admin State/Province:CA
Admin Postal Code:96019
Admin Country:US
Admin Phone:+1.5302090352
Admin Phone Ext.:
Admin FAX:
Admin FAX Ext.:
Admin
Billing ID:C114805831326043
Billing Name:YahooDomains BillingContact
Billing Organization:Yahoo! Inc
Billing Street1:701 First Ave.
Billing Street2:
Billing Street3:
Billing City:Sunnyvale
Billing State/Province:CA
Billing Postal Code:94089
Billing Country:US
Billing Phone:+1.6198813096
Billing Phone Ext.:
Billing FAX:
Billing FAX Ext.:
Billing
Tech ID114808093275217
Tech Name:YahooDomains TechContact
Tech Organization:Yahoo! Inc
Tech Street1:701 First Ave.
Tech Street2:
Tech Street3:
Tech City:Sunnyvale
Tech State/Province:CA
Tech Postal Code:94089
Tech Country:US
Tech Phone:+1.6198813096
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech
Name Server:YNS1.YAHOO.COM
Name Server:YNS2.YAHOO.COM









  #3  
Old February 6th 07, 09:53 PM posted to free.christians,alt.parenting.solutions,alt.religion.christian.baptist,alt.christnet.public
R. Steve Walz
external usenet poster
 
Posts: 2,954
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

Bible Bob wrote:

Be it known to all that would conspire with John Wolf to hack into
privaely owned computer systems (specifically mine, you will be
charged with conspiracy to violate US Federal Anti-Hacking laws.

-------------------
You're a ****ing idiot.

He's too stupid to ever be able to do that.
And you're too stupid to ever know if he did.
Steve
  #4  
Old February 6th 07, 10:08 PM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
Rod
external usenet poster
 
Posts: 14
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws


"Bible Bob" wrote in message
...
Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.




.....
BB
http://www.biblebob.net



Bob ! If you have Win Xp go to the windows directory with notepad, find
pfirewall.txt,
open it and go to the last entry on the bottom and copy it to notepad then
email it to me. If
if you do not have Xp let me know what you do have. A person that has his
own server
and network also KNOWS how to HACK !

Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com
  #5  
Old February 7th 07, 01:13 AM posted to free.christians,alt.parenting.solutions,alt.religion.christian.baptist,alt.christnet.public
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz"
wrote:

Bible Bob wrote:

Be it known to all that would conspire with John Wolf to hack into
privaely owned computer systems (specifically mine, you will be
charged with conspiracy to violate US Federal Anti-Hacking laws.

-------------------
You're a ****ing idiot.

He's too stupid to ever be able to do that.
And you're too stupid to ever know if he did.
Steve


Steve,

Kinda over reacted didn't ya?

Did you read the first line "to all that would?" According to the
laws of grammar "to all that would" are not John Wolf.



......
BB
http://www.biblebob.net
  #6  
Old February 7th 07, 01:32 AM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote:


"Bible Bob" wrote in message
.. .
Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.




.....
BB
http://www.biblebob.net



Bob ! If you have Win Xp go to the windows directory with notepad, find
pfirewall.txt,
open it and go to the last entry on the bottom and copy it to notepad then
email it to me. If
if you do not have Xp let me know what you do have. A person that has his
own server
and network also KNOWS how to HACK !

Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com


Rod,

I have XP but my computer is also my business computer so it is
protected with Outpost Firewall; not the XP firewall. The file you
spoke of is not in my windows directory. I can send you the log file
in csv format; but I do't know what good it will do. This morning the
log showed 20,000 port attacks all defeated by the firewall. A little
window pops up over in the right bottom of my screen every time a port
attack occurs. And I have virus software running continually with a
complete scan of all drives every morning. Besides, there is an old
trick I can use that will defeat every attacker - disconnect the modem
cable.

The FBI will have a copy of it. Weatherly posted Wolf's IP address
this morning. I've already contacted Wolf's ISP to have his account
canceled for criminal conduct. And I will sending the IP info to them
as well. He says he lives in San Francisco but his web site info
indicates he lives in Shasta. He may be in violation of domain name
registration rules. You have to take a childs toys away from him when
he wants to use them to hurt others.

......
BB
http://www.biblebob.net
  #7  
Old February 7th 07, 01:59 AM posted to free.christians,alt.parenting.solutions
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

On Tue, 06 Feb 2007 20:37:04 -0500, "127.0.0.1"
wrote:

Bible Bob wrote:

On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz"
wrote:

Bible Bob wrote:

Be it known to all that would conspire with John Wolf to hack into
privaely owned computer systems (specifically mine, you will be
charged with conspiracy to violate US Federal Anti-Hacking laws.
-------------------
You're a ****ing idiot.

He's too stupid to ever be able to do that.
And you're too stupid to ever know if he did.
Steve


Steve,

Kinda over reacted didn't ya?

Did you read the first line "to all that would?" According to the
laws of grammar "to all that would" are not John Wolf.


Bob, chances are a real hacker isn't going to leave behind his real
IP-Number. I use an IDS (Intrusion Detection System) Called 'Snort' That
runs in the background as a daemon. I get all kinds of break in attempts
daily, these aren't portscans but programs like Nikto, Nessus and
Metasploit searching for vulnerabilities and misconfigurations. It's
possible that script kiddies like Roger are running ping sweeps on a range
if IP's looking for open ports. I get scanned all the time (Most of the
time its harmless) Sometimes its not. Last week, I got some moron trying to
run Medusa and Brute Force my ssh login. That was a real break in attempt.

The best way to stop hackers is the make sure your software is up to date.
There is a reason that Buffer Overflow is the whipping boy of
vulnerabilities.


Thanks,

I am Bible Bob, not Puter Bob (sounds kewl maybe I could be).

I don't understand the terminolgy but I think I know what you mean. I
use Outpost for my firewall and AVG for virus protection plus Adaware
for spyware, etc.

I went to the snort website, I don't recognize the file extension on
the download. Will Snort run on XP? Would I have to dump Outpost to
use Snort?

......
BB
http://www.biblebob.net
  #8  
Old February 7th 07, 02:30 AM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
Rod
external usenet poster
 
Posts: 14
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws


"Bible Bob" wrote in message
news
On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote:


"Bible Bob" wrote in message
.. .
Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.




.....
BB
http://www.biblebob.net



Bob ! If you have Win Xp go to the windows directory with notepad,

find
pfirewall.txt,
open it and go to the last entry on the bottom and copy it to notepad

then
email it to me. If
if you do not have Xp let me know what you do have. A person that has his
own server
and network also KNOWS how to HACK !

Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com


Rod,

I have XP but my computer is also my business computer so it is
protected with Outpost Firewall; not the XP firewall. The file you
spoke of is not in my windows directory. I can send you the log file
in csv format; but I do't know what good it will do. This morning the
log showed 20,000 port attacks all defeated by the firewall.


These files can be read with a text editor. The last 20,000 entires
are the ones needed to be seen. The port #'s and ip addresses,
and the protocol used. The thing is, UDP is a transport protocol
for short distances (local networks), at long distances udp is
unreliable. If udp was used the attacker had to be in the same domain
block to use this protocol. If it was tcp, it could come from anywhere.

Do you have a packet sniffer or packet capture program ? If so,
run it in promiscuous mode on the next attack, for 5 minutes, then
save the info into a file. A good sniffer will tell you what is at the
front of the packet header, an e0000070h or an x means a forged
packet, an anonomous server.


A little
window pops up over in the right bottom of my screen every time a port
attack occurs. And I have virus software running continually with a
complete scan of all drives every morning. Besides, there is an old
trick I can use that will defeat every attacker - disconnect the modem
cable.

The FBI will have a copy of it. Weatherly posted Wolf's IP address
this morning. I've already contacted Wolf's ISP to have his account
canceled for criminal conduct. And I will sending the IP info to them
as well. He says he lives in San Francisco but his web site info
indicates he lives in Shasta. He may be in violation of domain name
registration rules. You have to take a childs toys away from him when
he wants to use them to hurt others.

.....
BB
http://www.biblebob.net


He will likely have help. They all need to be caught and jailed. I would
consider
it a rare pleasure if you would allow me to assist you in this ! I have a
physical
location on Johns machine, I need to compare it to a California map to
know
what town or suburb he is in, if it IS him. The wonderful thing about a
network
is that ip addresses are actually a tcp filter; remove the filters and
you know everyone's
data. If people knew how unsecured they really are on the net they
wouldn't transmit
ANY information on it at all. But thy don't.


Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com
  #9  
Old February 7th 07, 03:13 AM posted to free.christians,alt.parenting.solutions
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

On Tue, 06 Feb 2007 21:27:22 -0500, "127.0.0.1"
wrote:

Bible Bob wrote:

On Tue, 06 Feb 2007 20:37:04 -0500, "127.0.0.1"
wrote:

Bible Bob wrote:

On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz"
wrote:

Bible Bob wrote:

Be it known to all that would conspire with John Wolf to hack into
privaely owned computer systems (specifically mine, you will be
charged with conspiracy to violate US Federal Anti-Hacking laws.
-------------------
You're a ****ing idiot.

He's too stupid to ever be able to do that.
And you're too stupid to ever know if he did.
Steve

Steve,

Kinda over reacted didn't ya?

Did you read the first line "to all that would?" According to the
laws of grammar "to all that would" are not John Wolf.


Bob, chances are a real hacker isn't going to leave behind his real
IP-Number. I use an IDS (Intrusion Detection System) Called 'Snort' That
runs in the background as a daemon. I get all kinds of break in attempts
daily, these aren't portscans but programs like Nikto, Nessus and
Metasploit searching for vulnerabilities and misconfigurations. It's
possible that script kiddies like Roger are running ping sweeps on a range
if IP's looking for open ports. I get scanned all the time (Most of the
time its harmless) Sometimes its not. Last week, I got some moron trying
to run Medusa and Brute Force my ssh login. That was a real break in
attempt.

The best way to stop hackers is the make sure your software is up to date.
There is a reason that Buffer Overflow is the whipping boy of
vulnerabilities.


Thanks,

I am Bible Bob, not Puter Bob (sounds kewl maybe I could be).

I don't understand the terminolgy but I think I know what you mean. I
use Outpost for my firewall and AVG for virus protection plus Adaware
for spyware, etc.


This is good. A firewall will stop the majority of people, it does nothing
to stop hackers from writing malicious code to your buffers. Ever noticed
that when you look at the 'windows patches' it may say something like;
Without this patch a hacker could take controll of your operating system
remotely? Programming errors inside of the operating system are known as
buffer overflows. A program like Metasploit will scan your system for these
programing errors/overflows find them - and then feed code to your
memory buffer and drop a payload and give a person remote access.
Metasploit is just one such program.
Matter of fact here is a video you can watch on this very subject.
http://video.google.com/videoplay?do...sploit&h l=en

Verdy intaresting

Programs like Nikto won't deliver a payload but it will find the slightest
misconfiguration and give the user a programing exploit number to get into
the system.

The best way to stop this is to make sure you keep your software updated.

I went to the snort website, I don't recognize the file extension on
the download. Will Snort run on XP? Would I have to dump Outpost to
use Snort?


Snort will only run on Nix systems. I haven't used windows in years. "Google
Windows Intrusion Detection System". I'm sure they have something. Or check
out Linux, FreeBSD. Some of the new Linux distros have become just as user
friendly as Windows.

.....
BB
http://www.biblebob.net


I think it would be easier to shut the machine down when I'm not using
it.

So much for me becoming Puter Bob.

Thanks a million for your help.

......
BB
http://www.biblebob.net
  #10  
Old February 7th 07, 03:33 AM posted to free.christians,alt.parenting.solutions,microsoft.public.handheldpc,alt.religion.christian.baptist,alt.christnet.public
Bible Bob
external usenet poster
 
Posts: 135
Default John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws

On Tue, 6 Feb 2007 20:30:49 -0600, "Rod" wrote:


"Bible Bob" wrote in message
news
On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote:


"Bible Bob" wrote in message
.. .
Anyone knowing the IP adress of John Wolf or www.cerm.info please let
me know. My software does not ID "info" web sites.




.....
BB
http://www.biblebob.net


Bob ! If you have Win Xp go to the windows directory with notepad,

find
pfirewall.txt,
open it and go to the last entry on the bottom and copy it to notepad

then
email it to me. If
if you do not have Xp let me know what you do have. A person that has his
own server
and network also KNOWS how to HACK !

Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com


Rod,

I have XP but my computer is also my business computer so it is
protected with Outpost Firewall; not the XP firewall. The file you
spoke of is not in my windows directory. I can send you the log file
in csv format; but I do't know what good it will do. This morning the
log showed 20,000 port attacks all defeated by the firewall.


These files can be read with a text editor. The last 20,000 entires
are the ones needed to be seen. The port #'s and ip addresses,
and the protocol used. The thing is, UDP is a transport protocol
for short distances (local networks), at long distances udp is
unreliable. If udp was used the attacker had to be in the same domain
block to use this protocol. If it was tcp, it could come from anywhere.

Do you have a packet sniffer or packet capture program ? If so,
run it in promiscuous mode on the next attack, for 5 minutes, then
save the info into a file. A good sniffer will tell you what is at the
front of the packet header, an e0000070h or an x means a forged
packet, an anonomous server.


A little
window pops up over in the right bottom of my screen every time a port
attack occurs. And I have virus software running continually with a
complete scan of all drives every morning. Besides, there is an old
trick I can use that will defeat every attacker - disconnect the modem
cable.

The FBI will have a copy of it. Weatherly posted Wolf's IP address
this morning. I've already contacted Wolf's ISP to have his account
canceled for criminal conduct. And I will sending the IP info to them
as well. He says he lives in San Francisco but his web site info
indicates he lives in Shasta. He may be in violation of domain name
registration rules. You have to take a childs toys away from him when
he wants to use them to hurt others.

.....
BB
http://www.biblebob.net


He will likely have help. They all need to be caught and jailed. I would
consider
it a rare pleasure if you would allow me to assist you in this ! I have a
physical
location on Johns machine, I need to compare it to a California map to
know
what town or suburb he is in, if it IS him. The wonderful thing about a
network
is that ip addresses are actually a tcp filter; remove the filters and
you know everyone's
data. If people knew how unsecured they really are on the net they
wouldn't transmit
ANY information on it at all. But thy don't.


Rod



Posted Via Usenet.com Premium Usenet Newsgroup Services
----------------------------------------------------------
** SPEED ** RETENTION ** COMPLETION ** ANONYMITY **
----------------------------------------------------------
http://www.usenet.com



I don't gang up on Christians. I don't even stand against them; just
their behavior. Standing against them is standing against Christ and
myself because we are all of the one body. But John Wolf is evidently
not the real John Wolf, just a mummy that contains the spirit of God.
Mummy's can preserved for a long time.

Even when I rebuke and reprove or speak against our mutual
acquaintance; I am speaking to the evil manifested through the carcase
that hosts the demon. The body ain't nothin but the hammer the demon
uses to pound on the children of God.

Here is what I have. I assume your acttions will be in acordance with
applicable laws; if not then no thanks but thanks for the offer. John
says he lives in SF, used to live in Redding, but his IP points to
Shasta Lake.

207.213.216.100
SBC Internet Services PBI-NET-3 (NET-207-212-0-0-1)
207.212.0.0 - 207.215.255.255
Coastside Net, Inc. PBI-CUSTNET-1269 (NET-207-213-216-0-1)
207.213.216.0 - 207.213.217.255

Domain ID13485309-LRMS
Domain Name:CERM.INFO
Created On:20-May-2006 07:48:23 UTC
Last Updated On:19-Jul-2006 20:31:17 UTC
Expiration Date:20-May-2007 07:48:23 UTC
Sponsoring Registrar:MIT (R141-LRMS)
Status:CLIENT TRANSFER PROHIBITED
Registrant ID:C114805831326044
Registrant Name:John Wolf
Registrant Organization:John Wolf
Registrant Street1:Box 584
Registrant Street2:
Registrant Street3:
Registrant City:Shasta Lake
Registrant State/Province:CA
Registrant Postal Code:96019
Registrant Country:US
Registrant Phone:+1.5302090352
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant
Admin ID114808093275216
Admin Name:John Wolf
Admin Organization:John Wolf
Admin Street1:Box 584
Admin Street2:
Admin Street3:
Admin City:Shasta Lake
Admin State/Province:CA
Admin Postal Code:96019
Admin Country:US
Admin Phone:+1.5302090352
Admin Phone Ext.:
Admin FAX:
Admin FAX Ext.:
Admin
Billing ID:C114805831326043
Billing Name:YahooDomains BillingContact
Billing Organization:Yahoo! Inc
Billing Street1:701 First Ave.
Billing Street2:
Billing Street3:
Billing City:Sunnyvale
Billing State/Province:CA
Billing Postal Code:94089
Billing Country:US
Billing Phone:+1.6198813096
Billing Phone Ext.:
Billing FAX:
Billing FAX Ext.:
Billing
Tech ID114808093275217
Tech Name:YahooDomains TechContact
Tech Organization:Yahoo! Inc
Tech Street1:701 First Ave.
Tech Street2:
Tech Street3:
Tech City:Sunnyvale
Tech State/Province:CA
Tech Postal Code:94089
Tech Country:US
Tech Phone:+1.6198813096
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech
Name Server:YNS1.YAHOO.COM
Name Server:YNS2.YAHOO.COM



......
BB
http://www.biblebob.net
 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT +1. The time now is 07:08 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 ParentingBanter.com.
The comments are property of their posters.