Tuesday, June 4, 2013

Episode 45: Jumanji (with guest host Lizzy Unpronounceable!)

In this week’s adventure packed episode I explore the dark and sweaty jungle with adorable guest host Lizzy Unpronounceable, as we read Todd Strasser’s best possible attempt at adapting board-game-come-to-life classic, Jumanji! Forget Robin Williams! Forget Peter and Judy! We’re on the hunt for SOME CRAZY FRIGGING MONKEYS! Will we get our wish? Let us play Jumanji in your ears and you’ll find out!

Download here! (Click to stream or right-click to save and savour!)

5 comments:

  1. Lizzy Unpronounceable is the best. She is just grand.

    ReplyDelete
    Replies
    1. ◾ "PROTOCOL SHIELDERS" ◾
      Hello,

      I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
      In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

      Read it carefully!!
      Its reading will not take more than 10mins.

      We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

      WARNING:
      MOST HACKERS YOU SEE HERE ARE FAKES
      AND INCONGUROUS!!.
      It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

      HOW WOULD YOU KNOW??

      You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

      1, you see uncertified email accounts carrying numberings like
      "iamhacklord1232@(gmail,yahoo orhotmail.com"
      pls flee from them, BIG SCAMMERS.
      They take your money and never do your job!!

      2, you see posts like "do you need to spy on spouse?"
      All fake! , just a way to lure you toward getting ripped OFF!.

      3, posting fake testimonies and comments to trick you into feeling save and secured.
      Pls endeavour to ignore!!

      4,beware as we urge you not to make respond to any "IVAN HONG" (impersonating with our post pretending to work for us) with this exact post.

      ◾VERY IMPORTANT ◾

      For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
      "CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
      and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
      must firmly ascertain.

      ◾OUR "AIMS" HERE ◾
      Are:
      1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

      Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

      write us on:
      ◾Protocolhacks@gmail.com or
      ◾Cybershieldnotch@gmail.com
      ◾Cybershieldnotch@protonmail.com,

      COREY ROD,
      SIGNED...!
      Thank you!!!

      Delete
  2. Hello everyone! If you require the service of a professional hacker to help track your partner's cell phone remotely, contact deadlyhacker01@gmail.com, he was excellent in helping me hack my husband's phone without physical contact.
    You can also reach him on
    +1 513-445-5445 , tell him Stacey referred you.

    ReplyDelete
  3. Hello everyone,my name is kate johnson.i was able to hack my husband's phone remotely and got access to all his texts qnd calls with the help of ghosthacker2351@gmail.com.he is reliable and if you require his service tell him i referred you.

    ReplyDelete
  4. ◾ "PROTOCOL SHIELDERS" ◾
    Hello,

    I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
    In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

    Read it carefully!!
    Its reading will not take more than 10mins.

    We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

    WARNING:
    MOST HACKERS YOU SEE HERE ARE FAKES
    AND INCONGUROUS!!.
    It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

    HOW WOULD YOU KNOW??

    You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

    1, you see uncertified email accounts carrying numberings like
    "iamhacklord1232@(gmail,yahoo orhotmail.com"
    pls flee from them, BIG SCAMMERS.
    They take your money and never do your job!!

    2, you see posts like "do you need to spy on spouse?"
    All fake! , just a way to lure you toward getting ripped OFF!.

    3, posting fake testimonies and comments to trick you into feeling save and secured.
    Pls endeavour to ignore!!

    4,beware as we urge you not to make respond to any "IVAN HONG" (impersonating with our post pretending to work for us) with this exact post.

    ◾VERY IMPORTANT ◾

    For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
    "CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
    and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
    must firmly ascertain.

    ◾OUR "AIMS" HERE ◾
    Are:
    1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

    2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

    Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

    write us on:
    ◾Protocolhacks@gmail.com or
    ◾Cybershieldnotch@gmail.com
    ◾Cybershieldnotch@protonmail.com,

    COREY ROD,
    SIGNED...!
    Thank you!!!

    ReplyDelete