 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
" ^6 Z: [$ G' f+ ~ _; @% F; |3 K white: how control? 8 [" C7 R/ j: a: B3 `4 a
hackers: white with a Trojan 4 k2 ~$ r. U: N9 x! ^
:. . . . . . Where? I did not see
* ]: u: h! d" w6 K& i+ ?/ T r hackers: Open your Task Manager 3 n0 y" O# u g& }$ }# N0 E
white:. . . . . . . Task Manager, where?
! @' Y4 \) h. K: a G; G5 P hackers:. . . . . Your computer below! !
0 e4 z0 ?- i. C& H white: \;
! o3 d0 ~( K2 ^8 k( [1 S8 k Hacker: I have control of your computer , d; l. c$ p$ ]
white: Oh 4 p3 Q( a; _3 F, M+ c9 A
hackers: a funk? ! Hey / t8 E) c: w% c/ ~$ K$ n T
white: for the just, help me kill the virus it, many of the recent problems my Lord 6 ]% [* l$ G L+ t: n/ O
machine hackers:. . . . . . 6 n% ?5 l: y0 x5 g6 E* ]1 T+ Q
' V/ n! C* o' F( D. I white: how do you always in my computer and out of
6 ~0 T! b3 ~( b3 A+ ` casual hackers: You can install a firewall L- |7 c# q( M$ z& y
white: install a firewall, you can not access it? 5 ~5 e7 Z0 d' R1 ~, X1 G ^# R
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah . d9 i5 V" S. i8 ^: ]1 K& ^
# b9 h0 S. x# m4 y( \6 [' E
small White: I heard that you will create a \! % m. K; `! Z1 c! V: W; y
hackers: ah
6 K' z2 t: V8 x/ a! j white: you can control someone else's computer? ! u2 j% K* G. k% Q0 A/ X9 F3 u- D! ^
hackers: General is the
0 q. Y/ H( v! d Y+ u white: you can black out those sites?
; w7 d! n7 |% @$ A/ @ hackers: of course, did not hear people call me a \' R1 W! Y: o9 H9 y* D, f: l
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ( n4 c6 b& n& L# T8 M$ }
\! , B; X, q7 V& Y* {- _
white: every day you come in, do not feel tired of it? - N1 T- P" }3 a9 A& q) ]
hacker: is a pain, your machine is the worst I've ever seen in one of the + \! \& U1 f8 ^% h5 d. t
white: is not it, this is Brand
' J* ~# n# R6 D# z3 i7 q i" u Hackers: I was mentally retarded in addition to your yard game machine only virus a
& j; y8 X, ?2 M4 T% U white: Oh ~ ~ that you see me The \. . . . Goodbye
3 X4 L6 j% r# A& ^1 z
( M* C" Q) M4 i* h( C) [ hacker: Hey ~ ~ ~ I come! : r( N7 ?7 \, x6 n- B: ]
white: not seen you for days, was my firewall blocking you?
( ^" s" y! R o7 d hackers: Haha, jokes, on your machine is easier than my own, not you miss me
, s7 s- m% J# ^: u% I% u( } white: I want to Please help a busy 4 Y# G5 _# A: S# y$ O* b6 H5 h7 k
hacker: What?
' @+ X$ j2 ]( Z* j white: you can not modify the point into the power system data
6 U' l4 p4 J/ Q; X4 c/ | hackers:. . . . . . Why do you want to! ! / V3 @. ?% W ]- i$ v1 M
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
+ B6 s5 C5 H, Z$ Q/ q hackers: die! ! 4 F3 U" }' m' y: N$ f _& A# A! s
8 r: m) h0 A& i) y& s, K hacker: you die Where is? ! ! ! , E& ? h( P( h1 J8 U8 u
white:. . . . Go out and play for a few days, ah, come to me why
- @" J. \! M5 J4 i8 | Hacker: I'm looking for something
+ K/ M. n* e5 v8 T white: what I find here? ! {& A0 b X8 d
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 4 S6 D* n. O5 R4 T& ]
@7 N) b" `! e6 D1 l% N most hackers : I come! ! / M% }3 ^3 R0 ?- O
. . . . . .
/ {' L* K. L' G* m) S4 M hacker: how not to speak?
) N# b% S: E9 u9 c( M/ v! B2 } white: a bad mood N# O; C& Z0 }% m8 k! H6 R5 k5 B
hackers: Who bullied you?
2 B/ d# ~8 n* h/ ^' |6 i white: a Q No. I have not lost inside of my first love 6 C6 k. l) R/ h* g
Internet hackers: this simple, I get it for you - K2 e2 q$ Z" D- P0 _- K
white: do not get back 2 x; r( B) V+ I! r
hackers: No, tell me what number?
4 P9 v Q1 _% n1 O& Z0 x0 S white: Woo ~ ~ ~ ~ just do not remember
% b( n" H- M) P9 n' h8 Y' d ; ` [& E, C/ j, B0 H
white: you gave me out! ! ! !
/ [3 F3 U+ N! c- T4 s hacker: how wrong? !
z) Q5 Z0 f- F9 t6 s! O% J white: You are not the forum to use my ID to play it? ! ! * j# @8 x& ~- F" s
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 5 q* Q, H! P$ t7 t. [
white: it does not work! ! ! 5 Z, C# g, T% g6 v% E3 m
hacker: how should you like? ' k, t' V6 }; r3 y7 |
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! H* `+ p. b- G/ e! \ v
' d! g1 ~7 }& u hacker: Hey,ralph lauren pas cher, I did a lot of fun ) Q! w$ o/ Z3 j) z9 B& [% U
white: what
+ t, P7 ]( P) Y4 Z6 u3 N' E hackers: I go to the forums posted the top : e5 [# `# O8 h H1 C1 ~
white: This very common ah
6 c( x* x6 j7 _! V) t Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent / m) R% O5 ^% A9 s" N2 a
white: Wow, very enjoyable, and I can never dare, will be blocked! - k z" `6 Y% Q, z2 F
Hackers: Yes, has been banned. 2 Y% I( A: v6 u) y
white: this is also fun? !
5 r" m" I4 ~8 O+ k! Y Hackers: Yes, ah, because I use your ID
( }: n% N% @0 M2 L8 x white: you are pro? - O5 e* K3 g% G' f+ N c
hackers: You can say it. : C4 b3 _+ l, R! s
white: to what extent high? 8 M/ `! C. C3 i* }* z0 u+ S
hackers: ah, I am bored when their own
) i- m/ a) \9 `* Y white black: Ah, this I will!
, U, M& M% Z+ B$ u6 {; b# r/ R hacker :#?%! You can? !
2 S! f& O7 G% T6 D, ^* B white: Yes, ah, a black off it. . . . .
. |" S; a" e! L1 j& i' u$ n hackers: Go! e5 X* A4 {; M& X, K1 m/ v/ g
white: Ask your question $ X* l Q6 Q/ Z/ Q
hacker: says
, S) D- c/ A* `8 c; e( B# x9 \( g white: Besides me, you can also control other people's computers do ? / ^8 s3 i$ s( H, Q9 B8 q6 y
Hackers: Yes you can. . . . ; M/ `/ }8 K q: c1 ^
white: no networking is also OK? ' [; r& x: r4 N0 I" | w! k
hackers:. . . . . . .
: n3 A- Z4 Q; \7 ?! O1 B white: You can remote control to open someone else's machine it? 6 q4 x% E, w5 d; }" E& H
hackers:. . . . . . . . 8 S# W! P! C& e; h$ p0 @! i
white: You can steal top-secret file it! ! !
/ }/ N% w( W) H- K( [ hackers: I think you see more movies, go to sleep
4 S1 T1 {8 l/ l" T- p) g% n white wash: my computer is broken
- Q2 t1 W+ m4 A) h- Q hackers:. . . . . . . Just checked, your computer no problem ( s" @, R9 B/ ^5 P( M- V
white: that is, you bully me
8 U4 r1 N7 T: ]5 h- c7 h# G hackers: No ah 4 E& j3 ]# @$ C: F. A- _3 ^
white: You are! MP3 files are passed to my no images! 9 E9 k7 [) m) ?+ }+ m+ A
hackers: help ah ~~~~~~~ 8 g, C* ~- p5 @
white: Ask a computer problems can you answer?
6 Q8 E7 w2 z, I3 M/ x* ?9 q7 Q Hackers: should be able to 6 x1 `$ k) ?! t7 Q- @
white: Which key on the keyboard the most handsome?
& o3 X% |: m$ C' l) [& @ hackers:. . . . . . . Do not know
8 b. p6 W3 K) ~8 v. F( ^! e white: of course, \!
# \+ E% ~3 x9 l0 s& A hackers: halo ~ ~ ~ This is a computer problem? ! !
1 d9 |) n" \8 o3 i X 0 `. [5 {; p$ D8 P3 x6 L
white: ask you a computer problems you can answer? / @4 I: \9 U0 Y8 T" b
hackers: If the problem is not your idiot 8 H+ Y0 D4 G4 g
white: I am serious! ! You can operate my computer? $ @- }! a' w9 J1 e! [7 D# _
hackers: ah,juicy couture shop, yes $ \; g" }% n7 l
white: that problem, you can solve it 9 _% ]8 l1 |5 Q8 ^8 ~* n; v. j2 a
hackers: Your question is, should not be difficult ; ' s; z' f5 S+ Z$ Q% h
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
% a3 |, D# m) {# f a hacker:. . . . I excused
: m* A7 {" x# |% M; [- n white: we see meet you?
; `) F0 Z4 s) w2 \ d" b* [ hackers:. . . . This, not so good, why should we see / O, u2 V+ ^) B+ X* f# O6 X
white: I want to see you are not the same and I would like to % Y. U3 c1 S6 x) Q
Hacker: Oh, what you think?
! D$ b" M' E3 V9 i! @" I; I3 ?1 K white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
6 Q4 s* c* L% {8 r hackers:. . . . You say that Spider-Man, boss! ; l T# x2 ], z
hackers: Kazakhstan woven ~ ~ ~ % k- ^/ a2 X& n |6 b
white: You called every day, is not very curious about me?
1 r4 I: z: w g' X6 X( K1 h hackers: not curious, is the habit, easily came in
- K0 O' n* m5 s$ \( j, q% r white: Well, I have a good way to change your habit
9 x; e& f3 K1 Q* k, Z4 p hacker :. . . . Oh? ! Any way
& n. ?- I! P* z4 b: m: c/ U0 p white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
0 G& b) U& j, ^+ o; u4 ? hackers: Genius ah! . . . . . You can also connect to it? 2 z# r4 i& O. n+ J0 w, O" p
white: to ah, and slowly the hymns! 7 R v ?4 D0 ~1 x" u; X
white: you every day into my computer, is not very curious about me? & T N8 s8 c( T w9 [
hackers: No wonder, only used
) H6 j2 v7 t- c. S' e: V1 z; ? white: no you're curious about the place?
" J n7 a. i# C& }1 b: | hackers: a ah, I always wanted to know your machine so much as when the virus crashes
( s! C# x8 H: D# T
# F8 U2 q1 q t) j, d+ z white: I would like to control your computer
/ y' I6 ~8 X: \7 E" ? Hackers: I will not have other people access my computer I will be mad
; h& ]) [" m' ?* {7 D white: This is not fair! !
5 k! M) X; Y4 ]( y: z( E; D hackers: ah, well, you control the good of the ; l: c8 p4 g; h- q3 C. m
white:. . . . But I will not. . . . * K( V/ @8 l# n$ g$ \, ]. ~
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
' V. B7 |- P- K$ T Hacker: I'm white
+ [9 T0 j) U5 z2 } us again: This is probably the last time we met the
8 Z: N1 N4 ?- \ Hacker: Oh? What happened? / S# Z; U2 @/ z% B1 \+ i9 |( u
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ! Z, S. o, W# ^3 N6 a' k9 \9 A- F
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye - e3 ?5 h9 ]4 `0 x$ w" @
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! ! H# R: W$ i3 T4 b0 c7 h; J
hackers:. . . . . . . . . . 7 R. a( I" d. |- ]6 n; F2 h. O
hackers: so late, and how not offline?
) y% Q, J9 }# }% w6 j white: Oh, is the next, and I went to pull the power b% l6 D, M+ j$ u0 J
hackers: Slow! You will not shut down?
" T7 j1 u& b+ z' s3 @( l. P white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
2 f7 W2 @% q/ Z b hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \9 J0 s6 [$ G% @! P: Q
white:. . . . . . I press the power to the hackers call it
% @$ `% v6 W0 S5 p white: You are not really powerful
5 @$ Z8 Q/ C. D, W! M hackers: so-so friends
' W5 P) k& r: y' }6 ] white: bragging! You have the ability to shut down my machine in the horse. + ?3 w# T/ t% q8 E+ [4 p2 r+ p4 Q
hackers: this place is difficult! You wait
( W j' Z; U1 i M/ d1 r2 Y) o hackers: Haha, buttoned regret it ; Y) j$ h5 \& ?1 S' z; t
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
( d$ x( H; S" g# D+ p$ X A4 r$ z# L hackers: halo ~ ~ ~ ~ |
|