 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer % D7 g0 E3 u7 L
white: how control? ; O7 ^3 s" s4 x
hackers: white with a Trojan
4 i, f+ g+ l& Y0 x# R: i:. . . . . . Where? I did not see + X8 g# e+ H6 Q8 m3 K. Q3 y0 N
hackers: Open your Task Manager # W3 P, `9 ^$ ^; c; G
white:. . . . . . . Task Manager, where? % m! l% N" A" ? D4 F
hackers:. . . . . Your computer below! !
5 g9 c4 w0 |5 C8 ]" A white: \; 9 V" N$ k2 |4 c4 i9 z
Hacker: I have control of your computer + |) C% D- X8 O' P* U& [
white: Oh
4 w: A9 w- g/ U8 D; _( o hackers: a funk? ! Hey 7 X* @9 W" N q7 R. `
white: for the just, help me kill the virus it, many of the recent problems my Lord
( M% @8 ]! M Q) f; ]3 R& ^ machine hackers:. . . . . . " o3 c. Y' C \* M
% W# v3 A- B( v: J
white: how do you always in my computer and out of , j& ~% [1 \/ Q9 }" d& h
casual hackers: You can install a firewall 8 Y" ]6 s% d8 z# q( E# ^7 g
white: install a firewall, you can not access it? 2 Y# R P; X6 p
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah # X- t8 P# J' [( ^6 |: S
% T' ]5 l; w2 T) f( Z
small White: I heard that you will create a \!
8 B/ T' a2 S5 \ hackers: ah
3 P8 o4 b+ s/ E q white: you can control someone else's computer? ! # P& e8 y9 C& E) i( ~5 r( L
hackers: General is the
# ?9 w6 ~! ]6 v5 } white: you can black out those sites?
; \. u0 y+ e! m" l/ i# H3 P+ x hackers: of course, did not hear people call me a \
" F1 L S1 i/ E) n white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . + T3 ^8 I6 e" |" v, p" Y, `# ^- r! |, l
\! : v1 X% n9 Y' |1 ]( _# K2 ^# I
white: every day you come in, do not feel tired of it? ' ]& G# o3 k8 G2 n4 o V
hacker: is a pain, your machine is the worst I've ever seen in one of the 2 Z4 W0 a+ d9 z7 F
white: is not it, this is Brand ) u- [( B0 w# r
Hackers: I was mentally retarded in addition to your yard game machine only virus a % y6 O; n1 {" t" e7 y& _$ w
white: Oh ~ ~ that you see me The \. . . . Goodbye
2 q( A ~! `( m. W8 ]5 J 6 q' E1 ^3 F5 l- `0 ]2 i
hacker: Hey ~ ~ ~ I come! & }1 \/ L8 ^! k. w5 b2 h
white: not seen you for days, was my firewall blocking you? ' X. h! l I# Q: l A& A x% I
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
6 v0 y z/ S; f1 Z1 X1 A2 p white: I want to Please help a busy
, |1 S' N! K! {* c7 C. z4 T3 [ hacker: What? - L, j" V: ^6 C. u6 \
white: you can not modify the point into the power system data ! _+ {, T; V$ u5 [0 G. f: a
hackers:. . . . . . Why do you want to! ! 4 }% S8 Z; ~( g+ I7 h M. k
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . , u% I' R5 s+ y' @) x3 f$ b3 m0 `
hackers: die! !
# T# E0 J4 N1 }6 w; I & F+ b; `9 j, e0 q0 t
hacker: you die Where is? ! ! !
# |, Q( o- a G/ I white:. . . . Go out and play for a few days, ah, come to me why
' B W: `# t1 S Hacker: I'm looking for something 8 m* y2 Z2 R' d
white: what I find here?
, W7 Y+ g3 ]: E" w5 W hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 5 ]/ r$ ^9 b$ {# S" E8 ^
( f, t8 q% G' R4 { most hackers : I come! !
. u: H2 f* x. Q5 x9 b# Z1 y0 N. . . . . . 6 u" \8 A/ b2 _( F" ?# ?
hacker: how not to speak? - o7 C G% g5 t$ L) h7 S# O- ]) A
white: a bad mood 3 K: }9 y+ k, b. _. ]4 D4 Q+ H- p
hackers: Who bullied you?
, E" b0 u! g) B. l) A0 r8 C5 a white: a Q No. I have not lost inside of my first love 2 T* f/ w) w* h4 a5 [
Internet hackers: this simple, I get it for you # x) v7 x# T( X P1 H4 ~7 T
white: do not get back Z/ P) c# x. U* y8 ]
hackers: No, tell me what number?
) a# J4 U$ H/ {3 }* S5 R; u white: Woo ~ ~ ~ ~ just do not remember 5 C3 ^' P# }7 y _, ~
; I- S' [8 m0 A4 M$ o9 H# P; @
white: you gave me out! ! ! !
5 f8 T$ @- z9 f+ }: v hacker: how wrong? !
! K& W1 e- P) G5 k& P+ g7 w( X white: You are not the forum to use my ID to play it? ! ! & b2 v: i9 g* Z$ `- l7 n& T
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ) e# i+ [) a% s
white: it does not work! ! !
( R8 o" T/ ^- P. W' M& F hacker: how should you like? 6 C- e9 e( [- T5 `( b
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
. D; d& I5 d# }8 k1 e2 z " W# O& k% O3 I
hacker: Hey,ralph lauren pas cher, I did a lot of fun " [* g! D, L4 v$ ?2 f7 y& a& Z
white: what + z2 h; b$ N! V ^5 W2 p- V
hackers: I go to the forums posted the top
! C7 v/ Y% E3 h" L* w white: This very common ah
5 o% ]# o' d8 H! A Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent * R9 z2 T8 P8 E' Z; Z
white: Wow, very enjoyable, and I can never dare, will be blocked!
/ D& ]1 D) }5 [9 r- p5 g7 x Hackers: Yes, has been banned. " c% ?2 s+ Y- h2 ]* @% `/ R
white: this is also fun? ! - q2 Y8 y- Q' _6 _" N8 y0 l
Hackers: Yes, ah, because I use your ID
- d! R/ G- V9 d j4 U- L' N3 {7 ~ white: you are pro? 9 a- P- ]( Z% y$ w. P
hackers: You can say it. " u, U3 G' q: _- x R5 }
white: to what extent high?
; n2 B7 i$ c. a- K* ` hackers: ah, I am bored when their own , X- v/ R6 \: Y7 R4 }; Q
white black: Ah, this I will! 0 ~9 W) F+ |, g
hacker :#?%! You can? !
+ s$ i1 M9 @# d- c% X& ^! m white: Yes, ah, a black off it. . . . . , U- x$ a% f/ d: X9 f6 j
hackers: Go! " \1 v5 y" `' v8 T9 s9 M( \
white: Ask your question 9 x; S: s) [0 u* B5 A
hacker: says : O u! ~5 w( F+ A6 d
white: Besides me, you can also control other people's computers do ?
7 \: M* C3 l- b6 n9 A) D+ C Hackers: Yes you can. . . . " X4 r v; r9 `+ h+ ~
white: no networking is also OK? ( v) |+ R& Q* c; K* ~
hackers:. . . . . . .
' C' H$ W# q, |8 O8 { white: You can remote control to open someone else's machine it?
- a0 V" |" G( X4 L! t! V- n3 d hackers:. . . . . . . . & J' Y+ s5 k% t. Q9 ^1 `& Z
white: You can steal top-secret file it! ! ! 2 F/ \% K# y) k" N
hackers: I think you see more movies, go to sleep {6 L7 b3 V& a
white wash: my computer is broken
) p+ _1 w! X$ W+ Z1 C' ] hackers:. . . . . . . Just checked, your computer no problem 4 p6 N# t6 |8 G% s m
white: that is, you bully me
$ @+ p8 g& s5 o/ [; w$ e hackers: No ah
8 Z( r7 _- L9 v% t1 M+ ~8 R2 ] white: You are! MP3 files are passed to my no images! 3 o3 k3 G) A; {# a" s# X! |
hackers: help ah ~~~~~~~ & e5 O( I6 a, F, W- F
white: Ask a computer problems can you answer?
/ }! |* [4 t x/ F Hackers: should be able to
# L5 B( E2 x- Z7 r3 m5 Q1 Z9 T white: Which key on the keyboard the most handsome? + n9 F: P; W; T2 y9 w+ r+ }
hackers:. . . . . . . Do not know
* a1 e( l3 x8 m) Q. ^ white: of course, \! # j0 G: f6 }: A ~, i
hackers: halo ~ ~ ~ This is a computer problem? ! !
3 a2 A' V5 { a" A4 ] 2 ]+ y& T( T( n
white: ask you a computer problems you can answer?
% V6 i d, ^ w5 ]4 v/ k' l1 x% g! q hackers: If the problem is not your idiot + w# S/ w$ G9 ^ _
white: I am serious! ! You can operate my computer?
4 O4 i) v! j8 h; Q hackers: ah,juicy couture shop, yes ' U: A, @+ M5 r
white: that problem, you can solve it Q- o- } B1 {% j& C) u
hackers: Your question is, should not be difficult ;
+ j$ ^1 n1 x, s5 F& T M6 Y9 p white: Great, my fans do not seem to turn up,nike air jordan, help me change it
$ m. I0 a r5 x a hacker:. . . . I excused
8 {7 S/ f: J9 Q1 u% s5 P$ Z white: we see meet you?
- m/ y9 A; S% v" w$ t) A/ v hackers:. . . . This, not so good, why should we see
U( m. o) G$ ^/ v' C1 O+ U white: I want to see you are not the same and I would like to
2 y$ d/ E% M/ t7 T Hacker: Oh, what you think? . c0 f1 ^( q/ I
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 8 @& x, l7 x- j# m0 I4 {
hackers:. . . . You say that Spider-Man, boss! }3 \+ h. _+ o5 Q; Q2 b
hackers: Kazakhstan woven ~ ~ ~ 1 X* P9 d; }3 ^8 \3 K, f, ^4 R
white: You called every day, is not very curious about me? 9 V) l$ ^$ N) y! \( _, A5 \0 E
hackers: not curious, is the habit, easily came in 8 B1 I, O( b1 |! i/ ]# L6 w4 q
white: Well, I have a good way to change your habit , G9 O4 m* w! W4 W( Q+ ]
hacker :. . . . Oh? ! Any way ; ]3 k. o4 }. x2 w# K$ `
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
& U: r6 P4 O- U7 m# } hackers: Genius ah! . . . . . You can also connect to it?
6 q1 |/ J$ E% e white: to ah, and slowly the hymns!
# R0 {0 M/ V$ `/ ] white: you every day into my computer, is not very curious about me? $ I' G! B4 l6 b& D
hackers: No wonder, only used
; D6 W" D [$ q P$ W9 G$ o white: no you're curious about the place? + h2 C3 A. M9 H% u+ x
hackers: a ah, I always wanted to know your machine so much as when the virus crashes / m; _7 p' V6 i! j# i" l% \2 {, V
+ M/ ~! w' c- f' x5 _/ n4 D$ {$ { white: I would like to control your computer * i6 k2 R6 b+ i5 j/ N" H6 ]. \' J( y
Hackers: I will not have other people access my computer I will be mad ' l4 p/ ]4 T) |* H
white: This is not fair! !
8 }. {+ O1 N3 A( V, ?) { hackers: ah, well, you control the good of the : f& ^* d' m( o4 c9 A, E0 O
white:. . . . But I will not. . . . + t' G# x& [: {' ~$ { e
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ; J& t9 s* Z: j; q
Hacker: I'm white + ]2 N: B; j5 n) K1 Q
us again: This is probably the last time we met the
8 p; V: C4 U. }+ T9 [* I Hacker: Oh? What happened?
4 g+ q& H4 C+ [; y: @ white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
0 l, L' |! t) F: ^; t hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
[% ?& I: y0 i E white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 9 S( o; V1 @. R6 ^0 y+ i) E
hackers:. . . . . . . . . . ) B7 {- h- x- Z7 i- E. ^
hackers: so late, and how not offline? " H2 l# S% n& N$ O5 o
white: Oh, is the next, and I went to pull the power ) Q5 t n! k& Q7 H
hackers: Slow! You will not shut down?
4 [( C" l) a* x white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ' g& g! o1 e* M* f1 ~
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
& Q$ H! g6 z: g8 b2 T white:. . . . . . I press the power to the hackers call it 6 A2 g3 a% [7 {! a
white: You are not really powerful
, d) Z; g2 O/ \' ~9 Q, v hackers: so-so friends
0 M$ m1 l. ^9 c3 f" z3 b) D white: bragging! You have the ability to shut down my machine in the horse.
9 R+ H& ^6 l1 k$ m/ L; p! n* A6 G: V hackers: this place is difficult! You wait
* ~; d1 e; H( V% U$ B hackers: Haha, buttoned regret it
5 e% c% M5 ?: A4 d1 r/ d; k3 F white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 9 K+ e1 b1 t* g7 i8 S# b$ ]
hackers: halo ~ ~ ~ ~ |
|