 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 0 ~. w4 \1 I- q$ {" V
white: how control? ) N* W, g# |7 w% M4 S' x
hackers: white with a Trojan
# K7 b* |5 q3 \- F4 R) ~( W8 g:. . . . . . Where? I did not see
* o; A$ l2 x$ Q" b1 g# g hackers: Open your Task Manager # Y* i- }4 v1 o! M* l* e$ E! h
white:. . . . . . . Task Manager, where? 0 K9 T4 D1 F/ \2 }8 H- U0 S
hackers:. . . . . Your computer below! ! 4 a; ?# ?! Z9 ~" |
white: \;
& [) O* g( y+ L- L Hacker: I have control of your computer . J, B& v& U \- u* L0 J7 O
white: Oh + H2 W5 X) |) N% f$ s; T9 F5 P3 A
hackers: a funk? ! Hey ( ~5 a) a' F" J! s
white: for the just, help me kill the virus it, many of the recent problems my Lord ; r# H1 w5 w4 r- s. {
machine hackers:. . . . . . 3 i& n2 J' C8 U
6 m" _4 V; i2 B7 ] white: how do you always in my computer and out of 6 k; Y$ y C& J+ A$ b0 `" \, J
casual hackers: You can install a firewall & [( R" P: [5 E4 W6 g
white: install a firewall, you can not access it? ; }3 W" n2 l3 s2 S* L
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
) d; U# E' L# q& H Y! j7 y
1 U3 @& b: \2 @: C7 L0 ? small White: I heard that you will create a \!
& T( J" D$ ?# {2 l% E hackers: ah
8 _7 k; F/ w* t& v1 R white: you can control someone else's computer? ! 0 K1 o* \/ ?4 ]# y- N
hackers: General is the
9 w/ _- P5 q! v% e: p white: you can black out those sites?
2 E2 b' `& W1 E8 x5 B3 A/ {/ q+ j hackers: of course, did not hear people call me a \
A; y' Y+ w5 G# t( \% k white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . W; X! h' p, Q& p0 D
\! m! @( r% Z/ C/ h6 i8 k# P
white: every day you come in, do not feel tired of it?
8 ?) A7 m/ P) P' G) r8 M6 m! Q hacker: is a pain, your machine is the worst I've ever seen in one of the 8 ~% N' E5 F8 f9 f- Y
white: is not it, this is Brand + R: f$ h! w2 v
Hackers: I was mentally retarded in addition to your yard game machine only virus a 9 _/ Q! s4 ?! N9 g( f, U
white: Oh ~ ~ that you see me The \. . . . Goodbye 9 i6 H# Q! O# W9 [) Y2 q
4 P& K* j; O" f2 e1 G hacker: Hey ~ ~ ~ I come! % B% y7 @$ }9 ^1 [: s! P8 W
white: not seen you for days, was my firewall blocking you? , R3 K" f( S, C/ Q, z% v
hackers: Haha, jokes, on your machine is easier than my own, not you miss me ! p7 ]# T5 o: T( c) {9 K% U
white: I want to Please help a busy
4 F6 Y1 ~0 q6 e" V# X3 j hacker: What?
0 |! n4 k, A/ u3 J3 E6 | white: you can not modify the point into the power system data
8 t i( ~$ P2 ^! o hackers:. . . . . . Why do you want to! ! % E$ d! R# j9 @
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . , \$ e0 x+ f4 M, J
hackers: die! !
' Y$ G* d: ]1 R# K) z& X$ Y8 k
6 @3 H0 ^/ _8 P/ ]0 F. k hacker: you die Where is? ! ! ! . S) X5 q/ ~! j% ?! a
white:. . . . Go out and play for a few days, ah, come to me why 7 v% [. a0 l+ ^4 R* I. g9 {
Hacker: I'm looking for something & h4 u3 z, G% E0 Z. h
white: what I find here? + a6 o* ?* s& w( L/ k ?) D
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
7 K1 v9 h1 ?8 J
& Y$ ?5 O, C, D7 ~! ^, |- | most hackers : I come! ! 4 u, k# y$ E. _8 S9 ~: W
. . . . . .
) ~9 a$ t- j9 `: Q# r+ I J; p hacker: how not to speak?
8 I6 G! l5 S6 T) J4 U white: a bad mood / _" r! g" P1 y2 s7 ~
hackers: Who bullied you?
7 P0 `% d# `* \. w white: a Q No. I have not lost inside of my first love & t3 k4 w" I v# |8 g
Internet hackers: this simple, I get it for you - W/ S _) W8 G7 ^
white: do not get back
* S* C* E/ \8 @7 t% \ hackers: No, tell me what number? , H9 j; q7 l3 s0 z |$ [+ x$ i
white: Woo ~ ~ ~ ~ just do not remember 0 C9 `1 w% z7 |3 ~
! M; S# x0 N7 T+ F white: you gave me out! ! ! !
. R2 \+ C3 H1 F5 p0 \* I hacker: how wrong? ! # W, \6 O. F/ B# T
white: You are not the forum to use my ID to play it? ! ! # K! m j6 T# S1 U$ \
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the + G& Z/ D1 ^" x0 I! s" K+ L2 b* E& U% H
white: it does not work! ! ! ; E$ \9 \4 i2 L+ N0 ` Z9 J
hacker: how should you like?
* R$ {$ |; L* X/ X white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 4 i: X$ s7 \. p, y/ V3 ^
5 b% G9 l" r) r: X hacker: Hey,ralph lauren pas cher, I did a lot of fun # j9 a- W t+ R2 V& o; ^& e
white: what # I% }" f6 Q. {7 T, O
hackers: I go to the forums posted the top , j: X, B d+ }0 @+ [0 h
white: This very common ah 5 e `- A; m# \. r3 @( ^% X# }
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
" W7 |% d; M1 k6 a white: Wow, very enjoyable, and I can never dare, will be blocked!
7 J) m% Y2 ~1 P4 p Hackers: Yes, has been banned. 3 i* {! p$ i+ l5 b9 R1 I
white: this is also fun? !
7 M& h- M$ \0 w3 e; {7 e6 ^ Hackers: Yes, ah, because I use your ID + H; |) K- Y4 F5 m/ v0 F% p3 z' |# e
white: you are pro?
4 J; o/ R/ L- E9 u0 j hackers: You can say it.
6 N/ y1 m8 H( M* z1 Y white: to what extent high? , S/ y5 P3 g: Q- s
hackers: ah, I am bored when their own
$ U( D2 g8 Z: b8 [, Y white black: Ah, this I will!
+ v: m0 x) M1 @ v9 K& n) p hacker :#?%! You can? ! 3 g0 t8 W9 P% D* d
white: Yes, ah, a black off it. . . . . ' z; K; M6 l1 C% y+ g0 R J. G3 U4 o/ ~
hackers: Go!
3 | I8 Y' I! I2 F2 f$ y3 [. A white: Ask your question
0 T8 E% Z3 `5 h, ? h hacker: says
2 R4 D- N5 r, F3 b4 ]8 D white: Besides me, you can also control other people's computers do ? - m+ ^% Y0 O, v) y8 ^3 i# l
Hackers: Yes you can. . . . - N) K2 e/ N7 j# ?" R$ I* z
white: no networking is also OK?
8 s @% l2 @5 @* h; W' ^( u hackers:. . . . . . . / B; T% J' ?! v b. G! N( y
white: You can remote control to open someone else's machine it?
& V3 T+ `0 \6 r/ D hackers:. . . . . . . . 6 t" M# e& ?& F/ ]* M2 ^
white: You can steal top-secret file it! ! ! + K( }6 p! q$ a% y; T" P7 E" }
hackers: I think you see more movies, go to sleep
. k1 y' S, j- O! i# ^ @ white wash: my computer is broken
9 i& k$ m, h) ^" h' } hackers:. . . . . . . Just checked, your computer no problem 7 C) _- N# {2 w/ H& p
white: that is, you bully me
8 s% [! c) w" f1 K5 a; a hackers: No ah
5 \* E# }, d9 l; a+ }9 i& |. l& X white: You are! MP3 files are passed to my no images!
8 r' Q) @3 k, y# c2 R* J8 v8 e hackers: help ah ~~~~~~~
1 {- m9 a3 G2 o/ Y0 C O white: Ask a computer problems can you answer? ) j# T' M- \; n
Hackers: should be able to
8 W: T. }) G/ q white: Which key on the keyboard the most handsome? 6 z m- W% Z: Q, H5 F; U
hackers:. . . . . . . Do not know 5 k6 e* r( w( E. z
white: of course, \!
2 S2 ]9 i; L. K0 q% \* k hackers: halo ~ ~ ~ This is a computer problem? ! !
: W# F# \- p4 G) [( l1 G% q
7 n( V9 t- t$ H$ b+ ^7 i( m white: ask you a computer problems you can answer? 8 | A: m9 N- K( G
hackers: If the problem is not your idiot & a0 M4 g8 o9 z& [
white: I am serious! ! You can operate my computer? ! Q& o+ l6 n* M2 l3 ?# ~; B
hackers: ah,juicy couture shop, yes
( ]/ M8 I- q L) B2 j9 K. ? white: that problem, you can solve it 3 T! p/ ~: Q" a
hackers: Your question is, should not be difficult ;
( G+ I/ \8 d* Z white: Great, my fans do not seem to turn up,nike air jordan, help me change it
- {$ e. P p. |6 X8 V& { a hacker:. . . . I excused
2 X+ s* H$ ~) K; k! U white: we see meet you?
5 {- K* T" w' w9 }# s hackers:. . . . This, not so good, why should we see 5 Q" ]1 p* I+ e
white: I want to see you are not the same and I would like to 8 V/ j+ \! J* [$ z2 f
Hacker: Oh, what you think? k8 e" i; z+ V" d* x' C* d: a" n
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ' m: i! N: |" o1 C8 f
hackers:. . . . You say that Spider-Man, boss!
|0 H! o' q: ?* R( D* y' L/ u hackers: Kazakhstan woven ~ ~ ~ 3 |* v# Z$ P: M
white: You called every day, is not very curious about me?
' z; \( d8 r$ k) x hackers: not curious, is the habit, easily came in
$ Z" p' _$ d3 P4 v white: Well, I have a good way to change your habit # r9 Q, I0 S, b7 y
hacker :. . . . Oh? ! Any way " Z# P7 j* C# _+ N4 b; ]- e A. ^
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
9 {( e! \% x. @, e, @, A' G hackers: Genius ah! . . . . . You can also connect to it?
: q( }+ Z2 {9 n# Q$ E& q white: to ah, and slowly the hymns!
# N J) s% l1 ^% E white: you every day into my computer, is not very curious about me? : H9 z7 @4 r6 r# X. Z P
hackers: No wonder, only used 0 x! i: n4 D6 b* C0 s
white: no you're curious about the place? ' k' e6 D9 Q1 z6 X4 D
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
4 [) o I7 Z: C* f w, M: } e # t" g) W* i2 H9 G; P0 K* g
white: I would like to control your computer 3 N" i; C6 v2 A; }7 ]2 ^6 L8 `1 z
Hackers: I will not have other people access my computer I will be mad
. o0 {; J% D& G8 b o1 T, g+ Y white: This is not fair! !
# Z2 l% H; w% S" E6 s hackers: ah, well, you control the good of the
' y( I$ }3 n7 c white:. . . . But I will not. . . .
( e1 k# \! j1 f' c# O3 ~- P5 b hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
) j1 ^7 h* k2 q, m% |+ T+ H Hacker: I'm white
6 C* k6 } n' A( ?/ p' L2 P us again: This is probably the last time we met the
# A) R# Z% a- v. ^0 G' O0 e Hacker: Oh? What happened? & Y! F w( E; J7 c, E2 [
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! {( w& Q: X- P. N
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye / V/ q1 J7 R* I* y% j; v
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 8 i! W( h( n: i# m- g. C0 B2 c
hackers:. . . . . . . . . . ( z6 ~. W8 h" }( j
hackers: so late, and how not offline? 5 I8 }, d0 J G- b& F
white: Oh, is the next, and I went to pull the power
( p9 {% b+ L, x* w; | hackers: Slow! You will not shut down?
$ E/ |. v$ ~# P1 J; { white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
, z, w: } p) M! W hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \! N4 w# L4 s6 i% r5 T3 s: e, _
white:. . . . . . I press the power to the hackers call it
! Z0 ~0 z0 {8 I, F, u# g3 q white: You are not really powerful . Y" g0 m- ]" D) T1 T0 s/ |
hackers: so-so friends
- B! Y; L: _ s( t; K white: bragging! You have the ability to shut down my machine in the horse. S7 ]9 t9 t$ F* T \9 _
hackers: this place is difficult! You wait ; Y7 r' s) x M' F5 u. }& @
hackers: Haha, buttoned regret it ! L X6 d. @7 j6 n- d
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 8 E1 }; c* H* I
hackers: halo ~ ~ ~ ~ |
|