11 Clan Member panel

Member Login

Not a member yet? Sign Up!

SHOUTBOX ARCHIVE
Duikeend - 11:41 (29-07-2013)
@ skill that comes with the milf's
Duikeend - 11:39 (29-07-2013)
r u sure that I'm on the whitelist for the new servers :-)..
bananaSkill - 10:06 (29-07-2013)
@Leftie "Internet Protocol Man"
bananaSkill - 10:06 (29-07-2013)
Do we have whitetits ?
EBassie - 00:42 (29-07-2013)
Duikeend... what whitelist? You are on every whitelist...
Duikeend - 22:34 (28-07-2013)
hey admin.. please add me 2 whitelist :-)
Leftie - 17:30 (27-07-2013)
@dkong

www.imdb.com
foxterrier - 15:34 (27-07-2013)

Watch on Youtube
YouTube

Iv Benjae vI - 14:48 (27-07-2013)
There is a Caspian Border map on Minecraft :O
Watch on Youtube
YouTube

EBassie - 13:38 (27-07-2013)
Here we go again... DDOS after DDOS.... I'm not filling the servers today, Fuck.. it
Leftie - 18:40 (26-07-2013)
www.dumpert.nl
ArNeo - 12:27 (26-07-2013)
Ziibbaa!! ;P
vanPaalen - 20:06 (25-07-2013)
I think we can use the same texture pack as this guy is using leftie, this is fucking well done by the way. It does look nicer and more like zeba because of the lighting thing he uses in minecraft though. But fucking awesome!
Leftie - 17:21 (25-07-2013)
nice one!! good idea :P maybe pim and me can make a BF3 tribute building in Minecraft.. we don;t have those fancy hd texture packs though
EBassie - 15:42 (25-07-2013)
Talking about Minecraft. This one is for Arneo:

Watch on Youtube
YouTube


:)
Leftie - 15:21 (25-07-2013)
our minecraft server is running smooth :P
EBassie - 15:17 (25-07-2013)
ass ;)
dkong - 14:41 (25-07-2013)
Time for a new hobby?
EBassie - 14:04 (25-07-2013)
No contact with EA Online. Please try again later..... sigh...
dkong - 16:25 (24-07-2013)
I think it's a benefit as there is more knowlegde available to guide a proper implementation. If you set up shit from scratch you have to do everything right and think of everything at once making it prone to human errors which are inevitable. Also most security issues are not architecture related and probably not related to the OS itself either. Most vulnerabilities are in the applications on top of those two, or in the network connectivity that they use.