 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer ( i H/ b3 [3 [ q" a, @
white: how control? / c! x$ \1 a+ k& z& [
hackers: white with a Trojan 8 T( n3 O! ]2 B
:. . . . . . Where? I did not see
/ }, n5 d! {$ G hackers: Open your Task Manager : g. m' ?0 [# i& E
white:. . . . . . . Task Manager, where? 9 e9 s% y% V. p/ N9 M( a
hackers:. . . . . Your computer below! !
& j2 P T, o% N W5 D2 v. Z. I. U# C white: \; % ]! s* f# D2 v F4 D" b8 J4 U/ H
Hacker: I have control of your computer
# i- B. n: u& k white: Oh
; u% `( e) S0 E7 T' b. c hackers: a funk? ! Hey
" c5 l* X) I1 W. Z) [1 J white: for the just, help me kill the virus it, many of the recent problems my Lord 2 \# y, _# I9 C- J6 k( p
machine hackers:. . . . . .
2 R- X- K$ D. C+ K( f% v . L+ ]- l$ `) V0 A$ j0 {+ a
white: how do you always in my computer and out of
( f3 E) I) v1 u# C5 N casual hackers: You can install a firewall
1 Z$ `% F8 J( v. t, ^' ], j white: install a firewall, you can not access it? : w6 y5 w, d1 Q8 a; h2 C3 W$ P3 C: w
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 8 m( r# H' a% d, M# P9 ]
* d# ` t" U* A: R) a
small White: I heard that you will create a \! - z N$ |0 m: @( Q9 u& |' h& l
hackers: ah
: \; x: }7 F+ v7 s5 Q5 d white: you can control someone else's computer? ! ' x4 H* t5 e( B8 m2 R& G# h
hackers: General is the
! [5 S3 l0 T y# F+ J7 | white: you can black out those sites? : g' X7 d5 p/ Z) @) v2 l. e: y1 {1 | Y7 ?* H
hackers: of course, did not hear people call me a \
& x8 v+ r& V- x4 O white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . / U* v; _2 S# I- V( O
\! & _: I" l# `, i0 L/ y
white: every day you come in, do not feel tired of it?
" q/ X7 ^) Z: |6 `' A8 q0 H7 c% J hacker: is a pain, your machine is the worst I've ever seen in one of the
. ~4 z5 q0 U# @ white: is not it, this is Brand
7 y# W9 v6 b( I. R Hackers: I was mentally retarded in addition to your yard game machine only virus a - e4 \: |+ I) g) y$ H3 } D
white: Oh ~ ~ that you see me The \. . . . Goodbye . s- _( g! o0 O5 f# }
, v$ y5 ?! {9 p- n S, h
hacker: Hey ~ ~ ~ I come!
N: E5 a! s; t: B white: not seen you for days, was my firewall blocking you?
* ~2 K2 S( m5 |, h hackers: Haha, jokes, on your machine is easier than my own, not you miss me % I0 r4 Q* a5 [) P+ F' K5 _
white: I want to Please help a busy . |2 [' h% W' C7 Q& L h+ Q
hacker: What?
% @" ]+ m$ ^9 n1 d white: you can not modify the point into the power system data
5 Q3 d h2 v+ n( K2 o hackers:. . . . . . Why do you want to! !
$ s+ V f" S. n+ o; Q white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
: u: q; }5 n# c0 t hackers: die! !
' @+ t# P# _/ h& Z* c 2 N3 _: k# {( {+ R: _7 Z5 l7 h
hacker: you die Where is? ! ! !
1 f4 K5 z# a. M. e8 c) q( ~4 }3 N white:. . . . Go out and play for a few days, ah, come to me why : H" ?. \ l/ {8 i
Hacker: I'm looking for something ) i2 O6 i' f3 R& _- J
white: what I find here?
1 r. s9 i1 E) W& z1 n; s# A hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 1 @ k2 H8 @, H2 k" R. `
, u$ M8 }' @2 @4 H most hackers : I come! !
$ e. q. ~/ z1 L9 Q! ^. . . . . .
% T; `' {' h% N+ l- b( U hacker: how not to speak? 0 I( Q, a4 K& I4 z6 U
white: a bad mood
6 ^% l* Y% J2 F hackers: Who bullied you? 7 D A1 W$ t+ _% h
white: a Q No. I have not lost inside of my first love " w. H0 C% j# H9 O8 X4 F1 T+ H4 R
Internet hackers: this simple, I get it for you # d+ }1 H' Y2 g! M) G0 f5 {
white: do not get back
: M) K& Q. K' q hackers: No, tell me what number? 2 ]% ]' ^% S3 K6 B, X
white: Woo ~ ~ ~ ~ just do not remember
4 d* b# p6 j3 K4 H % S7 c/ U& _+ X) L, p; V: M$ a
white: you gave me out! ! ! ! 7 P! _& V: K; N3 z% }. K3 i
hacker: how wrong? !
, Y2 Y. ^: U8 S& g. P" k white: You are not the forum to use my ID to play it? ! !
& t% l7 N$ k0 E9 V hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 7 v j3 l. B/ E" k& M- }% X- t8 R
white: it does not work! ! !
8 l/ o# N& R' |0 g hacker: how should you like?
Z7 u, @; }9 O+ p white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
+ x! ~1 S( K) |: I' o" Q# a; K. `
+ a" C# v2 D* v8 d4 ` hacker: Hey,ralph lauren pas cher, I did a lot of fun : {0 |) @; L1 T4 L
white: what 1 l8 f6 R: x* S
hackers: I go to the forums posted the top ; N: `2 m" e) m# Q7 D5 E
white: This very common ah
" r; |9 e% H$ k6 p Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
: Q2 _2 ~7 v% J& g3 N white: Wow, very enjoyable, and I can never dare, will be blocked! & S9 f B' s* \& Z& y
Hackers: Yes, has been banned.
9 k, ^7 c9 `$ t3 u r white: this is also fun? ! ; U, v- C. v& t( K
Hackers: Yes, ah, because I use your ID
& s: O" J) ?4 r0 o- E6 b white: you are pro?
5 \+ t/ V( s$ u% `7 w2 D4 T& v hackers: You can say it.
, W3 Q |" {& F- s% B" O white: to what extent high?
: f) x- `+ ]* j" m$ W hackers: ah, I am bored when their own 4 J1 F0 |; |2 G. K* k% g: b
white black: Ah, this I will!
c% z! U3 W, d5 i/ X2 L$ Q hacker :#?%! You can? ! 9 ^6 a0 ]! q5 q4 Q5 T) h
white: Yes, ah, a black off it. . . . . 9 W% t) _; E9 [4 j% e
hackers: Go! 3 e# r8 I0 c# C5 s7 |& Z
white: Ask your question ) ]0 X* k$ i8 V- ]; i
hacker: says $ \2 f% A6 a0 a" V C7 O
white: Besides me, you can also control other people's computers do ? . M6 |( z J4 z- x) e: c" m; L
Hackers: Yes you can. . . .
) W: y4 [- _& W: Q white: no networking is also OK?
8 f- g" z" D' K hackers:. . . . . . .
$ l# z% N9 ^& J white: You can remote control to open someone else's machine it? & ?# Y' X% _5 F Q. s
hackers:. . . . . . . .
9 E# B0 n" m. Q0 F! a6 }7 I" r white: You can steal top-secret file it! ! ! : U5 W4 P* A# A! u
hackers: I think you see more movies, go to sleep
' S m# P* N- Q) m: u white wash: my computer is broken
! I. k i6 L$ Z0 E2 {0 Q) ^ hackers:. . . . . . . Just checked, your computer no problem
& f1 | Z. }/ i3 v white: that is, you bully me + M9 c) T9 h6 c: i5 S, |- M5 h
hackers: No ah
4 B6 J9 p; s: n3 _# R: c white: You are! MP3 files are passed to my no images!
4 |4 n6 D! x, X2 k% q hackers: help ah ~~~~~~~
+ g' Y8 a9 q( Q4 y. Y* u white: Ask a computer problems can you answer? 0 S6 M3 l# T" z- J! k! e: v) J5 y
Hackers: should be able to
) l" r% i! w6 s0 W* ] white: Which key on the keyboard the most handsome? $ \: ?/ @: M) d' P! {
hackers:. . . . . . . Do not know
& f# _5 a$ s5 u white: of course, \!
# r" o ]; k0 U' ~2 h, R hackers: halo ~ ~ ~ This is a computer problem? ! ! ( s! b5 N+ I* G$ q2 _0 Z
: q, f- R( ?- v% i4 }
white: ask you a computer problems you can answer?
9 t U% Q. B8 Y9 U( a3 m hackers: If the problem is not your idiot 7 h: N3 A, c, r. ~
white: I am serious! ! You can operate my computer?
6 ~# G$ B" I) |/ L% Q2 Z. e hackers: ah,juicy couture shop, yes 7 \9 G0 T0 p2 U0 }" ]$ |
white: that problem, you can solve it
8 x1 _% `% D4 V W hackers: Your question is, should not be difficult ;
L l1 C6 b% o- { white: Great, my fans do not seem to turn up,nike air jordan, help me change it
' \! U- h" S/ [! c/ D2 k+ } a hacker:. . . . I excused
, g' J3 z+ E5 y9 h. X2 ?4 B white: we see meet you?
( a" A! `2 \' T. K0 r7 X/ s hackers:. . . . This, not so good, why should we see
. {5 V5 }( o* Q7 P% V white: I want to see you are not the same and I would like to
8 e4 I1 e2 C) L1 K% t- d0 ] z9 U Hacker: Oh, what you think?
- P9 x* \3 P. j% A$ O; R. z6 i white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
( d) Q' j! v0 T2 Y% _# e W3 ~. f hackers:. . . . You say that Spider-Man, boss!
. }; w6 n1 F2 h; U hackers: Kazakhstan woven ~ ~ ~ 6 Z! C. ^ A5 ~7 C- ]) H
white: You called every day, is not very curious about me?
. Q; P# H$ _8 |4 @+ z hackers: not curious, is the habit, easily came in
& x$ [/ H6 J% s {- g8 b1 ? white: Well, I have a good way to change your habit
# y$ g) \3 l* O; G$ S0 X/ k# \ hacker :. . . . Oh? ! Any way
3 s' g A7 X. l- j4 e white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ " ? e$ W& V6 K
hackers: Genius ah! . . . . . You can also connect to it?
0 \( z- `8 V: w) c/ D2 D4 r white: to ah, and slowly the hymns! 2 D8 \/ H; N: u9 g+ z
white: you every day into my computer, is not very curious about me? # w/ h! T" R! L; C P
hackers: No wonder, only used ( Q! _' F0 e2 l8 @6 A' j7 Q" @
white: no you're curious about the place? 1 C6 L0 ?* ^) ?, M
hackers: a ah, I always wanted to know your machine so much as when the virus crashes & c. l0 U: z4 X+ Z' Q
0 z( J' E. @4 [. M
white: I would like to control your computer
( A1 U- R5 T5 U1 `: [8 ] Hackers: I will not have other people access my computer I will be mad
( i3 ]9 f0 [; Q white: This is not fair! !
- H; Y% z3 a% }- {0 j/ } hackers: ah, well, you control the good of the
0 V/ m* O( `. o9 [! M9 @0 X white:. . . . But I will not. . . . ' O1 o# B) ^% E! \% d1 m/ Y, z
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
, ^$ S" e; U) i/ ?9 ^ Hacker: I'm white , r& O# Y) B: \" m5 p$ E
us again: This is probably the last time we met the
' g, ^1 R0 U% [ Hacker: Oh? What happened?
9 q( t& \/ R8 z) f; ], \" d white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
; E: R- H/ n( {% w1 F: V* i hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 6 N! m7 P0 V1 a
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
# i) {3 g7 S2 K, k* c4 @ hackers:. . . . . . . . . . & o2 I' J( [* n4 [6 y; c# d- Z2 F
hackers: so late, and how not offline? 3 F: X, _& z" l% }1 p# }
white: Oh, is the next, and I went to pull the power . q7 Q. A0 W p4 s# U
hackers: Slow! You will not shut down? & @9 s6 f z5 N: f
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
: `1 _- u- p; \/ S hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \, J. }2 h* U& J& `) V( _" ]+ z
white:. . . . . . I press the power to the hackers call it $ Q8 a+ n8 u' E% `8 o
white: You are not really powerful
3 ^0 }1 w3 B5 c hackers: so-so friends
* W7 S- B) ]8 S0 c$ F) ~, F) F white: bragging! You have the ability to shut down my machine in the horse. 8 g! I9 ~* I5 @+ O' H
hackers: this place is difficult! You wait
6 H$ _9 [2 `) ^( E/ `% t& }$ @ hackers: Haha, buttoned regret it
# Z+ \5 O$ v: ]3 G( w3 \; Z white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
+ R# [% p% P% F9 s: a/ R& D. m, I hackers: halo ~ ~ ~ ~ |
|