We do not condone, support or give instruction on any illegal activity pertaining to computer systems, computer hardware, computer software programs or computer related activities. Included in this group of activities are requests for help to circumvent system admin passwords or Administrator settings on networks. We do understand that the majority of requests may be legitimate, but we do not have the means to discern these from non-legitimate requests.