 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 0 j9 n/ g: |0 H ^
white: how control?
* {* U- d8 S% z7 l hackers: white with a Trojan - R4 z( s* D/ _
:. . . . . . Where? I did not see 4 S* Z6 M6 Y+ ~! }' ]
hackers: Open your Task Manager
/ H7 e. F5 {/ N/ k, c9 v white:. . . . . . . Task Manager, where? ' m' n3 T4 g: Y& d# U: \
hackers:. . . . . Your computer below! !
& H% q( d/ L9 D0 g1 S/ {5 a0 S white: \;
) l( I; m5 y; c" x7 @5 y Hacker: I have control of your computer
0 W: ?1 t1 w7 g3 Z) |% D6 C/ ~( K white: Oh # B7 e2 Q* ^4 u+ Y5 X* M! |* O) `
hackers: a funk? ! Hey
9 Q3 O% [8 N* g# h8 \1 T' B( Q white: for the just, help me kill the virus it, many of the recent problems my Lord
8 E! H+ i% M8 W- D: V machine hackers:. . . . . .
y6 G1 T; r5 E1 T 8 ~2 w0 Q& P d7 r# L7 R1 s8 R
white: how do you always in my computer and out of
4 L g# f; u; y3 d( a casual hackers: You can install a firewall
3 H# ]5 W8 W/ z white: install a firewall, you can not access it? 4 Y6 _9 Q U T! q! w# \
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 2 }' J+ ?9 B4 _3 i x
3 e0 t" M0 ?( s& g7 ]6 j& W: D small White: I heard that you will create a \!
& s8 ^( u( r: V { hackers: ah 3 q7 A. U E7 q1 g2 H! P+ a
white: you can control someone else's computer? ! 5 k) T% s1 c' } o' o, k
hackers: General is the
& \, L' _' P8 T7 U4 G' a white: you can black out those sites? 9 L# b! j# J! t% [
hackers: of course, did not hear people call me a \# T1 N, t4 \. a) [* W) K# S$ W
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
u! m: e) I h' v; k5 r \! ; D: @: w! H* w% X% j- k8 g; n3 o
white: every day you come in, do not feel tired of it? 9 _7 m, Z/ y% |9 X' F5 V H% h
hacker: is a pain, your machine is the worst I've ever seen in one of the
, H! I0 c7 z4 l Q$ o$ W5 r white: is not it, this is Brand
2 g$ V% N, P. G. F/ o Hackers: I was mentally retarded in addition to your yard game machine only virus a
& M. W8 V) L$ Q6 Q( A white: Oh ~ ~ that you see me The \. . . . Goodbye " ^: E# B" x3 X$ W/ e6 J" ]
0 F1 |4 ~5 i$ A& X8 I hacker: Hey ~ ~ ~ I come!
j0 o8 q/ e% N5 d% Z2 Z4 g white: not seen you for days, was my firewall blocking you? $ V5 h* T0 n& b3 C. A7 \
hackers: Haha, jokes, on your machine is easier than my own, not you miss me : u9 E# W; z# M' I% ^3 x4 x
white: I want to Please help a busy
" q' ` O6 c6 n9 v* h9 ^$ M hacker: What?
- \. T" v. G& T, x+ r1 q" H white: you can not modify the point into the power system data
( |; h' p' ^4 L$ H9 o8 b hackers:. . . . . . Why do you want to! ! ; ^0 i4 l/ a) N: c4 o1 U+ e, p0 J1 ]8 v
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
& `0 W7 G( Q$ k' J4 N8 r: d( O0 y hackers: die! ! $ v. Z; S+ j0 R# r3 \: u
/ ~& Q0 I5 z% i
hacker: you die Where is? ! ! ! 5 M% t& x! Y3 b- Z
white:. . . . Go out and play for a few days, ah, come to me why
^1 r P0 m( i7 \0 ~; g1 W) {! |) L Hacker: I'm looking for something # m9 {9 ~( K; I' R3 v! T7 z o
white: what I find here? , H) w T2 M# R, u' X
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights : D# r/ H ~$ ?* ?
6 \: b) {: F- w& S9 ~8 d4 R& J
most hackers : I come! !
8 s h6 U3 u( U+ E. . . . . . " P% {/ L! s1 h. a% m) |$ [
hacker: how not to speak?
$ L' m( L. Q( y. m" _2 d( ~ white: a bad mood 1 D, Z. v9 c* C1 d
hackers: Who bullied you?
! b n4 U9 J* Y: G8 M white: a Q No. I have not lost inside of my first love
+ ?( e* _6 T8 m; ]' A o Internet hackers: this simple, I get it for you
. M" P3 W J8 \4 _6 {1 D) P3 K/ e% Q white: do not get back ( B1 G2 c8 G6 c K( d. Q
hackers: No, tell me what number?
. v: A$ Y8 I3 u y" k' P* f white: Woo ~ ~ ~ ~ just do not remember 0 ^% Z( E' c# h
5 R5 e4 \1 `; F
white: you gave me out! ! ! !
9 w3 z$ H. ^/ W& ? hacker: how wrong? ! 6 _4 S w+ _& N1 R8 s
white: You are not the forum to use my ID to play it? ! ! + S/ m% e6 S d- P2 c
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ; }4 |8 l) X( j$ N
white: it does not work! ! !
! P' `' ?9 v' J# e; w/ i5 j3 A3 i hacker: how should you like? # j$ W5 }1 T' `4 j+ u
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ' `% E/ O$ D2 t# c, e+ _
3 g+ _( t( s" c' ]$ y# D- Y
hacker: Hey,ralph lauren pas cher, I did a lot of fun
7 l6 W3 s% A/ }- c7 i" A# o% u white: what
7 e: x) u: }* h0 R hackers: I go to the forums posted the top 2 h0 K) U3 J) Q
white: This very common ah
. Z9 f7 W- T( R3 U Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
# o( r) a* `3 f: R5 @3 y white: Wow, very enjoyable, and I can never dare, will be blocked! ! G$ O0 r: F8 B2 w1 S7 o# n' Z
Hackers: Yes, has been banned.
; s# I* s; a. t/ ` white: this is also fun? ! + w( E% \$ P! \9 P0 S
Hackers: Yes, ah, because I use your ID 4 j* |2 `& \; s& N
white: you are pro?
" a; R5 @3 p3 [2 |" B hackers: You can say it.
3 P1 r$ T/ ?; Z6 l white: to what extent high?
# E. e# S5 n) E8 n" e2 O hackers: ah, I am bored when their own 1 D7 G" x! c* ^6 T+ i8 i9 g4 i
white black: Ah, this I will!
; ^ M: z: j& L- E+ ^ hacker :#?%! You can? !
, O# U6 U* H; i0 s! Q2 ]1 B' K7 O white: Yes, ah, a black off it. . . . . 4 f4 \! v a' I
hackers: Go!
`2 L4 | I, K9 s6 [ white: Ask your question
; z5 ^' h) I6 O. L8 [/ v1 p hacker: says
U' d9 m# w/ m1 q8 H) e+ ~7 T white: Besides me, you can also control other people's computers do ? 5 e: R q" @, u7 {) H: U2 N
Hackers: Yes you can. . . . 3 j7 |6 t0 M2 p
white: no networking is also OK?
! X/ O8 f7 W3 j hackers:. . . . . . . 2 t5 v3 ]9 E7 U# z. s4 l
white: You can remote control to open someone else's machine it?
1 s, A0 `0 F/ p; S$ O hackers:. . . . . . . . ' F# |( U+ p8 H( v
white: You can steal top-secret file it! ! !
7 d" F+ m2 B4 J& S) D hackers: I think you see more movies, go to sleep
3 L3 _, D9 o7 c% D white wash: my computer is broken
, M _ L/ A0 Q2 e: }4 L3 e hackers:. . . . . . . Just checked, your computer no problem
. } s# E1 `; T( C3 U white: that is, you bully me
) _$ k& d S6 q8 Z' w; w* L: f hackers: No ah
_/ t G9 N3 Q q4 @ white: You are! MP3 files are passed to my no images!
* Z) M% u0 Y3 t0 H" K9 t4 o% ]4 @ hackers: help ah ~~~~~~~
, B& R& [+ \- B/ B' y/ l' P white: Ask a computer problems can you answer?
+ c/ f W* q5 b5 R* H Hackers: should be able to ! R2 t; @/ {0 m8 V* v+ N, b8 }' Z
white: Which key on the keyboard the most handsome? " Z& U6 E* o0 @2 ?# G
hackers:. . . . . . . Do not know % i& d) N& B# E& Z4 I# e
white: of course, \!
~& e- V* V2 ^1 t3 i6 r3 P% h5 O hackers: halo ~ ~ ~ This is a computer problem? ! ! 6 o; F P- K) C# c/ u, ]' G% J0 g" L" ^
, a3 @/ Z( {0 n6 o# P- w
white: ask you a computer problems you can answer? / b R4 Q c" t# O
hackers: If the problem is not your idiot S( {- T/ k" E! F, U. F" I% L7 E
white: I am serious! ! You can operate my computer? 5 L' t9 j* p, A
hackers: ah,juicy couture shop, yes ' H4 `3 N G" q- b( w/ j
white: that problem, you can solve it 2 Y1 g9 O7 p- j8 t
hackers: Your question is, should not be difficult ; & Z' N# P9 S6 d! m* o1 P1 E
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 J& n% i4 V; y1 m; ]7 h a hacker:. . . . I excused
' ]7 `% q9 [: @! q6 H8 @% }. M white: we see meet you? ) _9 W! e4 T& N& Q
hackers:. . . . This, not so good, why should we see
5 y" _, t l, v$ h/ | white: I want to see you are not the same and I would like to " a" i( d( G/ j
Hacker: Oh, what you think?
- g/ L* o& d3 G white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
( U, S6 O( r' k- Q9 q9 y9 X2 \ hackers:. . . . You say that Spider-Man, boss! - y, ]6 }4 \; P9 u
hackers: Kazakhstan woven ~ ~ ~ & `0 _; s- t4 m) h$ U
white: You called every day, is not very curious about me?
: m0 D. z- j' D' b hackers: not curious, is the habit, easily came in ; `* z9 I5 g" |4 N1 Z# r2 i
white: Well, I have a good way to change your habit
5 W) p1 T$ i* D1 J' e. ~ hacker :. . . . Oh? ! Any way
" V( I$ J- x' C$ H- f. M white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ + z; r1 z' T, I, X- H! l2 G5 D+ r
hackers: Genius ah! . . . . . You can also connect to it?
$ w! m7 c9 T7 X! i# c0 p7 G white: to ah, and slowly the hymns!
$ v; y2 ~4 `, u2 s/ ^( y white: you every day into my computer, is not very curious about me? 6 ~- t2 x0 i: C0 Z9 N7 P* m5 Y
hackers: No wonder, only used 7 p' W4 A4 Y9 L \: e
white: no you're curious about the place?
" j9 Q" A5 i u/ y; P. w hackers: a ah, I always wanted to know your machine so much as when the virus crashes 1 e1 _ T2 k2 G0 V
& q( K# v5 n7 N
white: I would like to control your computer
4 ?9 O; M! ?& Q7 T$ W& d/ I Hackers: I will not have other people access my computer I will be mad
" | \7 s/ m( N9 U8 |9 C white: This is not fair! !
; Q$ A& o/ E# {* j, u1 u hackers: ah, well, you control the good of the `. ^9 I& Q+ ]$ Q
white:. . . . But I will not. . . . . l3 `2 `: V: B' X5 S9 B, u7 n
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
/ J) r; E- A! l8 E5 ~' B7 E Hacker: I'm white
% s8 ^! y& y- z2 R+ U* t us again: This is probably the last time we met the
- [# Y# ]5 s+ x. ~# ^ Hacker: Oh? What happened? 7 S0 a& v8 T( W
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
3 L2 Q! R D, H* k* q hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 8 `$ v; F; B$ F( k; |& p. }+ k& o( w
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 6 R9 F% B# ^& l% Q2 g5 }
hackers:. . . . . . . . . .
" F8 O7 a2 v5 F hackers: so late, and how not offline? + R; a* u* n, X: C
white: Oh, is the next, and I went to pull the power
' `9 n& `. ]- [" x4 X5 C, @3 U hackers: Slow! You will not shut down? 9 w) Z3 X% d2 Z0 q+ O/ ]% w5 H
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power , y- G2 D. R3 q1 v
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& }6 j! K+ m% ^% D( Q
white:. . . . . . I press the power to the hackers call it
( R# O8 S" k& ?7 W2 n) z0 S7 X white: You are not really powerful
: R" Y) E( ]' K6 i! K3 l hackers: so-so friends + H) @ W/ g% r+ x3 K C h
white: bragging! You have the ability to shut down my machine in the horse. 2 F. `" } k' g0 a/ g; B
hackers: this place is difficult! You wait & {8 Y- x7 i$ j# T1 Q5 s( @
hackers: Haha, buttoned regret it
' w$ |0 j2 `. O1 _& J* f- M8 z$ T& a white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . : b$ S) |: M' ]7 U: T2 t# v3 t" m
hackers: halo ~ ~ ~ ~ |
|