Solemn engineers, nervous smoking hackers and bright-eyed slow moving programmers came together watched by the great crowd of frightened and astonished users. With the words ?Let the power of Flawed Thought to enter our devious minds and let the Flawed Byte to enter our mighty computers?? the dark ritual begun.We had no name for it and so we called it Flawed Byte Summoning?.
These look good for the most part, although, it would be nice to see some more advanced techniques used... these are kinda basic.