 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer / _2 ?" Z( G" F3 p; e& x( d1 g
white: how control?
5 O) y5 d( q5 Y Q/ ^% N hackers: white with a Trojan
7 R- G( J {9 m' Z9 ~! a8 p:. . . . . . Where? I did not see M* j& _( q; e! @* k- z
hackers: Open your Task Manager ' Y/ L* }1 ^& e9 Y
white:. . . . . . . Task Manager, where? 1 v) g* U: c `# h% K* M# S
hackers:. . . . . Your computer below! ! & q1 ?# C) y" L: j+ h
white: \; - K5 k( g3 Q- i& [; T
Hacker: I have control of your computer
, k4 S) J4 F/ F# W- y white: Oh
! k. b4 T0 U( Y hackers: a funk? ! Hey . h! @* h' f' B' o8 h/ b
white: for the just, help me kill the virus it, many of the recent problems my Lord
$ z* ]; E+ _# N- f: h* j machine hackers:. . . . . . 3 D/ G5 I) q3 k( V0 Z2 B* a
) T6 O/ n# S6 ~+ c! a7 [
white: how do you always in my computer and out of * d, s9 E2 g" M6 |. L
casual hackers: You can install a firewall
) l! j [& z, }; R. }; M2 c white: install a firewall, you can not access it? ; W! L2 x( B1 f. P
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 4 J; f2 H7 x0 ]; N
5 e! G; p5 i! T% R
small White: I heard that you will create a \!
( [, a, T. S2 e9 G- X! c* e hackers: ah
9 `4 t: ~+ _& T white: you can control someone else's computer? !
1 d$ P3 p; X7 v [3 @0 c0 |$ K hackers: General is the 7 [3 A7 Z$ H( B+ q: v9 @% I
white: you can black out those sites? 4 s& i& w6 U, u* W* G7 S* F- {
hackers: of course, did not hear people call me a \
8 F) \ T. Y0 T white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
& v5 d& l$ Y! }, Q; E3 X: { \! ! j* L" x: ^& A% p9 g7 d- g
white: every day you come in, do not feel tired of it?
. {% l; J) E9 s( o hacker: is a pain, your machine is the worst I've ever seen in one of the
4 f2 p% S; P7 z; C) N' b9 u white: is not it, this is Brand , ^9 b& ?* q7 v
Hackers: I was mentally retarded in addition to your yard game machine only virus a
: L0 p& M) W P, n# e, Q# F1 F white: Oh ~ ~ that you see me The \. . . . Goodbye
9 ?( i, n6 O+ y5 ]: M * |% t$ |! t& ^0 O
hacker: Hey ~ ~ ~ I come!
& @4 r9 r+ E1 N! |1 d* q white: not seen you for days, was my firewall blocking you?
# H0 C$ D" H+ R9 T" H0 c2 q$ r! H1 N hackers: Haha, jokes, on your machine is easier than my own, not you miss me
+ ~* l8 \ E! \3 x3 t white: I want to Please help a busy
( X! b+ P+ z6 \! g+ F* ~ hacker: What?
& G& Z' b' g5 p9 B5 t% F: y2 b white: you can not modify the point into the power system data
$ J- T/ K! W. A. o% s7 F hackers:. . . . . . Why do you want to! !
; e! f( x* @) x" t$ \1 p white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . : @* p1 ^" a4 b* \4 T& H5 i
hackers: die! ! 9 g5 l D! q- h9 n1 N# u4 w+ U
7 k, k7 J, H( o0 j5 W4 Q( Q hacker: you die Where is? ! ! ! 8 X/ {4 X; o% F& g7 h, i
white:. . . . Go out and play for a few days, ah, come to me why
2 C; T' \4 k% } @ Hacker: I'm looking for something ! O: K6 H4 \, u
white: what I find here? - B( ~ M6 Z5 D7 j7 H( h
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 6 N8 j5 F4 f& u) y
% I6 I' M# p. N# D! v most hackers : I come! !
, `- |" ^+ Y8 T4 p0 D. . . . . . 9 O& n0 m$ v) p" R' V1 o* ~$ C7 E
hacker: how not to speak?
3 Z/ S: q, r, ~$ j+ N white: a bad mood
; X6 A o! p) U5 x% q) w6 G hackers: Who bullied you? 7 e/ T" Q0 {2 J a! k1 V) f
white: a Q No. I have not lost inside of my first love
! X! _" r; r( u6 z) g4 u5 c Internet hackers: this simple, I get it for you & L% P; z8 M9 W7 F# @
white: do not get back
( S- T+ d$ P i: ] hackers: No, tell me what number?
' M' E9 w5 F# H% {; I# V white: Woo ~ ~ ~ ~ just do not remember
* ~) o6 S" L" A5 X/ N 6 n4 g( Z0 |8 N2 M
white: you gave me out! ! ! ! # J) l2 H0 e! r0 A
hacker: how wrong? !
. C n L y# `. i, N1 I$ g white: You are not the forum to use my ID to play it? ! !
6 @" @- S- V, x, q o hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
) C0 E" f+ t( T" |$ D white: it does not work! ! ! 0 E: l# g6 |( X/ d
hacker: how should you like?
& O! h% c6 K) c& M4 [3 A white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
) p( [' p& G! @( C% r, e2 s
$ J- D- m I# n4 H7 x5 X: r hacker: Hey,ralph lauren pas cher, I did a lot of fun , z; k. v% J4 k! d: ^0 S1 Z! q5 u
white: what # B7 m) A7 ?+ ^+ A) ^
hackers: I go to the forums posted the top 4 y( E* B" G k8 B; u' v8 {8 I0 P
white: This very common ah 7 s2 G/ B& q) U0 U5 U* a
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent K2 z2 Z! l2 H C
white: Wow, very enjoyable, and I can never dare, will be blocked!
, a" U! s$ Z) o& `/ J0 }' N( n8 @+ V# Y Hackers: Yes, has been banned.
+ K- z7 c. h# i. y" I+ H white: this is also fun? !
" |$ L5 w# i- K& i! \. o' D Hackers: Yes, ah, because I use your ID
0 ?7 @& P @# f# }0 ]+ v white: you are pro?
! A/ l. K/ D( x$ U/ o$ M+ C hackers: You can say it. + Q( a6 X! f2 {% b( N1 z j" d5 s
white: to what extent high? 8 U* N4 G6 J5 y) f3 C# w+ Z' r
hackers: ah, I am bored when their own
# d# q$ n) j: v4 y4 P$ l2 B white black: Ah, this I will!
$ [6 m, T5 b1 k, S6 ^; H hacker :#?%! You can? ! ) V$ S5 s4 Z; W- k9 f' Z& w
white: Yes, ah, a black off it. . . . .
4 S- Z+ l+ ~7 e" w/ m. \) [ hackers: Go!
1 D1 f* v: J% P& F8 ]" j white: Ask your question
' ?: a$ z% G% }$ j: R/ D2 U hacker: says
% b: C9 s# s$ X( L! `. h1 v0 ]* k white: Besides me, you can also control other people's computers do ?
: b1 [8 c5 a7 A- U1 j' x. _ Hackers: Yes you can. . . .
9 ]* V$ w. f: Y- Q5 f8 M5 C white: no networking is also OK? , S- I4 c$ n. N4 I. J
hackers:. . . . . . .
: k: v4 M# h4 `8 G white: You can remote control to open someone else's machine it? " K' X; P: c, O: Y6 V& u
hackers:. . . . . . . .
- x+ w- k- t3 M. r white: You can steal top-secret file it! ! ! . j# i2 B+ N% F4 v8 C
hackers: I think you see more movies, go to sleep : s& {+ G% Q' l h0 L/ i
white wash: my computer is broken 6 A5 w& m2 M; a0 M- i3 ~) J/ e
hackers:. . . . . . . Just checked, your computer no problem + P$ j* S5 V1 V; |' H
white: that is, you bully me
* R3 \/ k! a: b1 ?0 O; `9 Z V hackers: No ah / H+ V$ T3 p8 n5 `6 G
white: You are! MP3 files are passed to my no images!
- t, Q v# P3 |, M. e! V hackers: help ah ~~~~~~~ ! R x) w M3 ~0 q
white: Ask a computer problems can you answer?
. p( e8 ]6 X3 j! ?1 D& S/ b Hackers: should be able to ! p, t( c `! p) v# P- R+ D/ E3 o
white: Which key on the keyboard the most handsome? # n4 n" q# P3 P+ v( j
hackers:. . . . . . . Do not know
' \3 i' }) a' J P1 ~/ ]2 l- V; A; r white: of course, \! 7 R' Y T }$ k0 P5 z# W8 g
hackers: halo ~ ~ ~ This is a computer problem? ! !
3 o/ x9 J+ N/ @9 ~
& h+ E4 [, z5 G white: ask you a computer problems you can answer?
9 @0 V# }" c2 @$ ^- F0 i. @! X8 Y hackers: If the problem is not your idiot ' S8 C# K0 v6 ^* T+ H: E5 k/ s* x9 ]
white: I am serious! ! You can operate my computer? 5 E! i7 D8 @8 a# E* x
hackers: ah,juicy couture shop, yes
5 l% e# P/ K5 S0 H7 ]. l white: that problem, you can solve it
- |! O( p8 f2 w% M3 r' Y hackers: Your question is, should not be difficult ; 4 I' n x2 |3 w* p/ P
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 h: }1 G' u) g4 A8 Y: [ a hacker:. . . . I excused 7 }+ l3 X' g2 f R
white: we see meet you? ; m" m5 p" C0 ] b( ?
hackers:. . . . This, not so good, why should we see
! A3 R+ @/ h2 Z. ]+ N2 f. p white: I want to see you are not the same and I would like to ' s: s2 U9 d; N" O/ C
Hacker: Oh, what you think?
& D" q6 X8 ]5 p& E8 _/ }2 _ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ) s9 w7 M( b9 G1 J
hackers:. . . . You say that Spider-Man, boss!
- ?2 _) k: P/ [" ^ hackers: Kazakhstan woven ~ ~ ~ : s( I) Q* R+ l0 C% \
white: You called every day, is not very curious about me? 0 P4 L9 K/ s0 o7 U- A
hackers: not curious, is the habit, easily came in " Q$ l& b& L# E, N& I. F" R+ u% h
white: Well, I have a good way to change your habit $ ?7 T' }4 O( w* N0 j- m, \
hacker :. . . . Oh? ! Any way
" ^- U# A) A* W3 u4 l% ~# L white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ a" Y$ h. f, J2 [; j# K) I
hackers: Genius ah! . . . . . You can also connect to it? 3 z/ v# e% |+ J
white: to ah, and slowly the hymns! + s1 Q- ]1 a4 C
white: you every day into my computer, is not very curious about me? * W" s: b2 N8 {9 [; B8 m
hackers: No wonder, only used 1 i% T/ u3 L) m& z7 f- a6 V# j
white: no you're curious about the place? G; f5 Q" h# H7 q/ e
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
1 n; b P7 v# S3 G
3 m3 L' r: W, g8 E* W white: I would like to control your computer l8 W; S3 P: k* I
Hackers: I will not have other people access my computer I will be mad
' ^+ @( G+ s c3 Q4 i white: This is not fair! !
" j4 f8 k* }/ \, h hackers: ah, well, you control the good of the 3 M' J# I4 u2 n q2 Z; B+ G
white:. . . . But I will not. . . .
& J& O' d* ^; D0 ` hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! % R( R5 p! q; |+ u
Hacker: I'm white
$ y7 g/ q' _! O* y us again: This is probably the last time we met the F# p9 n" p2 I1 U
Hacker: Oh? What happened? 5 P8 i3 V [6 u. ^- j& n, c. y, O4 E
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ! }( a+ P9 e# `/ W
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
# [# g0 ?9 S- A+ @* Y! Q white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
$ s! x! v/ o) ]; F' A) x8 N hackers:. . . . . . . . . . 3 m/ l+ K+ `* g7 d% H" U1 R; R9 o
hackers: so late, and how not offline?
w/ M# P# I$ L; ]+ v. |' S white: Oh, is the next, and I went to pull the power . ^5 @( B6 `) C4 a/ N
hackers: Slow! You will not shut down? G) w+ h T( A" _
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 1 ~" j1 e" V4 t" c* p
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \/ K+ D- `" S, O* s
white:. . . . . . I press the power to the hackers call it ) _% w: l, u u! X2 J# B- V
white: You are not really powerful ! D& y S' S( N. N! q$ r
hackers: so-so friends
- i7 i$ f& a7 W5 y5 c1 H4 T: {8 R white: bragging! You have the ability to shut down my machine in the horse. 6 g/ {: N+ A5 ^# _: ^ ~! e1 n
hackers: this place is difficult! You wait . u+ h; c! x/ l
hackers: Haha, buttoned regret it
9 ~* ]# o& s2 B W) Y, { white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 5 h2 {0 D, p9 a: f
hackers: halo ~ ~ ~ ~ |
|