 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer $ ], L: t0 B- G
white: how control?
N9 \- \" u& @7 J, f hackers: white with a Trojan 0 i2 F' L/ N# m1 \6 d: t) {- w
:. . . . . . Where? I did not see $ w) R1 o5 |4 @1 e" t
hackers: Open your Task Manager " G! z0 k* R! Q8 r Z
white:. . . . . . . Task Manager, where?
7 @$ ?7 V) w: f9 W hackers:. . . . . Your computer below! !
r `- @& n2 y; m" {/ ] white: \; % E, T5 \2 J" E" T
Hacker: I have control of your computer 9 ^ K, M+ r5 D6 O5 z
white: Oh 0 P5 d5 R/ X1 X& \+ T
hackers: a funk? ! Hey 4 A! }# M: p/ r( [
white: for the just, help me kill the virus it, many of the recent problems my Lord 6 I i) _# _; T9 k& H: X/ B
machine hackers:. . . . . . 0 P. F0 `' k. u& \2 B0 X
; W5 [2 p L9 s6 k2 ~- \
white: how do you always in my computer and out of
( T8 X, A1 e2 U5 {2 v" C8 Z casual hackers: You can install a firewall
& @; J1 Q% V6 u" b5 H0 z( y( \ white: install a firewall, you can not access it? " J: ?' J6 q! x! W' n# a0 Y: j
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
3 p R% O; A4 ^ x$ Q1 P 4 ^8 T" p t! j% B9 u; K4 v& u& X o
small White: I heard that you will create a \!
1 g1 Y( m- J9 X* R/ @ hackers: ah ~3 X2 \7 n+ U2 A% B
white: you can control someone else's computer? !
) f5 Y; {3 w" g! S# P/ j) d2 Q: K c hackers: General is the ! v$ ^/ i8 v, M
white: you can black out those sites? % t# L* ]9 C* y6 W2 ~% w
hackers: of course, did not hear people call me a \; p# T1 D3 M. D
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 W* v, p$ \2 M* n4 d \!
$ c! z" W' |8 o9 e white: every day you come in, do not feel tired of it?
. X0 m" ]+ l, z2 w hacker: is a pain, your machine is the worst I've ever seen in one of the M. a5 a" J; `+ z
white: is not it, this is Brand 1 n7 ]: r) y. z" E) k2 R, p: i# u
Hackers: I was mentally retarded in addition to your yard game machine only virus a
2 x; W8 T% T& x% _' [ H white: Oh ~ ~ that you see me The \. . . . Goodbye 9 }1 S i! b4 [! [- ~1 M. f. V# V
! z2 D: r7 h# ]- N/ L j hacker: Hey ~ ~ ~ I come!
1 D9 `& K% Z$ |- I- j- B% ]8 U white: not seen you for days, was my firewall blocking you?
5 F, D' _9 m3 I' F# S0 E hackers: Haha, jokes, on your machine is easier than my own, not you miss me
, r4 E2 q2 O! H- i) H white: I want to Please help a busy - v3 h! g( i8 ]
hacker: What? $ C; d& b' ` _0 `( d
white: you can not modify the point into the power system data ) N) c3 q3 d3 Q d7 ]
hackers:. . . . . . Why do you want to! !
% ^- |$ Q6 y7 F$ e* A7 L+ D# O* F white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ! }7 R& ]8 y% M' s) v
hackers: die! !
E% q: U* Z* ~% O0 e9 U; j
7 [8 ?! ?* x7 T* `" r8 a hacker: you die Where is? ! ! !
. e/ q+ ^, R& A7 Z, c" j- B8 N- \ white:. . . . Go out and play for a few days, ah, come to me why
& g. N' w% a% ?0 V Hacker: I'm looking for something ) t1 F1 O) a h5 D9 v! |( L
white: what I find here?
& t# _6 D6 h6 @+ P! c5 _ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
2 X$ C( x7 D* n7 o
# n3 u9 R/ M1 k, ]7 y% b most hackers : I come! ! 0 i; i; d$ K& m; J7 ~& a- [
. . . . . .
" @) O/ H& C" u hacker: how not to speak? ) D! |, Z" z7 p
white: a bad mood
5 |$ B" \. \! r2 l hackers: Who bullied you? 8 @3 Q* o* X0 c; a& W, w5 a
white: a Q No. I have not lost inside of my first love " {# x# k; u( G/ F
Internet hackers: this simple, I get it for you
" n$ G$ Z( I u4 C white: do not get back ; [: q* c6 H; m1 N
hackers: No, tell me what number? & o v) c: q; F) H, N7 {) G1 X+ q
white: Woo ~ ~ ~ ~ just do not remember V' S8 t. }+ P: z
- w/ o( E0 L6 s2 U z0 |/ b
white: you gave me out! ! ! ! 1 j/ s8 Q( C& d5 C) s
hacker: how wrong? !
9 D2 I. }" P. n white: You are not the forum to use my ID to play it? ! ! & n; P3 ~& C! z; C [3 G" A+ O- |
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
5 f4 j( E+ J' W white: it does not work! ! !
# L9 J, D; [# S0 v hacker: how should you like? , g# g% A' F! x; I4 |# v
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ) [: [0 q! _ k/ @; ^1 h
" l4 Q- R' R$ \" n8 X# v hacker: Hey,ralph lauren pas cher, I did a lot of fun " a5 p c; ?& R2 a
white: what
2 Z8 Y! p( U+ Y6 x hackers: I go to the forums posted the top
3 L1 M* W9 D7 F# Z: k7 A white: This very common ah * i% r" D! [: J# v5 X7 \0 s& f# m! \! ?4 H
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
* _. y3 ~- J( O9 L white: Wow, very enjoyable, and I can never dare, will be blocked! 8 e/ R1 u& v9 M1 ]& g( t/ }( x
Hackers: Yes, has been banned.
( m' m( A* f; t- Z) _5 ` white: this is also fun? !
* e4 i' O: g; j( t! {- f) ` Hackers: Yes, ah, because I use your ID ' ~) _- C/ s2 B. {
white: you are pro? 4 ?; y/ `% v2 O2 J7 O( c4 k+ w
hackers: You can say it.
' |" \: H$ j& C5 ?6 o% y% `# d white: to what extent high?
2 o, o& z! o4 E hackers: ah, I am bored when their own
# D2 I& d4 h/ r white black: Ah, this I will!
5 b: N( `# x, P, i+ @6 d+ {/ y1 U" v hacker :#?%! You can? !
6 c; s5 ?. \+ g1 v2 C5 r! } white: Yes, ah, a black off it. . . . .
# o. ]6 `# I% U, Q* B hackers: Go!
+ R) s/ r- n1 W white: Ask your question 2 p- ?8 b, w3 o( @! K
hacker: says
5 {% d3 e( F) \ Z2 P white: Besides me, you can also control other people's computers do ?
: b3 r0 D' v7 n `1 O, H% s Hackers: Yes you can. . . . ) u) p. G( e& T. A" U, _+ S& v
white: no networking is also OK? 3 n% c5 X/ c! `! H' ^7 q
hackers:. . . . . . . 8 V3 z" Q- @4 z) T$ b3 I6 [: s/ G K6 T
white: You can remote control to open someone else's machine it?
% \1 _7 b3 |0 {' ]& e* X hackers:. . . . . . . .
% @1 O& y9 {" C( R- h, s white: You can steal top-secret file it! ! !
9 {! `( |2 P: U, a+ v" P hackers: I think you see more movies, go to sleep
5 P% \- U# `6 _: E2 x white wash: my computer is broken ) x( e, s% k$ B7 _, y
hackers:. . . . . . . Just checked, your computer no problem
: O6 r, v8 @5 X- N2 O ^9 o& n. h white: that is, you bully me
; v) g8 `2 m+ J' v6 N hackers: No ah
9 P- f* h2 O' k. p0 n, k. q white: You are! MP3 files are passed to my no images!
& [$ g; p+ J5 d5 w+ ], B y: p- [ hackers: help ah ~~~~~~~
/ y! s+ h& N: i2 h! F+ j j: C white: Ask a computer problems can you answer?
$ i( t& R0 [- L/ S1 b Hackers: should be able to 5 I/ ?3 Q5 z" S& u8 h p# J4 V7 ~
white: Which key on the keyboard the most handsome? 6 K' K0 r0 s2 Z
hackers:. . . . . . . Do not know
! V0 j. U! O4 g8 y! k( A5 b0 g white: of course, \! - [9 {) G4 E: E* K5 F- M
hackers: halo ~ ~ ~ This is a computer problem? ! ! . S |' S$ F. B. v5 P$ W/ v
, }8 y8 d( a$ G1 k( A* t6 R white: ask you a computer problems you can answer?
* x6 y* A* ~1 w$ h, Q8 J hackers: If the problem is not your idiot + S, Y r! |# j% a0 l
white: I am serious! ! You can operate my computer?
" p+ x2 u; [7 f$ O( T hackers: ah,juicy couture shop, yes % `9 k5 [( V4 B0 h+ i6 D
white: that problem, you can solve it ! Z+ W/ }9 }; V/ \
hackers: Your question is, should not be difficult ;
" s/ f$ |+ x' L" x; q white: Great, my fans do not seem to turn up,nike air jordan, help me change it
) b* o$ |7 N2 |" D a hacker:. . . . I excused 5 m5 h$ ~$ Y) Z! O# \; T4 `* N1 L
white: we see meet you?
$ l( Z5 V$ \0 V1 U, a hackers:. . . . This, not so good, why should we see
: z$ V% h0 e0 _ white: I want to see you are not the same and I would like to % }5 Z) J2 j4 J" n
Hacker: Oh, what you think? & J- P" k$ p8 a# {, b# B' ]
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
" u0 _; e* `4 ?/ `0 t) w hackers:. . . . You say that Spider-Man, boss!
$ y" ~, Y4 [5 b: @ hackers: Kazakhstan woven ~ ~ ~
7 w; V9 D: T* P' j0 z4 C white: You called every day, is not very curious about me? 0 R2 z; d4 h+ x' T5 q, E
hackers: not curious, is the habit, easily came in 2 G7 a/ q) S) o) N- q. I% C
white: Well, I have a good way to change your habit
1 H) g- |1 m+ J( X; L3 M/ E hacker :. . . . Oh? ! Any way
4 z9 u7 I; o8 ] white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
( Z3 |7 R) r- X8 z9 }8 }2 a hackers: Genius ah! . . . . . You can also connect to it?
" l+ J8 V: b' h" p8 e( [3 b0 I0 ~ white: to ah, and slowly the hymns!
, B; n# R2 q+ n8 K- i' P$ }8 P white: you every day into my computer, is not very curious about me?
8 [ r& E% \7 G$ b( z4 M hackers: No wonder, only used 2 j! F" [2 D4 z+ C
white: no you're curious about the place? 8 u! \! C8 J- t$ }
hackers: a ah, I always wanted to know your machine so much as when the virus crashes / a8 l$ ]8 W& m& X- v
& v" x7 g2 E( I1 e) P; ~ white: I would like to control your computer ' F- I( o& i9 U: I
Hackers: I will not have other people access my computer I will be mad " ]. @( b$ n9 ]- g$ N0 [0 w- C
white: This is not fair! !
. ?( ?, z5 z, c: ^, U hackers: ah, well, you control the good of the # v2 a8 ^1 u0 o3 [" k
white:. . . . But I will not. . . . # T9 n9 v$ _2 T$ i9 ^
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! I! k: Q+ @ u$ E9 k, D7 q1 E
Hacker: I'm white
) g: M+ {& i& | w$ r& ^+ L us again: This is probably the last time we met the
# R1 h5 T' @! i2 A3 G! F Hacker: Oh? What happened?
$ t! U0 b" B9 T8 ]; V white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 5 I: }$ B2 y% r6 [7 b9 b
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
: c* M) J! g7 P$ d4 N5 S$ @# g white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
/ G8 T G% b4 ] hackers:. . . . . . . . . . : u' E5 Y. q# B4 `4 s
hackers: so late, and how not offline?
3 s* U' }* d+ |; `. x white: Oh, is the next, and I went to pull the power
/ |( k* h' r9 v: j! U, }# ^* P hackers: Slow! You will not shut down? / H$ C: @- h0 x. \- R# f2 o
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power % a" P( E6 ^/ W' o6 x- w4 w
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& \2 X* t, `, F3 X; A9 j1 q
white:. . . . . . I press the power to the hackers call it 7 f( W7 H! I& i
white: You are not really powerful
`& ^3 L) U2 c1 e1 c hackers: so-so friends 8 x& p1 r) ]6 r/ J. [
white: bragging! You have the ability to shut down my machine in the horse.
3 @- V# a6 V# q5 `& b; m! a( j; ^ hackers: this place is difficult! You wait & |( A! ]% y8 M5 s( {; l
hackers: Haha, buttoned regret it " e6 z8 D% _' Q. U; C$ `
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 6 ?. c Y4 u$ F
hackers: halo ~ ~ ~ ~ |
|