埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 778|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer 3 ~7 \3 r: i' s% A
white: how control? 9 c* n; O+ I  ~1 K3 O6 K  s
hackers: white with a Trojan
, C3 O- J% a3 W! b:. . . . . . Where? I did not see 6 I6 B  f7 ?( N
hackers: Open your Task Manager
3 f7 [  M- O/ t" p( a white:. . . . . . . Task Manager, where?
9 R3 L4 N4 {, [( ]5 @: j hackers:. . . . . Your computer below! ! $ z  V; Y: K7 z+ ?8 {
white: \; 1 f' V% r9 ^* J4 O8 K: z
Hacker: I have control of your computer
! R2 g; g* t6 M3 k/ ?) x4 y$ ^8 v white: Oh
  _( j; M" u) g3 x1 q hackers: a funk? ! Hey / L9 K% N( \  l& l0 S' j& t3 Y5 n/ F
white: for the just, help me kill the virus it, many of the recent problems my Lord
( k2 c$ O$ X9 ]& a# D machine hackers:. . . . . .   ^. K. |! S, L8 j

3 ^4 p# r% N7 g! D  i/ R white: how do you always in my computer and out of
" g; h/ e4 z$ [; l; w: ^7 [ casual hackers: You can install a firewall
! w( [2 w. U( E1 n6 I. W3 T# Q white: install a firewall, you can not access it? % D* X4 ?1 |: Q* {' A
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
$ U1 q. y+ m) F# w/ g
- \4 b* V. L0 U7 b* W small White: I heard that you will create a \! , @7 z6 d  r# F  l# E0 {* D' W: b
hackers: ah
, T( L) g) U% z4 z  [& t white: you can control someone else's computer? ! 5 g1 b( b' m; N0 Q
hackers: General is the
  v5 h9 f8 m9 Y5 b9 Y# u: F white: you can black out those sites?
7 A% ~% i) L6 s5 H8 C4 P) ?+ f hackers: of course, did not hear people call me a \3 j4 m$ r: v9 G6 \
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ; k* `8 a* P" i" O7 i" L
\!
/ L) T/ o" g# _/ r6 T white: every day you come in, do not feel tired of it? % Q9 b" b$ ^0 F2 P( F
hacker: is a pain, your machine is the worst I've ever seen in one of the : r9 }6 {$ _/ ]3 D* O! q" `) H8 n! l
white: is not it, this is Brand
7 J- }! e" f. r0 d# O7 g7 Y Hackers: I was mentally retarded in addition to your yard game machine only virus a 5 H- q. H' v9 ?' K
white: Oh ~ ~ that you see me The \. . . . Goodbye
/ I2 @% V7 J' u9 u0 @- @
; I% J$ S4 X+ I0 g hacker: Hey ~ ~ ~ I come! 9 P/ K& b6 j, l8 @7 u, r# \* A
white: not seen you for days, was my firewall blocking you?
; N) s: Y$ h4 J& u. t: n hackers: Haha, jokes, on your machine is easier than my own, not you miss me ' Y# }. g, A* `% g7 X. I2 L4 R3 |
white: I want to Please help a busy & A# E& p6 e0 j; n: c; d
hacker: What? : d3 b, x" H7 A# a# q
white: you can not modify the point into the power system data
) j- b; J  b0 T# _ hackers:. . . . . . Why do you want to! !
; z0 t( U" T8 d white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .   g/ E( H; n$ {1 l
hackers: die! !
, t# ^$ \/ \; J" ]# K. q/ l 2 n( N- i0 j7 ?+ p) R+ p
hacker: you die Where is? ! ! !
( S) Y* W% Q+ T" M  {+ Q6 j; F white:. . . . Go out and play for a few days, ah, come to me why ( _: i6 x/ |/ x) N7 \
Hacker: I'm looking for something ) J* Z9 M" b5 G8 Z' `( A
white: what I find here? - {; O( [8 v: O, C. h0 b4 Y
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights , u5 I/ ]" b& w

5 H: T( v+ c) B" j( z9 A- i most hackers : I come! !
' b! s4 C4 {  O. . . . . .
1 N1 R' D5 _* ?: i hacker: how not to speak?
. |( O$ `% P' N white: a bad mood
: p+ C2 @5 }" h' l: o0 T; G  O hackers: Who bullied you?
* \" ?. N# K, S" M& r' f9 U white: a Q No. I have not lost inside of my first love
. e/ {. |3 I2 {, ^, e: s3 ] Internet hackers: this simple, I get it for you
2 e( W0 }2 o/ o2 m8 V5 E white: do not get back
3 y6 m% N* \, b7 Q hackers: No, tell me what number?
# l, y+ _! _8 h& K0 V0 y2 i white: Woo ~ ~ ~ ~ just do not remember 9 C2 e) D! z8 w8 f

4 a' `! K% z& { white: you gave me out! ! ! !
9 d) [6 m# g% ~2 u& F hacker: how wrong? !
8 p+ |+ G; v& i0 q6 m6 b white: You are not the forum to use my ID to play it? ! !
0 P8 R& `+ I; p* Q- Q$ ?: J8 D hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
2 e2 S! o) U% R white: it does not work! ! !
9 Z5 s1 n% o3 s3 p, N hacker: how should you like? 9 u% r6 a2 r) g+ Q3 ^1 d, K  i% q
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! / M5 _8 J: E6 Q3 _
2 h! ^  D) E5 c- f4 m
hacker: Hey,ralph lauren pas cher, I did a lot of fun ; M% Z2 o7 _: [4 D( E
white: what 2 r2 S+ i: e+ H! r
hackers: I go to the forums posted the top
  q( \6 [; L7 I: C: Q9 X white: This very common ah
2 z! ~/ v; k. W5 M0 f& D4 I- r Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent # T; {3 y* i: X
white: Wow, very enjoyable, and I can never dare, will be blocked! 3 S0 _3 U- [7 L( L
Hackers: Yes, has been banned.
8 r" ]7 ]; ?6 w% i  U white: this is also fun? !
5 O- n* f6 A+ }5 f' B! c Hackers: Yes, ah, because I use your ID , U" F/ e0 d0 g% S
white: you are pro?   f! w0 f. z# }7 u9 K+ r8 F# f7 u
hackers: You can say it. 4 v/ f4 U) O% f4 V& Y; D
white: to what extent high? / f. f! v. b4 y% ?
hackers: ah, I am bored when their own 0 a3 {1 r2 d! ?! J7 E
white black: Ah, this I will! ) f. X: |2 r( v/ X/ Z" J- {
hacker :#?%! You can? ! + U1 C8 d& `5 e$ B7 R6 ?
white: Yes, ah, a black off it. . . . .
5 s4 l( H( F8 Y( A hackers: Go!
5 M  t* d. f' H, { white: Ask your question : C) i) V% I, W- E, m
hacker: says
7 F: w$ n6 ^8 k, n white: Besides me, you can also control other people's computers do ?
* O! n9 U% s! D Hackers: Yes you can. . . .
' k! J  A4 ^+ T& H white: no networking is also OK?
  F* y( f8 W4 Z9 B6 w, p hackers:. . . . . . .
+ I* O) g9 R2 K8 R  X$ Y/ ^  j/ J; l white: You can remote control to open someone else's machine it? ) _6 D5 b$ v1 `* A1 ]
hackers:. . . . . . . . & Q: J8 {$ v# ^" L
white: You can steal top-secret file it! ! !
. @( b0 ?+ }2 h  e) ^$ z/ [ hackers: I think you see more movies, go to sleep 4 \3 c, K$ E* l. l9 P( w% G, A
white wash: my computer is broken " ~3 z) D! K  l$ |/ _+ x
hackers:. . . . . . . Just checked, your computer no problem
, C. Q8 Z! X) ]  ~( B$ C white: that is, you bully me
0 t4 g, E! D- K1 T7 P hackers: No ah 7 P* `# @/ K& r9 o
white: You are! MP3 files are passed to my no images!
" u) P; h$ ?6 L( E8 w' K9 E hackers: help ah ~~~~~~~
5 C: p6 N! |( N( T6 p- ^ white: Ask a computer problems can you answer? * p; w4 s) S3 ~
Hackers: should be able to
/ f8 n" M$ @, e' v7 _5 B5 K& a3 h; T white: Which key on the keyboard the most handsome? 3 t* m  {. l  b# _9 A. D* |
hackers:. . . . . . . Do not know
$ A  E. r4 _( C! l, {& c white: of course, \!
- ?0 T3 O/ |, {8 k hackers: halo ~ ~ ~ This is a computer problem? ! ! ; ]& A7 F7 S- X
* Z" }( f  _1 }: I; q0 W
white: ask you a computer problems you can answer?
* ?" w% A& x0 M9 e, b9 K2 S5 { hackers: If the problem is not your idiot   Y- x6 O+ x8 M5 N, m# `
white: I am serious! ! You can operate my computer?
" [7 `6 @' R0 }0 J- d6 u hackers: ah,juicy couture shop, yes
! ]) Y- V1 s9 i$ D0 D/ Y white: that problem, you can solve it # x7 @8 U- b* L' R
hackers: Your question is, should not be difficult ;
4 |* y* h. Q1 i' B0 H  C" A white: Great, my fans do not seem to turn up,nike air jordan, help me change it 8 @8 e) U. }* z2 Y: N8 @& `' d7 s
a hacker:. . . . I excused
( {9 t- E/ w0 V. d  \ white: we see meet you?
7 n/ I  l/ U' @ hackers:. . . . This, not so good, why should we see 0 Q. g" J8 B, v8 H$ |/ E
white: I want to see you are not the same and I would like to 1 J+ x! a2 q0 I& p* G  f$ h
Hacker: Oh, what you think? % T# a8 h2 W. L8 d" P
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
. S/ D. T- [1 Z hackers:. . . . You say that Spider-Man, boss!
9 K! n! m4 N) p7 h hackers: Kazakhstan woven ~ ~ ~
- a0 c+ H8 I4 A7 s  G white: You called every day, is not very curious about me? . H" q, @" p2 u" E2 H
hackers: not curious, is the habit, easily came in
0 D3 i/ X6 B# n- U% F: T white: Well, I have a good way to change your habit
" g- r1 I5 T, `3 z' y# j7 D0 I8 B hacker :. . . . Oh? ! Any way
  H' M8 x1 p% u" x9 x6 X3 C white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
! B) x; Z1 y" e: |9 A hackers: Genius ah! . . . . . You can also connect to it?
' `% g3 e) e% K6 }+ e# u9 ~' l white: to ah, and slowly the hymns!
/ T+ U9 }- O1 Q& ~" O1 G white: you every day into my computer, is not very curious about me? * s$ ?# C# p* L( o
hackers: No wonder, only used
1 @! X. D0 c5 q) T6 m. s white: no you're curious about the place?
) V2 k/ p3 M& \- P+ O) Z- I hackers: a ah, I always wanted to know your machine so much as when the virus crashes % B1 O- J2 [+ S, u$ s+ c
2 O& I' C  e& d; @8 m3 A
white: I would like to control your computer / n5 O6 x7 W0 v, g/ l5 x# x
Hackers: I will not have other people access my computer I will be mad # [1 U; d2 e( E, v
white: This is not fair! ! 6 ^; R+ `/ N' {1 D+ i# p( Z# R
hackers: ah, well, you control the good of the 4 f9 E! e" z) i. p7 x; j1 m% R
white:. . . . But I will not. . . .
' x% ^& p0 o" @% e! I2 @% {. | hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 4 g  o, X* R; R! a0 D0 T7 B
Hacker: I'm white 4 N  O/ \4 M: ^5 W; {4 r
us again: This is probably the last time we met the
' m/ C) U, [5 U! ?+ g' t Hacker: Oh? What happened? 1 O3 K- i3 o0 d4 K, k
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
  w% a3 M  g* _$ u% ^6 r, m; a5 Q hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
8 J  E0 y6 b( f, ~7 i+ d white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! " B! F" l+ Z0 q# q
hackers:. . . . . . . . . .
3 f1 t* \( t' ~$ [) z hackers: so late, and how not offline? , r$ h* Q2 T0 S) \
white: Oh, is the next, and I went to pull the power
& w4 I+ c. P* y hackers: Slow! You will not shut down?   ?: `: T9 O" O) ]( d
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
' n, N3 H! p! M, E$ ? hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
. D% k2 R, d* l+ J9 S& w  g3 p white:. . . . . . I press the power to the hackers call it , p( K% D; f0 ^6 c9 d
white: You are not really powerful
0 k2 l) ~: [" {1 W4 h hackers: so-so friends . l+ X; I2 Y6 X1 e7 V7 I
white: bragging! You have the ability to shut down my machine in the horse. ! n" C7 j: Y+ Y' R
hackers: this place is difficult! You wait
% G# V+ c0 N8 U+ j6 `* w1 h hackers: Haha, buttoned regret it : O6 D, m1 H; S, G# s) j
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . . n! y+ S$ _6 w# x# T8 ^; M
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-4-5 05:32 , Processed in 0.090451 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表