埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 652|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
2 D  h7 u% z8 z+ ~3 |) M white: how control?
2 ^. D1 |3 @2 o$ I hackers: white with a Trojan
7 b% I3 E) Z. B( ^0 f- C:. . . . . . Where? I did not see
1 F# E" t: _- b# N8 K5 G) j6 q hackers: Open your Task Manager
. p% t) ]4 U& q; `" Z white:. . . . . . . Task Manager, where? 5 p/ d& N2 z5 V3 S' X
hackers:. . . . . Your computer below! ! 0 b) I) |; ?' T+ ~( I4 o
white: \; ) B' Q  k4 C9 d1 w, U; ]% J
Hacker: I have control of your computer
* P) ?3 ]- O8 P+ P white: Oh $ O1 a; k/ r8 m+ |
hackers: a funk? ! Hey 7 u' O, o7 v, F
white: for the just, help me kill the virus it, many of the recent problems my Lord
7 E5 A: e( o9 _2 C( W machine hackers:. . . . . . 9 J& T5 Z+ _% z, C4 z
% w1 ]1 e& G( T" m9 E% b2 i
white: how do you always in my computer and out of
( J9 |9 f0 |' E" y) Q4 v casual hackers: You can install a firewall
2 Q1 k2 H' r' p! i white: install a firewall, you can not access it? - p: y- T( R2 V9 k  W/ k( H
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ; q) \/ A6 w& k# c$ _

9 a! h; r* b0 U4 x' L) [ small White: I heard that you will create a \!
( H& t4 M4 }9 T hackers: ah
5 \9 T" X/ n& Q$ r* I2 z1 ? white: you can control someone else's computer? !
# ~, X4 V6 A( {) }8 A7 v; G hackers: General is the
( P* G+ r8 F0 h" _ white: you can black out those sites? . B6 C/ f2 @3 u1 a3 \
hackers: of course, did not hear people call me a \
5 `6 l& L8 l# Q" y& C white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
. z6 X- _: o6 f \! * i/ U' |9 `8 [' E* M* Q& B
white: every day you come in, do not feel tired of it? 0 s' o" I& u+ v1 T  ~
hacker: is a pain, your machine is the worst I've ever seen in one of the 1 B& t+ `: Z4 b2 b/ Q) _
white: is not it, this is Brand 6 T! ]( u) [8 \( j0 g, U
Hackers: I was mentally retarded in addition to your yard game machine only virus a
( B# P: Z- e8 P2 _. b( g white: Oh ~ ~ that you see me The \. . . . Goodbye & P* Y0 D  F: a
( {. ~, W0 a) t6 ^) L6 Z
hacker: Hey ~ ~ ~ I come! : x+ d- x, o- r  R+ S
white: not seen you for days, was my firewall blocking you? # b) _" o$ q" A: s: w
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
$ g. V8 p5 y7 N' j& j- `: [! R/ d4 | white: I want to Please help a busy ; x; f$ Q/ ]. w$ |" Z
hacker: What?
# \1 [4 \1 z- B7 I white: you can not modify the point into the power system data ; Y, d: Y) S" ^. n: s6 v+ c
hackers:. . . . . . Why do you want to! ! " n$ ?/ E# x# t6 x8 y/ i. ?- X
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
% i/ ]  Q5 t/ v. q( ^ hackers: die! ! 2 C* W* y8 W$ R  \4 y- ]

, A" y! ~: d4 X$ x hacker: you die Where is? ! ! !
3 S4 y" c' ~' u white:. . . . Go out and play for a few days, ah, come to me why / ?4 x" D$ Z8 U0 y3 Z& M6 v
Hacker: I'm looking for something & F; `$ U/ D3 q2 m
white: what I find here?   T  d2 G( _$ }& K  z$ V
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 7 D, p% G: F! _* j9 m
2 @, j! _' A' o" b" L. |7 T$ I
most hackers : I come! !   m% Z7 G- Q2 p* i- i1 I
. . . . . .
) [! p% s- Z- P) N8 Y. g hacker: how not to speak?
/ _4 {3 v9 v( w* H, d% o white: a bad mood 2 M* Z7 R* N9 K# a# v# v
hackers: Who bullied you? 2 ]$ J7 Q) ^5 }, S) n
white: a Q No. I have not lost inside of my first love
& e1 ?& O6 c7 o/ i2 t: b: d Internet hackers: this simple, I get it for you
  r* m( r& H' _6 E* L; q/ ?8 e white: do not get back ) H/ l2 w( I- j! ?# L" N% j) P, _
hackers: No, tell me what number? & c3 ~( d  J( H: o3 g) y; S, d
white: Woo ~ ~ ~ ~ just do not remember ) a. E' F$ g0 j! }! z
: e/ Q- P+ d1 N  i1 d% e
white: you gave me out! ! ! ! 8 [3 T- U6 @* @- p9 j6 q: _
hacker: how wrong? !
. R( J, v2 G( S# w' \; _ white: You are not the forum to use my ID to play it? ! ! , U3 @* q; n: f( M2 P/ x
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the $ Z- ~# w" c3 W# d3 L0 }
white: it does not work! ! ! 9 `! \. @/ Z/ G& ]- f8 y" f: j0 P
hacker: how should you like? * @/ ?  b5 \( S( |: L0 h2 \1 Y- j
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! + E  H8 K+ j" S7 ^
- i& a0 B8 Q" b" |
hacker: Hey,ralph lauren pas cher, I did a lot of fun $ x( m2 O! M, v' [3 _) n1 `
white: what
" U# u* Y% m% V7 `; ^, d3 m hackers: I go to the forums posted the top
. L' k# ~0 \. N+ I, O( F: i white: This very common ah - c( P, |* `/ B+ i6 d" N3 S5 c6 N5 m
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
; u! ^9 }& E2 T& R/ P! J7 } white: Wow, very enjoyable, and I can never dare, will be blocked! , w) ~- z% ]5 M0 ]; v2 l/ L& h' d
Hackers: Yes, has been banned.
0 Y& B" D- R4 c4 _) ^, ?: i, i white: this is also fun? ! $ k1 h# Z, G. E! L! u6 M' b
Hackers: Yes, ah, because I use your ID
5 c4 q! c( H$ A2 k& P7 s. [ white: you are pro? . @  L: S; Y% x
hackers: You can say it.
- E) P  G3 N" h/ ^9 Y" A) G white: to what extent high?
3 I' a( U2 J/ O! Q, a3 b hackers: ah, I am bored when their own ) Y! b' z1 G9 H+ k0 C
white black: Ah, this I will!
0 c$ x( H/ N* W hacker :#?%! You can? !
+ ]8 y5 o! f( t% b4 C7 h" o white: Yes, ah, a black off it. . . . .
1 Z9 V2 J  o6 A0 | hackers: Go! % Z) C, ]4 \3 z  y  b/ q/ s( ]: B: t+ R
white: Ask your question
4 Z  D# b- Q4 e1 c( c! e  h hacker: says
8 _) }7 b7 l3 p% r0 C! j; _* s" j white: Besides me, you can also control other people's computers do ? / w" p8 [: O. l
Hackers: Yes you can. . . .
- _+ b7 M  q3 R8 ~0 D white: no networking is also OK? : a% u# Z* T6 Q9 n) M
hackers:. . . . . . .
! c: ^* N. V, e0 a, }" U5 K white: You can remote control to open someone else's machine it?   q5 z5 c' {7 T+ Y# \7 z
hackers:. . . . . . . .
; j9 M" e  M  Y6 t, C white: You can steal top-secret file it! ! ! 3 b0 L* r, L. @+ W. P
hackers: I think you see more movies, go to sleep
5 @# O- |9 i$ w2 i& h white wash: my computer is broken - I7 o! y% p2 X  g6 _1 t# _5 ]
hackers:. . . . . . . Just checked, your computer no problem
$ f2 e2 h: d* |. [- e( g white: that is, you bully me 6 ]2 E  d5 |# C) s2 T
hackers: No ah 1 T0 O* K$ x. N! f" K
white: You are! MP3 files are passed to my no images!
/ _3 p) ^7 g4 K+ L6 c  F hackers: help ah ~~~~~~~ 1 N- \& |  K; g& ^- o% m
white: Ask a computer problems can you answer?
0 `6 @: _8 `/ g5 G Hackers: should be able to 8 C! E; r2 p  x+ m& y
white: Which key on the keyboard the most handsome?
1 `! C% }* K) Y hackers:. . . . . . . Do not know
: j8 ~7 O: E  y/ j. P2 ~ white: of course, \! 7 G/ E5 ]0 X' m' l4 V6 B
hackers: halo ~ ~ ~ This is a computer problem? ! !
& f0 ^( ]$ F( U
* O# Y" b8 h: N5 |5 q4 ]. F  p) i white: ask you a computer problems you can answer?
5 A# L$ p% `' N! @0 |0 k hackers: If the problem is not your idiot
7 l7 I5 C' q  ]- @2 |' t white: I am serious! ! You can operate my computer? 5 e9 i( o, w" d+ l) i
hackers: ah,juicy couture shop, yes
9 T( x7 d7 t' }2 H+ }# V0 N; j' W white: that problem, you can solve it 8 `3 c/ j9 ^% {, U
hackers: Your question is, should not be difficult ; 9 L$ }  r" ~( S! Z* N
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
# M6 y5 L  ~; r/ ?' w+ [6 ?/ R, R" G a hacker:. . . . I excused % i- T: H$ d1 c  f
white: we see meet you?
5 y3 \; e! g' Y6 f% O0 i6 H, b hackers:. . . . This, not so good, why should we see . j* P5 a5 l) v) G- ]+ @
white: I want to see you are not the same and I would like to
5 R' H. W  c1 ]/ R% @ Hacker: Oh, what you think?
; Y, l1 S, X3 M6 ` white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
. W% |( `" ]3 C6 _6 |5 ?% U- p hackers:. . . . You say that Spider-Man, boss! 8 H3 P3 `' Q. G% y! {. i$ i
hackers: Kazakhstan woven ~ ~ ~
- f7 s- c: Q. {# h white: You called every day, is not very curious about me?
; A% X5 N- \& V/ F4 o hackers: not curious, is the habit, easily came in
% L# Z  o, n* |3 B! y white: Well, I have a good way to change your habit
- Z, O+ \3 S% d( _  r8 r hacker :. . . . Oh? ! Any way
' ~( E5 d: [+ R! s1 m" [ white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 9 ~) d1 f9 D' r# r
hackers: Genius ah! . . . . . You can also connect to it? 6 n; J8 H* V1 w
white: to ah, and slowly the hymns! 3 d+ s* q1 r& H! x9 l* i8 @8 e
white: you every day into my computer, is not very curious about me?
3 }& K# }7 X7 T8 n. F hackers: No wonder, only used
* X: N, m# x+ Q white: no you're curious about the place? 2 e" L3 V- O$ O2 f1 C5 }% u
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
/ N% ]4 Y! K+ V$ n; e) N) n; z0 }
1 L  L- V& I( }# F1 n white: I would like to control your computer
0 K. L! `, H& \4 R Hackers: I will not have other people access my computer I will be mad 2 z% ]$ Q! S# B6 ^# K
white: This is not fair! ! : V1 w/ _# I! \$ H
hackers: ah, well, you control the good of the % ?& u% r0 b0 T" o1 F+ A
white:. . . . But I will not. . . .
' [5 U/ v: \( ] hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! $ c$ X9 e7 k8 o/ v
Hacker: I'm white ! c9 n* z+ _( F7 T) p) L2 N3 R( E
us again: This is probably the last time we met the
8 g1 c% N1 C) _& p" o Hacker: Oh? What happened? ; A* E/ f. A- c$ _: j
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
$ K4 N. c: _# ~) m- U3 S+ U hackers: You are so tired of me. . . . . Well, since I do not come, goodbye ) h- U4 i" S2 i( C
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
0 Q$ g% n5 W; h$ r9 x- E2 R) z hackers:. . . . . . . . . .
% _% w4 Q1 s5 s: e2 K hackers: so late, and how not offline?
4 q) q6 d' S4 r& \3 v white: Oh, is the next, and I went to pull the power
* x# S* m0 o& C) D. \: B hackers: Slow! You will not shut down? 9 k) F" B/ c. R. ^: h6 x
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
9 d' x: b% _$ G2 c0 a hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \! G) k( _! U' w: ~  k* E
white:. . . . . . I press the power to the hackers call it
6 L. I+ P* g' I- P white: You are not really powerful
5 v: G% E# e# P7 t hackers: so-so friends - l; h- c, k! f
white: bragging! You have the ability to shut down my machine in the horse.
7 \8 |6 V. P# ^3 a1 k. n; w; U% v hackers: this place is difficult! You wait
* p2 L5 B6 s  P  V. P hackers: Haha, buttoned regret it
4 I, \' i+ |: P8 F" Q& N* C  T+ y* T white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . # u; ^# U3 g1 H4 V* v4 h
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-9-18 07:15 , Processed in 0.212798 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表