wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to kiss

profile
Genius Ape
Sep 02, 2017
0 Likes
1 Discussions
1146 Reads
Found this on the internet and was amazing so thought of sharing Consider this a google map like guide to kissing:

1. START AT THE LIPS, KISSING (NO TONGUE) GENTLY DOWN TOWARDS THE CHIN, THEN ALL ALONG THE JAWBONE, TOWARDS THE EAR. FROM HERE, GIVE THEIR EARLOBE A LITTLE NIP, OR WHISPER SOFTLY … "SO WHEN ARE WE GETTING CHIPOTLE?" (OPTIONAL.)

How to kiss- 1  

2. SNEAK UP ON BAE FROM BEHIND AND KISS FROM THE TOP OF THEIR SHOULDER, ALONG THE CURVE TOWARDS THEIR EAR. (AND AGAIN, THE OPTIONAL WHISPER: "I WANT TO EAT AN ENTIRE PIZZA WITH YOU.")

  How to kiss- 2  

3. GENTLY KISS DOWN THE FOREHEAD, STARTING AT THE HAIRLINE, ALONG THE SLOPE OF THE NOSE, ENDING AT THE LIPS. CONGRATS: YOU'RE NOW SO *GODDAMN CUTE.*

How to kiss- 3

Comments ()


Sign in

Read Next

Memory Management

Blog banner

Online Games

Blog banner

Puri Jagannath temple

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Operating system

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

E-learning in today's world

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Cache memory

Blog banner

MySQL

Blog banner

Concurrency and memory

Blog banner

HTML vs HTML5

Blog banner

Os Virtual Memory

Blog banner

Race Condition

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Expert System In AI

Blog banner

OS Evolution Achievements

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

De-Coding Love

Blog banner

GOOGLE

Blog banner

Cyber Laws In India and Around the World

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

PYTHON

Blog banner

Multiple processor scheduling

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Threat management

Blog banner

Assignment-3

Blog banner

BUFFER OVERFLOW_142

Blog banner

Balance

Blog banner

Steganography

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

DBMS and various career options related to it.

Blog banner

Child labour

Blog banner

Network Forensics

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner