埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 706|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer & a% C( [- I1 ^  H2 i
white: how control?
$ s/ n" L6 z2 f7 h hackers: white with a Trojan
' d% i5 E( y7 T- Z8 z:. . . . . . Where? I did not see # N4 f' S- u9 y) }& |
hackers: Open your Task Manager - Y# ]" G, ]3 [) |( z
white:. . . . . . . Task Manager, where? : p% N6 Q: g& `8 V
hackers:. . . . . Your computer below! ! ! G8 B: k- v, Z& Q& Q
white: \; * q& G: w& {, e3 w' S: \
Hacker: I have control of your computer   l) M/ D# K7 s6 @
white: Oh
) v5 B: a3 V2 n7 x hackers: a funk? ! Hey
1 ?( q' s9 M4 z% X& g: G; {" U5 N white: for the just, help me kill the virus it, many of the recent problems my Lord
4 W- b# c$ V* t+ p5 \: J machine hackers:. . . . . .
% i; c" n' [- E; b6 n0 i, t# n" |$ C 0 Q2 b3 Y, r' D
white: how do you always in my computer and out of ; A5 ~5 V4 Z4 x% \0 H
casual hackers: You can install a firewall
" ]* B" K) z: G7 O1 w; z! U white: install a firewall, you can not access it? 2 Q8 b) |) J5 N: b3 O1 @( o1 G
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 1 p- r1 c5 e" l
# I$ E) A; v1 G8 e
small White: I heard that you will create a \!
" u* t: [4 m0 i: n! t  a3 P hackers: ah
9 {! f$ ^) e3 [4 ~' P0 Z white: you can control someone else's computer? ! & q6 T( t8 B% t8 L9 h' r
hackers: General is the
5 g% @% \" d: Q white: you can black out those sites? 5 t( Q& s# ]4 N) Z! k/ e  V6 R2 y! |
hackers: of course, did not hear people call me a \
, E$ o. O) Z/ |6 C white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 6 j- K! [1 q+ m
\! # O4 d2 K# L4 b
white: every day you come in, do not feel tired of it? 0 |1 E! V& X- D2 W% H0 e
hacker: is a pain, your machine is the worst I've ever seen in one of the
2 I) `* o1 {' H white: is not it, this is Brand ( ?* H* k$ d7 C
Hackers: I was mentally retarded in addition to your yard game machine only virus a
4 E2 C2 K0 @$ f2 u0 W white: Oh ~ ~ that you see me The \. . . . Goodbye ) p, ~6 S" D: s2 W

$ q1 W% E; i/ r" G hacker: Hey ~ ~ ~ I come! 6 I; W% U) ?, {4 S5 F* Q
white: not seen you for days, was my firewall blocking you? 5 ?. ~) d, z* O+ f9 r
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
- I; C$ b0 t) R) r% y/ C white: I want to Please help a busy 4 j  T7 B1 ~& _9 i  m- D' W
hacker: What? , a4 \# Y3 f5 q" ~
white: you can not modify the point into the power system data . @; @. V! h  I
hackers:. . . . . . Why do you want to! ! 5 ]. I' [4 `- J* v
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
% i. I: P4 K$ a+ C hackers: die! !
1 G: o0 V/ P/ ^- T, I ( W% E8 y4 k2 {$ @; t: _& K
hacker: you die Where is? ! ! !
7 a7 _, L0 o+ N0 d white:. . . . Go out and play for a few days, ah, come to me why
) y1 d5 l5 I: N9 N+ @* u. G) w* `8 y% T Hacker: I'm looking for something & \1 g# x5 f6 O& J
white: what I find here?
- F5 E. ?! y0 C" A, c hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 5 m- K4 o' H2 b# z# N  b

, N. R7 W) L& Y( `! U2 V- w most hackers : I come! ! 0 R5 H  C) `5 f$ Z; h
. . . . . . # V; A4 ~2 L5 z0 b7 c" i. h% Z
hacker: how not to speak?
. Z) _8 i$ c: y white: a bad mood 8 v- a" s/ t0 c* C, P
hackers: Who bullied you? & ?8 Y/ ~# F2 {+ {& ^
white: a Q No. I have not lost inside of my first love
4 ^3 O+ @0 s( b6 [! n( w2 _ Internet hackers: this simple, I get it for you
( Y7 R; F5 I, d. r# U2 k( B# s! j white: do not get back
  D" {! K6 g# f& x! ^ hackers: No, tell me what number?   |8 G# \- y; {+ w( F; J
white: Woo ~ ~ ~ ~ just do not remember - w: L# G; F* H- H' u( C1 y5 H7 [

0 \# ]2 q4 Y4 |! S' Y+ ?0 {& s! f- M white: you gave me out! ! ! ! * q! f1 ]' i5 }. b: i; o" L6 Y0 L  t
hacker: how wrong? ! 3 ^0 Z% t: T+ \* b$ r
white: You are not the forum to use my ID to play it? ! !
' g+ p! Y# J  w. i hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the $ ]/ f" G6 Z: q% s5 j& P5 |
white: it does not work! ! !
  A" l9 O( B. s! {3 w+ s$ n& M hacker: how should you like?
6 \% F- R% R( A white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! . v" T3 s7 R! Y$ p  e
0 p) g5 ^  i8 l" ^' V
hacker: Hey,ralph lauren pas cher, I did a lot of fun : J7 T9 z8 C5 s) N+ M( }
white: what
7 \9 [' r8 D4 ?$ U' F hackers: I go to the forums posted the top
( l2 K2 p/ A) o; I" J, n2 r  D/ [ white: This very common ah
7 h2 J7 P. V6 n8 O8 ]1 S Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
/ T5 H' R# @1 O- K white: Wow, very enjoyable, and I can never dare, will be blocked!
% E% c2 K, M3 j Hackers: Yes, has been banned. 3 X. y" A2 I4 s) d5 L- `; s3 E( [
white: this is also fun? ! # u) W9 ^: J- C- c
Hackers: Yes, ah, because I use your ID & k0 T& ^+ R* S& |  k' L
white: you are pro? 0 c. {+ n5 n0 t9 Y! a5 Z2 }$ F6 P
hackers: You can say it. 0 b; F: W5 `: A  }
white: to what extent high?
9 G5 l* i- S3 H4 p hackers: ah, I am bored when their own 8 @% s9 }0 c, d3 v8 E
white black: Ah, this I will! 6 X2 T! U: @! N
hacker :#?%! You can? !
8 w2 Y! m/ G; i5 o* z white: Yes, ah, a black off it. . . . .
: m: W9 W( F' }  H" k7 C hackers: Go! + F# x5 N) E" v3 Z- Y, x4 |, l# A
white: Ask your question ! }; u! ^# n9 m$ ]2 \& N
hacker: says # Y0 k2 ^+ v! L1 J; D
white: Besides me, you can also control other people's computers do ?
- Q' @# ~. Q* Q6 S+ i' ~8 z Hackers: Yes you can. . . . 5 [/ d  @! T. c, [, V
white: no networking is also OK?
, b. c" b8 }, ? hackers:. . . . . . . * R) y9 I: q5 y4 a+ Q. j5 K
white: You can remote control to open someone else's machine it?
5 Q3 Z# I7 B, f$ t' R! e2 N2 A hackers:. . . . . . . .
( V! [0 v% F) m; o white: You can steal top-secret file it! ! !
* h* l. h4 R7 C; ]6 E2 ?" | hackers: I think you see more movies, go to sleep
) ~( X& V' e/ w6 U4 { white wash: my computer is broken
3 v6 M4 s1 ^/ C& K; G0 i hackers:. . . . . . . Just checked, your computer no problem
3 P9 J/ {) A4 F* j' i) X8 E white: that is, you bully me 5 C0 z  Z  T# K7 u# z
hackers: No ah
  Z4 v+ D$ x/ @. f- h0 K white: You are! MP3 files are passed to my no images! , V+ s# [: |. E! p% g
hackers: help ah ~~~~~~~ + ^/ ^- A6 N) C2 F
white: Ask a computer problems can you answer? 8 m* k2 q' V9 _+ F' `
Hackers: should be able to
" q# K  M# i3 Y! z0 ~  ] white: Which key on the keyboard the most handsome?
, f  y" {; S; }: |2 w( G hackers:. . . . . . . Do not know
$ N6 ?! a. \, K! Y  B white: of course, \! 3 ~8 R8 M6 [1 p6 J. b3 K8 O
hackers: halo ~ ~ ~ This is a computer problem? ! !
3 @9 D" E1 u1 m! S- m, y, Z
# ]3 k1 X5 Z. ^3 Z3 m; [% I white: ask you a computer problems you can answer?
0 X; H/ G2 V  F' v5 ?, m, n5 ^ hackers: If the problem is not your idiot - r4 C0 M/ r+ \5 q, K9 ]
white: I am serious! ! You can operate my computer?
0 h# r0 i/ ^$ b  J5 `1 | hackers: ah,juicy couture shop, yes 2 @: [/ C% z) X  M; a& S* ^2 g
white: that problem, you can solve it ) D  Z8 T2 l1 q- M
hackers: Your question is, should not be difficult ; " f0 @# ?& H+ G- h& b
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
# ]7 f. O0 z2 y$ d a hacker:. . . . I excused
) _# m1 Z: M# { white: we see meet you?
* S7 I: R4 M8 q' Z" ^( \. h: s hackers:. . . . This, not so good, why should we see + @# s9 {, k9 F3 O8 y( ]5 h1 b
white: I want to see you are not the same and I would like to
! Y  T/ g' V/ a, H Hacker: Oh, what you think?
2 X, Y3 J, A* D$ i* G white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights $ i1 l& q" K2 u0 d
hackers:. . . . You say that Spider-Man, boss! ; K( P9 U6 s+ Y* o# h# @
hackers: Kazakhstan woven ~ ~ ~ 7 b1 z2 y- l8 B6 F
white: You called every day, is not very curious about me?
5 i0 W+ C- v# D$ Z. P hackers: not curious, is the habit, easily came in + L8 V) ?+ k1 l) Y; C
white: Well, I have a good way to change your habit 9 `, j# w! f. ], p9 j( Q
hacker :. . . . Oh? ! Any way - Z( |4 K- l+ d, D9 p' N
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ % h; ?3 o7 E* _# O9 g# v
hackers: Genius ah! . . . . . You can also connect to it?
' ]  @# V1 p/ {2 {+ r white: to ah, and slowly the hymns! 7 z2 P) F, a5 v, k: |& F( l( P. {. f
white: you every day into my computer, is not very curious about me?
1 [( m, T  b: M6 X( | hackers: No wonder, only used $ ?; m- x3 w. U  p8 p0 T1 m, [
white: no you're curious about the place? % n/ s" Z( ~- z3 s" q8 e
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
' A) P: j4 ]$ k1 M+ W" E+ b3 v# L, h 1 |2 `4 q8 _8 ~/ m
white: I would like to control your computer 8 u" m  f) _8 C3 E, a' n2 ^0 e
Hackers: I will not have other people access my computer I will be mad ) N$ B4 ?  Z# m4 B; i' r0 {% Q  W
white: This is not fair! !
8 X2 l6 |9 `8 s9 k. J hackers: ah, well, you control the good of the
" ]* O" {6 b1 V. u3 h" ^ white:. . . . But I will not. . . . 0 ?( t6 B; ]2 e% v  }
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
8 _( a0 w3 o: [) i$ \ Hacker: I'm white
) Y9 I7 G( W! M4 g5 s3 y us again: This is probably the last time we met the ; T1 B& m% e+ z5 @% v$ h6 `
Hacker: Oh? What happened? & p  c* v+ P8 m, [4 T$ ^
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 6 L& n1 {# X$ l7 k* X
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
) e8 J* E, i5 a( i$ h( U( s! M/ O( N white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
2 T. j, Y# @: e- N8 E6 y: w hackers:. . . . . . . . . . & T/ j) S# R3 |& N
hackers: so late, and how not offline? $ W1 o( u, m3 R
white: Oh, is the next, and I went to pull the power
  `+ g4 W" T8 G( ?5 y hackers: Slow! You will not shut down?
. m, w+ a9 _2 p& M white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
# F; a' O. x  @- g1 ?0 j, w4 @' F( i hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
8 {& U. \' J8 c: m. ]/ O& f0 ?8 d white:. . . . . . I press the power to the hackers call it
9 _& R  }5 J9 t& A white: You are not really powerful 9 u4 l- ~5 y- r! L+ e2 U: T. t
hackers: so-so friends ) i/ \! }0 K" w* @8 Y
white: bragging! You have the ability to shut down my machine in the horse.
2 y2 x6 I9 F& n% G) v' g. O hackers: this place is difficult! You wait * N% X1 I+ ^4 F& H: C
hackers: Haha, buttoned regret it
( }+ H' M$ i0 e5 p white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
8 J5 O; G" u% l hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-12-22 15:18 , Processed in 0.119044 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表