Forum |  HardWare.fr | News | Articles | PC | S'identifier | S'inscrire | Shop Recherche
2722 connectés 

 


 Mot :   Pseudo :  
  Aller à la page :
 
 Page :   1  2  3  4  5  ..  689  690  691  ..  21111  21112  21113  21114  21115  21116
Auteur Sujet :

Bla-bla @ Discussions - Dehors les newb

n°975765
Marc
Chasseur de joce & sly
Posté le 11-08-2003 à 18:22:16  profilanswer
 

Reprise du message précédent :
http://www.hardware.fr/marc/voodoo1.jpg

mood
Publicité
Posté le 11-08-2003 à 18:22:16  profilanswer
 

n°975773
Atigrou
Posté le 11-08-2003 à 18:23:30  profilanswer
 

[:leg9 is gay]


---------------
Troll2jeux
n°975785
Meganne
Féministe Ardant
Posté le 11-08-2003 à 18:27:14  profilanswer
 

[:gm_superstar]

n°975790
Enzan
Bougresse sur canapé...
Posté le 11-08-2003 à 18:28:34  profilanswer
 

[:votezmeg]

n°975801
Meganne
Féministe Ardant
Posté le 11-08-2003 à 18:30:59  profilanswer
 

:jap: tout à fait

n°975803
canaille
beyond the limits
Posté le 11-08-2003 à 18:31:39  profilanswer
 

encore mieux que celui là ! [:keyzer93]
 
 
mais pkoion est limité a 10 smileys perso [:sisicaivrai]


---------------
You cannot refer to something as your sister's without showing a picture of the sister in question. || made in Mattighofen
n°975837
the mystic​al
It’s a competitive world...
Posté le 11-08-2003 à 18:38:10  profilanswer
 


 
MDR !!  [:schumacher]  [:schumacher]


---------------
It's hard to say it, I hate to say it, but it's probably me...
n°976190
Gordon Shu​mway
Ça fout la frousse.
Posté le 11-08-2003 à 20:03:48  profilanswer
 

Rautte, Mode: ça vous dirait d'aller manger une crêpe le 23? Parce que va falloir finallement que je parte de la gare Montparnasse. :D
 
 
EDIT: on peut s'en éloigner, hein, c'est pas rédhibitoire. ;)


Message édité par Gordon Shumway le 11-08-2003 à 20:05:16

---------------
Tees et autres trucs pour geeks | Mon Instagram il est bien. Suis-le.
n°976241
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:17:26  profilanswer
 

os cours à chaque fois que je redémarre mon PC j'ai une fenêtre windows NT qui me dit que mon system va s'éteindre dans 40sec j'ai pas d'anti virus rien

n°976244
Krapaud
Posté le 11-08-2003 à 20:18:21  profilanswer
 

la honte  [:jofusion]

mood
Publicité
Posté le 11-08-2003 à 20:18:21  profilanswer
 

n°976271
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:25:20  profilanswer
 

generic host prcess for win 32 services has encounered a problem and needs to close
 
c koâ???? aidez moâââ [:icon9]


Message édité par Meganne le 11-08-2003 à 20:25:33
n°976280
Gordon Shu​mway
Ça fout la frousse.
Posté le 11-08-2003 à 20:27:09  profilanswer
 

Meganne a écrit :

os cours à chaque fois que je redémarre mon PC j'ai une fenêtre windows NT qui me dit que mon system va s'éteindre dans 40sec j'ai pas d'anti virus rien

Essaye ça:
http://www.symantec.com/cgi-bin/securitycheck.cgi


---------------
Tees et autres trucs pour geeks | Mon Instagram il est bien. Suis-le.
n°976281
Krapaud
Posté le 11-08-2003 à 20:27:53  profilanswer
 

[:rofl] rpc enculé [:rofl]

n°976295
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:31:03  profilanswer
 

j'ai pas le temps de télécharger j'ai tjs la même fenêtre qui s'ouvre + System Shtdown
 
qu'est ce que je fais????? [:zoutte]  :(  :(  :(

n°976297
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:31:33  profilanswer
 

motte!!!!! [:zoutte]  [:zoutte]  [:zoutte]

n°976307
Gordon Shu​mway
Ça fout la frousse.
Posté le 11-08-2003 à 20:32:43  profilanswer
 

Meganne a écrit :

j'ai pas le temps de télécharger j'ai tjs la même fenêtre qui s'ouvre + System Shtdown
 
qu'est ce que je fais????? [:zoutte]  :(  :(  :(

C'est un anti-virus en ligne, tu ne le télécharges pas. :)


---------------
Tees et autres trucs pour geeks | Mon Instagram il est bien. Suis-le.
n°976308
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:32:47  profilanswer
 

mais ta gl toâ putain

n°976315
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:34:13  profilanswer
 

ça y est j'ai la fenêtre d'erreur ça va closer gordonne!!!! [:zoutte]
 
 
j'ai pas le temps de faire l'analyse de fichiers ça close ava


Message édité par Meganne le 11-08-2003 à 20:34:35
n°976328
Krapaud
Posté le 11-08-2003 à 20:36:03  profilanswer
 

HotShot a écrit :

Il est bien ventilé ton PC ? cet aprèm j'ai eu une erreur du genre, foutu un ventilo dans le boitier, now ça roulaize


 
c'est la faille rpc ducon!

n°976339
Silk
Canard Laqué
Posté le 11-08-2003 à 20:37:46  profilanswer
 

krapaud a écrit :

[:rofl] rpc enculé [:rofl]

qqn s'amuse à le rebooter à distance?  :whistle:


---------------
"[rombière, insipide et] radasse qui a raté une belle carrière de mère supérieure de bénédictines" dixit guigui le 17 juin 02      [:xx_xx]                 :love: Joce c'est un super coup! MANGEZ-EN !  
n°976340
Festen
Posté le 11-08-2003 à 20:38:03  profilanswer
 

Meganne a écrit :

ça y est j'ai la fenêtre d'erreur ça va closer gordonne!!!! [:zoutte]
 
 
j'ai pas le temps de faire l'analyse de fichiers ça close ava


 
Y a un petit côté Sarah Bernard qui plane sur ce topic depuis la canicule. Entre les crises de larmes, le plan PQ et les pbs d'huisseries, on aura eu droit à la totale.
 
So > Bain+glace+vin+clope+musique ;-)
Bref, fais-toi plaisir.

n°976343
schnapsman​n
Zaford Beeblefect
Posté le 11-08-2003 à 20:38:27  profilanswer
 

Meganne a écrit :

... de fichiers ça close ava


 
[:rofl], bien joué le coup du post non terminé à cause d'un plantage, un peu carbonisé quand même, mais tjrs marrant  :o


---------------
From now on, you will speak only when spoken to, and the first and last words out of your filthy sewers will be "Sir!"
n°976344
Krapaud
Posté le 11-08-2003 à 20:38:29  profilanswer
 

Citation :


   
Microsoft Security Bulletin MS03-010
Print Print
 
Flaw in RPC Endpoint Mapper Could Allow Denial of Service Attacks (331953)
 
Originally posted: March 26, 2003
Updated: May 13, 2003
Summary
 
Who should read this bulletin: Customers using Microsoft® Windows® NT 4.0, Windows 2000, or Windows XP
 
Impact of vulnerability: Denial of Service
 
Maximum Severity Rating: Important
 
Recommendation: Customers should install the patch at the earliest opportunity
 
Affected Software:
 
    * Microsoft Windows NT 4
    * Microsoft Windows 2000
* Microsoft Windows XP
 
Technical details
Technical description:
 
Note:
Application of this security patch has been reported to, in some specific configurations, cause local COM calls to stop responding. This problem occurs only when several local RPC calls are made quickly from multiple threads, and each thread has a unique set of security credentials. A supported fix is now available from Microsoft. For additional information on this, and details of obtaining a fix, please see Microsoft Knowledge Base Article 814119.
 
Remote Procedure Call (RPC) is a protocol used by the Windows operating system. RPC provides an inter-process communication mechanism that allows a program running on one computer to seamlessly execute code on a remote system. The protocol itself is derived from the OSF (Open Software Foundation) RPC protocol, but with the addition of some Microsoft specific extensions.
 
There is a vulnerability in the part of RPC that deals with message exchange over TCP/IP. The failure results because of incorrect handling of malformed messages. This particular vulnerabilty affects the RPC Endpoint Mapper process, which listens on TCP/IP port 135. The RPC endpoint mapper allows RPC clients to determine the port number currently assigned to a particular RPC service.
 
To exploit this vulnerability, an attacker would need to establish a TCP/IP connection to the Endpoint Mapper process on a remote machine. Once the connection was established, the attacker would begin the RPC connection negotiation before transmitting a malformed message. At this point, the process on the remote machine would fail. The RPC Endpoint Mapper process is responsible for maintaining the connection information for all of the processes on that machine using RPC. Because the Endpoint Mapper runs within the RPC service itself, exploiting this vulnerability would cause the RPC service to fail, with the attendant loss of any RPC-based services the server offers, as well as potential loss of some COM functions.
 
Microsoft has provided patches with this bulletin to correct this vulnerability for Windows 2000 and Windows XP. Although Windows NT 4.0 is affected by this vulnerability, Microsoft is unable to provide a patch for this vulnerability for Windows NT 4.0. The architectural limitations of Windows NT 4.0 do not support the changes that would be required to remove this vulnerability. Windows NT 4.0 users are strongly encouraged to employ the workaround discussed in the FAQ below, which is to protect the NT 4.0 system with a firewall that blocks Port 135.
 
Mitigating factors:
 
    * To exploit this vulnerability, the attacker would require the ability to connect to the Endpoint Mapper running on the target machine. For intranet environments, the Endpoint Mapper would normally be accessible, but for Internet connected machines, the port used by the Endpoint Mapper would normally be blocked by a firewall. In the case where this port is not blocked, or in an intranet configuration, the attacker would not require any additional privileges.
    * Best practices recommend blocking all TCP/IP ports that are not actually being used. For this reason, most machines attached to the Internet should have port 135 blocked. RPC over TCP is not intended to be used in hostile environments such as the internet. More robust protocols such as RPC over HTTP are provided for hostile environments. To learn more about securing RPC for client and server please refer to http://msdn.microsoft.com/library/ [...] erver.asp. To learn more about the ports used by RPC, please refer to http://www.microsoft.com/technet/p [...] cpappc.asp
* This vulnerability only permits a denial of service attack and does not provide an attacker with the ability to modify or retrieve data on the remote machine.
 
Severity Rating:
Windows NT 4.0 Important
Windows NT 4.0, Terminal Server Edition Important
Windows 2000 Important
Windows XP Important
The above assessment is based on the types of systems affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them.
 
Vulnerability identifier: CAN-2002-1561
 
Tested Versions:
Microsoft tested Windows NT 4.0, Windows 2000 and Windows XP to assess whether they are affected by these vulnerabilities. Previous versions are no longer supported, and may or may not be affected by these vulnerabilities.
 
Frequently asked questions
 
If Windows NT 4.0 is listed as an affected product, why is Microsoft not issuing a patch for it?
 
During the development of Windows 2000, significant enhancements were made to the underlying architecture of RPC. In some areas these changes involved making fundamental changes to the way the RPC server software was built. The Windows NT 4.0 architecture is much less robust than the more recent Windows 2000 architecture, Due to these fundamental differences between Windows NT 4.0 and Windows 2000 and its successors, it is infeasible to rebuild the software for Windows NT 4.0 to eliminate the vulnerability. To do so would require rearchitecting a very significant amount of the Windows NT 4.0 operating system, and not just the RPC component affected. The product of such a rearchitecture effort would be sufficiently incompatible with Windows NT 4.0 that there would be no assurance that applications designed to run on Windows NT 4.0 would continue to operate on the patched system.
 
Microsoft strongly recommends that customers still using Windows NT 4.0 protect those systems by placing them behind a firewall which is filtering traffic on Port 135. Such a firewall will block attacks attempting to exploit this vulnerability, as discussed in the workarounds section below.
 
Will Microsoft issue a patch for Windows NT 4.0 sometime in the future?
 
Microsoft has extensively investigated an engineering solution for NT 4.0 and found that the Windows NT 4.0 architecture will not support a fix to this issue, now or in the future.
 
What?s the scope of this vulnerability?
 
This is a denial of service vulnerability. An attacker who successfully exploited this vulnerability could cause a remote computer to fail. However, the attacker could not modify or retrieve data or execute code of his or her choice on the remote machine.
 
To carry out such an attack, an attacker would require the ability to make a TCP/IP connection to the Endpoint Mapper running on the target machine. Once a TCP connection had been made, the attacker could send a malformed message to the RPC service and thereby cause the target machine to fail.
 
The best defense against remote RPC attacks from the Internet is to configure the firewall to block port 135. RPC over TCP is not intended to be used across hostile environments such as the Internet
 
What causes the vulnerability?
 
The vulnerability results because the Windows RPC Endpoint Mapper does not properly check message inputs under certain circumstances. If an attacker were to send a certain type of malformed RPC message after RPC established a connection, that could cause the RPC Endpoint Mapper process on the remote machine to fail. This process is responsible for maintaining the connection information of all the processes on that machine using RPC. Because the endpoint mapper runs within the RPC service itself, exploiting this vulnerability would cause the RPC service itself to fail, with the attendant loss of any RPC-based services the server offers, as well as potential loss of some COM functions.
 
What is RPC (Remote Procedure Call)?
 
Remote Procedure Call (RPC) is a protocol that a program can use to request a service from a program located on another computer in a network. RPC helps with interoperability because the program using RPC does not have to understand the network protocols that are supporting communication. In RPC, the requesting program is the client and the service-providing program is the server.
 
What is the RPC endpoint mapper?
 
The RPC endpoint mapper allows RPC clients to determine the port number currently assigned to a particular RPC service. An endpoint is a protocol port or named pipe on which the server application listens to for client remote procedure calls. Client/server applications can use either well-known or dynamic ports.
 
What's wrong with Microsoft?s implementation of Remote Procedure Call (RPC)?
 
There is a flaw in the part of RPC that deals with message exchange over TCP/IP. A failure results because of incorrect handling of malformed messages. This particular failure affects the RPC Endpoint Mapper process, which listens on TCP/IP port 135. The RPC Endpoint Mapper allows RPC clients to determine the port number currently assigned to a particular RPC service. By sending a malformed RPC message, an attacker could the RPC service on a machine to fail.
 
What could this vulnerability enable an attacker to do?
 
This vulnerability could enable an attacker who could send RPC messages to the RPC Endpoint Mapper process on a server to launch a denial of service attack. Even though an attacker could cause machines to fail, it would not be possible to modifiy or retrieve data or execute code.
 
How could an attacker exploit this vulnerability?
 
An attacker could seek to exploit this vulnerability by programming a machine that could communicate with a vulnerable server over TCP port 135 to send a specific kind of malformed RPC message. Receipt of such a message could cause the RPC service on the vulnerable machine to fail.
 
What does the patch do?
 
The patch eliminates the vulnerability by correctly verifying the format of messages that are received via TCP/IP. This verification permits the RPC Endpoint Mapper to reject malformed messages.
 
Workarounds
 
I?m unable to install the patch for this vulnerability immediately. Is there anything I can do to protect myself from attempts to exploit this vulnerability?
 
Microsoft recommends the following workarounds:
 
    * Block Port 135 at your firewall. Port 135 is used to initiate an RPC connection with the RPC Endpoint Mapper service. Blocking Port 135 at the firewall will prevent systems behind that firewall from being attacked by attempts to exploit this vulnerability. However to ensure that those systems cannot be attacked by systems behind the firewall, you should still consider applying the patch.
    * Internet Connection Firewall. If you are using the Internet Connection Firewall in Windows XP to protect your Internet connection, it will by default block inbound RPC traffic.
 
Patch availability
Download locations for this patch
 
    * Microsoft Windows 2000
          o All except Japanese NEC
    o Japanese NEC
    * Windows XP
          o 32-bit Edition
o 64-bit edition
 
Additional information about this patch
Installation platforms:
 
    * The Windows 2000 patch can be installed on systems running Windows 2000 Service Pack 2 or Service Pack 3
* The patch for Windows XP can be installed on systems running Windows XP Gold or Service Pack 1.
 
Inclusion in future service packs:
The fix for this issue will be included in Service pack 4 for Windows 2000 and Service pack 2 for Windows XP
 
Reboot needed: Yes
 
Patch can be uninstalled: yes
 
Superseded patches: None.
 
Verifying patch installation:
 
    * Windows 2000:
 
      To verify that the patch has been installed on the machine, confirm that the following registry key has been created on the machine: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows 2000\SP4\ Q331953
 
      To verify the individual files, use the date/time and version information provided in the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows 2000\SP4\ Q331953\Filelist.
    * Windows XP:
          o If installed on Windows XP Gold:
 
            To verify that the patch has been installed, confirm that the following registry key has been created on the machine: HKLM\Software\Microsoft\Updates\Windows XP\SP1\Q331953.
 
            To verify the individual files, use the date/time and version information provided in the following registry key: HKLM\Software\Microsoft\Updates\Windows XP\SP1\ Q331953\Filelist.
 
          o If installed on Windows XP Service Pack 1:
 
            To verify that the patch has been installed, confirm that the following registry key has been created on the machine: HKLM\Software\Microsoft\Updates\Windows XP\SP2\Q331953.
 
      To verify the individual files, use the date/time and version information provided in the following registry key: HKLM\Software\Microsoft\Updates\Windows XP\SP2\Q331953\Filelist.
 
Caveats:
Microsoft tested Windows NT 4.0 and Windows NT 4.0 Terminal Server Edition. These platforms are vulnerable to the denial of service attack however due to architectural limitations it is infeasible to rebuild the software for Windows NT 4.0 to eliminate the vulnerability.
 
Application of this security patch has been reported to, in some specific configurations, cause local COM calls to stop responding. This problem occurs only when several local RPC calls are made quickly from multiple threads, and each thread has a unique set of security credentials. A supported fix is now available from Microsoft. For additional information on this, and details of obtaining a fix, please see Microsoft Knowledge Base Article 814119.
 
Localization:
Localized versions of this patch are available at the locations discussed in ?Patch Availability?.
 
Obtaining other security patches:
Patches for other security issues are available from the following locations:
 
    * Security patches are available from the Microsoft Download Center, and can be most easily found by doing a keyword search for "security_patch".
* Patches for consumer platforms are available from the WindowsUpdate web site
 
Other information:
Acknowledgments
 
Microsoft thanks  jussi jaakonaho for reporting this issue to us and working with us to protect customers.
 
Support:
 
    * Microsoft Knowledge Base article 331953 discusses this issue. Knowledge Base articles can be found on the Microsoft Online Support web site.
* Technical support is available from Microsoft Product Support Services. There is no charge for support calls associated with security patches.
 
Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.
 
Disclaimer:
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
 
Revisions:
 
    * V1.0 (March 26, 2003): Bulletin Created.
* V1.1 (May 13, 2003): Bulletin updated to include information and link to Microsoft Knowledge Base Article 814119, for customers experiencing technical problems after installing this patch.
 
  Contact Us   |   E-mail this Page   |   TechNet Newsletter
  © 2003 Microsoft Corporation. All rights reserved.     Terms of Use    Privacy Statement    Accessibility  

n°976347
Festen
Posté le 11-08-2003 à 20:39:00  profilanswer
 

krapaud a écrit :


 
c'est la faille rpc ducon!


 
Pourquoi tu l'aides l'autre coche  :??:

n°976353
Silk
Canard Laqué
Posté le 11-08-2003 à 20:39:42  profilanswer
 

HotShot a écrit :


 
"C'est la faille rpc povre conne" :o

:kaola:  
 
j'vais quasiment pas sur S&R


---------------
"[rombière, insipide et] radasse qui a raté une belle carrière de mère supérieure de bénédictines" dixit guigui le 17 juin 02      [:xx_xx]                 :love: Joce c'est un super coup! MANGEZ-EN !  
n°976364
Krapaud
Posté le 11-08-2003 à 20:41:04  profilanswer
 

HotShot a écrit :


 
Ben vi, y a tout un topic dédié sur Soft&Rés. Curieux que tu l'aies pas dit plus tôt, tu ne lis jamais les tomics ? :??:
 
edit : t'es qu'une merde, au fait [:joce]


 
arrache ta gueule sac à foutre, aussi bandante que soit ta prose je la trouve avant tout consternante. Dorénavant tache de réfléchir avant de nous rappeler que tu es un puit de connerie.

n°976368
Krapaud
Posté le 11-08-2003 à 20:41:31  profilanswer
 

HotShot a écrit :


 
"C'est la faille rpc povre conne" :o


 
qui shoot ce résidus?

n°976375
Krapaud
Posté le 11-08-2003 à 20:42:29  profilanswer
 

Festen a écrit :


 
Pourquoi tu l'aides l'autre coche  :??:  


 
plus vite elle est réparée, plus vite elle shoot l'autre boulard d'hotspot.

n°976384
Festen
Posté le 11-08-2003 à 20:44:21  profilanswer
 

krapaud a écrit :


 
plus vite elle est réparée, plus vite elle shoot l'autre boulard d'hotspot.


 
Eau-de-chiotte  :non:  
 
Elle l'apprécie suffisamment pour lui foutre la paix, au pire elle demande à Goret de faire ses basses oeuvres.
 
T'es d'une humeur à chier.  [:keyzer93]

n°976391
Krapaud
Posté le 11-08-2003 à 20:46:04  profilanswer
 

festen->mon humeur se porte bien, mais peut -être pas assez pour me tripoter la bite en lisant ce gland.

n°976397
schnapsman​n
Zaford Beeblefect
Posté le 11-08-2003 à 20:46:44  profilanswer
 

krapaud a écrit :

festen->mon humeur se porte bien, mais peut -être pas assez pour me tripoter la bite en lisant ce gland.


 
encore eut il phallus qu'il ait un membre  [:zebra33]


---------------
From now on, you will speak only when spoken to, and the first and last words out of your filthy sewers will be "Sir!"
n°976399
Silk
Canard Laqué
Posté le 11-08-2003 à 20:46:55  profilanswer
 

peau peu korn
 
[:pop satory]


---------------
"[rombière, insipide et] radasse qui a raté une belle carrière de mère supérieure de bénédictines" dixit guigui le 17 juin 02      [:xx_xx]                 :love: Joce c'est un super coup! MANGEZ-EN !  
n°976407
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:48:44  profilanswer
 

est ce que kkun peut m'aider svp?
 
je n'ai pas le temps au sens premier du terme d'aller sur le forum soft et reseaux
 
merci

n°976408
Meganne
Féministe Ardant
Posté le 11-08-2003 à 20:49:45  profilanswer
 

ça recommence!!!!!! :(  :(  :(

n°976411
schnapsman​n
Zaford Beeblefect
Posté le 11-08-2003 à 20:49:53  profilanswer
 

http://download.microsoft.com/down [...] 86-FRA.exe
 
install ça  [:calin]


---------------
From now on, you will speak only when spoken to, and the first and last words out of your filthy sewers will be "Sir!"
n°976412
Festen
Posté le 11-08-2003 à 20:49:56  profilanswer
 

HotShot a écrit :


Quelle prose !  [:pinzo]  


 
 :heink:
 
 On assume pas ces propos avt edit  ?  :D

n°976414
Festen
Posté le 11-08-2003 à 20:50:17  profilanswer
 
n°976418
Gordon Shu​mway
Ça fout la frousse.
Posté le 11-08-2003 à 20:50:56  profilanswer
 

Meganne a écrit :

est ce que kkun peut m'aider svp?
 
je n'ai pas le temps au sens premier du terme d'aller sur le forum soft et reseaux
 
merci

Ca a l'air risquer de rester trop longtemps sur ton PC... Motte est au boulot?


---------------
Tees et autres trucs pour geeks | Mon Instagram il est bien. Suis-le.
n°976420
freaxinthe​night
Posté le 11-08-2003 à 20:51:29  profilanswer
 

Festen a écrit :


 
voilà.  :jap:  


où ?

n°976422
Festen
Posté le 11-08-2003 à 20:51:52  profilanswer
 
n°976425
sadistyk
I'll see you out there
Posté le 11-08-2003 à 20:52:13  profilanswer
 

dans ton cul
 
hihihihi

mood
Publicité
Posté le   profilanswer
 

 Page :   1  2  3  4  5  ..  689  690  691  ..  21111  21112  21113  21114  21115  21116

Aller à :
 

Sujets relatifs
Le topic des stars (victimes ?) de l'internet [ 56k dehors ]Voilà, c'est fait .... de Bla bla - Divers on passe à Discussions
Le(s) premiers sujet(s) de discussionsVoilà, c'est fait .... de Bla bla - Divers on passe à Discussions
Voilà, c'est fait .... de Bla bla - Divers on passe à DiscussionsVoilà, c'est fait .... de Bla bla - Divers on passe à Discussions
Voilà, c'est fait .... de Bla bla - Divers on passe à Discussions[Discussions] La section qui sent du slip.
Voilà, c'est fait .... de Bla bla - Divers on passe à DiscussionsLa Victime de "Discussions"
Plus de sujets relatifs à : Bla-bla @ Discussions - Dehors les newb


Copyright © 1997-2025 Groupe LDLC (Signaler un contenu illicite / Données personnelles)