 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer + @, L/ U- C9 i% F
white: how control? 0 g5 N a: E: W8 o) `! s
hackers: white with a Trojan & k8 I# k8 g1 e* C( s
:. . . . . . Where? I did not see
( I1 d* y2 P i4 d$ w1 w7 b hackers: Open your Task Manager 0 N; N$ c& s; S2 q! A
white:. . . . . . . Task Manager, where?
{2 Y4 d! n a7 g3 Q- N hackers:. . . . . Your computer below! !
3 Q# g0 A6 |1 J( d white: \; + S) i+ @5 R" F* w* y; b1 f
Hacker: I have control of your computer
( I: N0 P7 a. z$ n2 w white: Oh : I$ j3 }+ A4 Z
hackers: a funk? ! Hey $ Q0 I2 [- b# {! k0 Y
white: for the just, help me kill the virus it, many of the recent problems my Lord
2 A5 W! k* y' M/ R* n2 i machine hackers:. . . . . . - g N- z) V3 A% u& ?% l7 c1 p
' Y2 ~% s/ p6 z( Y% a
white: how do you always in my computer and out of
: V- T1 [) h5 f0 m# |7 G4 ~% t+ T casual hackers: You can install a firewall
* U7 D0 G. i; {* W& a; _ white: install a firewall, you can not access it? 7 p' S: Q9 C4 M" L/ V5 b
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah & A: h( A& C, \! ?
7 W/ d0 I1 a; N" I- O7 }: _1 J small White: I heard that you will create a \!
6 S: q5 F% _: n8 P; O0 n0 ^$ V hackers: ah 9 ?8 |# z; W0 A4 g3 i
white: you can control someone else's computer? ! ! {* U7 {3 K0 s. C" x# k
hackers: General is the 9 I; ?, q! ]% b& p c+ E
white: you can black out those sites?
9 |. s/ e. I3 ~/ } hackers: of course, did not hear people call me a \
y: C) ~2 H9 y. e8 i" h white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . e# k" ^1 |' G: z. j0 v& z
\!
6 h% g6 x/ ?- D4 B7 S) O white: every day you come in, do not feel tired of it? # F, y" `7 j4 B0 q
hacker: is a pain, your machine is the worst I've ever seen in one of the . W/ j8 H1 k S- t
white: is not it, this is Brand
& E, I# I3 a8 c. }+ z3 @ Hackers: I was mentally retarded in addition to your yard game machine only virus a 5 M/ ~7 O/ O4 J% `! O" a$ a
white: Oh ~ ~ that you see me The \. . . . Goodbye , V' J" q: n- }$ T# A6 O
% f. V# O& e4 U" X$ a: d hacker: Hey ~ ~ ~ I come!
: s# H- B, O: B, {1 T% [7 J& o white: not seen you for days, was my firewall blocking you?
g8 R" L% ?/ U$ }" l+ N3 ^ hackers: Haha, jokes, on your machine is easier than my own, not you miss me $ N2 [- X" x5 J* ^2 H C9 }( t" ~+ j
white: I want to Please help a busy " R! t% ?! u5 Y9 e: P/ G) N6 S
hacker: What? " a9 o; W) }8 }2 @3 n/ x% l5 [
white: you can not modify the point into the power system data ( e" n( `! L5 G" x7 i
hackers:. . . . . . Why do you want to! !
: J& E a8 x, E8 Y white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
8 ?/ P$ d" f* C hackers: die! !
- @+ D# H, j4 T, J) e ( `% H" ?) Q, G
hacker: you die Where is? ! ! ! , \3 R7 m9 S3 ?7 O7 A# W1 g
white:. . . . Go out and play for a few days, ah, come to me why # ]5 N# F0 i- K" n
Hacker: I'm looking for something
9 `% ]( W& f3 {3 V0 |* M white: what I find here? 8 s$ x* q, l( m6 D' A( I; |8 {
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 6 j2 L* }6 Y9 @& V1 p
( E5 Y% d8 K/ K: K: e most hackers : I come! ! 2 y3 e3 g* u \, I/ n$ m5 U4 a
. . . . . .
0 i: t' g) x, G: l# _ hacker: how not to speak?
& x5 v- A# D8 B# d+ {! K/ D white: a bad mood
F. X' S* C. o/ x, @- l hackers: Who bullied you? * @$ C" o# g9 ]2 \
white: a Q No. I have not lost inside of my first love # F8 Z$ J m4 r+ w; y
Internet hackers: this simple, I get it for you
$ W* o: C, A+ E" v white: do not get back % v$ W% t% R* ]- A& A, @1 K
hackers: No, tell me what number? 7 l6 e1 `: C$ g
white: Woo ~ ~ ~ ~ just do not remember N3 E- o! B# X- f% r( u# e
6 r) l- @" S. b3 M. w white: you gave me out! ! ! !
4 V. F) C% D/ i. f2 Q hacker: how wrong? !
; A; X: r! f. e/ g( E white: You are not the forum to use my ID to play it? ! ! . O y$ z6 k/ Z0 c5 s0 M4 Z
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 0 C& x- l' d9 v$ S
white: it does not work! ! ! 5 j; A7 D; v: F) Q5 `5 u
hacker: how should you like?
1 I0 O- i9 M4 q' j! b white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 2 G3 H0 r# D! v
. i6 h! Z ?: a$ M/ @5 h hacker: Hey,ralph lauren pas cher, I did a lot of fun
9 K6 r! p) Z5 e white: what Z2 g4 d: m, H/ X
hackers: I go to the forums posted the top - H% s$ y" n/ e% W7 C9 T" f
white: This very common ah 9 l. Q9 C4 G7 q* j% w. }1 @5 l4 F
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent " y, J0 q: k8 L* {5 ?9 d q
white: Wow, very enjoyable, and I can never dare, will be blocked!
. ~- }+ Z X, L) L Hackers: Yes, has been banned. 5 ~+ T0 x" a/ G9 B, O
white: this is also fun? ! 4 A" A3 n9 p4 _
Hackers: Yes, ah, because I use your ID ! z/ d c. ~/ D; B# R: a
white: you are pro?
3 ~5 Q1 t6 V9 e! y6 l hackers: You can say it.
/ ?: b2 t/ G* W# R. p( O white: to what extent high?
7 r, c% A }- k/ c0 h; I) b t+ { hackers: ah, I am bored when their own
1 }; G( Y M4 R3 i" p- I white black: Ah, this I will! 7 I' m# f' B5 L2 U' |# X4 C
hacker :#?%! You can? !
. y; I& I% W7 e0 K J% O white: Yes, ah, a black off it. . . . .
. o' D9 ]6 ^# B6 t) O hackers: Go! 2 d6 @, y( t+ D$ k8 Q4 h3 z
white: Ask your question
+ F' U( r) [) O" ~! ^ hacker: says
7 I! Q# p) H6 M' o: h' ? white: Besides me, you can also control other people's computers do ? 1 {( b- s$ w D8 b7 F
Hackers: Yes you can. . . .
7 v# M. w1 V# L U. ?, o! \ white: no networking is also OK? 0 O. @: j& c2 g* }: F
hackers:. . . . . . .
* j; {, Z7 |- D5 |% q white: You can remote control to open someone else's machine it? 3 R' k; T4 \* `7 l3 ~
hackers:. . . . . . . . / ^7 e, p9 M+ k: C* M( r
white: You can steal top-secret file it! ! ! 7 V& @9 v8 O3 ~: Q% [ v% w& X) i
hackers: I think you see more movies, go to sleep ' I! k6 E" c/ W5 @
white wash: my computer is broken 7 |6 U5 [8 ?7 O$ s0 k
hackers:. . . . . . . Just checked, your computer no problem ( _. x0 c; ?/ j' R
white: that is, you bully me + M. {7 f: P% s3 m* i$ r" f6 p6 N
hackers: No ah 7 B; X/ Y7 X; Y
white: You are! MP3 files are passed to my no images!
, _, j$ t1 N; `7 ?$ x t5 v) z$ _$ ] hackers: help ah ~~~~~~~
/ A- p. ]/ D' }# O& { white: Ask a computer problems can you answer? / x" }: `: Z! k6 d6 G9 q& {8 ~
Hackers: should be able to
0 g% I: `, `, r' |0 W white: Which key on the keyboard the most handsome? 5 D/ C F N( P3 P+ k0 A6 t
hackers:. . . . . . . Do not know
$ G+ R( R; z y1 T& H! k- i' w white: of course, \!
* t! V& K: P, \) P hackers: halo ~ ~ ~ This is a computer problem? ! !
' C% w" T/ D2 X
- \. F( |1 F. L& m" k4 Y white: ask you a computer problems you can answer?
# n$ d4 |/ X6 \: N6 [9 {0 Q( B hackers: If the problem is not your idiot 5 w) f3 }6 k; G9 O
white: I am serious! ! You can operate my computer? ?# [7 l4 l. C4 y' L& T
hackers: ah,juicy couture shop, yes
- g/ Y* G" m8 e5 c" y0 ~ white: that problem, you can solve it
+ S: }' |* L3 \8 h4 h9 Z9 F0 k- C hackers: Your question is, should not be difficult ;
5 w. B$ f& n9 _9 ]% C! p white: Great, my fans do not seem to turn up,nike air jordan, help me change it + B: A5 U; ~0 q( G9 f. x/ B0 f
a hacker:. . . . I excused
. e. Z5 z( q6 @: B white: we see meet you? 0 H! e( c L7 b5 F: ^4 Y
hackers:. . . . This, not so good, why should we see
9 @& X0 r; R+ z" ~7 d white: I want to see you are not the same and I would like to
]+ p7 T* Z$ t, D) R Hacker: Oh, what you think?
! p1 k6 C0 S1 I# s white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
' r* m% L; R! K hackers:. . . . You say that Spider-Man, boss!
6 T7 U, l2 e# @2 N) ]% [. P0 h hackers: Kazakhstan woven ~ ~ ~ 7 } X. u9 q0 F- A9 Y6 r' i
white: You called every day, is not very curious about me? 5 T1 r: w, F% }4 |' H6 V, g
hackers: not curious, is the habit, easily came in
@8 s5 d& t$ V3 M white: Well, I have a good way to change your habit ) H4 r; _' i8 o3 b( d. a9 w6 H8 t# c$ |
hacker :. . . . Oh? ! Any way ) {* r$ ]* @0 l4 q$ i; Q$ [* g
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
1 \: e! E+ Z% ] hackers: Genius ah! . . . . . You can also connect to it? ! _ c6 V2 e: `9 D1 H4 a
white: to ah, and slowly the hymns! $ g. G3 A% V# c8 q% W$ Q
white: you every day into my computer, is not very curious about me?
3 P2 I" m& o# R2 m" h hackers: No wonder, only used ! t/ V' N6 i7 V& A; F& V$ H. [( ^
white: no you're curious about the place? - ^% T% h5 N: }
hackers: a ah, I always wanted to know your machine so much as when the virus crashes , `# D* L# x1 g4 X4 l
# A3 g3 p4 G& |
white: I would like to control your computer 1 U) P$ a7 O; ?: R" B
Hackers: I will not have other people access my computer I will be mad
1 l6 X3 I, m# l$ ]2 t5 P white: This is not fair! ! % U2 Y* Y$ W' t7 F+ r: q
hackers: ah, well, you control the good of the
0 r( B% A* K, n; B' S white:. . . . But I will not. . . .
; F) L) v. \) @/ d hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
- u! j7 N" U' l" P0 U* h Hacker: I'm white
8 C+ \, p% c% w* C, S- T& A1 N us again: This is probably the last time we met the
9 k, {2 ]5 q8 r. i) c2 P! P Hacker: Oh? What happened? ; h# A7 F& y' Y* F2 A% G3 M
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! : O0 Z8 I& [( S
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
2 m- @# X# C# N4 y T! | white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 6 S( H8 t8 Z2 Z* t7 b) g
hackers:. . . . . . . . . .
, J% Q) ^' x( w5 `( W hackers: so late, and how not offline?
/ F4 J$ }* \/ N/ [- Q+ I4 }0 K white: Oh, is the next, and I went to pull the power
8 g& \) z1 R7 |9 m p, X hackers: Slow! You will not shut down?
2 @! y& n' d4 \) y$ I% X3 v white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 7 o. h6 U. c: f' S0 R
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
( y5 e6 z8 g; b( L6 b' R white:. . . . . . I press the power to the hackers call it 2 D( k7 J+ y. B9 e2 L# w) u
white: You are not really powerful ; ~5 E& k9 V1 L/ d- o6 N
hackers: so-so friends & j; l1 g! o5 \! E/ F6 I
white: bragging! You have the ability to shut down my machine in the horse. . p$ D* r' ~. {; M. r+ i
hackers: this place is difficult! You wait 9 h8 x5 o% I7 m W
hackers: Haha, buttoned regret it # B$ Y5 b, t+ x; i$ ~
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ! i) T5 |/ o7 P' I: q3 X
hackers: halo ~ ~ ~ ~ |
|