wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to kiss

profile
Genius Ape
Sep 02, 2017
0 Likes
1 Discussions
1146 Reads
Found this on the internet and was amazing so thought of sharing Consider this a google map like guide to kissing:

1. START AT THE LIPS, KISSING (NO TONGUE) GENTLY DOWN TOWARDS THE CHIN, THEN ALL ALONG THE JAWBONE, TOWARDS THE EAR. FROM HERE, GIVE THEIR EARLOBE A LITTLE NIP, OR WHISPER SOFTLY … "SO WHEN ARE WE GETTING CHIPOTLE?" (OPTIONAL.)

How to kiss- 1  

2. SNEAK UP ON BAE FROM BEHIND AND KISS FROM THE TOP OF THEIR SHOULDER, ALONG THE CURVE TOWARDS THEIR EAR. (AND AGAIN, THE OPTIONAL WHISPER: "I WANT TO EAT AN ENTIRE PIZZA WITH YOU.")

  How to kiss- 2  

3. GENTLY KISS DOWN THE FOREHEAD, STARTING AT THE HAIRLINE, ALONG THE SLOPE OF THE NOSE, ENDING AT THE LIPS. CONGRATS: YOU'RE NOW SO *GODDAMN CUTE.*

How to kiss- 3

Comments ()


Sign in

Read Next

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Cross site scripting Attack

Blog banner

Operating Systems

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Principles of Service Operation

Blog banner

Memory hierarchy

Blog banner

Memory heirachy (Operating system)

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Fault Tolerance in an Operating System

Blog banner

Multicore and Multithreading

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

GIS REMOTE SENSING

Blog banner

Memory Management

Blog banner

De-Coding Love

Blog banner

Constrains in service design

Blog banner

File management In Operating System

Blog banner

Self managing devices

Blog banner

The most common internet security threats

Blog banner

Service Operations Principles

Blog banner

Smartsheet

Blog banner

1.1 basic elements

Blog banner

Electronic Funds Transfer

Blog banner

Virus

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Assignment-3

Blog banner

Dos (Denial of service) Attack

Blog banner

Consumer to consumer business mode

Blog banner

Amazon

Blog banner

Android Flashlight Application

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Google classroom

Blog banner

Modern Operating System

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Facebook marketing

Blog banner

Beatbox

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Importance Of Time

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner