⚠️ Encyclopedia Dramatica is currently being restored by automated scripts ⚠️

There's been a lot of questions as to what's going on with the site and what comes next. So we have this (ordered) roadmap of what's being worked on and what's to come. This will be updated until the roadmap is complete as Æ has a lot of missing features and ideas that I'd like to fix in regards to its offerings before I implement big plans for the site's popularity and well-being in 2021.

Æ Roadmap

  • Content restoration (Mostly done, few things missing that will be restored sporadically)
  • Image restoration (Being run in background, nothing I can do cept wait)
  • Æ Imageboard (Currently being worked on)
  • Mediawiki upgrade and backend fixes
  • .onion domain for Tor-friendly editing and viewing
  • CSS overhaul (Fixing things like the videos on mobile, and overall a rehaul of the wiki's look to be more friendly to readers)
  • Paid bounty board for new articles (Won't be managed by me for legal reasons however I will ensure it runs smoothly)
  • Anonymous phone # service for those seeking ban evades from Twitter as well as a phone number not tied to their name (more details at launch)

  • Currently we are nearing our annual LLC renewal fee ($650) as well throwing the funds required for these other changes and aspects. If you would like to support Æ consider purchasing a copy of The Hustler's Bible or securing some Merch. Donating is also appreciated however I would rather give something back as per the two options above.

    If you have any questions you can join our public Telegram chat to DM me privately or @ me in chat.

    You can also email me via [email protected]

    Merch notes: Thank you to all who have purchased merch. We will ship late January or mid February depending on our provider's speed.

    Here's to setting the world on fire in 2021! - aediot

    Is Your Son a Computer Hacker?

    From Encyclopedia Dramatica
    Jump to navigation Jump to search

    Is Your Son a Computer Hacker? is the name of a eight year old magnificent essay on Adequacy.org. Written by a wonderful human being with many redeeming qualities, the lulzy article is infamous for exposing hackers for who they really are: 13 year old boys who aren't really hackers. However, anyone under the age of 18 knows that it's nothing more than the misinformed musings of a concerned parent. They were, of course, wrong and posted hate mail, proving themselves to be idiots. Also notice how the names are characters from the Brady Bunch.

    Eleven signs little Billy is a computer hacker

    1. Child asks to change ISP's.
    2. Child installs programs which aren't AOL or Calculator as all others are Autorun.gen.
    3. Child wants to upgrade his computer.
    4. Child wants to read books without the words Playboy or Bible in the title.
    5. Child wants to waste more than 30 minutes on the computer.
    6. Child plays Quake.
    7. Child swears.
    8. Child installs Lunix.
    9. Child dresses differently from others.
    10. Child sucks at school.
    11. Child is a furry


    I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I'm a model parent.

    T. Reginald Gibbons,

    Most American families use trusted and responsible Internet Service Providers, such as AOL.

    T. Reginald Gibbons,

    Someone up this man's dosage.
    Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

    T. Reginald Gibbons,

    You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

    T. Reginald Gibbons,

    Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

    T. Reginald Gibbons,

    Top secret hacker assembly
    [...] If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

    T. Reginald Gibbons,

    Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school. If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

    T. Reginald Gibbons,

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government.

    T. Reginald Gibbons,

    They may also be used to break into people's stereos to steal their music, using the "mp3" program.

    T. Reginald Gibbons,

    In your internet, corrupting your children.
    Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to YouTube on the internet without using a telephone.

    T. Reginald Gibbons,

    If you see this image, your computer is FUCKED.
    If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

    T. Reginald Gibbons,

    If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association.

    T. Reginald Gibbons,



    j00 5700p1d musca domestica! A 'son' raised by a control freak like you CANNOT be a haxor!!!



    Go castrate yourself!!!

    You are a lying, self-serving hypocrite that does not deserve any bandwidth!!! Wait, isn't BANDWIDTH a hacker tool?!

    And you should RESPECT the intellectual BRILLIANCE of a true haxxor, you moron!

    Oh, and tell your son the EASTER BUNNY IS NOT REAL!!!


    ~*~Haxxor the World ^_^~*~

    jo 7o 4ll (v)4 1337 |-|4xx0rz !!!


    —Anonymous Reader, [1]

    The author of this article must be a Jew.


    —Anonymous Reader, [2]

    Ok whatever your name is, you are a moronic piece of shit. I bet your dad raped you as a kid, and dont even bring Jesus into this, him and computer hackers have nothing to do. You attend parties with your kids? Come on you little piece of shit, are you afraid that your shitty mormon kids are going to have sex? Yeah right. And where the hell did you get this "how hackers dress"? Your son is probably just wearing bright clothes to get attention because his self conciouss parents ignore him because he is a "hacker". God, you fucking moron parent.


    —Anonymous Reader, [3]

    Is Your Daughter a Computer Hacker?



    Is Your Son a Computer Hacker? is part of a series on Security Faggots

    1337 h4x0rz

    Captain CrunchCult of the Dead CowDavid L. SmithGary McKinnonGOBBLESHD MooreJeff MossKevin MitnickLance M. HavokRobert MorrisTheo de RaadtweevWoz


    2cashAnonOpsBrian SalcedoFearnorFry GuyGadi Evrong00nsHack This SiteHacking TeamhannJoanna RutkowskaJohn FieldJoseph CampLizard SquadLulzSecMark ZuckerbergMarshviperXMasters of DeceptionMichael LynnKrashedRavenr000tRyanSteve Gibsonth3j35t3rThe RegimeSabuZeekill

    Related Shit

    AviraCiscogateCloudflareConfickerCyberDefenderDefconThe GibsonThe Great Em/b/assy Security Leak of 2007HeartbleedI GOT NORTON!Is Your Son a Computer Hacker?Operation SundevilPIFTS.exeSocial engineeringStylometrySubSevenZone-H