wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to kiss

profile
Genius Ape
Sep 02, 2017
0 Likes
1 Discussions
1146 Reads
Found this on the internet and was amazing so thought of sharing Consider this a google map like guide to kissing:

1. START AT THE LIPS, KISSING (NO TONGUE) GENTLY DOWN TOWARDS THE CHIN, THEN ALL ALONG THE JAWBONE, TOWARDS THE EAR. FROM HERE, GIVE THEIR EARLOBE A LITTLE NIP, OR WHISPER SOFTLY … "SO WHEN ARE WE GETTING CHIPOTLE?" (OPTIONAL.)

How to kiss- 1  

2. SNEAK UP ON BAE FROM BEHIND AND KISS FROM THE TOP OF THEIR SHOULDER, ALONG THE CURVE TOWARDS THEIR EAR. (AND AGAIN, THE OPTIONAL WHISPER: "I WANT TO EAT AN ENTIRE PIZZA WITH YOU.")

  How to kiss- 2  

3. GENTLY KISS DOWN THE FOREHEAD, STARTING AT THE HAIRLINE, ALONG THE SLOPE OF THE NOSE, ENDING AT THE LIPS. CONGRATS: YOU'RE NOW SO *GODDAMN CUTE.*

How to kiss- 3

Comments ()


Sign in

Read Next

All you need to know about Cassandra

Blog banner

IT Service Continuity Management

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Veg Mix Pickle

Blog banner

10 Reasons to date your best friend

Blog banner

Service Strategy principles

Blog banner

AOL Mail

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

File management in os

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Cache Memory

Blog banner

FASHION

Blog banner

Multiprocessor

Blog banner

LIMITED EDITION

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Memory Management

Blog banner

INTERNET

Blog banner

Modern Operating System

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Threads

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Types Of scheduling

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Digital Marketing

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Synchronization

Blog banner

Modern Operating System

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Texting is actually better than talking in person

Blog banner

E-mail security

Blog banner

Self-love: Being the reason of your own smile

Blog banner

OPERATING SYSTEM

Blog banner

Buffer Overflow

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Disk Scheduling

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner