 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer ) U5 T6 O2 w6 D' ~0 D: ?
white: how control? 8 o* g; C: @% R# E% `. L
hackers: white with a Trojan ) k/ Q: @9 H1 m8 g( R+ [
:. . . . . . Where? I did not see
0 \4 e. w: ?& y( A( Z' y% } hackers: Open your Task Manager ) b+ ^% ~9 ~" x! d8 z8 {" }
white:. . . . . . . Task Manager, where? 5 U/ |) f/ h$ ~6 {0 ^
hackers:. . . . . Your computer below! ! ; o* s* y) r$ ?, c
white: \; 6 S5 F* Q+ B f: j3 M% i1 }7 d
Hacker: I have control of your computer
2 v* S) O/ U- f G, b+ x# S6 S8 Z4 a white: Oh
- y; m1 x \. W. A+ H- m hackers: a funk? ! Hey 0 O7 j, P% s* e& [
white: for the just, help me kill the virus it, many of the recent problems my Lord 5 m# Q/ Y' O' @% e* \
machine hackers:. . . . . .
9 l3 p. e: u7 f* }& D: U# h% [
8 m* h, n9 g4 y; U2 D; n$ ^; y white: how do you always in my computer and out of
& }; \" T2 j" C* H& z casual hackers: You can install a firewall
* [) a: ^0 M0 r" M7 R+ ` white: install a firewall, you can not access it?
( L/ T0 R c/ n6 A$ A) [ hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
4 a+ l6 w/ R% s# T8 } 2 U& Z! G$ y( _' a# _$ g1 S% U# E @
small White: I heard that you will create a \!
* U( R$ u# ~. t' p hackers: ah . Z, V, n! N3 a! }
white: you can control someone else's computer? ! o( H$ B" D: L; K3 R* X
hackers: General is the
0 [# u$ T/ G$ N8 s( r; k6 Z white: you can black out those sites? + l$ m5 q6 f( T
hackers: of course, did not hear people call me a \
0 ]& C0 J5 H! m/ `* U white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 P9 T$ E; @- `- y \! 1 w y: D( n3 r. s) s3 ^! j
white: every day you come in, do not feel tired of it? : ]5 m; \6 r: @2 T F; L
hacker: is a pain, your machine is the worst I've ever seen in one of the
9 ]9 R8 j) {+ f7 [1 ^3 Y5 r* E; p, v white: is not it, this is Brand 0 `3 z$ g: E. e, D& E9 r
Hackers: I was mentally retarded in addition to your yard game machine only virus a e9 N, L8 m0 q- e
white: Oh ~ ~ that you see me The \. . . . Goodbye
. ]( M. K( t3 [4 w/ _- r( _/ I
; K8 U7 h7 N+ f7 M hacker: Hey ~ ~ ~ I come! 8 { T/ ?" p8 ?2 V
white: not seen you for days, was my firewall blocking you? ) O# L% m; o/ h* e. [' {3 k9 C
hackers: Haha, jokes, on your machine is easier than my own, not you miss me 7 Y) g, F4 x4 @: j" w* n
white: I want to Please help a busy
9 ^$ }& B# d" Y0 [ hacker: What?
, `& q6 N; Z3 a; d8 a$ S3 Z white: you can not modify the point into the power system data * A9 D2 K) ~, `
hackers:. . . . . . Why do you want to! ! . Q4 b2 ~: a/ Y6 a- c
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ' `* S6 k2 a* S1 n6 J
hackers: die! !
" r* I y n& Q! \: h$ q, b- ]
' G' Q- F- d# o9 N hacker: you die Where is? ! ! ! 5 N. J+ [( _& W2 _6 z7 c* |
white:. . . . Go out and play for a few days, ah, come to me why 6 @, R( |! O$ a4 x/ g1 e5 n
Hacker: I'm looking for something & e. x% ?- ^8 T' o
white: what I find here? \$ n' c* ], W# b
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
( a# ]$ w' r$ S- Z: ^# i , v+ }* l' |8 y" m1 g# n
most hackers : I come! !
/ e& a' g+ @2 n8 J u: \. . . . . .
* _$ W0 W- i0 \- K hacker: how not to speak? 3 X ]* y3 }" Q9 r2 y
white: a bad mood
0 P5 M) v1 R0 ^9 `7 [$ F& c hackers: Who bullied you? $ p! k: s2 W/ _+ }5 \ n4 e' I
white: a Q No. I have not lost inside of my first love
3 i; k! j+ D3 ~. C/ \" j Internet hackers: this simple, I get it for you
* m! _3 J2 U0 h" _ white: do not get back
" d5 V; Z- ?# \ S2 C- K* e$ m hackers: No, tell me what number? $ q1 n) @! L8 o) h
white: Woo ~ ~ ~ ~ just do not remember
5 X/ w: U. [2 o! R 9 P0 K9 v0 i7 i
white: you gave me out! ! ! ! % C* O' A* w4 R, X, N! f6 ^
hacker: how wrong? ! : v! Y- h& r7 u6 K/ j0 P- N
white: You are not the forum to use my ID to play it? ! !
4 v ]# k& ?5 t6 i0 w7 ]3 A$ I5 U hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the * k+ m+ M- c r8 h* P: f8 B
white: it does not work! ! !
6 v! G( A8 z1 p4 y, I& y hacker: how should you like?
/ |9 Z/ V" Q6 _- K; N! ?! ^2 k white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! , ~6 U4 C4 i5 c+ S
2 C3 V) Q C0 V/ v6 ] hacker: Hey,ralph lauren pas cher, I did a lot of fun
9 M* x+ Z2 z N4 F5 v5 ~ white: what ) @1 n! i5 |* m- A! l+ K4 p
hackers: I go to the forums posted the top
; h' S! a, w( N: T) k- y: k1 O) ` white: This very common ah
/ w5 w9 W: V. q1 u% S$ v9 @0 b Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
- s) a j0 S6 [" s1 I- ] white: Wow, very enjoyable, and I can never dare, will be blocked!
0 Q. r# }+ g1 j1 o! C Hackers: Yes, has been banned. ) F' L; [2 z4 v3 u1 G$ a5 n i0 |
white: this is also fun? ! $ |- _ w' ~. q y$ J5 \: D
Hackers: Yes, ah, because I use your ID
/ ]( @/ O5 i" b" E, Q white: you are pro? / i+ d# I$ H/ M4 ?, M
hackers: You can say it.
2 Z; G& U+ H8 Y" I white: to what extent high? 7 S b7 ]4 y Q% _ y( S
hackers: ah, I am bored when their own
* f9 M9 a3 K& |& p$ y3 s) M$ Z v white black: Ah, this I will! l, l, J4 |$ U: s
hacker :#?%! You can? ! 2 i; R% h0 K1 ?; D/ t
white: Yes, ah, a black off it. . . . . / Z9 a# q: u. K' h
hackers: Go!
4 q. ^9 w4 d2 m- `; M white: Ask your question
s' l r( G( V: x3 s5 N( C hacker: says
0 s& M9 m% ~, p8 G' i9 f white: Besides me, you can also control other people's computers do ? , u' E w5 R/ n' _3 }* N. ~
Hackers: Yes you can. . . . ( V& O! t, |% ?9 o! ?3 E$ x
white: no networking is also OK? 8 t0 v) _- M0 e, g6 g
hackers:. . . . . . .
8 h' j$ `$ L9 d4 g0 G& e: W white: You can remote control to open someone else's machine it? ' _- L2 ~& [: [6 i3 F
hackers:. . . . . . . .
$ W& i; W- O, Z2 m; W white: You can steal top-secret file it! ! !
: W+ e# Q3 L9 n# \4 T hackers: I think you see more movies, go to sleep
! r# h) D0 f. c; X white wash: my computer is broken
( Z0 x$ G! l2 d. E& s hackers:. . . . . . . Just checked, your computer no problem
( D; A! R8 t% p# A0 ^ white: that is, you bully me
$ S5 d* l/ i9 c1 p hackers: No ah
* R* x# ^6 d; e white: You are! MP3 files are passed to my no images!
# i4 h/ h5 @5 Y% o$ S hackers: help ah ~~~~~~~
) ~+ E. |4 B; x6 T% Y4 F# { white: Ask a computer problems can you answer? ! J7 H7 n# w' t% N1 L0 m
Hackers: should be able to
' h! x7 c4 D# `* c0 d8 n white: Which key on the keyboard the most handsome?
6 j: N; Y5 L5 N' V9 l& M hackers:. . . . . . . Do not know
+ c/ O. w7 ]+ r! h white: of course, \! 9 O& A% _# y3 c
hackers: halo ~ ~ ~ This is a computer problem? ! ! 6 n7 f m" j4 r$ | t5 H
( |9 D/ j3 n* s7 U1 ]/ K: j/ j' e
white: ask you a computer problems you can answer? ( B8 F. u' o( P$ J4 k
hackers: If the problem is not your idiot
* H- z9 f6 U2 _0 F7 x* {& |5 ^2 o; g white: I am serious! ! You can operate my computer?
. y* @! M, S- N4 v" T2 g hackers: ah,juicy couture shop, yes
5 [3 O; e! I/ x9 U white: that problem, you can solve it : i! ]* e- h2 |5 q. [
hackers: Your question is, should not be difficult ;
/ I$ s7 Y8 | R3 x2 Y white: Great, my fans do not seem to turn up,nike air jordan, help me change it , b+ e- X$ ~3 F7 d, ?. X/ n
a hacker:. . . . I excused 8 N- D3 b% e2 T( \! D
white: we see meet you?
1 j1 Q* v& l. i4 x- X3 s3 F A/ e hackers:. . . . This, not so good, why should we see
! q5 d- \1 C' n( w) p# ~6 a5 A. Z white: I want to see you are not the same and I would like to
" Y; z& m* l8 {9 G% o% z6 K7 J- f Hacker: Oh, what you think?
4 k7 k6 s k# p2 K, c" z! b$ Q! O white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
/ }( G8 p. e8 s' @/ z F hackers:. . . . You say that Spider-Man, boss!
6 O: Z0 c' d" x" |3 C) r- F hackers: Kazakhstan woven ~ ~ ~
! J2 i" P- m# S- f white: You called every day, is not very curious about me? ) W$ U A' G. t+ _- d* t! ^9 C
hackers: not curious, is the habit, easily came in
3 E5 i7 [3 }, T: H, p; S4 ?8 M white: Well, I have a good way to change your habit 5 a1 F1 m+ m. O. m3 D- E
hacker :. . . . Oh? ! Any way
: e$ c- b7 X6 u- E! i5 { white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
& W2 I, l2 Y( B* G# f hackers: Genius ah! . . . . . You can also connect to it?
3 q" F) { u% i& I white: to ah, and slowly the hymns!
+ u( u7 J" [5 O9 y9 { white: you every day into my computer, is not very curious about me?
- g5 Q" N3 G; q3 z hackers: No wonder, only used
! r8 k5 f" A; g, D white: no you're curious about the place? 2 m* f, F: _! K
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
' q; F) I2 `! \
% U' b' n0 h, a% T* c& V5 x/ ] white: I would like to control your computer : ^1 l1 P. V! B
Hackers: I will not have other people access my computer I will be mad
6 O! X9 g) d6 S( S3 s4 r2 I white: This is not fair! ! - Q: k0 j) \) x# n- ?& e9 y' J5 C
hackers: ah, well, you control the good of the
( c* U s) c3 w- |/ F white:. . . . But I will not. . . . - `& i4 _* F9 Z# g! ?7 M' h
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ; P: g6 u% q0 z/ |
Hacker: I'm white
: y: r0 T4 I6 |( e us again: This is probably the last time we met the ' n) @4 f5 l; r P$ q+ V
Hacker: Oh? What happened? ! v4 I7 o/ L; p
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
( J6 T3 r4 [* x6 ?: H. `: D4 O" a) ? hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 5 O7 _. x! X u( l. [% X/ d
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! ) X. \# P. }; t. t9 q4 O( V
hackers:. . . . . . . . . . 3 _3 q5 e+ n+ I; K; t
hackers: so late, and how not offline? & N2 l5 Q* _1 N+ A, [! y8 t
white: Oh, is the next, and I went to pull the power - |) o: W' g. [0 k, \
hackers: Slow! You will not shut down?
% j' w" N7 B4 B5 T2 c white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
9 i3 x6 R2 b" r, N. L& c# _ hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \: d3 n/ U3 ~2 @
white:. . . . . . I press the power to the hackers call it
* t5 u$ X8 X, U" O3 \( e4 l o5 _ white: You are not really powerful - k+ g2 ? R0 b$ K0 n
hackers: so-so friends
: j/ x. M' _& U& Q9 j7 z white: bragging! You have the ability to shut down my machine in the horse. ! t# e1 _8 h' o1 q% t
hackers: this place is difficult! You wait
1 c' N8 @8 e$ `. f1 U9 b hackers: Haha, buttoned regret it ) x# Q. F: H/ A$ n" U
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . . l0 F8 A* B* F, _
hackers: halo ~ ~ ~ ~ |
|