埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 863|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer ! y8 Z  u. j0 I9 s6 w( O% c( ]
white: how control? 0 N: ?8 M' ^: m* i
hackers: white with a Trojan 2 @: O2 A/ a# O7 Z/ {% ?
:. . . . . . Where? I did not see
1 |# v$ Y7 ^7 r% q% i2 e# i/ H0 i hackers: Open your Task Manager ' M9 s7 @. @/ c2 h. r
white:. . . . . . . Task Manager, where?
- V  U3 t7 w3 D) q4 T hackers:. . . . . Your computer below! !
7 z( V  a% i/ G3 ]9 J white: \;
- j# [, e4 x. ^# E  ` Hacker: I have control of your computer + X% C8 z0 X) D
white: Oh
# M. \# F7 q+ I hackers: a funk? ! Hey
9 M1 x% f( t/ L2 A white: for the just, help me kill the virus it, many of the recent problems my Lord / U6 g" u; m8 J: h' `9 ?
machine hackers:. . . . . .
/ J! e& U1 R* H1 Z 7 f3 f4 F/ Y! F* L% H
white: how do you always in my computer and out of 7 v4 M  j* P9 f
casual hackers: You can install a firewall ) o, i. q0 F! [, P1 ]* H( e" y. C8 D8 ^
white: install a firewall, you can not access it? 6 G# A" A$ j/ y
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
" o0 B) e& m- \/ E8 n
; y- H! R. A2 ]! y' L( _  m small White: I heard that you will create a \! / r. y1 t1 `* J, N+ C* A* R
hackers: ah
" M" p. A; h: e; O  z4 e+ J# ^ white: you can control someone else's computer? ! ) v4 Y! _3 L3 H, ~. {
hackers: General is the   z. }4 W2 i( q, s  ]' d
white: you can black out those sites? ) w- O/ `) X5 W
hackers: of course, did not hear people call me a \9 V3 h9 F* O( s  h' f# U9 g5 |
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
  U/ S& b) E$ X2 |" @; C/ \ \! 2 ?6 l# y' n' E" ^
white: every day you come in, do not feel tired of it?
2 \; _  Z" g: B% G) e" C% { hacker: is a pain, your machine is the worst I've ever seen in one of the
8 i! L5 c% E# T  g; q: z$ j9 V" s white: is not it, this is Brand " z. D8 v. I5 i# y
Hackers: I was mentally retarded in addition to your yard game machine only virus a 8 U- W+ |8 ], f8 R- g7 w6 h, ^3 I
white: Oh ~ ~ that you see me The \. . . . Goodbye
, R6 E# i: Y  ^! Z
" R* X3 o+ ]" X hacker: Hey ~ ~ ~ I come! 3 H, k* l. x& b
white: not seen you for days, was my firewall blocking you?
7 H/ A7 N* X# j# D6 r hackers: Haha, jokes, on your machine is easier than my own, not you miss me
  u, F) x% V$ f white: I want to Please help a busy 4 l$ c  z; [! T# B$ J8 G+ N( l
hacker: What? % z' h3 |, S  }- K2 P8 e
white: you can not modify the point into the power system data
5 o4 @1 l7 N+ Y2 O& Z" n hackers:. . . . . . Why do you want to! !
( p8 m7 {! [* K; N8 u( ]9 z white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . # X$ ?3 y# k' O% a5 |( t
hackers: die! !
/ b$ f0 A7 o3 w
5 i3 q. T* N7 i0 W hacker: you die Where is? ! ! !
; s3 c: U* [0 P4 i0 v+ j white:. . . . Go out and play for a few days, ah, come to me why - H( T6 i& B# R/ z  G4 ?
Hacker: I'm looking for something " ?- n0 d$ D# m3 x+ ^& |3 W; ]$ `+ \0 g
white: what I find here? 4 T- l: v2 B. u! O2 h
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 4 \; M" E1 m$ Z: W- n

# J9 l2 c) q- `0 r% { most hackers : I come! !
6 T" p) d. w  i) J, F. . . . . .
) f, |3 O8 K. U. C' u1 g% _) w hacker: how not to speak? ! |% \9 z3 E) y
white: a bad mood
$ ?: f) L' c8 m hackers: Who bullied you? 4 p, A! r2 M9 Z
white: a Q No. I have not lost inside of my first love " e3 A& T3 L, |6 A& k: t0 c
Internet hackers: this simple, I get it for you
, }# e$ J$ W' w/ V# R" K white: do not get back ' v4 Z' f6 L8 Y5 u( m
hackers: No, tell me what number?
4 ]4 T* O+ K7 }! i7 _ white: Woo ~ ~ ~ ~ just do not remember
8 r& c& r: X/ m! e* o6 ]
. w- d4 `: T( [ white: you gave me out! ! ! !
* ?' o$ `# L9 y& M hacker: how wrong? !
$ J- p! o% p' k  D/ E' O white: You are not the forum to use my ID to play it? ! !
, d0 A' x. O  M3 G" o; V hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 7 a& {+ ^8 S- }( z
white: it does not work! ! ! : u9 K0 C$ k7 c* Y2 p7 @, z
hacker: how should you like? 7 L/ H8 }$ ]. ]5 s& ^8 _' h
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
; K2 \2 ~4 ?# n
) |$ B' O* x; z4 {! C& n hacker: Hey,ralph lauren pas cher, I did a lot of fun 1 I. l' G* s' y/ q* ]; ?, Y8 ?
white: what # @+ I$ b3 a) g0 G
hackers: I go to the forums posted the top + _; d# l! U) {2 ^+ B
white: This very common ah
/ p$ P+ a' K; `- W: m Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent * p8 A# g+ A; n
white: Wow, very enjoyable, and I can never dare, will be blocked!
0 e! ~8 J; @. V9 F+ J Hackers: Yes, has been banned.   m  L. v* J3 V  y0 ]- d
white: this is also fun? ! 9 ^% E& z1 S8 {7 p1 P
Hackers: Yes, ah, because I use your ID
$ ^2 b. H4 L6 k) s6 }' }# c+ m white: you are pro?
9 ]& F) C7 j* r& |: i hackers: You can say it.
. Z& _8 `( d$ N2 [' r) I7 b white: to what extent high?
2 o  s+ _3 Z- `5 ^0 g2 M7 M1 E2 k hackers: ah, I am bored when their own 9 q. y: s5 r6 Q1 V
white black: Ah, this I will! ! f" D# v6 L; w5 ]: L# z
hacker :#?%! You can? ! 0 M. B  ]# |. S% ^
white: Yes, ah, a black off it. . . . . / c& o' s; }/ |1 _* y# y
hackers: Go! # \: y: G# N; F- \7 @' r
white: Ask your question " T* j% j( \  t) p% t( d
hacker: says ) \# Y2 r6 j2 y# X/ A5 N4 Z
white: Besides me, you can also control other people's computers do ?
- l" q5 ]0 D9 q* v Hackers: Yes you can. . . .
; g8 F4 N5 K) L% k+ c. `0 j/ h white: no networking is also OK?
: `% o: G) C" K1 } hackers:. . . . . . . 4 ^; ]) i# a# Q/ u$ }
white: You can remote control to open someone else's machine it? ( [/ c  E( f* d$ g
hackers:. . . . . . . .
; i5 x! b- l4 ~- r. j white: You can steal top-secret file it! ! !
, W) O- F5 a3 b  k  Z hackers: I think you see more movies, go to sleep
2 k0 n8 o8 h( a6 @5 d9 S7 s white wash: my computer is broken 4 G( z5 |7 F. U- R8 V
hackers:. . . . . . . Just checked, your computer no problem
: {) A$ w6 [! {" S white: that is, you bully me + Y$ b+ [! ?: A1 f& I' z
hackers: No ah
1 D+ s% w. |, V$ {9 D; s/ ~8 \ white: You are! MP3 files are passed to my no images! 4 b* u2 z& R! ~7 B
hackers: help ah ~~~~~~~
/ w. F6 D- l6 ^" n( N! T white: Ask a computer problems can you answer? ) `, p+ d) F' q4 s
Hackers: should be able to
- a. R2 C; i6 {7 S3 \ white: Which key on the keyboard the most handsome? . h" z2 [) W0 G2 M8 D) v( p
hackers:. . . . . . . Do not know
! _: g, Q6 b* j) j white: of course, \! / N, D1 p# g: H
hackers: halo ~ ~ ~ This is a computer problem? ! !
4 |% \* \* n: G8 z 6 G) q& A4 T0 j# ^
white: ask you a computer problems you can answer?
/ v% F. n2 h  t) S0 V# [ hackers: If the problem is not your idiot 7 K- p: |1 S6 V. ^) `; t0 a# J0 g
white: I am serious! ! You can operate my computer? 1 N& w' l/ b: _# ]- D
hackers: ah,juicy couture shop, yes
1 s% _" Z4 I: w2 v5 ^  |+ o white: that problem, you can solve it
* w8 \# L- [: q/ n2 F3 b" T" R hackers: Your question is, should not be difficult ;
* r1 @" G6 _7 A: y8 d: g5 t white: Great, my fans do not seem to turn up,nike air jordan, help me change it
$ n# C: f6 ]& z& E9 u6 J a hacker:. . . . I excused
! c+ o: T0 t' _1 ^4 ~9 U3 w white: we see meet you? 5 A3 S4 e" K! K2 q" Z3 Q+ U
hackers:. . . . This, not so good, why should we see   Z3 ]  c# j+ u) t  Z7 [, m, Z/ l5 G
white: I want to see you are not the same and I would like to
$ d2 b' C& z6 \6 X! O5 h Hacker: Oh, what you think? * e) |# R2 h8 Y, m
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
8 F" l" R& P, l2 l" z* { hackers:. . . . You say that Spider-Man, boss!
0 K, s" g% W# D0 J1 v2 ~. p hackers: Kazakhstan woven ~ ~ ~ & B7 Y- D" [1 q
white: You called every day, is not very curious about me? 6 l" a7 H1 s0 g- F7 Q
hackers: not curious, is the habit, easily came in ( s1 F" |( C5 s3 k
white: Well, I have a good way to change your habit
' Y! R7 H! a; C$ D! l hacker :. . . . Oh? ! Any way . i2 M+ V# {3 r) I
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
+ m$ C' y$ ?  u; u. E4 j1 j hackers: Genius ah! . . . . . You can also connect to it?
- h8 \, T0 n8 s1 q6 c1 ]! ?# k white: to ah, and slowly the hymns!
3 h' B" l, g5 W7 Q white: you every day into my computer, is not very curious about me?
8 e& j" z- {: e0 n hackers: No wonder, only used * f' ]7 H) R- g! N1 f+ |$ w
white: no you're curious about the place?
- C3 r; w! b5 J) f: u( X- {1 N& x hackers: a ah, I always wanted to know your machine so much as when the virus crashes
; [' {0 q& a% j. E
. j: n4 b- A" L/ M. F white: I would like to control your computer ( \% Z( }# G. p' P. w6 v( |# ]
Hackers: I will not have other people access my computer I will be mad
! k9 `0 `' U* H/ I( S# \6 k white: This is not fair! ! 5 R. o6 r; h% v8 l( h# x
hackers: ah, well, you control the good of the
2 C8 ]. c7 o0 g1 @/ E white:. . . . But I will not. . . .
9 x2 X+ v* d6 Y( ~, A hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 4 T3 F' P  v. t! E, `( e3 z- S4 o
Hacker: I'm white 0 s, }- W& ^: s
us again: This is probably the last time we met the   R# w3 D/ @+ v) t0 O- I/ s/ i
Hacker: Oh? What happened?
1 Y; y# j5 U0 ?" k: B white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! % a9 B$ M( N" L$ Q
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye & \8 J0 g" C# V: z
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
6 M# U+ k6 k' J  } hackers:. . . . . . . . . .
: p1 P- G! Y6 ]2 @8 L hackers: so late, and how not offline?
$ o5 Z; B2 R$ E; ]% L# ~' u white: Oh, is the next, and I went to pull the power
. }' }) e9 Y! p9 V1 c4 s hackers: Slow! You will not shut down? . F7 K( b' y2 i3 Y! k+ \2 `
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 1 a4 M2 F. [1 q9 h, r
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
2 `* [' H+ a6 S, V9 h( [* _9 d" } white:. . . . . . I press the power to the hackers call it : ^7 \$ }: n/ G4 N3 t' m  i
white: You are not really powerful 7 \) Y3 ~$ R3 Q1 `: Q/ h% s
hackers: so-so friends
3 g8 t; J6 d6 V* x: j white: bragging! You have the ability to shut down my machine in the horse.
2 t  x$ _  R# j  s hackers: this place is difficult! You wait - u( ]' I/ N2 M" H
hackers: Haha, buttoned regret it # l& c9 Y6 u: c" _
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . + z! O4 t- m( _1 Q" p
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-5-22 13:20 , Processed in 0.130395 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表