 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
^% L; U) Z% S# Y, I% M6 L white: how control?
& H2 F& u0 C8 i9 Q4 E; M1 y. j& R hackers: white with a Trojan
( u# x7 S1 T e6 n:. . . . . . Where? I did not see
! V+ t7 |: b- e/ O" c. f8 N2 O' H hackers: Open your Task Manager
/ k+ ]$ z% w4 X* |: s) w9 q white:. . . . . . . Task Manager, where? ! D8 R' L% J: _2 v$ _& C1 ]
hackers:. . . . . Your computer below! ! 8 @8 o( D6 _. W+ f0 M) b! A4 Y
white: \;
( j, {0 s% U& c- r/ W) K Hacker: I have control of your computer 5 x, C5 o2 o& N9 w; u+ y/ X5 f
white: Oh
' b7 w# p( j1 S9 v) u+ _( q hackers: a funk? ! Hey 2 F9 R, w5 n! D0 F
white: for the just, help me kill the virus it, many of the recent problems my Lord ' b3 e+ f. A9 M, A( v
machine hackers:. . . . . . + h# X8 y9 d) J
) g# m; c; l, w, q* o white: how do you always in my computer and out of - n( n: [( h, l0 V4 p3 o8 O; L
casual hackers: You can install a firewall 0 J" x6 p/ {" x
white: install a firewall, you can not access it?
, F; }0 V7 b$ s# @ hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 9 o' u6 M6 z( Y7 E8 K1 {8 O
% }; x Y4 h* V. S) q9 @1 Y/ H small White: I heard that you will create a \!
" N- S- Z" m" E, k5 [/ l# E) O hackers: ah
# x+ \* T8 f5 e: {) g% _ white: you can control someone else's computer? ! 1 c! }% [% v1 ~' w2 K7 @4 Z, U
hackers: General is the
8 n0 k1 l. }+ `" x/ h white: you can black out those sites? 9 b: v3 z5 a2 Y% H% q' t
hackers: of course, did not hear people call me a \' N0 e4 X% o+ T- v9 p& M, C
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ) N8 f: f! f0 P# ~% ^. f A
\!
* \% }; @( T0 n: ^# C; Y( ^ white: every day you come in, do not feel tired of it?
! a' @* P3 T9 E1 r7 M5 i/ Q hacker: is a pain, your machine is the worst I've ever seen in one of the
4 v0 J! Y# b- E, Q# m$ \3 b white: is not it, this is Brand 0 Z. e5 A9 T! v2 d" {1 T$ d% ^
Hackers: I was mentally retarded in addition to your yard game machine only virus a % [$ o! A8 V& g3 O, V
white: Oh ~ ~ that you see me The \. . . . Goodbye 7 w4 X9 R7 b3 |$ b7 C
9 c! J5 |- i, i8 s5 R& L
hacker: Hey ~ ~ ~ I come!
; G. i/ U9 u) U/ U/ ]! W; A white: not seen you for days, was my firewall blocking you? + ~4 j7 l5 T6 Y3 C4 G
hackers: Haha, jokes, on your machine is easier than my own, not you miss me " p+ Z0 C% P) C4 M
white: I want to Please help a busy
7 f& E& N' G0 ^- Z* s1 e+ ]8 B( _ hacker: What?
- I4 c9 f; c4 |, }! g4 ^ white: you can not modify the point into the power system data
/ {9 I, ?0 F" G! e! P hackers:. . . . . . Why do you want to! ! ' Y, R- z1 E5 U' {7 d
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
1 }. {* ^+ G5 i8 K ] hackers: die! !
]9 | F" s. ]* k
; g) f3 e. @+ B* e hacker: you die Where is? ! ! ! ' u/ u' @% k8 I; K+ T
white:. . . . Go out and play for a few days, ah, come to me why 2 t$ v [3 q1 T& D
Hacker: I'm looking for something 0 P. d/ `) N6 w6 R9 y
white: what I find here?
. x9 e4 ]3 g( w hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ; p. L# P( T: E* ?
, _7 V8 G8 j/ b) I3 v2 x4 @
most hackers : I come! !
1 B7 Q+ k3 }- }8 I9 i. . . . . .
8 v2 V5 y8 M. }* W; o! M5 n) Q" D hacker: how not to speak? 8 ^3 t6 |1 f1 g5 q: y; t5 @
white: a bad mood
+ D# d/ `. l( E! Q- j% @; L; S; b hackers: Who bullied you? # F, L; {( M3 ]0 q3 M7 U. S
white: a Q No. I have not lost inside of my first love ( c4 O, P i( S9 h' n7 D, l
Internet hackers: this simple, I get it for you
; O J! x, |( `: o) H white: do not get back
' H2 D0 b" G: A/ d8 c7 B. R hackers: No, tell me what number? - R, T o1 X9 j. o8 K8 V* D
white: Woo ~ ~ ~ ~ just do not remember
4 c9 \9 V4 v" R9 O _ ; A# c7 g! M) m& v: A
white: you gave me out! ! ! ! / X4 o% h, n% f
hacker: how wrong? ! 2 P2 W9 [ R! W% {8 N$ Z# J
white: You are not the forum to use my ID to play it? ! ! 0 g N$ v3 V$ u* f7 r# j
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
! F% Y' O6 Y9 Q" F. |9 X3 d/ P m white: it does not work! ! !
0 k: v' P" B$ e hacker: how should you like? 4 M ~7 U7 R5 f- Z" i
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
+ w- i3 q0 P8 m* }( N
: m# L% R4 T' \. Q! b hacker: Hey,ralph lauren pas cher, I did a lot of fun
2 C, `5 e8 Q/ R$ b+ f white: what
; W6 m9 A8 G. }3 V0 B w hackers: I go to the forums posted the top
" h- k: h. o1 u' p& t& x9 w$ K white: This very common ah ' }% y) F) N3 d* S! m
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
' | X0 p9 _0 U/ p* N% Y: \, }; A white: Wow, very enjoyable, and I can never dare, will be blocked!
& ?- E$ \* u" ]% J Hackers: Yes, has been banned. * m4 w+ B* t- ?% a
white: this is also fun? ! , L: S% S0 {, [* b* t( q& j
Hackers: Yes, ah, because I use your ID : u/ m1 m5 Q& Q6 h
white: you are pro? ; z9 o P- r* [, q1 d! q6 B
hackers: You can say it.
/ [& o/ C. s0 X( V white: to what extent high?
2 R- K4 i+ O0 j8 G3 M% ?$ `. M1 f hackers: ah, I am bored when their own 9 V1 Q& x4 g+ n) [8 }& ?' m
white black: Ah, this I will! 3 J. Z# H w, w/ C9 c, P
hacker :#?%! You can? !
; E7 H& C6 Y- ~5 y' D$ J! J white: Yes, ah, a black off it. . . . . # t$ U0 a9 ]. j
hackers: Go!
; ^( w6 w7 F9 d4 P1 }3 x) f/ E! Y white: Ask your question 8 G, P k1 n. q; N, P
hacker: says 3 X% o5 J7 z$ J
white: Besides me, you can also control other people's computers do ?
3 G' c/ T' H7 x: @' \! K) E( k Hackers: Yes you can. . . .
; Y' E5 z2 I; y& j5 ?. {/ O white: no networking is also OK?
) m; J$ { P! ^& {/ W# ~- D( H hackers:. . . . . . . 2 f9 E; x# K! X4 R6 O( s! r# D
white: You can remote control to open someone else's machine it? + c( `; P$ q; j% l5 x( p! I \5 @
hackers:. . . . . . . . 3 |5 c& L J; P$ l( T
white: You can steal top-secret file it! ! ! 2 s2 x. M( Z+ |/ [5 J. ]# L4 v- V
hackers: I think you see more movies, go to sleep ' e. g- V! S# C) d# n
white wash: my computer is broken
- ]8 B3 C1 ^$ f8 m1 a- L hackers:. . . . . . . Just checked, your computer no problem 5 @; L1 T3 v% f, f. Z% A
white: that is, you bully me
1 B" f) i0 x/ l. g0 i, Z- V hackers: No ah ) ^! a6 C0 _& J
white: You are! MP3 files are passed to my no images! & O4 [2 j2 l, @0 A8 O6 N2 }( R
hackers: help ah ~~~~~~~ ; @# A8 D3 L T! Y ?" q, H9 c1 ?7 a
white: Ask a computer problems can you answer? . |5 {* R2 n' X% f
Hackers: should be able to
8 x7 y6 @; _% v6 f. ] white: Which key on the keyboard the most handsome? + K5 i7 F$ Y6 D
hackers:. . . . . . . Do not know ( y$ ]! w8 ^7 Y, N2 u8 C P
white: of course, \!
1 K+ h2 K! R; b0 t8 w hackers: halo ~ ~ ~ This is a computer problem? ! ! 9 z$ k" V# B4 n# w+ ~
7 {3 o* ^3 u2 S
white: ask you a computer problems you can answer?
* G6 x: T, U' r4 Z: B& } hackers: If the problem is not your idiot
& ]% ~9 Y9 X+ W5 r1 f white: I am serious! ! You can operate my computer? : B. \% B7 F9 ]0 x2 e! A
hackers: ah,juicy couture shop, yes
/ r. m. u5 M# [3 W$ K- k7 u white: that problem, you can solve it 8 K9 `9 Y8 b5 P
hackers: Your question is, should not be difficult ;
3 @/ u% W9 o8 } white: Great, my fans do not seem to turn up,nike air jordan, help me change it
4 v; k' `5 F0 C6 }4 h, [/ m" x a hacker:. . . . I excused
5 q; W& I1 b9 m5 n$ U+ d5 H white: we see meet you?
& q6 c* I' s3 f hackers:. . . . This, not so good, why should we see 7 ~* K0 E: Y. Y
white: I want to see you are not the same and I would like to
5 ~& V x5 N1 C8 } Hacker: Oh, what you think? 9 n( N& e5 H4 O( i7 L
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights I5 Z3 h; a4 F2 S: K9 J
hackers:. . . . You say that Spider-Man, boss!
: H$ S- m0 j& `. r# |5 d& ~ hackers: Kazakhstan woven ~ ~ ~ * M% w* C2 w; M& J4 F2 C5 ? E
white: You called every day, is not very curious about me?
7 [& T& k" h$ c/ j hackers: not curious, is the habit, easily came in 1 R' g* a' v V9 q- `
white: Well, I have a good way to change your habit
. L" K! I4 g2 S$ s; S2 T hacker :. . . . Oh? ! Any way
0 e7 i* W4 h0 `6 @5 i6 v# `. x white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
q9 r5 F3 N2 O; U5 y, O hackers: Genius ah! . . . . . You can also connect to it?
# m* t8 |$ I6 A) n. Z4 k0 z white: to ah, and slowly the hymns!
1 Z! x: K1 T- B% J- E white: you every day into my computer, is not very curious about me? 1 D1 Z# k) }. D- X% k; u, q
hackers: No wonder, only used ; f9 l) j2 P1 L4 V. U- R1 B* \
white: no you're curious about the place?
# L' S& M7 D4 g- D; s: @8 J hackers: a ah, I always wanted to know your machine so much as when the virus crashes 9 X" C. |/ s: y: B
/ ^, m% j) p5 z& E' c) v1 s
white: I would like to control your computer $ [* [6 M2 a6 R' ?7 e" ~! k
Hackers: I will not have other people access my computer I will be mad 0 H# y" @5 K/ t6 O
white: This is not fair! !
9 M+ Z9 T5 T. E2 | hackers: ah, well, you control the good of the
( b" E4 W" L7 Q# M u0 l- K white:. . . . But I will not. . . . " x( B6 z) p* Z9 S; b/ o
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! U- [! O @% Q; a3 m
Hacker: I'm white
, I4 s7 V) c$ |5 C us again: This is probably the last time we met the
$ w- D0 {* Q4 {) x: ~ Hacker: Oh? What happened? % q9 V4 Q/ C S! L/ E
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 9 [! w+ B6 c" P# Q
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
/ M' j; l% \+ `" G+ j! Y white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
4 J' n A: ` k5 s$ v; c& b hackers:. . . . . . . . . . / L6 J( C! s8 o! U3 b% ]5 r ^
hackers: so late, and how not offline? 3 S; s: w' T3 A4 _; |
white: Oh, is the next, and I went to pull the power 5 S6 A: A$ I0 Q" l2 a
hackers: Slow! You will not shut down? ( \7 S/ e# E$ d4 s. Z/ _7 ]
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 A5 T1 A7 R0 G$ Y. O2 w hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& i+ T \+ }6 W. D9 N8 x# J
white:. . . . . . I press the power to the hackers call it
9 Y3 [- N: k& @+ { white: You are not really powerful & e4 P& B$ L5 p( @4 W
hackers: so-so friends
+ o; x$ {$ s! V% w3 Q/ S white: bragging! You have the ability to shut down my machine in the horse. 5 X" V6 d6 d' c V! x
hackers: this place is difficult! You wait % e6 C* E% y g9 j3 t! j
hackers: Haha, buttoned regret it
) ~; |- M* q( i' f0 U2 T R8 Q white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
* w0 q9 Z8 O9 { [7 u8 S o' ? hackers: halo ~ ~ ~ ~ |
|