埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 673|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer , y: m' F6 g) ~2 P& f  O
white: how control?
0 w4 e4 K" j7 U hackers: white with a Trojan
7 ~6 g/ B3 X! s) m$ x:. . . . . . Where? I did not see 2 w& }5 o; M8 B  W
hackers: Open your Task Manager 4 O9 k6 v$ ?+ d: D, _$ u
white:. . . . . . . Task Manager, where? 1 Q) W) C& q1 q1 j
hackers:. . . . . Your computer below! ! 8 |0 E- }2 Z. \+ m
white: \; ! V) l' n- D$ ^# k% {. X8 m
Hacker: I have control of your computer 9 n1 p8 P4 C. \- l8 h* Z; V5 E, _
white: Oh
* B1 P( F' G! s: u  B1 D4 s hackers: a funk? ! Hey , x/ O' R+ K: f  P( H' w6 O
white: for the just, help me kill the virus it, many of the recent problems my Lord
* d* o! ?" S' @+ n7 S7 Q machine hackers:. . . . . . $ y' f5 [& r) a" `' t
) I6 n5 k- T4 e6 r! q7 X
white: how do you always in my computer and out of 3 v1 G( @- n3 j
casual hackers: You can install a firewall
* i2 L$ @6 N- ]) v# Y+ ?7 Q8 G white: install a firewall, you can not access it? ' ^& `& z4 H$ d& Z; \) _$ s
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
1 \$ n, k" t0 E) o& `, r4 ~; F3 T1 e - N! x* B! E) q6 w' L( |+ `
small White: I heard that you will create a \! ; C( ?$ I" [: I0 z/ N/ h/ S
hackers: ah
( s" z# p% b4 L1 h5 ]8 h white: you can control someone else's computer? ! 5 W# j: q% y- x4 C& m+ L( n. G
hackers: General is the
# J" k# e$ G2 M6 ^( i, I* E white: you can black out those sites? / s4 w- j6 y4 P4 [; k# r5 J$ u
hackers: of course, did not hear people call me a \1 }, m/ }' y$ Z7 ~
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . : B: E. ^4 ]4 F/ p
\! 2 u8 E% ?2 X# e( b4 m2 v7 [* l- D3 V
white: every day you come in, do not feel tired of it? ; b, H% m: a+ C! b, ^: R" ?
hacker: is a pain, your machine is the worst I've ever seen in one of the 7 C1 w! `* V! A0 ]9 {+ E
white: is not it, this is Brand
" X6 p+ u" s; g1 u2 w$ L& q+ F" [ Hackers: I was mentally retarded in addition to your yard game machine only virus a 7 @0 D  I$ a4 X' Q* `. l/ s! U
white: Oh ~ ~ that you see me The \. . . . Goodbye
! n! r, ?! z/ d' ^1 E. H* {
. i, T" C3 B* s/ s$ G hacker: Hey ~ ~ ~ I come! 8 q/ M6 @6 ?/ |
white: not seen you for days, was my firewall blocking you? . F& @' J2 H$ `
hackers: Haha, jokes, on your machine is easier than my own, not you miss me / n2 J+ _0 I0 I2 J: N  d
white: I want to Please help a busy 2 f1 y% ?. X$ u& l3 n% W4 [. j0 t
hacker: What? 5 o& l6 C% m) ~1 q
white: you can not modify the point into the power system data
: i; b+ \0 T( d% y- [ hackers:. . . . . . Why do you want to! ! ) s/ u: l8 P4 n0 A
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
& s( o$ S  z2 b& h2 u* ?" T hackers: die! !
/ R! |& t1 m1 U! x1 I 4 u7 a# L% S0 j( ~* V* S1 G7 ]
hacker: you die Where is? ! ! !
9 @8 B0 [% o" L  z: Z5 f white:. . . . Go out and play for a few days, ah, come to me why $ Y7 N# J7 b( ]6 i
Hacker: I'm looking for something ; m$ n" V( `- a1 I. V" ~9 h2 U
white: what I find here?
  W; J1 N3 H! Q! ~( S# ^0 M6 a hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 7 ], n. Y$ {% `0 E

! I" ^3 B) G1 d# G most hackers : I come! !
2 w. `1 H( X  d. . . . . .
& a8 ]  q: c0 U$ J2 v2 |' w! x% k hacker: how not to speak?
  ]3 I1 [3 Y, o: S2 J4 N# A white: a bad mood ( b3 P: G9 L$ Z1 r& X* D1 q! w. p8 ~
hackers: Who bullied you?
# o8 y. t/ P+ r: W  F( c1 Y; } white: a Q No. I have not lost inside of my first love
) \6 n! j: V5 s& B3 z; ~ Internet hackers: this simple, I get it for you ; X, i" ?- V8 L7 C  C  x4 E
white: do not get back + \& a  h' Z. E, ?( @
hackers: No, tell me what number?
! u5 Y5 H' q% Z: z white: Woo ~ ~ ~ ~ just do not remember
$ x+ J& b3 r5 _0 B* { 2 H3 {/ a: {* f" z5 t% S
white: you gave me out! ! ! !
1 i6 }8 h% P, D/ q5 I1 [ hacker: how wrong? ! 0 }3 p3 {4 k7 B" M: l: o' ]
white: You are not the forum to use my ID to play it? ! ! ( b  s) d+ A+ q7 \: l
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
* F2 _+ y& q4 @" T white: it does not work! ! ! & q, }. d" n: U/ [) w
hacker: how should you like?
3 w& _! i! A0 j5 D: ` white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
, e+ A8 c" X& x% \ : P6 i$ C& @0 Q" C: Y- O, X
hacker: Hey,ralph lauren pas cher, I did a lot of fun
3 k0 B- [  p- p; s, G white: what
! X# [" x# o+ V' N hackers: I go to the forums posted the top
; ~: H/ Y8 J  A) n white: This very common ah ; t' o2 P5 k% O
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
, V4 \# s- d' ] white: Wow, very enjoyable, and I can never dare, will be blocked! - ]3 p" y( S# w+ @0 F4 H
Hackers: Yes, has been banned. 3 {7 H9 [0 [( f1 X# S6 A( Z
white: this is also fun? !
3 H& e1 s; t2 @3 L$ o/ |" n Hackers: Yes, ah, because I use your ID
2 ~$ T$ _$ t7 S' u; @ white: you are pro?
9 x) R2 g+ j! l" p1 ` hackers: You can say it. : A/ m9 P5 n% Q
white: to what extent high?
  R9 Z! Q/ n/ O. z0 c) t hackers: ah, I am bored when their own 2 N0 H3 ~1 `# o5 ]/ s  Y6 D
white black: Ah, this I will! % m, a' `' e& \
hacker :#?%! You can? ! , _5 N- m: r0 }1 K, m) v; j, ~# r* e
white: Yes, ah, a black off it. . . . .
$ y4 c# \# w) \2 F2 q hackers: Go!
* ^4 \" w- C6 F white: Ask your question , A# O( [, t+ ]5 F* n2 [" e
hacker: says 7 s7 L* w# m+ U, X6 x
white: Besides me, you can also control other people's computers do ?
5 [4 B* [2 H; Y/ Q8 G0 o Hackers: Yes you can. . . .
( O3 i1 f. y1 @" j8 ~+ l5 c white: no networking is also OK?
8 v" A- `1 {: g/ N" V/ X hackers:. . . . . . . & L8 m2 I* G. l+ O
white: You can remote control to open someone else's machine it? ( K  s8 e  M3 h2 q) u) e6 }
hackers:. . . . . . . .
  B" }9 n- `$ T& i; [# j" k5 e! D& o white: You can steal top-secret file it! ! ! / s  x0 m% Z! m# Y, S
hackers: I think you see more movies, go to sleep
* b7 A+ C6 o9 J" s1 E- m( L+ Q white wash: my computer is broken
7 u2 M# B2 n4 Y  R3 e2 [ hackers:. . . . . . . Just checked, your computer no problem 5 @! j( Z) J4 ^; T4 @" J  N4 {
white: that is, you bully me 3 I/ J% F4 K: B% C) B5 m
hackers: No ah
' v4 L0 S1 S+ G, R white: You are! MP3 files are passed to my no images! / ^" ?3 p5 _" J/ j  x
hackers: help ah ~~~~~~~
' Q8 c( K! |: {; h# b, y7 w* y; a. d white: Ask a computer problems can you answer?
; f( \: k% W% S) T Hackers: should be able to
8 S8 J* y0 N# U. X. z2 C/ H0 i white: Which key on the keyboard the most handsome?
' o. W8 |. ?9 C7 i) u, p hackers:. . . . . . . Do not know 6 m7 w3 K' l, H
white: of course, \!
/ m5 c, |1 y& u7 P, v hackers: halo ~ ~ ~ This is a computer problem? ! ! & u# A! j& x+ j( O
+ _- {0 L1 _: {5 U
white: ask you a computer problems you can answer? , F- [# G( J; z, t3 M) s) y
hackers: If the problem is not your idiot
, B/ }8 P! d% W white: I am serious! ! You can operate my computer? * O- f$ B" k+ k  L4 t6 S# r0 R. U
hackers: ah,juicy couture shop, yes
" l! u# A1 s6 l- M" V) h. Y white: that problem, you can solve it ; W+ O1 ~6 f2 u
hackers: Your question is, should not be difficult ;
6 r* d: p( i% k white: Great, my fans do not seem to turn up,nike air jordan, help me change it
- ^: P' z) n/ B/ V# a a hacker:. . . . I excused
7 C( p/ {3 {# u: A' P white: we see meet you? 4 W; ?3 {- I' y+ }& _
hackers:. . . . This, not so good, why should we see
6 B2 w- r) f1 F# M" n! w  v, L white: I want to see you are not the same and I would like to
+ [7 u% [6 ?$ y9 @ Hacker: Oh, what you think? % d1 r6 Z3 |, f
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 3 Z9 f% ^, s  G1 n7 X' g6 B
hackers:. . . . You say that Spider-Man, boss! , d+ C) K- G- R1 x( R
hackers: Kazakhstan woven ~ ~ ~ 9 J  C* Z3 l$ t& o/ `$ {4 M
white: You called every day, is not very curious about me?
" g5 E7 |# [! t4 V( r* C hackers: not curious, is the habit, easily came in
0 O0 N6 {7 r7 D' f white: Well, I have a good way to change your habit # D0 u. H$ ~% u
hacker :. . . . Oh? ! Any way ; y) F  d0 w$ o7 x; @1 d
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ + k/ V3 _0 x9 j3 s6 u) L. x
hackers: Genius ah! . . . . . You can also connect to it?
0 i9 \! w8 j, Y6 Z& @ white: to ah, and slowly the hymns! 2 o( |' R; w1 r% q2 [8 B4 u
white: you every day into my computer, is not very curious about me? & I% |" J/ n/ ~& T9 {* f1 d
hackers: No wonder, only used
' J  }3 t2 R6 s9 k white: no you're curious about the place?
, P. [2 U: B  A0 i1 J% m hackers: a ah, I always wanted to know your machine so much as when the virus crashes ! L) v+ p5 }! u  [% C
- S, P( |/ I6 h- z0 ^- L9 |; t
white: I would like to control your computer ) c  {2 U; `, Y" M' U0 I) w0 o
Hackers: I will not have other people access my computer I will be mad ! f- B4 @  L$ Z3 ^+ k# J% q
white: This is not fair! ! 0 w  H3 O. M' n3 w4 G
hackers: ah, well, you control the good of the
. M" O2 n9 q' U6 N white:. . . . But I will not. . . . 9 E2 c/ q- H6 J0 J' g
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! " d$ ^0 t3 u" D0 y+ j
Hacker: I'm white
3 D/ p' s& J2 v& T us again: This is probably the last time we met the ; x. b" n" A; [- r; Z
Hacker: Oh? What happened?
# f) y3 C2 t6 ]+ O white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 5 x) l1 u* E  [" }$ O% c* _( {
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
( n! f* |  C# d6 H, } white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
" \" W" f, T: D7 m5 B hackers:. . . . . . . . . . 1 E4 `( z8 k1 e
hackers: so late, and how not offline?
- ?$ x- n9 G+ P: w0 r2 P white: Oh, is the next, and I went to pull the power ' d& h  O' e8 J- c! O) R
hackers: Slow! You will not shut down? 8 c! X2 C  D% \; \
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 [8 A9 t" _. p) T hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
% U+ V/ R+ d2 [; Y* Q white:. . . . . . I press the power to the hackers call it 3 x7 r' s9 p1 ~
white: You are not really powerful ( q% D6 S( q2 o3 ~8 }
hackers: so-so friends - ?' i1 I9 _3 }% M8 M5 o
white: bragging! You have the ability to shut down my machine in the horse. . T1 J4 a# p' B6 z6 o
hackers: this place is difficult! You wait
/ r- J" w8 j) B! e! q: o; d+ `0 n  Y hackers: Haha, buttoned regret it 4 r/ K" g$ m2 z3 B
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . # @" ~9 C/ w3 C2 ]4 q
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-11-5 20:06 , Processed in 0.127838 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表