埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 650|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer 1 ^( P& @$ e7 M, J+ N  @. V
white: how control?
9 ~9 P4 \- n0 H2 d hackers: white with a Trojan
: a( M. H" g0 i7 \- D9 S' m:. . . . . . Where? I did not see 4 m# [+ f0 D$ X3 C$ G% y
hackers: Open your Task Manager
0 M2 ]4 ^( k" X! H& G  c8 G1 F0 y white:. . . . . . . Task Manager, where?
. g) X9 }$ m# l; _ hackers:. . . . . Your computer below! ! 8 p# o' X6 {  E% `2 I
white: \; 1 A5 O" Y. `2 i0 f, R  m
Hacker: I have control of your computer   |% S) K4 P* q+ T" c# @
white: Oh
$ w$ R# n2 k% T0 S hackers: a funk? ! Hey
; @# N' z/ p4 i6 p/ o: _7 U5 h# m white: for the just, help me kill the virus it, many of the recent problems my Lord 7 |/ Q0 h& ^( P+ T" J
machine hackers:. . . . . .
0 g) y* J! {* T
3 G# q- {) V: f# M5 H. A white: how do you always in my computer and out of
$ w7 F" n9 c& O0 e casual hackers: You can install a firewall . R5 c/ t& K  V
white: install a firewall, you can not access it? 1 h# T1 |9 q# ~
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
9 V1 P" X. ]* _9 R ( ?) ~* b  `1 q9 e! ]0 s
small White: I heard that you will create a \!
8 @% j2 D. R4 [# s+ I) s hackers: ah 4 o7 \# ?+ {8 L8 p0 o
white: you can control someone else's computer? !
  Y* h6 s! i9 S4 ? hackers: General is the   O) ?2 f3 y, h
white: you can black out those sites?
. L) [. }" `) W hackers: of course, did not hear people call me a \
. x; d6 E$ I! R" S6 o white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 6 g: K1 W7 c- h$ X$ F& B
\! - k1 T9 {" E- [/ U+ _& ]
white: every day you come in, do not feel tired of it?
( E; m3 C6 x; x% T6 B; _* j hacker: is a pain, your machine is the worst I've ever seen in one of the 1 ?9 C$ A: o; D( f$ G
white: is not it, this is Brand ) P% M9 r* c; K% S
Hackers: I was mentally retarded in addition to your yard game machine only virus a
. [( p! I# I' c- K8 H% c white: Oh ~ ~ that you see me The \. . . . Goodbye 7 b0 x* c9 i' S' W* C4 U
7 p8 Y9 W* @" Q- ^6 H
hacker: Hey ~ ~ ~ I come!
" [+ c4 q- |- K# u. n! n: Z white: not seen you for days, was my firewall blocking you? - N! w) ?5 j% D; l$ l
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
4 |7 N: A6 C! q, G/ Z* ` white: I want to Please help a busy
- ~" g1 p8 u. q+ X8 d hacker: What?
& i# L# G8 X5 q) q white: you can not modify the point into the power system data - Q( ^8 s+ I: y. V" o4 n
hackers:. . . . . . Why do you want to! ! - W9 s0 L: {, P, U
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 8 E& w+ u& M! n% K& @! _# `) ]& Y
hackers: die! !
" _; [* P  D4 c6 J , W  l! a. f: `- d  {3 U2 ~2 t* L
hacker: you die Where is? ! ! ! 0 N/ k/ d: J5 Z! f% q
white:. . . . Go out and play for a few days, ah, come to me why " W' p4 K; e1 P3 I+ C
Hacker: I'm looking for something
: R: z3 P* T1 B( B* i$ V" R7 P( V white: what I find here?
" O8 a6 d6 w" y. I hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ' q8 m! V* q# H% n- `' Z

2 j! R4 [; j  x! t; ?8 C, t most hackers : I come! ! ) W' Z- F4 o) o
. . . . . .
3 i. e, a: ?; X& h hacker: how not to speak?
4 G4 T4 W2 v+ K, h, ?, T white: a bad mood
2 q4 Y6 d* n& Y' f hackers: Who bullied you?
, d, O" b. J4 U/ ^0 \( m white: a Q No. I have not lost inside of my first love
9 Z, G- Z  F: {4 O; H' \9 F Internet hackers: this simple, I get it for you 9 b7 k6 H, I, _7 b  b' u9 v
white: do not get back 9 `  p, y4 a2 l9 G2 e
hackers: No, tell me what number? 7 H2 `8 P& M/ k' L
white: Woo ~ ~ ~ ~ just do not remember 4 Q& t0 ^# f; H, s" I; o$ ]0 S
. v* Q) ]/ a2 Y6 h8 }/ S( N/ l
white: you gave me out! ! ! ! 1 E8 Q# |+ o" Z5 g$ f% y4 d
hacker: how wrong? ! + {7 A/ x; ^3 |6 S& \
white: You are not the forum to use my ID to play it? ! ! 7 ~+ R6 j7 g, @% f( G9 t
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the " m5 x" `  k' ~" D# _
white: it does not work! ! !
; a$ J% S0 j  D- e hacker: how should you like? & ~& ^% O/ P; r5 G, v- h
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
' f  a4 i) a: Z# z: Y, v; Q- M9 \
8 U4 ]; c  {7 L hacker: Hey,ralph lauren pas cher, I did a lot of fun
' ~4 g* ^& C/ B# B5 u9 { white: what / C6 v1 R: C. B( n
hackers: I go to the forums posted the top
7 ~* c- c9 V! ~' A& e white: This very common ah / B$ h. {+ S  ^5 A3 y/ c) Y3 `
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 4 W' T+ U2 s4 S6 L% a
white: Wow, very enjoyable, and I can never dare, will be blocked!
! c7 s6 p# i+ G% L! e9 n$ R Hackers: Yes, has been banned.
2 a8 v( F% [! }: A white: this is also fun? ! 6 Z& K) V6 F9 }1 z, T5 q
Hackers: Yes, ah, because I use your ID , S; {! ]4 j. W/ z
white: you are pro?
1 W2 @0 T2 {* Q' `" d8 n hackers: You can say it. 8 U3 t' ]2 {. G- F
white: to what extent high? 4 ?* M  e& v; V8 r- J  V3 }0 P& a
hackers: ah, I am bored when their own ' d  z6 {0 ]8 O- d
white black: Ah, this I will! ; \" K8 E$ h5 M, c* {9 L6 p7 ]
hacker :#?%! You can? !
- d4 L& F0 F8 ~2 b! f white: Yes, ah, a black off it. . . . .
$ i+ p) J/ m  T8 [' V hackers: Go! $ p  D2 ?7 ~- S' ]& k
white: Ask your question 4 q, C& L! B/ W- b3 D
hacker: says 7 w4 ^9 N7 E& Q5 b8 s
white: Besides me, you can also control other people's computers do ?
- R9 B  L, p& y6 F# |6 [, ? Hackers: Yes you can. . . .
4 `4 \8 K* G3 m8 o1 R white: no networking is also OK? & f5 \* t6 ]6 f# Q9 U
hackers:. . . . . . . 6 R6 r/ s: ^: h' c# `/ N0 w
white: You can remote control to open someone else's machine it?
) a' v2 P" I& I hackers:. . . . . . . . 6 q3 n% r3 f. [* P, q2 s4 ~/ W9 q2 K
white: You can steal top-secret file it! ! !
/ [' u+ I1 c. }$ _4 \  t( j hackers: I think you see more movies, go to sleep ; L) U- r, O8 P4 s4 V0 O) F
white wash: my computer is broken 7 |- P6 j* o( [& g5 i
hackers:. . . . . . . Just checked, your computer no problem
) z; f. ^  P( K9 I# S( d white: that is, you bully me 9 V1 j" c* \& B6 n+ V
hackers: No ah
- r. o: W$ V3 X- M! a" o! z white: You are! MP3 files are passed to my no images!
9 h7 W# G4 w  x9 O, {6 c hackers: help ah ~~~~~~~ 5 X0 g. D' T9 G0 _
white: Ask a computer problems can you answer? # A' J3 e! S7 C
Hackers: should be able to   L, m4 I/ r8 @# [
white: Which key on the keyboard the most handsome? 5 v1 p0 T" R6 t5 A$ k  G; {
hackers:. . . . . . . Do not know 3 X4 q8 S2 o# l4 M3 P# P# |; r
white: of course, \! 6 |- n) c& U- r, [7 [. }5 o5 X
hackers: halo ~ ~ ~ This is a computer problem? ! !
& @3 H6 b! H" v: A% j% F6 } 3 s) W1 i+ X- R' e
white: ask you a computer problems you can answer? 9 i# S" v6 S: M! L
hackers: If the problem is not your idiot ' l3 o  U5 I9 Y( D. y
white: I am serious! ! You can operate my computer?
. \5 M. Y, c2 C" x5 b1 N) H% Z hackers: ah,juicy couture shop, yes
6 ~, B  X1 U/ ?* a4 Y white: that problem, you can solve it
7 E( j0 t( v( j! I; u hackers: Your question is, should not be difficult ; 6 @' Q& u) u" y9 G" |/ E% k- {# u
white: Great, my fans do not seem to turn up,nike air jordan, help me change it $ W( ]# h) w& V: I# K
a hacker:. . . . I excused
: J. h( [  t/ k) a! {% h# D white: we see meet you?
. m  D4 J, o% G6 Y/ | hackers:. . . . This, not so good, why should we see
1 O/ i. u2 w9 e' P* _! n( R% y white: I want to see you are not the same and I would like to - h2 ^! L' W' s
Hacker: Oh, what you think? ) w. _! V- E& m; `, }: b) Q" n
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 3 a5 i6 V( Q  _0 k, C* _' h5 N
hackers:. . . . You say that Spider-Man, boss! ' q5 d0 O2 _4 {# s
hackers: Kazakhstan woven ~ ~ ~ % V- n9 j9 a8 l- r6 l) d5 d5 {/ y
white: You called every day, is not very curious about me? ) h5 m5 A+ |2 M" E# U, O
hackers: not curious, is the habit, easily came in
) L4 s$ v. R8 F) Q/ A white: Well, I have a good way to change your habit 3 j, o' N) y5 A6 U+ X  T) U
hacker :. . . . Oh? ! Any way   I5 i3 _1 H" Y* k3 f% B
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ - _3 E6 r  ~" ]( X$ d5 J& H- ]
hackers: Genius ah! . . . . . You can also connect to it?
! C  o. R9 w, Q' @0 b& Y# ~ white: to ah, and slowly the hymns!
1 p/ A/ _7 ?( ]; f: h  ` white: you every day into my computer, is not very curious about me? % m2 t+ P9 i2 t. @  m
hackers: No wonder, only used
! h9 B. @9 {- z9 i& j) `0 } white: no you're curious about the place? : j; l0 u5 f. E/ l7 R" j
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
, h/ w8 N5 \0 h; w
7 q! y5 t1 a9 r# S2 O white: I would like to control your computer
, t1 k2 Q; C* j; w8 Z. L$ t Hackers: I will not have other people access my computer I will be mad 3 f0 f' D2 s" t: J4 _" y
white: This is not fair! ! $ j" I8 w4 P6 ?" _- D* a
hackers: ah, well, you control the good of the & R) C7 M) A" o2 C: J
white:. . . . But I will not. . . .
% i9 n: T, ^0 r) r$ i; b0 Z hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
% c4 u9 T/ e# M  U- H( U Hacker: I'm white 3 t5 t& @+ t* B  g8 M( ]5 J$ x1 {, ^
us again: This is probably the last time we met the
3 ~3 \, L" A% m* U Hacker: Oh? What happened?
% \" m! k8 n* X white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
1 k, ]! Y+ t) k* S9 O hackers: You are so tired of me. . . . . Well, since I do not come, goodbye % L! }& c! i& H+ x$ ]/ ~* h
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!   L1 K4 V0 S2 P5 \
hackers:. . . . . . . . . .
4 P, t5 r& Y$ V6 ?. H hackers: so late, and how not offline? ! O0 J1 v) k! A7 i! A5 @9 @
white: Oh, is the next, and I went to pull the power 3 A8 ?- X. f. a" Q' v" ?
hackers: Slow! You will not shut down? ( G: P' _, [% @" @, B4 S
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
, R8 X% Z* s- k8 E, r% f; d4 [ hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
( M: |% V$ x3 T* Y+ n6 r/ e white:. . . . . . I press the power to the hackers call it
( J/ r6 I: K2 |. c( Q% g white: You are not really powerful
( D* \. c) A3 `$ Y7 a3 d; }: Y hackers: so-so friends " j  w) J; j; ]* p
white: bragging! You have the ability to shut down my machine in the horse.
. ^' s/ }  G; g" u3 f hackers: this place is difficult! You wait
" l3 H, t" N$ Q7 K  v3 w$ v! q( \6 }  {, l hackers: Haha, buttoned regret it . _; j0 D% B0 e& f5 g! ]9 i
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
5 C9 W- c2 z5 P0 l hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-9-17 15:46 , Processed in 0.104743 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表