<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_12_07_1318225</id>
	<title>Hackers vs. Phishers</title>
	<author>CmdrTaco</author>
	<datestamp>1260194220000</datestamp>
	<htmltext>An anonymous reader writes <i>"Some hackers out there don't like to do all the hard work of running a successful phishing campaign. Instead, they developed a simple online service to <a href="http://securityhacks.net/hackers-rip-off-phishers">'steal' account details from the hard-working phishers</a>. Named AutoWhaler, the service allows anyone to scan a phishing server for log files that contain juicy information such as usernames and passwords."</i></htmltext>
<tokenext>An anonymous reader writes " Some hackers out there do n't like to do all the hard work of running a successful phishing campaign .
Instead , they developed a simple online service to 'steal ' account details from the hard-working phishers .
Named AutoWhaler , the service allows anyone to scan a phishing server for log files that contain juicy information such as usernames and passwords .
"</tokentext>
<sentencetext>An anonymous reader writes "Some hackers out there don't like to do all the hard work of running a successful phishing campaign.
Instead, they developed a simple online service to 'steal' account details from the hard-working phishers.
Named AutoWhaler, the service allows anyone to scan a phishing server for log files that contain juicy information such as usernames and passwords.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357232</id>
	<title>Low-quality phishing software</title>
	<author>Animats</author>
	<datestamp>1260177540000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>
I've seen that, too. Recently, Stanford University came up
on our <a href="http://www.sitetruth.com/reports/phishes.html" title="sitetruth.com">short list of major sites being exploited by phishers.</a> [sitetruth.com] I was surprised, because Stanford is usually good about stopping that.  It was a weird subdomain under "stanford.edu", and at first I thought someone had compromised Stanford's DNS to get their site under the "stanford.edu" domain.  But no, it was just some minor machine that had had a break-in.
</p><p>
The directory with the phishing page was readable as a web page and contained the log of captured passwords, so I sent those to Stanford security and Bank of America security.  Haven't heard back from either.  After the end of the weekend, the site was taken down, and that took Stanford off the blacklist.
</p><p>
We've been reasonably successful at cleaning up that list.  We're trying to popularize the idea that one verified phishing URL blacklists the whole domain until the problem is fixed.  (The idea behind SiteTruth is to take a hard-line approach and measure the collateral damage so it can be minimized.) The oldest sites on that list are ones which won't respond to complaints by e-mail or phone.  In some cases we've sent faxes.
</p><p>
The worst offenders are Piczo and FortuneCity. Piczo is some kind of social network/hosting service for teenage girls, and it's full of phishing pages, mostly for Habbo logins.  PhishTank counts 15, and there are probably more.  The phony pages are often not in English, and the Piczo abuse department may not recognize a French Habbo phishing page. This may be the next trend in phishing - put your page on a site run by someone unlikely to understand the page.  I've seen a phishing page in Greek on an Indian site.
</p><p>
It's getting harder to run a phishing site. Since the end of "domain tasting", the business of high-volume bogus domain registration has tapered off.  We haven't seen an "open redirector" on a major site in a while; eBay, Yahoo, and Microsoft Live all used to have at least one.  The "url shorteners" are getting very aggressive about killing links to phishing sites.  This might be winnable.</p></htmltext>
<tokenext>I 've seen that , too .
Recently , Stanford University came up on our short list of major sites being exploited by phishers .
[ sitetruth.com ] I was surprised , because Stanford is usually good about stopping that .
It was a weird subdomain under " stanford.edu " , and at first I thought someone had compromised Stanford 's DNS to get their site under the " stanford.edu " domain .
But no , it was just some minor machine that had had a break-in .
The directory with the phishing page was readable as a web page and contained the log of captured passwords , so I sent those to Stanford security and Bank of America security .
Have n't heard back from either .
After the end of the weekend , the site was taken down , and that took Stanford off the blacklist .
We 've been reasonably successful at cleaning up that list .
We 're trying to popularize the idea that one verified phishing URL blacklists the whole domain until the problem is fixed .
( The idea behind SiteTruth is to take a hard-line approach and measure the collateral damage so it can be minimized .
) The oldest sites on that list are ones which wo n't respond to complaints by e-mail or phone .
In some cases we 've sent faxes .
The worst offenders are Piczo and FortuneCity .
Piczo is some kind of social network/hosting service for teenage girls , and it 's full of phishing pages , mostly for Habbo logins .
PhishTank counts 15 , and there are probably more .
The phony pages are often not in English , and the Piczo abuse department may not recognize a French Habbo phishing page .
This may be the next trend in phishing - put your page on a site run by someone unlikely to understand the page .
I 've seen a phishing page in Greek on an Indian site .
It 's getting harder to run a phishing site .
Since the end of " domain tasting " , the business of high-volume bogus domain registration has tapered off .
We have n't seen an " open redirector " on a major site in a while ; eBay , Yahoo , and Microsoft Live all used to have at least one .
The " url shorteners " are getting very aggressive about killing links to phishing sites .
This might be winnable .</tokentext>
<sentencetext>
I've seen that, too.
Recently, Stanford University came up
on our short list of major sites being exploited by phishers.
[sitetruth.com] I was surprised, because Stanford is usually good about stopping that.
It was a weird subdomain under "stanford.edu", and at first I thought someone had compromised Stanford's DNS to get their site under the "stanford.edu" domain.
But no, it was just some minor machine that had had a break-in.
The directory with the phishing page was readable as a web page and contained the log of captured passwords, so I sent those to Stanford security and Bank of America security.
Haven't heard back from either.
After the end of the weekend, the site was taken down, and that took Stanford off the blacklist.
We've been reasonably successful at cleaning up that list.
We're trying to popularize the idea that one verified phishing URL blacklists the whole domain until the problem is fixed.
(The idea behind SiteTruth is to take a hard-line approach and measure the collateral damage so it can be minimized.
) The oldest sites on that list are ones which won't respond to complaints by e-mail or phone.
In some cases we've sent faxes.
The worst offenders are Piczo and FortuneCity.
Piczo is some kind of social network/hosting service for teenage girls, and it's full of phishing pages, mostly for Habbo logins.
PhishTank counts 15, and there are probably more.
The phony pages are often not in English, and the Piczo abuse department may not recognize a French Habbo phishing page.
This may be the next trend in phishing - put your page on a site run by someone unlikely to understand the page.
I've seen a phishing page in Greek on an Indian site.
It's getting harder to run a phishing site.
Since the end of "domain tasting", the business of high-volume bogus domain registration has tapered off.
We haven't seen an "open redirector" on a major site in a while; eBay, Yahoo, and Microsoft Live all used to have at least one.
The "url shorteners" are getting very aggressive about killing links to phishing sites.
This might be winnable.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352542</id>
	<title>Hard work?</title>
	<author>Xacid</author>
	<datestamp>1260199200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>"Some hackers out there don't like to do all the hard work of running..."

Nuff said.</htmltext>
<tokenext>" Some hackers out there do n't like to do all the hard work of running... " Nuff said .</tokentext>
<sentencetext>"Some hackers out there don't like to do all the hard work of running..."

Nuff said.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288</id>
	<title>Parasites are everywhere, for natural reasons</title>
	<author>Anonymous</author>
	<datestamp>1260198180000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma. Instead, they developed a simple online service to 'steal' karma from the hardworking posters. The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up".</htmltext>
<tokenext>In other news , some Slashdot users do n't like to do all the hard work of writing inspiring posts to build karma .
Instead , they developed a simple online service to 'steal ' karma from the hardworking posters .
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to " mod parent up " .</tokentext>
<sentencetext>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma.
Instead, they developed a simple online service to 'steal' karma from the hardworking posters.
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30362516</id>
	<title>Phisers strikes at the hackers and their kiddies</title>
	<author>bjoeg</author>
	<datestamp>1260302880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Yesterday the Auto Whaler was something I would thumb up for. Now when I finally got my chance to abuse it, it somewhat became old news too quick.
<br> <br>
During my sleep I finally received some phising mails to test with the Auto Whaler.
<br> <br>
First one gave no hits
Second one gave green lines all over. Trying to open one of the text files I was just redirected to a sub page on the site where all the red lights starts flashing. Tons of malware trying to be installed.
<br> <br>
So do not let the phishers fool you, they too know about Whales.</htmltext>
<tokenext>Yesterday the Auto Whaler was something I would thumb up for .
Now when I finally got my chance to abuse it , it somewhat became old news too quick .
During my sleep I finally received some phising mails to test with the Auto Whaler .
First one gave no hits Second one gave green lines all over .
Trying to open one of the text files I was just redirected to a sub page on the site where all the red lights starts flashing .
Tons of malware trying to be installed .
So do not let the phishers fool you , they too know about Whales .</tokentext>
<sentencetext>Yesterday the Auto Whaler was something I would thumb up for.
Now when I finally got my chance to abuse it, it somewhat became old news too quick.
During my sleep I finally received some phising mails to test with the Auto Whaler.
First one gave no hits
Second one gave green lines all over.
Trying to open one of the text files I was just redirected to a sub page on the site where all the red lights starts flashing.
Tons of malware trying to be installed.
So do not let the phishers fool you, they too know about Whales.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353296</id>
	<title>Re:Hacker culture</title>
	<author>commodore64\_love</author>
	<datestamp>1260202860000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>Yes.  If you're going to steal, then steal from a known thief, because he's unlikely to go to the cops and report you.</p><p>Same applies to shopping on ebay</p></htmltext>
<tokenext>Yes .
If you 're going to steal , then steal from a known thief , because he 's unlikely to go to the cops and report you.Same applies to shopping on ebay</tokentext>
<sentencetext>Yes.
If you're going to steal, then steal from a known thief, because he's unlikely to go to the cops and report you.Same applies to shopping on ebay</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356556</id>
	<title>Hacker</title>
	<author>Anonymous</author>
	<datestamp>1260217560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>That's the real hacker -&gt; http://catb.org/~esr/faqs/hacker-howto.html</p></htmltext>
<tokenext>That 's the real hacker - &gt; http : //catb.org/ ~ esr/faqs/hacker-howto.html</tokentext>
<sentencetext>That's the real hacker -&gt; http://catb.org/~esr/faqs/hacker-howto.html</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352390</id>
	<title>I can see the poll now...</title>
	<author>Anonymous</author>
	<datestamp>1260198600000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>In a web 3.0 show-down who would win?</p><p>1) Hackers.<br>2) Pirates.<br>3) Phishers.<br>4) Ninjas.<br>5) The Man.<br>5) Cowboy Neal.</p><p>Missing option being a tag-team of Chuck Norris and Angelina Jolie.</p></htmltext>
<tokenext>In a web 3.0 show-down who would win ? 1 ) Hackers.2 ) Pirates.3 ) Phishers.4 ) Ninjas.5 ) The Man.5 ) Cowboy Neal.Missing option being a tag-team of Chuck Norris and Angelina Jolie .</tokentext>
<sentencetext>In a web 3.0 show-down who would win?1) Hackers.2) Pirates.3) Phishers.4) Ninjas.5) The Man.5) Cowboy Neal.Missing option being a tag-team of Chuck Norris and Angelina Jolie.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</id>
	<title>Dag-nabbit!</title>
	<author>Anonymous</author>
	<datestamp>1260198720000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>These young hackers causing all this hutinanity and without any real work.</p><p>Back in my days youngans, Hacking or cracking as it was sometimes called, while still illegal was something to be respected, you had to know what you were doing to break into a system and the harder the break-in the more respect you got... Now todays you kids got all comerical and you can break into computers without having the break into them.  You just ask someone for the passwords and they give them to you... Dag-nabbit that is not hacking that sounds like politicians  to me.</p></htmltext>
<tokenext>These young hackers causing all this hutinanity and without any real work.Back in my days youngans , Hacking or cracking as it was sometimes called , while still illegal was something to be respected , you had to know what you were doing to break into a system and the harder the break-in the more respect you got... Now todays you kids got all comerical and you can break into computers without having the break into them .
You just ask someone for the passwords and they give them to you... Dag-nabbit that is not hacking that sounds like politicians to me .</tokentext>
<sentencetext>These young hackers causing all this hutinanity and without any real work.Back in my days youngans, Hacking or cracking as it was sometimes called, while still illegal was something to be respected, you had to know what you were doing to break into a system and the harder the break-in the more respect you got... Now todays you kids got all comerical and you can break into computers without having the break into them.
You just ask someone for the passwords and they give them to you... Dag-nabbit that is not hacking that sounds like politicians  to me.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354748</id>
	<title>HERESY!</title>
	<author>Thud457</author>
	<datestamp>1260208800000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>As the little old lady tought Betrand Russel, <i> <b>it's turtles all the way down</b> </i>!!!</htmltext>
<tokenext>As the little old lady tought Betrand Russel , it 's turtles all the way down ! !
!</tokentext>
<sentencetext>As the little old lady tought Betrand Russel,  it's turtles all the way down !!
!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30366476</id>
	<title>Re:Not surprised</title>
	<author>Spykk</author>
	<datestamp>1260292860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What is being stolen from the phishers is stolen account information. The only way to make money with that is to use it to steal from the phisher's innocent victims. There is nothing white hat about this.</htmltext>
<tokenext>What is being stolen from the phishers is stolen account information .
The only way to make money with that is to use it to steal from the phisher 's innocent victims .
There is nothing white hat about this .</tokentext>
<sentencetext>What is being stolen from the phishers is stolen account information.
The only way to make money with that is to use it to steal from the phisher's innocent victims.
There is nothing white hat about this.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353720</id>
	<title>Re:Not surprised</title>
	<author>Anonymous</author>
	<datestamp>1260204780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Don't worry, this criminal log result for free.... so criminal steal criminals who steal criminals.... Everyone is happy !</p></htmltext>
<tokenext>Do n't worry , this criminal log result for free.... so criminal steal criminals who steal criminals.... Everyone is happy !</tokentext>
<sentencetext>Don't worry, this criminal log result for free.... so criminal steal criminals who steal criminals.... Everyone is happy !</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352292</id>
	<title>Well, obviously</title>
	<author>Anonymusing</author>
	<datestamp>1260198180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>FBI: Why do you rob banks? <br>Willie Sutton: Because that's where the money is.</p></htmltext>
<tokenext>FBI : Why do you rob banks ?
Willie Sutton : Because that 's where the money is .</tokentext>
<sentencetext>FBI: Why do you rob banks?
Willie Sutton: Because that's where the money is.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354924</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>MarkvW</author>
	<datestamp>1260209520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hacking started out as a slang term that means one cluster of things.  The meaning has since evolved.</p><p>Now we've got people citing dictionary meanings of the term.</p><p>The drive to classify--and to impose your classification upon others--must be a human biological imperative.</p></htmltext>
<tokenext>Hacking started out as a slang term that means one cluster of things .
The meaning has since evolved.Now we 've got people citing dictionary meanings of the term.The drive to classify--and to impose your classification upon others--must be a human biological imperative .</tokentext>
<sentencetext>Hacking started out as a slang term that means one cluster of things.
The meaning has since evolved.Now we've got people citing dictionary meanings of the term.The drive to classify--and to impose your classification upon others--must be a human biological imperative.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353132</id>
	<title>The Phish, from Vermont?</title>
	<author>Slash.Poop</author>
	<datestamp>1260202140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>The Phish, from Vermont...are the poo poo.</htmltext>
<tokenext>The Phish , from Vermont...are the poo poo .</tokentext>
<sentencetext>The Phish, from Vermont...are the poo poo.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356270</id>
	<title>Finishing Statement Its now over</title>
	<author>daddycoy</author>
	<datestamp>1260216000000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext>oh its gonna be a flame war i see i dont do those, Just shows how smart you are " i got my answer" mission accomplished and you cant get enough of it. You should see if theres any money in that seriously. but you would fail at beeing a good heckler i doubt you have the intelligence to be a good one. i didnt want to flame i hate flaming and getting labled as troll for saying a real hacker doesnt harm well the hackers i know and they are real and they dont harm. maybe i got it wrong or maybe that definition you fetched is wrong and labled all hackers the same way. It seems to have really done that. "The hackers i know dont harm" they do it for a challenge to find the vulnerability etc the access point they will even tell the operating systems about it,before it gets out. I should of said all hackers arent the same. Ok as this definition has stated. Kevin Mitnick was labled a hacker but for what kinda hacking he done was illegal and he is labled the best. The best dont get caught isnt that the whole objective anyway not to get caught while your doing something in that way, well he got caught. they should of labled him "the best caught hacker" not the best hacker. A hacker would have to know how to program to be any good at it not rely on other peoples kiddie tools or well maybe to cause harm maybe a better hacker made the tool, but a hacker dont give away his trade secrets if he is doing it for harm. ok since i read the definition i totally change my mind but will not lable my friends that for they do not do harm. boy they can surely penetrate a os and they have told me theres a hell of alot of ways in windows. i like these hacking competitions. one beeing the one with ubuntu windows and osx. if you followed what were the one they didnt get into. ill answer ubuntu. osx failed because of safari and windows failed well because its windows. the hackers enjoyed that or they would of not done it right. did they cause harm. NOOOO, Theres even hackers who get paid to do what they do not because they "harm" they find ways in and its totally legal well just depends were you live i guess in the United States it is anyway. The United States have hackers they use some of the caught ones to work for them, why so they dont to prision the rest of there lifes. You got a choice Prision for the rest of your life or work for The US Goverment jeez thats a hard decision if i where a hacker that caused that much harm id say US Goverment and actually get paid for it, they get paid good so ive heard. That definition shouldnt be used to lable all hackers as in saying all hackers cause harm. They dont. Theres more than one type of Hacker i knew this before i made the comment i was just seeing what you people would say and all you come up with is that damn definition. Theres hackers thats good with the telephone aka phreakers, remember the blackbox heh those were the days. I should of said i respect the hackers that dont cause know harm and there reasoning of hacking is for the challenge.  If your gonna hack please dont do it for a pointless reason there has to be some stadegy. I got so mad when they labled that kid who got in sarah palins email a hacker, i know how he done it because he lives really close to me, ive followed the story all the kid done is use a yahoo password cracker and got labled a hacker, how pathetic is that. This new world has depressed me. Alot of people believes all hackers cause harm thats not true. some find vulnerabilities and tell operating systems etc about them those are what i call "Real Hackers" there doing good with there craft. did you know you can get a certification to be a hacker its called ethical hacking hmm i knew this but for some reason it helps you to better secure a network. I think its worthless but a degree gets the job not the talent.  this would also get you the job in network security say your in the interview and they ask how can you secure my network without a degree, the answer is this by breaking into it and telling you how i did so. if say so company thinks you have to have that certification to p</htmltext>
<tokenext>oh its gon na be a flame war i see i dont do those , Just shows how smart you are " i got my answer " mission accomplished and you cant get enough of it .
You should see if theres any money in that seriously .
but you would fail at beeing a good heckler i doubt you have the intelligence to be a good one .
i didnt want to flame i hate flaming and getting labled as troll for saying a real hacker doesnt harm well the hackers i know and they are real and they dont harm .
maybe i got it wrong or maybe that definition you fetched is wrong and labled all hackers the same way .
It seems to have really done that .
" The hackers i know dont harm " they do it for a challenge to find the vulnerability etc the access point they will even tell the operating systems about it,before it gets out .
I should of said all hackers arent the same .
Ok as this definition has stated .
Kevin Mitnick was labled a hacker but for what kinda hacking he done was illegal and he is labled the best .
The best dont get caught isnt that the whole objective anyway not to get caught while your doing something in that way , well he got caught .
they should of labled him " the best caught hacker " not the best hacker .
A hacker would have to know how to program to be any good at it not rely on other peoples kiddie tools or well maybe to cause harm maybe a better hacker made the tool , but a hacker dont give away his trade secrets if he is doing it for harm .
ok since i read the definition i totally change my mind but will not lable my friends that for they do not do harm .
boy they can surely penetrate a os and they have told me theres a hell of alot of ways in windows .
i like these hacking competitions .
one beeing the one with ubuntu windows and osx .
if you followed what were the one they didnt get into .
ill answer ubuntu .
osx failed because of safari and windows failed well because its windows .
the hackers enjoyed that or they would of not done it right .
did they cause harm .
NOOOO , Theres even hackers who get paid to do what they do not because they " harm " they find ways in and its totally legal well just depends were you live i guess in the United States it is anyway .
The United States have hackers they use some of the caught ones to work for them , why so they dont to prision the rest of there lifes .
You got a choice Prision for the rest of your life or work for The US Goverment jeez thats a hard decision if i where a hacker that caused that much harm id say US Goverment and actually get paid for it , they get paid good so ive heard .
That definition shouldnt be used to lable all hackers as in saying all hackers cause harm .
They dont .
Theres more than one type of Hacker i knew this before i made the comment i was just seeing what you people would say and all you come up with is that damn definition .
Theres hackers thats good with the telephone aka phreakers , remember the blackbox heh those were the days .
I should of said i respect the hackers that dont cause know harm and there reasoning of hacking is for the challenge .
If your gon na hack please dont do it for a pointless reason there has to be some stadegy .
I got so mad when they labled that kid who got in sarah palins email a hacker , i know how he done it because he lives really close to me , ive followed the story all the kid done is use a yahoo password cracker and got labled a hacker , how pathetic is that .
This new world has depressed me .
Alot of people believes all hackers cause harm thats not true .
some find vulnerabilities and tell operating systems etc about them those are what i call " Real Hackers " there doing good with there craft .
did you know you can get a certification to be a hacker its called ethical hacking hmm i knew this but for some reason it helps you to better secure a network .
I think its worthless but a degree gets the job not the talent .
this would also get you the job in network security say your in the interview and they ask how can you secure my network without a degree , the answer is this by breaking into it and telling you how i did so .
if say so company thinks you have to have that certification to p</tokentext>
<sentencetext>oh its gonna be a flame war i see i dont do those, Just shows how smart you are " i got my answer" mission accomplished and you cant get enough of it.
You should see if theres any money in that seriously.
but you would fail at beeing a good heckler i doubt you have the intelligence to be a good one.
i didnt want to flame i hate flaming and getting labled as troll for saying a real hacker doesnt harm well the hackers i know and they are real and they dont harm.
maybe i got it wrong or maybe that definition you fetched is wrong and labled all hackers the same way.
It seems to have really done that.
"The hackers i know dont harm" they do it for a challenge to find the vulnerability etc the access point they will even tell the operating systems about it,before it gets out.
I should of said all hackers arent the same.
Ok as this definition has stated.
Kevin Mitnick was labled a hacker but for what kinda hacking he done was illegal and he is labled the best.
The best dont get caught isnt that the whole objective anyway not to get caught while your doing something in that way, well he got caught.
they should of labled him "the best caught hacker" not the best hacker.
A hacker would have to know how to program to be any good at it not rely on other peoples kiddie tools or well maybe to cause harm maybe a better hacker made the tool, but a hacker dont give away his trade secrets if he is doing it for harm.
ok since i read the definition i totally change my mind but will not lable my friends that for they do not do harm.
boy they can surely penetrate a os and they have told me theres a hell of alot of ways in windows.
i like these hacking competitions.
one beeing the one with ubuntu windows and osx.
if you followed what were the one they didnt get into.
ill answer ubuntu.
osx failed because of safari and windows failed well because its windows.
the hackers enjoyed that or they would of not done it right.
did they cause harm.
NOOOO, Theres even hackers who get paid to do what they do not because they "harm" they find ways in and its totally legal well just depends were you live i guess in the United States it is anyway.
The United States have hackers they use some of the caught ones to work for them, why so they dont to prision the rest of there lifes.
You got a choice Prision for the rest of your life or work for The US Goverment jeez thats a hard decision if i where a hacker that caused that much harm id say US Goverment and actually get paid for it, they get paid good so ive heard.
That definition shouldnt be used to lable all hackers as in saying all hackers cause harm.
They dont.
Theres more than one type of Hacker i knew this before i made the comment i was just seeing what you people would say and all you come up with is that damn definition.
Theres hackers thats good with the telephone aka phreakers, remember the blackbox heh those were the days.
I should of said i respect the hackers that dont cause know harm and there reasoning of hacking is for the challenge.
If your gonna hack please dont do it for a pointless reason there has to be some stadegy.
I got so mad when they labled that kid who got in sarah palins email a hacker, i know how he done it because he lives really close to me, ive followed the story all the kid done is use a yahoo password cracker and got labled a hacker, how pathetic is that.
This new world has depressed me.
Alot of people believes all hackers cause harm thats not true.
some find vulnerabilities and tell operating systems etc about them those are what i call "Real Hackers" there doing good with there craft.
did you know you can get a certification to be a hacker its called ethical hacking hmm i knew this but for some reason it helps you to better secure a network.
I think its worthless but a degree gets the job not the talent.
this would also get you the job in network security say your in the interview and they ask how can you secure my network without a degree, the answer is this by breaking into it and telling you how i did so.
if say so company thinks you have to have that certification to p</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352984</id>
	<title>I think this is a grave offence.</title>
	<author>gadget junkie</author>
	<datestamp>1260201360000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext>I am not a lawyer (and I use Acronyms sparingly), but stealing accounts from other phishers  may be a <a href="http://www.copyright.gov/legislation/dmca.pdf" title="copyright.gov"> DMCA violation!!!</a> [copyright.gov]</htmltext>
<tokenext>I am not a lawyer ( and I use Acronyms sparingly ) , but stealing accounts from other phishers may be a DMCA violation ! ! !
[ copyright.gov ]</tokentext>
<sentencetext>I am not a lawyer (and I use Acronyms sparingly), but stealing accounts from other phishers  may be a  DMCA violation!!!
[copyright.gov]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352706</id>
	<title>Re:Parasites are everywhere, for natural reasons</title>
	<author>Anonymous</author>
	<datestamp>1260199920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Indeed...</p><p><a href="http://www.google.com/hostednews/ap/article/ALeqM5joOOsTVD57lFwm\_InpZY\_nRbg4KQD9CDRVOO0" title="google.com" rel="nofollow">http://www.google.com/hostednews/ap/article/ALeqM5joOOsTVD57lFwm\_InpZY\_nRbg4KQD9CDRVOO0</a> [google.com]</p><p><a href="http://www.nypost.com/p/news/international/warm\_and\_fuzzy\_facts\_RD1aMFGyyvy19b0ZTHaGwO" title="nypost.com" rel="nofollow">http://www.nypost.com/p/news/international/warm\_and\_fuzzy\_facts\_RD1aMFGyyvy19b0ZTHaGwO</a> [nypost.com]</p></htmltext>
<tokenext>Indeed...http : //www.google.com/hostednews/ap/article/ALeqM5joOOsTVD57lFwm \ _InpZY \ _nRbg4KQD9CDRVOO0 [ google.com ] http : //www.nypost.com/p/news/international/warm \ _and \ _fuzzy \ _facts \ _RD1aMFGyyvy19b0ZTHaGwO [ nypost.com ]</tokentext>
<sentencetext>Indeed...http://www.google.com/hostednews/ap/article/ALeqM5joOOsTVD57lFwm\_InpZY\_nRbg4KQD9CDRVOO0 [google.com]http://www.nypost.com/p/news/international/warm\_and\_fuzzy\_facts\_RD1aMFGyyvy19b0ZTHaGwO [nypost.com]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354572</id>
	<title>Re:I Had to comment this has bothered me</title>
	<author>ChienAndalu</author>
	<datestamp>1260208140000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p>Is this a Markov chain text generator or something?</p></htmltext>
<tokenext>Is this a Markov chain text generator or something ?</tokentext>
<sentencetext>Is this a Markov chain text generator or something?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352578</id>
	<title>i tried it out and...</title>
	<author>Anonymous</author>
	<datestamp>1260199380000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>...all it does is to try access a number of pre-defined files from the root directory of the probed host:  passwords.txt, logs.txt, l0gz.txt, accounts.txt etc.  --  talk about sophisticated hacker tool!  massive all phreaker big-up! what a joke...</p><p>the tool also "epically fails" if you supply a host that is not encapsuled in http://<nobr> <wbr></nobr>... /</p></htmltext>
<tokenext>...all it does is to try access a number of pre-defined files from the root directory of the probed host : passwords.txt , logs.txt , l0gz.txt , accounts.txt etc .
-- talk about sophisticated hacker tool !
massive all phreaker big-up !
what a joke...the tool also " epically fails " if you supply a host that is not encapsuled in http : // ... /</tokentext>
<sentencetext>...all it does is to try access a number of pre-defined files from the root directory of the probed host:  passwords.txt, logs.txt, l0gz.txt, accounts.txt etc.
--  talk about sophisticated hacker tool!
massive all phreaker big-up!
what a joke...the tool also "epically fails" if you supply a host that is not encapsuled in http:// ... /</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30358056</id>
	<title>Luxury!</title>
	<author>John Guilt</author>
	<datestamp>1260182220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Back in <b>our</b> day, we had to move the electrons around with <i>tweezers</i>.</htmltext>
<tokenext>Back in our day , we had to move the electrons around with tweezers .</tokentext>
<sentencetext>Back in our day, we had to move the electrons around with tweezers.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354358</id>
	<title>Keep It Simple Son</title>
	<author>Anonymous</author>
	<datestamp>1260207360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The correct definition of "hacking" a device or application is,<br>making the device or application function in a way which was not intended by the original author.</p><p>The definition brought forward by the media only focuses on hacking remote devices for malicious purposes.</p></htmltext>
<tokenext>The correct definition of " hacking " a device or application is,making the device or application function in a way which was not intended by the original author.The definition brought forward by the media only focuses on hacking remote devices for malicious purposes .</tokentext>
<sentencetext>The correct definition of "hacking" a device or application is,making the device or application function in a way which was not intended by the original author.The definition brought forward by the media only focuses on hacking remote devices for malicious purposes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354456</id>
	<title>Re:Hackers and phishers</title>
	<author>natehoy</author>
	<datestamp>1260207720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And on that flea there was a rash a rare rash, a rattlin' rash. The rash on the flea and the flea on the wing and the wing on the bird and the bird in the egg and the egg in the bird and the bird in the nest and the nest on the leaf and the leaf on the twig and the twig on the branch and the branch on the trunk and the trunk on the tree and the tree in the bog and the bog down in the valley-o.</p></htmltext>
<tokenext>And on that flea there was a rash a rare rash , a rattlin ' rash .
The rash on the flea and the flea on the wing and the wing on the bird and the bird in the egg and the egg in the bird and the bird in the nest and the nest on the leaf and the leaf on the twig and the twig on the branch and the branch on the trunk and the trunk on the tree and the tree in the bog and the bog down in the valley-o .</tokentext>
<sentencetext>And on that flea there was a rash a rare rash, a rattlin' rash.
The rash on the flea and the flea on the wing and the wing on the bird and the bird in the egg and the egg in the bird and the bird in the nest and the nest on the leaf and the leaf on the twig and the twig on the branch and the branch on the trunk and the trunk on the tree and the tree in the bog and the bog down in the valley-o.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</id>
	<title>misuse of the term 'hacker'</title>
	<author>Anonymous</author>
	<datestamp>1260201840000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>from <a href="http://catb.org/jargon/html/H/hacker.html" title="catb.org" rel="nofollow"> the jargon file</a> [catb.org]:</p><p><div class="quote"><p>hacker: n.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; [originally, someone who makes furniture with an axe]</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 3. A person capable of appreciating hack value.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 4. A person who is good at programming quickly.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 5. An expert at a particular program, or one who frequently does work using it or on it; as in &lsquo;a Unix hacker&rsquo;. (Definitions 1 through 5 are correlated, and people who fit them congregate.)</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; The term &lsquo;hacker&rsquo; also tends to connote membership in the global community defined by the net (see the network. For discussion of some of the basics of this culture, see the How To Become A Hacker FAQ. It also implies that the person described is seen to subscribe to some version of the hacker ethic (see hacker ethic).</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled bogus). See also geek, wannabee.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC and the MIT AI Lab. We have a report that it was used in a sense close to this entry's by teenage radio hams and electronics tinkerers in the mid-1950s.</p></div><p>Note that the perjorative use has been deprecated.</p></div>
	</htmltext>
<tokenext>from the jargon file [ catb.org ] : hacker : n .         [ originally , someone who makes furniture with an axe ]         1 .
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities , as opposed to most users , who prefer to learn only the minimum necessary .
RFC1392 , the Internet Users ' Glossary , usefully amplifies this as : A person who delights in having an intimate understanding of the internal workings of a system , computers and computer networks in particular .
        2 .
One who programs enthusiastically ( even obsessively ) or who enjoys programming rather than just theorizing about programming .
        3 .
A person capable of appreciating hack value .
        4 .
A person who is good at programming quickly .
        5 .
An expert at a particular program , or one who frequently does work using it or on it ; as in    a Unix hacker    .
( Definitions 1 through 5 are correlated , and people who fit them congregate .
)         6 .
An expert or enthusiast of any kind .
One might be an astronomy hacker , for example .
        7 .
One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations .
        8 .
[ deprecated ] A malicious meddler who tries to discover sensitive information by poking around .
Hence password hacker , network hacker .
The correct term for this sense is cracker .
        The term    hacker    also tends to connote membership in the global community defined by the net ( see the network .
For discussion of some of the basics of this culture , see the How To Become A Hacker FAQ .
It also implies that the person described is seen to subscribe to some version of the hacker ethic ( see hacker ethic ) .
        It is better to be described as a hacker by others than to describe oneself that way .
Hackers consider themselves something of an elite ( a meritocracy based on ability ) , though one to which new members are gladly welcome .
There is thus a certain ego satisfaction to be had in identifying yourself as a hacker ( but if you claim to be one and are not , you 'll quickly be labeled bogus ) .
See also geek , wannabee .
        This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC and the MIT AI Lab .
We have a report that it was used in a sense close to this entry 's by teenage radio hams and electronics tinkerers in the mid-1950s.Note that the perjorative use has been deprecated .</tokentext>
<sentencetext>from  the jargon file [catb.org]:hacker: n.
        [originally, someone who makes furniture with an axe]
        1.
A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
        2.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
        3.
A person capable of appreciating hack value.
        4.
A person who is good at programming quickly.
        5.
An expert at a particular program, or one who frequently does work using it or on it; as in ‘a Unix hacker’.
(Definitions 1 through 5 are correlated, and people who fit them congregate.
)
        6.
An expert or enthusiast of any kind.
One might be an astronomy hacker, for example.
        7.
One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
        8.
[deprecated] A malicious meddler who tries to discover sensitive information by poking around.
Hence password hacker, network hacker.
The correct term for this sense is cracker.
        The term ‘hacker’ also tends to connote membership in the global community defined by the net (see the network.
For discussion of some of the basics of this culture, see the How To Become A Hacker FAQ.
It also implies that the person described is seen to subscribe to some version of the hacker ethic (see hacker ethic).
        It is better to be described as a hacker by others than to describe oneself that way.
Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome.
There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled bogus).
See also geek, wannabee.
        This term seems to have been first adopted as a badge in the 1960s by the hacker culture surrounding TMRC and the MIT AI Lab.
We have a report that it was used in a sense close to this entry's by teenage radio hams and electronics tinkerers in the mid-1950s.Note that the perjorative use has been deprecated.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352520</id>
	<title>Re:Dag-nabbit!</title>
	<author>Anonymous</author>
	<datestamp>1260199140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Most of the cool hacker stories I've heard/read involved a lot of social-engineering. Phising could be considered a form of social-engineering, couldn't it?</p></htmltext>
<tokenext>Most of the cool hacker stories I 've heard/read involved a lot of social-engineering .
Phising could be considered a form of social-engineering , could n't it ?</tokentext>
<sentencetext>Most of the cool hacker stories I've heard/read involved a lot of social-engineering.
Phising could be considered a form of social-engineering, couldn't it?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352948</id>
	<title>Re:Thieves stealing from thieves.</title>
	<author>baKanale</author>
	<datestamp>1260201240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Speaking of which, I'll bet the phishers aren't doing so well in this economy.  Sounds like somebody needs a bailout!</htmltext>
<tokenext>Speaking of which , I 'll bet the phishers are n't doing so well in this economy .
Sounds like somebody needs a bailout !</tokentext>
<sentencetext>Speaking of which, I'll bet the phishers aren't doing so well in this economy.
Sounds like somebody needs a bailout!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353442</id>
	<title>Weekend phishing</title>
	<author>mancunian\_nick</author>
	<datestamp>1260203460000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext>The only time I was really interested in phishing was when I was a young teenager - more years ago than I sometimes care to remember. I used to love going to the end of Eastbourne pier but despite a lot of effort and determination, all I ever seemed to 'catch' were crabs and the occasional tiddler. These days I don't bother - older and the fact I'm not near the coast probably contribute to that. Oh well, c'est la vie.</htmltext>
<tokenext>The only time I was really interested in phishing was when I was a young teenager - more years ago than I sometimes care to remember .
I used to love going to the end of Eastbourne pier but despite a lot of effort and determination , all I ever seemed to 'catch ' were crabs and the occasional tiddler .
These days I do n't bother - older and the fact I 'm not near the coast probably contribute to that .
Oh well , c'est la vie .</tokentext>
<sentencetext>The only time I was really interested in phishing was when I was a young teenager - more years ago than I sometimes care to remember.
I used to love going to the end of Eastbourne pier but despite a lot of effort and determination, all I ever seemed to 'catch' were crabs and the occasional tiddler.
These days I don't bother - older and the fact I'm not near the coast probably contribute to that.
Oh well, c'est la vie.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356058</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Princeofcups</author>
	<datestamp>1260215040000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>Note that the perjorative use has been deprecated.</p></div><p>And the jargon file represents, what, less than 5\% of the English speaking world?  The rest use the word hacker.  Sorry, the battle is already lost.</p></div>
	</htmltext>
<tokenext>Note that the perjorative use has been deprecated.And the jargon file represents , what , less than 5 \ % of the English speaking world ?
The rest use the word hacker .
Sorry , the battle is already lost .</tokentext>
<sentencetext>Note that the perjorative use has been deprecated.And the jargon file represents, what, less than 5\% of the English speaking world?
The rest use the word hacker.
Sorry, the battle is already lost.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352632</id>
	<title>Evolution?</title>
	<author>rrohbeck</author>
	<datestamp>1260199620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Is it just me or is there more and more biology-like complexity evolving?</p></htmltext>
<tokenext>Is it just me or is there more and more biology-like complexity evolving ?</tokentext>
<sentencetext>Is it just me or is there more and more biology-like complexity evolving?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353388</id>
	<title>To Those Hard Working Phishers....</title>
	<author>Anonymous</author>
	<datestamp>1260203220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>... that had the same password as their account names on various servers over the years:</p><p>Thank you for the laughs.</p><p>And no, I don't have your phished data.  I didn't want it.  I'm the guy who recursively deleted all of it.  As much as I could find.</p><p>I love seeing that little tilde in the target address I'm supposed to click in your spam.</p></htmltext>
<tokenext>... that had the same password as their account names on various servers over the years : Thank you for the laughs.And no , I do n't have your phished data .
I did n't want it .
I 'm the guy who recursively deleted all of it .
As much as I could find.I love seeing that little tilde in the target address I 'm supposed to click in your spam .</tokentext>
<sentencetext>... that had the same password as their account names on various servers over the years:Thank you for the laughs.And no, I don't have your phished data.
I didn't want it.
I'm the guy who recursively deleted all of it.
As much as I could find.I love seeing that little tilde in the target address I'm supposed to click in your spam.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596</id>
	<title>I Had to comment this has bothered me</title>
	<author>Anonymous</author>
	<datestamp>1260204180000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext>For the 50 thousandth time hackers dont harm they find ways into a computer thats what they like to do is find a vulnerability nothing more. Please for the love of god use the term hacker right. i call people who harm crackers because thats the name they deserve by doing harm you should be called that. Hackers are good people they just have a hobby is all and thats finding vulnerabilities ways in, thats the true enjoyment of it in the first place. Microsoft listen to the real hackers out there when they tell you of a vulnerability dont label them as a threat and have them arrested. Microsoft thats another reason your so vulnerable when a true hacker trys to help you and tell you of your vulnerability you dont listen but maybe you do its bad you have to make yourself completly anonnymous to tell you you have a vulnerbility. Sometimes the True Hacker gets fed up with microsoft and makes it easy so everyone can do it by programming something so these so called crackers will use it and do good all in all you eventually fix your vulnerabilities i guess a cracker is good for something. Please comment and btw im not a hacker but i do know alot of them true ones atleast that dont do harm and i know a couple that have got fed up and programmed something so a cracker can take it up microsofts ass, the hacker didnt want to harm but only got fed up is all. Btw i can program self taught back in the old days, i didnt need a damn university to teach me i learnt the hard way, to any one who wants to learn to program they have books for that tutorials the sources are endless these days go out and grab a few and read them youll learn eventually and ill say this theres no deadline, start out with something mad easy if it takes you along time well guess what your just learning thats normal, donr let someone tell you i could do that in 5 minutes discourage you,thats what people do is discourage you its stupidity, if the truely indeed started programming thereselfs and said that took me 2 minutes guess what, ill lay a thousand on it they stold someones source code and said they programmed it alot of self proclaimed programmers do that the numbers would shock you. Microsoft im not calling you one of those people in anyway. Just a hint i was alive when windows first came out and the same for apples operating system and when it did why did both do the same stuff but only looked diffrent, if anyone didnt notice back then were stupid but hay theres alot of stupid people out there, Bill Gates i only respect you as a buisnessman your one hell of a one, it took alot of talent for what you did, im not listing the things but to ever good buisnessman is a crook but you have to be a crook to be a good buisnessman it wouldnt work out if you werent. Now Steve Jobs i respect that guy for more than that, Bill Gates sadly you may be worth more, But Steve Jobs is better than you he proved it back then and hes even proving it now and at the rate it keeps going apple will be worth more than microsoft, its sad steve jobs doesnt own a chunk of apple it should, Bill Gates you screwed up and dont even know it you broke the trust of the best friend you could of ever had and you would of even been more successfull than you are now, well thats a lie since at that time microsoft and apples operating system was basically the same thing so how would bill gates profit with his operating system, this is sarcasm someone elses operating system to begin with. I wish one day steve jobs would really speak out say what needs to be said and finish it it would only hurt you if microsoft owned apple i know they used to own most of it but i dont know now i think things have changed, i dont know if microsoft even owns any of apple they dont need to thats for sure and if they dont Steve Jobs speak up and tell it like it is it needs to be heard from you, You know what im talking about and make people lose respect for bill gates oh i forgot he retired but atleast make people think less of him people think to high of him and shouldnt if they only knew the actual truth Let it be known, bec</htmltext>
<tokenext>For the 50 thousandth time hackers dont harm they find ways into a computer thats what they like to do is find a vulnerability nothing more .
Please for the love of god use the term hacker right .
i call people who harm crackers because thats the name they deserve by doing harm you should be called that .
Hackers are good people they just have a hobby is all and thats finding vulnerabilities ways in , thats the true enjoyment of it in the first place .
Microsoft listen to the real hackers out there when they tell you of a vulnerability dont label them as a threat and have them arrested .
Microsoft thats another reason your so vulnerable when a true hacker trys to help you and tell you of your vulnerability you dont listen but maybe you do its bad you have to make yourself completly anonnymous to tell you you have a vulnerbility .
Sometimes the True Hacker gets fed up with microsoft and makes it easy so everyone can do it by programming something so these so called crackers will use it and do good all in all you eventually fix your vulnerabilities i guess a cracker is good for something .
Please comment and btw im not a hacker but i do know alot of them true ones atleast that dont do harm and i know a couple that have got fed up and programmed something so a cracker can take it up microsofts ass , the hacker didnt want to harm but only got fed up is all .
Btw i can program self taught back in the old days , i didnt need a damn university to teach me i learnt the hard way , to any one who wants to learn to program they have books for that tutorials the sources are endless these days go out and grab a few and read them youll learn eventually and ill say this theres no deadline , start out with something mad easy if it takes you along time well guess what your just learning thats normal , donr let someone tell you i could do that in 5 minutes discourage you,thats what people do is discourage you its stupidity , if the truely indeed started programming thereselfs and said that took me 2 minutes guess what , ill lay a thousand on it they stold someones source code and said they programmed it alot of self proclaimed programmers do that the numbers would shock you .
Microsoft im not calling you one of those people in anyway .
Just a hint i was alive when windows first came out and the same for apples operating system and when it did why did both do the same stuff but only looked diffrent , if anyone didnt notice back then were stupid but hay theres alot of stupid people out there , Bill Gates i only respect you as a buisnessman your one hell of a one , it took alot of talent for what you did , im not listing the things but to ever good buisnessman is a crook but you have to be a crook to be a good buisnessman it wouldnt work out if you werent .
Now Steve Jobs i respect that guy for more than that , Bill Gates sadly you may be worth more , But Steve Jobs is better than you he proved it back then and hes even proving it now and at the rate it keeps going apple will be worth more than microsoft , its sad steve jobs doesnt own a chunk of apple it should , Bill Gates you screwed up and dont even know it you broke the trust of the best friend you could of ever had and you would of even been more successfull than you are now , well thats a lie since at that time microsoft and apples operating system was basically the same thing so how would bill gates profit with his operating system , this is sarcasm someone elses operating system to begin with .
I wish one day steve jobs would really speak out say what needs to be said and finish it it would only hurt you if microsoft owned apple i know they used to own most of it but i dont know now i think things have changed , i dont know if microsoft even owns any of apple they dont need to thats for sure and if they dont Steve Jobs speak up and tell it like it is it needs to be heard from you , You know what im talking about and make people lose respect for bill gates oh i forgot he retired but atleast make people think less of him people think to high of him and shouldnt if they only knew the actual truth Let it be known , bec</tokentext>
<sentencetext>For the 50 thousandth time hackers dont harm they find ways into a computer thats what they like to do is find a vulnerability nothing more.
Please for the love of god use the term hacker right.
i call people who harm crackers because thats the name they deserve by doing harm you should be called that.
Hackers are good people they just have a hobby is all and thats finding vulnerabilities ways in, thats the true enjoyment of it in the first place.
Microsoft listen to the real hackers out there when they tell you of a vulnerability dont label them as a threat and have them arrested.
Microsoft thats another reason your so vulnerable when a true hacker trys to help you and tell you of your vulnerability you dont listen but maybe you do its bad you have to make yourself completly anonnymous to tell you you have a vulnerbility.
Sometimes the True Hacker gets fed up with microsoft and makes it easy so everyone can do it by programming something so these so called crackers will use it and do good all in all you eventually fix your vulnerabilities i guess a cracker is good for something.
Please comment and btw im not a hacker but i do know alot of them true ones atleast that dont do harm and i know a couple that have got fed up and programmed something so a cracker can take it up microsofts ass, the hacker didnt want to harm but only got fed up is all.
Btw i can program self taught back in the old days, i didnt need a damn university to teach me i learnt the hard way, to any one who wants to learn to program they have books for that tutorials the sources are endless these days go out and grab a few and read them youll learn eventually and ill say this theres no deadline, start out with something mad easy if it takes you along time well guess what your just learning thats normal, donr let someone tell you i could do that in 5 minutes discourage you,thats what people do is discourage you its stupidity, if the truely indeed started programming thereselfs and said that took me 2 minutes guess what, ill lay a thousand on it they stold someones source code and said they programmed it alot of self proclaimed programmers do that the numbers would shock you.
Microsoft im not calling you one of those people in anyway.
Just a hint i was alive when windows first came out and the same for apples operating system and when it did why did both do the same stuff but only looked diffrent, if anyone didnt notice back then were stupid but hay theres alot of stupid people out there, Bill Gates i only respect you as a buisnessman your one hell of a one, it took alot of talent for what you did, im not listing the things but to ever good buisnessman is a crook but you have to be a crook to be a good buisnessman it wouldnt work out if you werent.
Now Steve Jobs i respect that guy for more than that, Bill Gates sadly you may be worth more, But Steve Jobs is better than you he proved it back then and hes even proving it now and at the rate it keeps going apple will be worth more than microsoft, its sad steve jobs doesnt own a chunk of apple it should, Bill Gates you screwed up and dont even know it you broke the trust of the best friend you could of ever had and you would of even been more successfull than you are now, well thats a lie since at that time microsoft and apples operating system was basically the same thing so how would bill gates profit with his operating system, this is sarcasm someone elses operating system to begin with.
I wish one day steve jobs would really speak out say what needs to be said and finish it it would only hurt you if microsoft owned apple i know they used to own most of it but i dont know now i think things have changed, i dont know if microsoft even owns any of apple they dont need to thats for sure and if they dont Steve Jobs speak up and tell it like it is it needs to be heard from you, You know what im talking about and make people lose respect for bill gates oh i forgot he retired but atleast make people think less of him people think to high of him and shouldnt if they only knew the actual truth Let it be known, bec</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354058</id>
	<title>Re:I Had to comment this has bothered me</title>
	<author>Anonymous</author>
	<datestamp>1260206100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>please take your antipsycotic meds</p></htmltext>
<tokenext>please take your antipsycotic meds</tokentext>
<sentencetext>please take your antipsycotic meds</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355238</id>
	<title>Re:Hackers and phishers</title>
	<author>Anonymous</author>
	<datestamp>1260211020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This is similar to one of my favorite fluid dynamics poems:</p><blockquote><div><p>Big whorls have little whorls,<br>Which feed on their velocity;<br>And little whorls have lesser whorls,<br>And so on to viscosity</p></div></blockquote><p>-Lewis Fry Richardson, 1922</p></div>
	</htmltext>
<tokenext>This is similar to one of my favorite fluid dynamics poems : Big whorls have little whorls,Which feed on their velocity ; And little whorls have lesser whorls,And so on to viscosity-Lewis Fry Richardson , 1922</tokentext>
<sentencetext>This is similar to one of my favorite fluid dynamics poems:Big whorls have little whorls,Which feed on their velocity;And little whorls have lesser whorls,And so on to viscosity-Lewis Fry Richardson, 1922
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30358054</id>
	<title>Clever!</title>
	<author>Anonymous</author>
	<datestamp>1260182220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Now, if the hackers were *really* smart, they'd download the data files, and replace them with randomly-generated but plausible data, thus ensuring that the phishers would not get the stolen card details stomped on by Visa, MC, et al. too soon for the hackers to use them.</p></htmltext>
<tokenext>Now , if the hackers were * really * smart , they 'd download the data files , and replace them with randomly-generated but plausible data , thus ensuring that the phishers would not get the stolen card details stomped on by Visa , MC , et al .
too soon for the hackers to use them .</tokentext>
<sentencetext>Now, if the hackers were *really* smart, they'd download the data files, and replace them with randomly-generated but plausible data, thus ensuring that the phishers would not get the stolen card details stomped on by Visa, MC, et al.
too soon for the hackers to use them.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352506</id>
	<title>Parasites are everywhere, for natural reasons</title>
	<author>Anonymous</author>
	<datestamp>1260199020000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>-1</modscore>
	<htmltext>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma. Instead, they developed a simple online service to 'steal' karma from the hardworking posters. The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up"</htmltext>
<tokenext>In other news , some Slashdot users do n't like to do all the hard work of writing inspiring posts to build karma .
Instead , they developed a simple online service to 'steal ' karma from the hardworking posters .
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to " mod parent up "</tokentext>
<sentencetext>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma.
Instead, they developed a simple online service to 'steal' karma from the hardworking posters.
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342</id>
	<title>Thieves stealing from thieves.</title>
	<author>captainpanic</author>
	<datestamp>1260198360000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p>Suddenly sounds like they are all bankers to me.</p></htmltext>
<tokenext>Suddenly sounds like they are all bankers to me .</tokentext>
<sentencetext>Suddenly sounds like they are all bankers to me.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352688</id>
	<title>Re:Parasites are everywhere, for natural reasons</title>
	<author>smitty777</author>
	<datestamp>1260199860000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p>That is the most asinine, idiotic comment I have ever read.  If your intellect was 1/8th of mine, you would simply burn your keyboard and never show your face on<nobr> <wbr></nobr>/. again.  I shall now go back to reveling in my own smugness - the rest of you may continue the conversation.</p><p>*...I hope the mods have a sense of humor this morning*</p></htmltext>
<tokenext>That is the most asinine , idiotic comment I have ever read .
If your intellect was 1/8th of mine , you would simply burn your keyboard and never show your face on / .
again. I shall now go back to reveling in my own smugness - the rest of you may continue the conversation .
* ...I hope the mods have a sense of humor this morning *</tokentext>
<sentencetext>That is the most asinine, idiotic comment I have ever read.
If your intellect was 1/8th of mine, you would simply burn your keyboard and never show your face on /.
again.  I shall now go back to reveling in my own smugness - the rest of you may continue the conversation.
*...I hope the mods have a sense of humor this morning*</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352560</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352332</id>
	<title>People of ill repute diong thingfs of ill repute</title>
	<author>asdf7890</author>
	<datestamp>1260198300000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>People of ill repute do things of ill repute. Even to each other. Is anyone really surprised?</p><p>This is no different from a car thief stealing cars from another car thief, aside from it involving the internet (therefore probably making it newly patentable!) and perhaps a matter of scale.</p></htmltext>
<tokenext>People of ill repute do things of ill repute .
Even to each other .
Is anyone really surprised ? This is no different from a car thief stealing cars from another car thief , aside from it involving the internet ( therefore probably making it newly patentable !
) and perhaps a matter of scale .</tokentext>
<sentencetext>People of ill repute do things of ill repute.
Even to each other.
Is anyone really surprised?This is no different from a car thief stealing cars from another car thief, aside from it involving the internet (therefore probably making it newly patentable!
) and perhaps a matter of scale.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352378</id>
	<title>Yup...</title>
	<author>Anonymous</author>
	<datestamp>1260198540000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>There is always a bigger fish.<br>
&nbsp; -- Qui-Gon Jinn</p></div></div>
	</htmltext>
<tokenext>There is always a bigger fish .
  -- Qui-Gon Jinn</tokentext>
<sentencetext>There is always a bigger fish.
  -- Qui-Gon Jinn
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352630</id>
	<title>Re:Wait a second, here.</title>
	<author>IBBoard</author>
	<datestamp>1260199620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Yeah, what's hard about cloning a site (not always that well), hiring a botnet and spamming the whole world (again, not always that convincingly and not always to the relevant people) before sitting and waiting for the account details to roll in?</p><p>Next thing you know there'll be an article about how migrants are stealing jobs from these poor, hard-working phishers!</p></htmltext>
<tokenext>Yeah , what 's hard about cloning a site ( not always that well ) , hiring a botnet and spamming the whole world ( again , not always that convincingly and not always to the relevant people ) before sitting and waiting for the account details to roll in ? Next thing you know there 'll be an article about how migrants are stealing jobs from these poor , hard-working phishers !</tokentext>
<sentencetext>Yeah, what's hard about cloning a site (not always that well), hiring a botnet and spamming the whole world (again, not always that convincingly and not always to the relevant people) before sitting and waiting for the account details to roll in?Next thing you know there'll be an article about how migrants are stealing jobs from these poor, hard-working phishers!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352338</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355438</id>
	<title>In the olden days...</title>
	<author>Lead Butthead</author>
	<datestamp>1260211980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This would've been considered as an act of war, and the next thing you know people in the streets are cutting each others in half with tommy guns.</p></htmltext>
<tokenext>This would 've been considered as an act of war , and the next thing you know people in the streets are cutting each others in half with tommy guns .</tokentext>
<sentencetext>This would've been considered as an act of war, and the next thing you know people in the streets are cutting each others in half with tommy guns.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354374</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>daddycoy</author>
	<datestamp>1260207420000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext>Who ever labled this guy as a troll is a total pinhead. Theres tons of those on slashdot the numbers will kill you. He is right not exactly but real close, why in the hell would a real hacker need to use a password cracker and use premade dictionary list number list etc to get into something that wasnt a challenge to begin with. Yes a true hacker programs youve got to,to make what is needed for some of the objectives. heres the kicker they are password crackers that will crack any password no matter what it is, but only a true hacker would have that and that would mean he programmed it and it is a challenge to make btw now i would see why a real hacker would use a password cracker but not a premade one but the one everyone cant get the one that can crack all passwords. If a real hacker wanted to crack a password he would want it to be challenging something noone else could do, omg i just proved something thats what makes a hacker what he does for the challenge of it. A True Hacker wants a challenge or it would be pointless to even hack. If a hacker does pointless stuff lets see using a password hacker now come on my 8 year old can do that, no talent in that what so ever. A Real hacker wont even bother with a old vulnerability thats known or that he knows he moves on to get in a diffrent way why you may ask for the challenge of it. A True Hacker thrives for a challenge not someone elses known entry then it would be pointless to be a hacker and once again hackers dont harm. but times have changed maybe im even wrong maybe hackers of today dont want a challenge and they use someone elses password cracker and etc etc. The New Times are doing nothing but depressing me. If you ask so called hacker if he can program and he says no there is definatly something wrong with that picture oh ill answer this it may be sarcastic to you but i dont care a hacker who cant program is not even a hacker. ask so called hacker why he hacks if he dont answer this "for the challenge of it" there again is something wrong with that picture. ok say if hackers make viruses for instance, would he use someone elses why no its probably done been detected. that is why he would need to program to make something nothing detects, thats if he wanted to harm. For those windows users who say theres no viruses on my computer, your a pinhead As ill say this not even norton will protect you. and i really hate norton lousy excuse for a virus scanners and ill leave in a fact if indeed every virus could be identified then why is there definition updates for virus scanners. quick answer they discovered a new virus and there updating it, it dont mean the virus came out right then, it simply means they discovered it i know of a virus that wasnt discovered untill 3 years later and keep causing havoc. good job on who ever discovered that one and how to disinfect it, it took you that long to disinfect it. did you read the aricle about they tried 20 virus scanners and it didnt fully take out a certain virus scary huh. - only if your a windows users theres lots to be scared of when you use windows. If windows is so great then why you scared, some pinheads dont care if they get a virus or not they just format. yea geeksquad a format will fix it every time for gawd sakes take the effort to fix it. that was sarcasm and fact see i have this neibor who uses geeksquad im like are they good, he says i like them, then i questioned him more, then he says they backup my data and format and then i said everytime they come out he said yes. I told him im not claiming to know better than geeksquad but next time you have problem let me have a crack at it whats gonna hurt your not gonna loose your data and you know geeksquad is gonna format,he's like ok i go to sit as his pc i find the problem it took no longer than lets say 5 minutes i fixed it i didnt format the pc. i told him his pc was fixed. he's like no way you didnt format i laughed then he sits at his pc he's like wow it is fixed then he said what do i owe you and my answer nothing it was to simple. this neibor comes and knocks on</htmltext>
<tokenext>Who ever labled this guy as a troll is a total pinhead .
Theres tons of those on slashdot the numbers will kill you .
He is right not exactly but real close , why in the hell would a real hacker need to use a password cracker and use premade dictionary list number list etc to get into something that wasnt a challenge to begin with .
Yes a true hacker programs youve got to,to make what is needed for some of the objectives .
heres the kicker they are password crackers that will crack any password no matter what it is , but only a true hacker would have that and that would mean he programmed it and it is a challenge to make btw now i would see why a real hacker would use a password cracker but not a premade one but the one everyone cant get the one that can crack all passwords .
If a real hacker wanted to crack a password he would want it to be challenging something noone else could do , omg i just proved something thats what makes a hacker what he does for the challenge of it .
A True Hacker wants a challenge or it would be pointless to even hack .
If a hacker does pointless stuff lets see using a password hacker now come on my 8 year old can do that , no talent in that what so ever .
A Real hacker wont even bother with a old vulnerability thats known or that he knows he moves on to get in a diffrent way why you may ask for the challenge of it .
A True Hacker thrives for a challenge not someone elses known entry then it would be pointless to be a hacker and once again hackers dont harm .
but times have changed maybe im even wrong maybe hackers of today dont want a challenge and they use someone elses password cracker and etc etc .
The New Times are doing nothing but depressing me .
If you ask so called hacker if he can program and he says no there is definatly something wrong with that picture oh ill answer this it may be sarcastic to you but i dont care a hacker who cant program is not even a hacker .
ask so called hacker why he hacks if he dont answer this " for the challenge of it " there again is something wrong with that picture .
ok say if hackers make viruses for instance , would he use someone elses why no its probably done been detected .
that is why he would need to program to make something nothing detects , thats if he wanted to harm .
For those windows users who say theres no viruses on my computer , your a pinhead As ill say this not even norton will protect you .
and i really hate norton lousy excuse for a virus scanners and ill leave in a fact if indeed every virus could be identified then why is there definition updates for virus scanners .
quick answer they discovered a new virus and there updating it , it dont mean the virus came out right then , it simply means they discovered it i know of a virus that wasnt discovered untill 3 years later and keep causing havoc .
good job on who ever discovered that one and how to disinfect it , it took you that long to disinfect it .
did you read the aricle about they tried 20 virus scanners and it didnt fully take out a certain virus scary huh .
- only if your a windows users theres lots to be scared of when you use windows .
If windows is so great then why you scared , some pinheads dont care if they get a virus or not they just format .
yea geeksquad a format will fix it every time for gawd sakes take the effort to fix it .
that was sarcasm and fact see i have this neibor who uses geeksquad im like are they good , he says i like them , then i questioned him more , then he says they backup my data and format and then i said everytime they come out he said yes .
I told him im not claiming to know better than geeksquad but next time you have problem let me have a crack at it whats gon na hurt your not gon na loose your data and you know geeksquad is gon na format,he 's like ok i go to sit as his pc i find the problem it took no longer than lets say 5 minutes i fixed it i didnt format the pc .
i told him his pc was fixed .
he 's like no way you didnt format i laughed then he sits at his pc he 's like wow it is fixed then he said what do i owe you and my answer nothing it was to simple .
this neibor comes and knocks on</tokentext>
<sentencetext>Who ever labled this guy as a troll is a total pinhead.
Theres tons of those on slashdot the numbers will kill you.
He is right not exactly but real close, why in the hell would a real hacker need to use a password cracker and use premade dictionary list number list etc to get into something that wasnt a challenge to begin with.
Yes a true hacker programs youve got to,to make what is needed for some of the objectives.
heres the kicker they are password crackers that will crack any password no matter what it is, but only a true hacker would have that and that would mean he programmed it and it is a challenge to make btw now i would see why a real hacker would use a password cracker but not a premade one but the one everyone cant get the one that can crack all passwords.
If a real hacker wanted to crack a password he would want it to be challenging something noone else could do, omg i just proved something thats what makes a hacker what he does for the challenge of it.
A True Hacker wants a challenge or it would be pointless to even hack.
If a hacker does pointless stuff lets see using a password hacker now come on my 8 year old can do that, no talent in that what so ever.
A Real hacker wont even bother with a old vulnerability thats known or that he knows he moves on to get in a diffrent way why you may ask for the challenge of it.
A True Hacker thrives for a challenge not someone elses known entry then it would be pointless to be a hacker and once again hackers dont harm.
but times have changed maybe im even wrong maybe hackers of today dont want a challenge and they use someone elses password cracker and etc etc.
The New Times are doing nothing but depressing me.
If you ask so called hacker if he can program and he says no there is definatly something wrong with that picture oh ill answer this it may be sarcastic to you but i dont care a hacker who cant program is not even a hacker.
ask so called hacker why he hacks if he dont answer this "for the challenge of it" there again is something wrong with that picture.
ok say if hackers make viruses for instance, would he use someone elses why no its probably done been detected.
that is why he would need to program to make something nothing detects, thats if he wanted to harm.
For those windows users who say theres no viruses on my computer, your a pinhead As ill say this not even norton will protect you.
and i really hate norton lousy excuse for a virus scanners and ill leave in a fact if indeed every virus could be identified then why is there definition updates for virus scanners.
quick answer they discovered a new virus and there updating it, it dont mean the virus came out right then, it simply means they discovered it i know of a virus that wasnt discovered untill 3 years later and keep causing havoc.
good job on who ever discovered that one and how to disinfect it, it took you that long to disinfect it.
did you read the aricle about they tried 20 virus scanners and it didnt fully take out a certain virus scary huh.
- only if your a windows users theres lots to be scared of when you use windows.
If windows is so great then why you scared, some pinheads dont care if they get a virus or not they just format.
yea geeksquad a format will fix it every time for gawd sakes take the effort to fix it.
that was sarcasm and fact see i have this neibor who uses geeksquad im like are they good, he says i like them, then i questioned him more, then he says they backup my data and format and then i said everytime they come out he said yes.
I told him im not claiming to know better than geeksquad but next time you have problem let me have a crack at it whats gonna hurt your not gonna loose your data and you know geeksquad is gonna format,he's like ok i go to sit as his pc i find the problem it took no longer than lets say 5 minutes i fixed it i didnt format the pc.
i told him his pc was fixed.
he's like no way you didnt format i laughed then he sits at his pc he's like wow it is fixed then he said what do i owe you and my answer nothing it was to simple.
this neibor comes and knocks on</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357620</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Anonymous</author>
	<datestamp>1260179640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>Note that the perjorative use has been deprecated.</p></div></blockquote><p>Note, also, that the correct spelling is 'pejorative.'</p></div>
	</htmltext>
<tokenext>Note that the perjorative use has been deprecated.Note , also , that the correct spelling is 'pejorative .
'</tokentext>
<sentencetext>Note that the perjorative use has been deprecated.Note, also, that the correct spelling is 'pejorative.
'
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352560</id>
	<title>Re:Parasites are everywhere, for natural reasons</title>
	<author>Anonymous</author>
	<datestamp>1260199320000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p><div class="quote"><p>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma. Instead, they developed a simple online service to 'steal' karma from the hardworking posters. The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up".</p></div><p>Actually I've found that "mod parent up" posts are quite likely to get you modded down.</p><p>Replying to let someone know how they're wrong, now that's how you get easy karma!</p></div>
	</htmltext>
<tokenext>In other news , some Slashdot users do n't like to do all the hard work of writing inspiring posts to build karma .
Instead , they developed a simple online service to 'steal ' karma from the hardworking posters .
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to " mod parent up " .Actually I 've found that " mod parent up " posts are quite likely to get you modded down.Replying to let someone know how they 're wrong , now that 's how you get easy karma !</tokentext>
<sentencetext>In other news, some Slashdot users don't like to do all the hard work of writing inspiring posts to build karma.
Instead, they developed a simple online service to 'steal' karma from the hardworking posters.
The service allows anyone to scan Slashdot articles for underrated comments and automatically post replies urging moderators to "mod parent up".Actually I've found that "mod parent up" posts are quite likely to get you modded down.Replying to let someone know how they're wrong, now that's how you get easy karma!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30371170</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Anonymous</author>
	<datestamp>1260270720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>Note that the perjorative use has been deprecated.</i></p><p>LOL. "Deprecated" by whom? ESR and his tiny coterie of basement-virgin sycophants maybe, but the other 99.99\% of the English-speaking world still uses the word "perjoratively."</p><p>As an aside, do any "real hackers" give a shit how the word is used? It seems like the people making the most noise are wannabes who think they're rocket scientists for mastering some web tutorial on php. Just a thought.</p></htmltext>
<tokenext>Note that the perjorative use has been deprecated.LOL .
" Deprecated " by whom ?
ESR and his tiny coterie of basement-virgin sycophants maybe , but the other 99.99 \ % of the English-speaking world still uses the word " perjoratively .
" As an aside , do any " real hackers " give a shit how the word is used ?
It seems like the people making the most noise are wannabes who think they 're rocket scientists for mastering some web tutorial on php .
Just a thought .</tokentext>
<sentencetext>Note that the perjorative use has been deprecated.LOL.
"Deprecated" by whom?
ESR and his tiny coterie of basement-virgin sycophants maybe, but the other 99.99\% of the English-speaking world still uses the word "perjoratively.
"As an aside, do any "real hackers" give a shit how the word is used?
It seems like the people making the most noise are wannabes who think they're rocket scientists for mastering some web tutorial on php.
Just a thought.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354822</id>
	<title>Re:I Had to comment this has bothered me</title>
	<author>Anonymous</author>
	<datestamp>1260209040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I prescribe some Zyprexa twice daily</p></htmltext>
<tokenext>I prescribe some Zyprexa twice daily</tokentext>
<sentencetext>I prescribe some Zyprexa twice daily</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352738</id>
	<title>Re:Hackers and phishers</title>
	<author>Stregano</author>
	<datestamp>1260200100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I have no clue what you are talking about, but there are pills and ointments you can use if you are dealing with that many fleas</htmltext>
<tokenext>I have no clue what you are talking about , but there are pills and ointments you can use if you are dealing with that many fleas</tokentext>
<sentencetext>I have no clue what you are talking about, but there are pills and ointments you can use if you are dealing with that many fleas</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352896</id>
	<title>Into the Octogon with them</title>
	<author>Anonymous</author>
	<datestamp>1260200940000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hackers vs. Phishers.</p><p>Two go in. One comes out.</p></htmltext>
<tokenext>Hackers vs. Phishers.Two go in .
One comes out .</tokentext>
<sentencetext>Hackers vs. Phishers.Two go in.
One comes out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357442</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Anonymous</author>
	<datestamp>1260178740000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Thank you for that correction.</p><p>I would think that out of all the sites I read, Slashdot would be the one to get the real meaning of hacking right. Obviously this isn't correct.</p><p>What the hell is the world coming to if one of the leading tech blogs turns on its (i suppose formerly) biggest fans and readers?</p></htmltext>
<tokenext>Thank you for that correction.I would think that out of all the sites I read , Slashdot would be the one to get the real meaning of hacking right .
Obviously this is n't correct.What the hell is the world coming to if one of the leading tech blogs turns on its ( i suppose formerly ) biggest fans and readers ?</tokentext>
<sentencetext>Thank you for that correction.I would think that out of all the sites I read, Slashdot would be the one to get the real meaning of hacking right.
Obviously this isn't correct.What the hell is the world coming to if one of the leading tech blogs turns on its (i suppose formerly) biggest fans and readers?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355874</id>
	<title>Close the loop</title>
	<author>SnarfQuest</author>
	<datestamp>1260214140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you can get the phishers to concentrate on the hackers, while the hackers are concentrating on the phishers, maybe they will leave the rest of us alone.</p></htmltext>
<tokenext>If you can get the phishers to concentrate on the hackers , while the hackers are concentrating on the phishers , maybe they will leave the rest of us alone .</tokentext>
<sentencetext>If you can get the phishers to concentrate on the hackers, while the hackers are concentrating on the phishers, maybe they will leave the rest of us alone.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356888</id>
	<title>Re:Dag-nabbit!</title>
	<author>StikyPad</author>
	<datestamp>1260219060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Did you mean <b> <a href="http://en.wikipedia.org/wiki/Hootenanny" title="wikipedia.org">hootenanny</a> [wikipedia.org] </b>?</p></htmltext>
<tokenext>Did you mean hootenanny [ wikipedia.org ] ?</tokentext>
<sentencetext>Did you mean  hootenanny [wikipedia.org] ?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353038</id>
	<title>Re:Thieves stealing from thieves.</title>
	<author>Yvanhoe</author>
	<datestamp>1260201720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>At least the meta-thief doesn't try to convince the thief he has made a good deal.</htmltext>
<tokenext>At least the meta-thief does n't try to convince the thief he has made a good deal .</tokentext>
<sentencetext>At least the meta-thief doesn't try to convince the thief he has made a good deal.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352406</id>
	<title>The hunter becomes the hunted</title>
	<author>Anonymous</author>
	<datestamp>1260198600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I've always wanted to say this.</htmltext>
<tokenext>I 've always wanted to say this .</tokentext>
<sentencetext>I've always wanted to say this.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357642</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>kylebarbour</author>
	<datestamp>1260179760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Unfortunately, the people who need to know this don't read the Jargon File.</p></htmltext>
<tokenext>Unfortunately , the people who need to know this do n't read the Jargon File .</tokentext>
<sentencetext>Unfortunately, the people who need to know this don't read the Jargon File.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30361568</id>
	<title>Autowhaler = crowd sourcing?</title>
	<author>peterthomas2009</author>
	<datestamp>1260205860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Since the tool is not run locally you can only assume that all the submitted url's are going into someone's database.<br> <br>

That someone is going to collect a lot of hacked accounts very quickly.<br> <br>

Hackers vs Phishers vs Hosted Hacked account collection Service?</htmltext>
<tokenext>Since the tool is not run locally you can only assume that all the submitted url 's are going into someone 's database .
That someone is going to collect a lot of hacked accounts very quickly .
Hackers vs Phishers vs Hosted Hacked account collection Service ?</tokentext>
<sentencetext>Since the tool is not run locally you can only assume that all the submitted url's are going into someone's database.
That someone is going to collect a lot of hacked accounts very quickly.
Hackers vs Phishers vs Hosted Hacked account collection Service?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354198</id>
	<title>Re:I Had to comment this has bothered me</title>
	<author>Anonymous</author>
	<datestamp>1260206760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Since you kept repeating this incorrectly for 50 times, i had to correct you.</p><p>The correct definition of "hacking" a device or application is,<br>making the device or application function in a way that was not intended by the original author.</p><p>The definition brought forward by the media only focuses on hacking remote devices for malicious purposes.</p></htmltext>
<tokenext>Since you kept repeating this incorrectly for 50 times , i had to correct you.The correct definition of " hacking " a device or application is,making the device or application function in a way that was not intended by the original author.The definition brought forward by the media only focuses on hacking remote devices for malicious purposes .</tokentext>
<sentencetext>Since you kept repeating this incorrectly for 50 times, i had to correct you.The correct definition of "hacking" a device or application is,making the device or application function in a way that was not intended by the original author.The definition brought forward by the media only focuses on hacking remote devices for malicious purposes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352684</id>
	<title>Re:Dag-nabbit!</title>
	<author>spyrochaete</author>
	<datestamp>1260199800000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Hacking is about finding the most efficient route to the juiciest payload without ruffling feathers unduly.  Here's a <a href="http://seoblackhat.com/2009/10/31/heres-how-you-make-the-most-money-with-5-and-2-hours/" title="seoblackhat.com">fun article</a> [seoblackhat.com] that I think illustrates this concept really well.</p></htmltext>
<tokenext>Hacking is about finding the most efficient route to the juiciest payload without ruffling feathers unduly .
Here 's a fun article [ seoblackhat.com ] that I think illustrates this concept really well .</tokentext>
<sentencetext>Hacking is about finding the most efficient route to the juiciest payload without ruffling feathers unduly.
Here's a fun article [seoblackhat.com] that I think illustrates this concept really well.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286</id>
	<title>Hacker culture</title>
	<author>Anonymous</author>
	<datestamp>1260198120000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext>That's the hacker culture allright. Use inventivity rather than "hard work" to get your result with the least possible effort<nobr> <wbr></nobr>:)</htmltext>
<tokenext>That 's the hacker culture allright .
Use inventivity rather than " hard work " to get your result with the least possible effort : )</tokentext>
<sentencetext>That's the hacker culture allright.
Use inventivity rather than "hard work" to get your result with the least possible effort :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357538</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Anonymous</author>
	<datestamp>1260179280000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>Note that the perjorative use has been deprecated.</i><br>Deprecated by who?  A fat pimply webmaster from London?</p><p>I wonder how many black hat hackers refer to themselves as black hat hackers?  How many are referred to by their peers as black hat hackers?</p><p>More likely the only people who refer to them as such are highly affected fanboys.</p><p>Ultimately they all hold a mouse in one hand while "making love".</p></htmltext>
<tokenext>Note that the perjorative use has been deprecated.Deprecated by who ?
A fat pimply webmaster from London ? I wonder how many black hat hackers refer to themselves as black hat hackers ?
How many are referred to by their peers as black hat hackers ? More likely the only people who refer to them as such are highly affected fanboys.Ultimately they all hold a mouse in one hand while " making love " .</tokentext>
<sentencetext>Note that the perjorative use has been deprecated.Deprecated by who?
A fat pimply webmaster from London?I wonder how many black hat hackers refer to themselves as black hat hackers?
How many are referred to by their peers as black hat hackers?More likely the only people who refer to them as such are highly affected fanboys.Ultimately they all hold a mouse in one hand while "making love".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352768</id>
	<title>Parasites have parasites</title>
	<author>Anonymous</author>
	<datestamp>1260200220000</datestamp>
	<modclass>Funny</modclass>
	<modscore>0</modscore>
	<htmltext><p>"Great fleas have little fleas upon their backs to bite 'em,<br>And little fleas have lesser fleas, and so ad infinitum.<br>And the great fleas themselves, in turn, have greater fleas to go on,<br>While these again have greater still, and greater still, and so on."</p></htmltext>
<tokenext>" Great fleas have little fleas upon their backs to bite 'em,And little fleas have lesser fleas , and so ad infinitum.And the great fleas themselves , in turn , have greater fleas to go on,While these again have greater still , and greater still , and so on .
"</tokentext>
<sentencetext>"Great fleas have little fleas upon their backs to bite 'em,And little fleas have lesser fleas, and so ad infinitum.And the great fleas themselves, in turn, have greater fleas to go on,While these again have greater still, and greater still, and so on.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356746</id>
	<title>Using it for good?</title>
	<author>MattBD</author>
	<datestamp>1260218460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I would be tempted to use this for honourable reasons (ie wait for phishers to email me, then get the details off their site and let someone know that these account details had been stolen) but I'm not sure how. I strongly suspect actually posting them on a website would likely get you in trouble with the authorities, and I'm not sure how effective emailing either the bank(s) or websites in question, or the people whose details were stolen, would be.</htmltext>
<tokenext>I would be tempted to use this for honourable reasons ( ie wait for phishers to email me , then get the details off their site and let someone know that these account details had been stolen ) but I 'm not sure how .
I strongly suspect actually posting them on a website would likely get you in trouble with the authorities , and I 'm not sure how effective emailing either the bank ( s ) or websites in question , or the people whose details were stolen , would be .</tokentext>
<sentencetext>I would be tempted to use this for honourable reasons (ie wait for phishers to email me, then get the details off their site and let someone know that these account details had been stolen) but I'm not sure how.
I strongly suspect actually posting them on a website would likely get you in trouble with the authorities, and I'm not sure how effective emailing either the bank(s) or websites in question, or the people whose details were stolen, would be.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348</id>
	<title>Hackers and phishers</title>
	<author>Anonymous</author>
	<datestamp>1260198420000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>Great fleas have little fleas upon their backs to bite 'em,<br>And little fleas have lesser fleas, and so ad infinitum.<br>And the great fleas themselves, in turn, have greater fleas to go on;<br>While these again have greater still, and greater still, and so on.</p></htmltext>
<tokenext>Great fleas have little fleas upon their backs to bite 'em,And little fleas have lesser fleas , and so ad infinitum.And the great fleas themselves , in turn , have greater fleas to go on ; While these again have greater still , and greater still , and so on .</tokentext>
<sentencetext>Great fleas have little fleas upon their backs to bite 'em,And little fleas have lesser fleas, and so ad infinitum.And the great fleas themselves, in turn, have greater fleas to go on;While these again have greater still, and greater still, and so on.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30363812</id>
	<title>Re:Hacker culture</title>
	<author>Tirith45</author>
	<datestamp>1260278340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Not all hackers aspire to be phishers, or vice versa or even remotely close. I am a hacker, I don't do it to steal passwords and or valuables, I do it to get into places I shouldn't, expose the holes, confront the company explaining how I did it, and why I did it. Then leave out... minor... details so they have to ask more and then they pick me up on a contract.

It's not "wrong" because I'm not making the holes, I am just finding them.</htmltext>
<tokenext>Not all hackers aspire to be phishers , or vice versa or even remotely close .
I am a hacker , I do n't do it to steal passwords and or valuables , I do it to get into places I should n't , expose the holes , confront the company explaining how I did it , and why I did it .
Then leave out... minor... details so they have to ask more and then they pick me up on a contract .
It 's not " wrong " because I 'm not making the holes , I am just finding them .</tokentext>
<sentencetext>Not all hackers aspire to be phishers, or vice versa or even remotely close.
I am a hacker, I don't do it to steal passwords and or valuables, I do it to get into places I shouldn't, expose the holes, confront the company explaining how I did it, and why I did it.
Then leave out... minor... details so they have to ask more and then they pick me up on a contract.
It's not "wrong" because I'm not making the holes, I am just finding them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352524</id>
	<title>Re:Dag-nabbit!</title>
	<author>Anonymous</author>
	<datestamp>1260199140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>...while still illegal was something to be respected, you had to know what you were doing... sounds like politicians to me.</p></div><p>Doesn't sound to me like anything has changed.</p></div>
	</htmltext>
<tokenext>...while still illegal was something to be respected , you had to know what you were doing... sounds like politicians to me.Does n't sound to me like anything has changed .</tokentext>
<sentencetext>...while still illegal was something to be respected, you had to know what you were doing... sounds like politicians to me.Doesn't sound to me like anything has changed.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324</id>
	<title>Not surprised</title>
	<author>zmaragdus</author>
	<datestamp>1260198300000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>Criminals stealing from criminals? Doesn't surprise me. It happens all the time in the physical world.</p><p>(Before the deluge of malice-laden replies regarding "how I make all hackers out to be villians," yes, I know the difference between white hat and black hat.)</p></htmltext>
<tokenext>Criminals stealing from criminals ?
Does n't surprise me .
It happens all the time in the physical world .
( Before the deluge of malice-laden replies regarding " how I make all hackers out to be villians , " yes , I know the difference between white hat and black hat .
)</tokentext>
<sentencetext>Criminals stealing from criminals?
Doesn't surprise me.
It happens all the time in the physical world.
(Before the deluge of malice-laden replies regarding "how I make all hackers out to be villians," yes, I know the difference between white hat and black hat.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355372</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>nacturation</author>
	<datestamp>1260211680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Note that the perjorative use has been deprecated.</p></div><p>Note that the act of deprecating definitions you do not like has been deprecated.</p></div>
	</htmltext>
<tokenext>Note that the perjorative use has been deprecated.Note that the act of deprecating definitions you do not like has been deprecated .</tokentext>
<sentencetext>Note that the perjorative use has been deprecated.Note that the act of deprecating definitions you do not like has been deprecated.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352338</id>
	<title>Wait a second, here.</title>
	<author>Runefox</author>
	<datestamp>1260198360000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p><b>Hard-working</b> phishers? What? Did we cross over into the Twilight Zone, here?</p></htmltext>
<tokenext>Hard-working phishers ?
What ? Did we cross over into the Twilight Zone , here ?</tokentext>
<sentencetext>Hard-working phishers?
What? Did we cross over into the Twilight Zone, here?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30359318</id>
	<title>Re:misuse of the term 'hacker'</title>
	<author>Thinboy00</author>
	<datestamp>1260188760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>from <a href="http://catb.org/jargon/html/H/hacker.html" title="catb.org"> the jargon file</a> [catb.org]:</p><p><div class="quote"><p>[long definition]</p></div><p>Note that the perjorative use has been deprecated.</p></div><p>I thought dictionaries were supposed to be descriptive, not prescriptive.</p></div>
	</htmltext>
<tokenext>from the jargon file [ catb.org ] : [ long definition ] Note that the perjorative use has been deprecated.I thought dictionaries were supposed to be descriptive , not prescriptive .</tokentext>
<sentencetext>from  the jargon file [catb.org]:[long definition]Note that the perjorative use has been deprecated.I thought dictionaries were supposed to be descriptive, not prescriptive.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353194</id>
	<title>Re:Not surprised</title>
	<author>Anonymous</author>
	<datestamp>1260202440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Criminals stealing from criminals? Doesn't surprise me. It happens all the time in the physical world.</p><p>(Before the deluge of malice-laden replies regarding "how I make all hackers out to be villians," yes, I know the difference between white hat and black hat.)</p></div><p>All in the game, yo, all in the game.</p></div>
	</htmltext>
<tokenext>Criminals stealing from criminals ?
Does n't surprise me .
It happens all the time in the physical world .
( Before the deluge of malice-laden replies regarding " how I make all hackers out to be villians , " yes , I know the difference between white hat and black hat .
) All in the game , yo , all in the game .</tokentext>
<sentencetext>Criminals stealing from criminals?
Doesn't surprise me.
It happens all the time in the physical world.
(Before the deluge of malice-laden replies regarding "how I make all hackers out to be villians," yes, I know the difference between white hat and black hat.
)All in the game, yo, all in the game.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352738
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352630
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352338
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354374
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352706
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354572
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356888
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353296
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357642
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352896
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355238
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353720
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30363812
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354748
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357620
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30359318
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353194
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354924
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30358056
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355438
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352524
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355372
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357442
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354822
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357538
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352684
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352948
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30366476
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354358
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354198
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353038
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30371170
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_12_07_1318225_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352688
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352560
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352292
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352378
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353060
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30371170
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357642
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356058
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355372
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357442
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354374
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354924
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357620
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354358
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30357538
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30359318
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352390
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352338
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352630
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352348
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354748
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355238
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354456
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352738
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352324
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353720
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353194
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30366476
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30355438
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352288
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352560
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352688
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352706
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352342
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353038
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352948
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352434
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30356888
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352524
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30358056
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352520
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352684
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353596
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354198
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354822
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354572
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30354058
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352406
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352332
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_12_07_1318225.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352286
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30353296
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30363812
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_12_07_1318225.30352896
</commentlist>
</conversation>
