Aangemaakte reacties
- AuteurBerichten
-
Hey ik weet niet of je er wat aan hebt maar wie weet, tis om te helpen: technical details
When Trojan.ByteVerify is executed, it performs the following actions:
1. Escapes the sandbox restrictions, using Blackbox.class, by doing the following:
1. Declares a new PermissionDataSet with setFullyTrusted set to TRUE.
2. Creates a trusted PermissionSet.
3. Sets permission to PermissionSet by creating its own URLClassLoader class, derived from the VerifierBug.class.
2. Loads Beyond.class using the URLClassLoader from Blackbox.class.
3. Gains unrestricted rights on the local machine by invoking the .assertPermission method of the PolicyEngine class in Beyond.class.
4. Opens the Web page,
http://www.clavus.net/lst.backs , and parses the text that this site displays.For example, SP|
http://www.ewebsearch.net/sp.htm means that the Internet Explorer Start Page will be set up tohttp://www.ewebsearch.net/sp.htm 5. Several pornographic links are added into the favorites.
6. May attempt to retrieve dialer programs and install them on the infected computer. The dialer programs may attempt to connect the infected computer to pornographic Web sites.
Notes:
* Trojan.ByteVerify will typically arrive as a component of other malicious content. An attacker could use the compiled Java class file to execute other code. The file will likely exist as VerifierBug.Class. For example, an attacker could create a .html file that uses the Trojan, and then create a script file that will perform other actions, such as setting the Internet Explorer Start Page.
* Notification of infection does not always indicate that a machine has been infected; it only indicates that a program included the viral class file. This does not mean that it used the malicious functionality.
recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security “best practices”:
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
removal instructions
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Restart the computer in Safe mode or VGA mode.
4. Run a full system scan and delete all the files detected as Trojan.ByteVerify.
For specific details on each of these steps, read the following instructions.
1. Disabling System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
* “How to disable or enable Windows Me System Restore”
* “How to turn off or turn on Windows XP System Restore”
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, “Antivirus Tools Cannot Clean Infected Files in the _Restore Folder,” Article ID: Q263455.
2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
* Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
* Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read “How to update virus definition files using the Intelligent Updater” for detailed instructions.
3. Restarting the computer in Safe mode or VGA mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode.
* For Windows 95, 98, Me, 2000, or XP users, restart the computer in Safe mode. For instructions, read the document, “How to start the computer in Safe Mode.”
* For Windows NT 4 users, restart the computer in VGA mode.
4. Scanning for and deleting the infected files
1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
* For Norton AntiVirus consumer products: Read the document, “How to configure Norton AntiVirus to scan all files.”
* For Symantec AntiVirus Enterprise products: Read the document, “How to verify that a Symantec Corporate antivirus product is set to scan all files.”
2. Run a full system scan.
3. If any files are detected as infected with Trojan.ByteVerify, click Delete.
Hey ik weet niet of je er wat aan hebt maar wie weet, tis om te helpen: technical details
When Trojan.ByteVerify is executed, it performs the following actions:
1. Escapes the sandbox restrictions, using Blackbox.class, by doing the following:
1. Declares a new PermissionDataSet with setFullyTrusted set to TRUE.
2. Creates a trusted PermissionSet.
3. Sets permission to PermissionSet by creating its own URLClassLoader class, derived from the VerifierBug.class.
2. Loads Beyond.class using the URLClassLoader from Blackbox.class.
3. Gains unrestricted rights on the local machine by invoking the .assertPermission method of the PolicyEngine class in Beyond.class.
4. Opens the Web page,
http://www.clavus.net/lst.backs , and parses the text that this site displays.For example, SP|
http://www.ewebsearch.net/sp.htm means that the Internet Explorer Start Page will be set up tohttp://www.ewebsearch.net/sp.htm 5. Several pornographic links are added into the favorites.
6. May attempt to retrieve dialer programs and install them on the infected computer. The dialer programs may attempt to connect the infected computer to pornographic Web sites.
Notes:
* Trojan.ByteVerify will typically arrive as a component of other malicious content. An attacker could use the compiled Java class file to execute other code. The file will likely exist as VerifierBug.Class. For example, an attacker could create a .html file that uses the Trojan, and then create a script file that will perform other actions, such as setting the Internet Explorer Start Page.
* Notification of infection does not always indicate that a machine has been infected; it only indicates that a program included the viral class file. This does not mean that it used the malicious functionality.
recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security “best practices”:
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
removal instructions
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Restart the computer in Safe mode or VGA mode.
4. Run a full system scan and delete all the files detected as Trojan.ByteVerify.
For specific details on each of these steps, read the following instructions.
1. Disabling System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.
Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.
Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.
For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:
* “How to disable or enable Windows Me System Restore”
* “How to turn off or turn on Windows XP System Restore”
For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, “Antivirus Tools Cannot Clean Infected Files in the _Restore Folder,” Article ID: Q263455.
2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
* Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
* Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).
The Intelligent Updater virus definitions are available: Read “How to update virus definition files using the Intelligent Updater” for detailed instructions.
3. Restarting the computer in Safe mode or VGA mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode.
* For Windows 95, 98, Me, 2000, or XP users, restart the computer in Safe mode. For instructions, read the document, “How to start the computer in Safe Mode.”
* For Windows NT 4 users, restart the computer in VGA mode.
4. Scanning for and deleting the infected files
1. Start your Symantec antivirus program and make sure that it is configured to scan all the files.
* For Norton AntiVirus consumer products: Read the document, “How to configure Norton AntiVirus to scan all files.”
* For Symantec AntiVirus Enterprise products: Read the document, “How to verify that a Symantec Corporate antivirus product is set to scan all files.”
2. Run a full system scan.
3. If any files are detected as infected with Trojan.ByteVerify, click Delete.
Religion a system of thought, feeling, and action that is shared by a group and that gives the members an object of devotion; a code of behavior by which individuals may judge the personal and social consequences of their actions; and a frame of reference by which individuals may relate to their group and their universe. Usually, religion concerns itself with that which transcends the known, the natural, or the expected; it is an acknowledgment of the extraordinary, the mysterious, and the supernatural. The religious consciousness generally recognizes a transcendent, sacred order and elaborates a technique to deal with the inexplicable or unpredictable elements of human experience in the world or beyond it.
Section: Types of Religious Systems
The evolution of religion cannot be precisely determined owing to the lack of clearly distinguishable stages, but anthropological and historical studies of isolated cultures in various periods of development have suggested a typology but not a chronology. One type is found among some Australian aborigines who practice magic and fetishism (see fetish ) but consider the powers therein to be not supernatural but an aspect of the natural world. Inability or refusal to divide real from preternatural and acceptance of the idea that inanimate objects may work human good or evil are sometimes said to mark a prereligious phase of thought. This is sometimes labeled naturism or animatism. It is characterized by a belief in a life force that itself has no definite characterization (see animism ).
A second type of religion, represented by many Oceanic and African tribal beliefs, includes momentary deities (a tree suddenly falling on or in front of a person is malignant, although it was not considered “possessed� before or after the incident) and special deities (a particular tree is inhabited by a malignant spirit, or the spirits of dead villagers inhabit a certain grove or particular animals). In this category one must distinguish between natural and supernatural forces. This development is related to the emergence of objects of devotion, to rituals of propitiation, to priests and shamans , and to an individual sense of group participation in which the individual or the group is protected by, or against, supernatural beings and is expected to act singly or collectively in specific ways when in the presence of these forces (see ancestor worship ; totem ; spiritism ).
In a third class of religion—usually heavily interlaced with fetishism—magic, momentary and special deities, nature gods, and deities personifying natural functions (such as the Egyptian solar god Ra, the Babylonian goddess of fertility Ishtar, the Greek sea-god Poseidon, and the Hindu goddess of death and destruction Kali) emerge and are incorporated into a system of mythology and ritual. Sometimes they take on distinctively human characteristics (see anthropomorphism ).
Beyond these more elementary forms of religious expression there are what are commonly called the “higher religions.� Theologians and philosophers of religion agree that these religions embody a principle of transcendence, i.e., a concept, sometimes a godhead, that involves humans in an experience beyond their immediate personal and social needs, an experience known as “the sacred� or “the holy.�
In the comparative study of these religions certain classifications are used. The most frequent are polytheism (as in popular Hinduism and ancient Greek religion), in which there are many gods; dualism (as in Zoroastrianism and certain Gnostic sects), which conceives of equally powerful deities of good and of evil; monotheism (as in Christianity , Judaism , and Islam ), in which there is a single god; supratheism (as in Hindu Vedanta and certain Buddhist sects), in which the devotee participates in the religion through a mystical union with the godhead; and pantheism , in which the universe is identified with God.
Another frequently used classification is based on the origins of the body of knowledge held by a certain religion: some religions are revealed, as in Judaism (where God revealed the Commandments to Moses), Christianity (where Christ, the Son of God, revealed the Word of the Father), and Islam (where the angel Gabriel revealed God’s will to Muhammad). Some religions are nonrevealed, or “natural,â€� the result of human inquiry alone. Included among these and sometimes called philosophies of eternity are Buddhist sects (where Buddha is recognized not as a god but as an enlightened leader), Brahmanism, and Taoism and other Chinese metaphysical doctrines.
Section: Bibliography
See J. Wach, Comparative Study of Religions (1951, repr. 1958); J. G. Frazer, The Golden Bough (3d ed., 13 vol., 1955; repr. 1966); V. T. A. Ferm, Encyclopedia of Religion (1959); J. Hick, The Philosophy of Religion (1963); J. de Vries, The Study of Religion (tr. 1967); G. Parrinder, ed., Man and His Gods (1971); M. Eliade, ed., Encyclopedia of Religion (16 vol., 1986); E. L. Queen 2d et al., ed., The Encyclopedia of American Religious History (1996).
http://www.encyclopedia.com , hey jess gewoon goed zoeken dan vind je alles!Z@3 +1Religion a system of thought, feeling, and action that is shared by a group and that gives the members an object of devotion; a code of behavior by which individuals may judge the personal and social consequences of their actions; and a frame of reference by which individuals may relate to their group and their universe. Usually, religion concerns itself with that which transcends the known, the natural, or the expected; it is an acknowledgment of the extraordinary, the mysterious, and the supernatural. The religious consciousness generally recognizes a transcendent, sacred order and elaborates a technique to deal with the inexplicable or unpredictable elements of human experience in the world or beyond it.
Section: Types of Religious Systems
The evolution of religion cannot be precisely determined owing to the lack of clearly distinguishable stages, but anthropological and historical studies of isolated cultures in various periods of development have suggested a typology but not a chronology. One type is found among some Australian aborigines who practice magic and fetishism (see fetish ) but consider the powers therein to be not supernatural but an aspect of the natural world. Inability or refusal to divide real from preternatural and acceptance of the idea that inanimate objects may work human good or evil are sometimes said to mark a prereligious phase of thought. This is sometimes labeled naturism or animatism. It is characterized by a belief in a life force that itself has no definite characterization (see animism ).
A second type of religion, represented by many Oceanic and African tribal beliefs, includes momentary deities (a tree suddenly falling on or in front of a person is malignant, although it was not considered “possessed� before or after the incident) and special deities (a particular tree is inhabited by a malignant spirit, or the spirits of dead villagers inhabit a certain grove or particular animals). In this category one must distinguish between natural and supernatural forces. This development is related to the emergence of objects of devotion, to rituals of propitiation, to priests and shamans , and to an individual sense of group participation in which the individual or the group is protected by, or against, supernatural beings and is expected to act singly or collectively in specific ways when in the presence of these forces (see ancestor worship ; totem ; spiritism ).
In a third class of religion—usually heavily interlaced with fetishism—magic, momentary and special deities, nature gods, and deities personifying natural functions (such as the Egyptian solar god Ra, the Babylonian goddess of fertility Ishtar, the Greek sea-god Poseidon, and the Hindu goddess of death and destruction Kali) emerge and are incorporated into a system of mythology and ritual. Sometimes they take on distinctively human characteristics (see anthropomorphism ).
Beyond these more elementary forms of religious expression there are what are commonly called the “higher religions.� Theologians and philosophers of religion agree that these religions embody a principle of transcendence, i.e., a concept, sometimes a godhead, that involves humans in an experience beyond their immediate personal and social needs, an experience known as “the sacred� or “the holy.�
In the comparative study of these religions certain classifications are used. The most frequent are polytheism (as in popular Hinduism and ancient Greek religion), in which there are many gods; dualism (as in Zoroastrianism and certain Gnostic sects), which conceives of equally powerful deities of good and of evil; monotheism (as in Christianity , Judaism , and Islam ), in which there is a single god; supratheism (as in Hindu Vedanta and certain Buddhist sects), in which the devotee participates in the religion through a mystical union with the godhead; and pantheism , in which the universe is identified with God.
Another frequently used classification is based on the origins of the body of knowledge held by a certain religion: some religions are revealed, as in Judaism (where God revealed the Commandments to Moses), Christianity (where Christ, the Son of God, revealed the Word of the Father), and Islam (where the angel Gabriel revealed God’s will to Muhammad). Some religions are nonrevealed, or “natural,â€� the result of human inquiry alone. Included among these and sometimes called philosophies of eternity are Buddhist sects (where Buddha is recognized not as a god but as an enlightened leader), Brahmanism, and Taoism and other Chinese metaphysical doctrines.
Section: Bibliography
See J. Wach, Comparative Study of Religions (1951, repr. 1958); J. G. Frazer, The Golden Bough (3d ed., 13 vol., 1955; repr. 1966); V. T. A. Ferm, Encyclopedia of Religion (1959); J. Hick, The Philosophy of Religion (1963); J. de Vries, The Study of Religion (tr. 1967); G. Parrinder, ed., Man and His Gods (1971); M. Eliade, ed., Encyclopedia of Religion (16 vol., 1986); E. L. Queen 2d et al., ed., The Encyclopedia of American Religious History (1996).
http://www.encyclopedia.com , hey jess gewoon goed zoeken dan vind je alles!Z@3 +1Thanatos ik ben van mening dat je iets als dit niet kunt vergoeden of zoals jij zegt “dokken” met geld. Stel je nou voor dat je vriendin / vriend (of wat voor naaste dan ook) word doodgereden. Dan moet je mij is uitleggen hoe dat met een “bedrag met 5 nullenâ€� kan worden goedgemaakt. Als ik de ouder zou zijn van dit kind , dat tot overmaat van ramp ook al dood is, zou zijn zou ik me absoluut niet het gezeik van een rechtzaak op de nek nemen. Sommige dingen worden er niet beter op met geld. Ik wens de ouders veel sterkte toe, dat lijkt me het geen dat ze het meest nodig hebben nu. Thanatos ik ben van mening dat je iets als dit niet kunt vergoeden of zoals jij zegt “dokken” met geld. Stel je nou voor dat je vriendin / vriend (of wat voor naaste dan ook) word doodgereden. Dan moet je mij is uitleggen hoe dat met een “bedrag met 5 nullenâ€� kan worden goedgemaakt. Als ik de ouder zou zijn van dit kind , dat tot overmaat van ramp ook al dood is, zou zijn zou ik me absoluut niet het gezeik van een rechtzaak op de nek nemen. Sommige dingen worden er niet beter op met geld. Ik wens de ouders veel sterkte toe, dat lijkt me het geen dat ze het meest nodig hebben nu. Uhm ja het lijkt me logisch dat ik Windows er opnieuw wil installeren. Weet je wat, ik denk dat de rest wel begrijpt wat ik bedoel, als je niet begrijpt wat ik bedoel dan weet je me te vinden op msn, anders word dit zo’n lange topic etc waar niemand iets aan heeft. Bedankt! Uhm ja het lijkt me logisch dat ik Windows er opnieuw wil installeren. Weet je wat, ik denk dat de rest wel begrijpt wat ik bedoel, als je niet begrijpt wat ik bedoel dan weet je me te vinden op msn, anders word dit zo’n lange topic etc waar niemand iets aan heeft. Bedankt! De uitleg van wat. Heb ik iets gemist? Of is er een post verwijderd of iets soortgelijks? Sorry necrocide ik beheers pools slecht eveneens Russisch en Italiaans liggen mij slecht, en de schoonmaakster is ook niet altijd aanwezig hier. Ik stel het echt enorm op prijs dat je me iets wilt uitleggen maar vertel dan wel meteen wat! Om het dan samen te vatten wil ik graag een torrent of ftp adres voor een recente versie van Windows XP pro sp2 , zowel Nederlands als Engels zou ik enorm opprijs stellen. Thanx!! edit Een gekraakte versie ja het liefst!

De uitleg van wat. Heb ik iets gemist? Of is er een post verwijderd of iets soortgelijks? Sorry necrocide ik beheers pools slecht eveneens Russisch en Italiaans liggen mij slecht, en de schoonmaakster is ook niet altijd aanwezig hier. Ik stel het echt enorm op prijs dat je me iets wilt uitleggen maar vertel dan wel meteen wat! Om het dan samen te vatten wil ik graag een torrent of ftp adres voor een recente versie van Windows XP pro sp2 , zowel Nederlands als Engels zou ik enorm opprijs stellen. Thanx!! edit Een gekraakte versie ja het liefst!

Nee dat hoeft niet, bij voorkeur een engelse of nederlandse versie dat wel , met pools etc kan ik niet goed overweg. ( shame on me ) Nee dat hoeft niet, bij voorkeur een engelse of nederlandse versie dat wel , met pools etc kan ik niet goed overweg. ( shame on me ) Ik lees hier dat sommige mensen kill bill een “kut film” vinden en de actrice lelijk vinden. Dit lijken me nogal persoonlijke opvattingen. Een mening is altijd interessant maar waarom zo. Kill bill is gewoon een film die opgebouwd is uit een bepaalde mix van stijlen. Dat moet je kunnen waarderen, als je dat kunt dan is het een erg leuke film om naar te kijken en kun je alle kleine ingevoerde stijlen en de vaak goed geplaste muziek ook waarderen. Ik vind het dus nogal flauw om meteen te gaan roepen dat dit of dat niet klopt of lelijk is. We hebben allemaal een andere smaak, laten we dat dan melden op een zondanige manier dat het net is. Ik vind het een stukje kunst net als zijn voorgaande films. (kga ook nieuwe lopen roepen dat jullie een stel fkrs zijn omdat jullie die film niet kunnen waarderen, geef mij maar liever een getailleerde reden of opmerking op een nette manier dan he)
Ik lees hier dat sommige mensen kill bill een “kut film” vinden en de actrice lelijk vinden. Dit lijken me nogal persoonlijke opvattingen. Een mening is altijd interessant maar waarom zo. Kill bill is gewoon een film die opgebouwd is uit een bepaalde mix van stijlen. Dat moet je kunnen waarderen, als je dat kunt dan is het een erg leuke film om naar te kijken en kun je alle kleine ingevoerde stijlen en de vaak goed geplaste muziek ook waarderen. Ik vind het dus nogal flauw om meteen te gaan roepen dat dit of dat niet klopt of lelijk is. We hebben allemaal een andere smaak, laten we dat dan melden op een zondanige manier dat het net is. Ik vind het een stukje kunst net als zijn voorgaande films. (kga ook nieuwe lopen roepen dat jullie een stel fkrs zijn omdat jullie die film niet kunnen waarderen, geef mij maar liever een getailleerde reden of opmerking op een nette manier dan he)
- AuteurBerichten

