 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
+ y r# f. h1 F0 H8 |! I' X* ` white: how control?
- M% A+ n/ J( n3 `2 k: q hackers: white with a Trojan 4 s3 T* ~ r7 |3 f+ \' b
:. . . . . . Where? I did not see
; U- z& o; O1 G hackers: Open your Task Manager 5 T) W+ }: }' E% H
white:. . . . . . . Task Manager, where?
5 K# j4 j5 v4 f5 O' E3 k* M) Q hackers:. . . . . Your computer below! !
% U' _8 {6 b7 j, R9 F white: \; " W& p* g4 }- n" ?" z$ T1 O
Hacker: I have control of your computer 2 D2 F# s( C3 F( f f9 v
white: Oh $ I" u0 }) `& S, M- s: Q& v, [* J! H
hackers: a funk? ! Hey B1 e+ y% G/ {0 h7 ]5 K
white: for the just, help me kill the virus it, many of the recent problems my Lord
3 ~% z! B7 W, K# u. o0 j X/ G machine hackers:. . . . . .
3 d) g: F O T( {) B6 D. w
7 M/ _9 S) @ V, B/ V; I2 X white: how do you always in my computer and out of
5 S# w3 F% e; F1 x5 c) y9 F casual hackers: You can install a firewall
, M. E4 S; @* f$ U; | white: install a firewall, you can not access it? & }" _1 L* C6 t
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
" H4 I1 g9 w# \( m) D 2 u0 X3 M: I- i/ ?$ S, d
small White: I heard that you will create a \! ( k0 n w [9 K) P% ]
hackers: ah
* `0 |/ m. ~5 m2 X. J. v$ Z# a) b white: you can control someone else's computer? !
) U T) d& m$ b, _ O" C, D: {# V hackers: General is the
\- j3 E) h' e" Q white: you can black out those sites?
* d' Q" z5 w" k% D$ M hackers: of course, did not hear people call me a \: E( ~2 g3 y" t+ V+ T
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ; R6 `' t" {. e( v
\! ?6 u$ h' ]0 g0 q; X
white: every day you come in, do not feel tired of it? 0 L3 P- U0 Z0 Z& i' b* N' j
hacker: is a pain, your machine is the worst I've ever seen in one of the
0 I! y( l1 H1 B, L+ e/ e/ A white: is not it, this is Brand ( e/ m5 w+ m, `5 c+ x8 \
Hackers: I was mentally retarded in addition to your yard game machine only virus a 5 v. j4 Y7 ^' @, [
white: Oh ~ ~ that you see me The \. . . . Goodbye
" U3 B" s" I! q7 L3 N) u
' ]# o+ O; }& g% V hacker: Hey ~ ~ ~ I come! 3 D m# p- o( ^# ~0 O. m
white: not seen you for days, was my firewall blocking you?
" n7 F' j% J$ Z B. p b$ M hackers: Haha, jokes, on your machine is easier than my own, not you miss me 6 c( z4 t% p7 N) r' ~5 ]) \4 m
white: I want to Please help a busy
( l2 I/ |" T) r+ E* R! L) p hacker: What? ! I% C5 ~! f6 G/ i4 K8 ]9 @, A
white: you can not modify the point into the power system data * N! \8 x: J6 c, |
hackers:. . . . . . Why do you want to! !
6 G; }6 N4 E: M, Y& i white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
( I1 e- E' a5 Z1 ]6 K( D' e, Q hackers: die! ! 7 l1 N" J) g N% [: `
; }( Z( P( x0 h2 ^3 j0 u9 I hacker: you die Where is? ! ! ! 4 F& { f# S2 p- n5 D
white:. . . . Go out and play for a few days, ah, come to me why
! C' R0 G, Z7 L% [ _0 U Hacker: I'm looking for something k8 B- ~8 o9 n/ w
white: what I find here?
7 p+ [' a2 h* E) {9 g3 d! n2 E* D hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
, S) g2 F' J% C7 V' S1 k
, J: [/ T4 L# O most hackers : I come! !
! Q7 C( ~9 G0 q: Q/ @. . . . . .
$ J5 @ q, E7 B hacker: how not to speak? ) W; T; V4 q6 M" n
white: a bad mood
1 s. X, z' `1 y- X hackers: Who bullied you?
: A6 [# u2 ^2 m- g white: a Q No. I have not lost inside of my first love
4 N( p7 j0 z6 J7 E Internet hackers: this simple, I get it for you
\' I+ b& `& }2 B+ o' f- U white: do not get back 4 u+ V3 t0 M1 m% e
hackers: No, tell me what number? # s% G& v/ Q" @1 G$ G; O
white: Woo ~ ~ ~ ~ just do not remember
9 R: H4 a! l+ ]8 L* F
6 c4 x( n% [/ c. N white: you gave me out! ! ! !
; _# n5 I. t( i# d& U, ~ hacker: how wrong? ! ' a1 b! F) ?4 t
white: You are not the forum to use my ID to play it? ! ! 2 W: E/ t7 T8 z# v& j/ s/ B
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
- V2 k# P) M# c: Y9 X white: it does not work! ! ! 9 n& {9 p& b Z
hacker: how should you like? / o5 }* m1 Z6 ^- x5 o% u
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
; l @/ P* X5 p' G& @- b - c3 t H) c9 T8 k1 C! z
hacker: Hey,ralph lauren pas cher, I did a lot of fun
% X1 q5 X( k, ^2 L7 o white: what
& V0 E+ Q( S5 }& I hackers: I go to the forums posted the top
4 o, m5 B F; w9 Z white: This very common ah
0 t0 U' h L% w! P2 F) [8 r Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
9 U7 k/ G& t0 K" j8 M* A" X7 J B* q white: Wow, very enjoyable, and I can never dare, will be blocked!
. U5 h2 y/ O& O1 w/ \ Hackers: Yes, has been banned.
6 \# x8 }1 H" `. N9 {( X+ m white: this is also fun? !
1 d1 ?7 t& \7 Y; W7 L0 v4 F Hackers: Yes, ah, because I use your ID ! T# n% J4 Q- k: {- Z
white: you are pro? . t S# I7 b5 Q7 F! j
hackers: You can say it. / Y) |: c) K7 f! J; I0 N# ^
white: to what extent high? ( }* Y2 i; I: Q7 a1 ^" F. x0 q, p" ]
hackers: ah, I am bored when their own , f q1 H" o/ Q1 N/ L
white black: Ah, this I will! , c# W$ S$ v$ C) e% e, x! W0 z5 f
hacker :#?%! You can? ! 7 ?& @: g4 @1 C1 E) Z2 A' n S
white: Yes, ah, a black off it. . . . . 1 ]& J! |6 @" a7 z+ r% |
hackers: Go!
- k1 [5 `* ]$ V" O# \' q( K white: Ask your question
4 I" D. `" T5 y! ]3 l hacker: says
4 k# ?- G8 R& O- @0 c white: Besides me, you can also control other people's computers do ? 9 J( I+ d& t9 U8 g* @
Hackers: Yes you can. . . .
/ I% E1 ]6 [$ x; D white: no networking is also OK?
, t% u( Y' Y% J hackers:. . . . . . .
7 v! \; L7 D! h4 A G9 M white: You can remote control to open someone else's machine it? 9 E) L, ^7 d% i1 Z, @. D* f6 w2 ]
hackers:. . . . . . . . ' y# i0 w; J' X. R. M6 T8 G
white: You can steal top-secret file it! ! ! . ?' f" `( z+ P" J6 B( o
hackers: I think you see more movies, go to sleep 3 U1 ]% F1 g# v
white wash: my computer is broken
( U M! [1 J0 n hackers:. . . . . . . Just checked, your computer no problem
9 [) P4 V8 _* t# u white: that is, you bully me . [- x n; f* _5 |$ Y: l+ b! }9 O4 a
hackers: No ah 3 Y B5 V- |/ I4 d9 m( L1 S
white: You are! MP3 files are passed to my no images! & g) [6 [) v9 A6 _+ i! c) m
hackers: help ah ~~~~~~~ " }8 B# k3 h( \
white: Ask a computer problems can you answer? 9 I+ s- ~2 S" R8 U& \
Hackers: should be able to S7 R p) _- L( b) ^! H
white: Which key on the keyboard the most handsome? P7 v6 _. R% j2 D0 u+ j' ] d
hackers:. . . . . . . Do not know
2 c: N1 t0 y* K( ?! j+ S white: of course, \!
9 r" U. J$ B* B' U6 W7 d* _& |5 A hackers: halo ~ ~ ~ This is a computer problem? ! ! ) b+ W* G6 U' p
# @$ K; V3 u2 y4 {' b d( m
white: ask you a computer problems you can answer?
% B. ], p5 `/ o# e1 e" N/ \ s hackers: If the problem is not your idiot
; a- O! c5 W% p j& u) _ white: I am serious! ! You can operate my computer? # k% Q8 y6 F% X# ? u( |
hackers: ah,juicy couture shop, yes - O% C. l2 |. R1 J
white: that problem, you can solve it 2 Y# X9 s4 h8 z9 n& ]
hackers: Your question is, should not be difficult ;
6 o s3 }" h0 N1 F white: Great, my fans do not seem to turn up,nike air jordan, help me change it
4 z+ W* \- ?2 ~/ j: X* A- } a hacker:. . . . I excused
7 M* y3 v; X5 y# D white: we see meet you? ' k- ~% \6 o g1 p: v6 ^
hackers:. . . . This, not so good, why should we see
& l6 w( k ?& \4 i white: I want to see you are not the same and I would like to
0 |! R" i5 G& N* Z, ]+ ? M Hacker: Oh, what you think? 6 R- T$ E+ Y$ ]3 w! ?9 w" ~, I
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ( H1 K# a$ h2 z
hackers:. . . . You say that Spider-Man, boss!
/ G# F2 R+ c w- \: {& ]) L hackers: Kazakhstan woven ~ ~ ~
2 c ^) q' k% L/ b6 p white: You called every day, is not very curious about me?
( b/ n* g* B; [( `& f hackers: not curious, is the habit, easily came in 1 A; F6 R5 Y- ^' v% e4 w
white: Well, I have a good way to change your habit 8 N1 e% L" o6 [% K( N( g7 n# Z
hacker :. . . . Oh? ! Any way 8 Y" h& K, Y. j0 a
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
$ g6 ]0 T9 ]3 k* W$ i& t% { hackers: Genius ah! . . . . . You can also connect to it?
5 g6 E+ ?- X9 Z7 Q6 s white: to ah, and slowly the hymns!
# ]/ C/ q- W6 A2 R% R# y- i" [ white: you every day into my computer, is not very curious about me? & M+ C9 E, K9 C0 A0 v8 D
hackers: No wonder, only used
9 G; _7 b+ J. _4 g5 r9 K white: no you're curious about the place? 9 Z4 z& E# S Y6 i, {, t
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
: g2 d5 Z+ Q* O* v3 g! j
: U8 [' o/ Y4 Y- [; _" ~ white: I would like to control your computer
0 R) l- a$ m' l' M Hackers: I will not have other people access my computer I will be mad - H. R+ {* c2 S& U( Y
white: This is not fair! !
- ]& j. F" q. `0 y% s% b, V hackers: ah, well, you control the good of the
6 f1 G: Z/ r; b2 V# r7 U; p white:. . . . But I will not. . . .
1 K/ |% x' ?/ N. n# g* i hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ! }+ l1 y1 b3 Y4 ]7 Z# G/ }
Hacker: I'm white * R$ X/ \" J/ ]' a$ r/ ]4 l4 h: A
us again: This is probably the last time we met the * `9 h5 V& d3 t: v6 F1 g' D6 e
Hacker: Oh? What happened? 4 Q' y! H$ x- \
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
! B* x% n7 C* S2 y8 f5 y hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 0 ~: @1 F) ~% I- W) H* u, W6 c
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! - u# ~3 M0 P. Y5 X; u
hackers:. . . . . . . . . . ! b( X. e. @6 P
hackers: so late, and how not offline? ' C# J; M7 s0 a9 E5 ^
white: Oh, is the next, and I went to pull the power % {3 j/ D& |2 l n/ O
hackers: Slow! You will not shut down?
2 Q* Q& t# |9 y, Z s6 r1 _ white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power , X$ r, B9 [0 ^8 p
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \7 P; b6 _9 ^+ h
white:. . . . . . I press the power to the hackers call it
" m; P1 P$ E4 y+ r white: You are not really powerful
* N: C4 v6 P/ m( I hackers: so-so friends 4 `' m5 \! c3 V3 I X) ^
white: bragging! You have the ability to shut down my machine in the horse.
1 H; E t0 p; h4 Z+ `( d hackers: this place is difficult! You wait 7 {0 r% @- w5 _3 r6 L0 i
hackers: Haha, buttoned regret it ! }' j& \6 j. ?" V0 E U) J
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . + P! g3 d3 U! T+ z
hackers: halo ~ ~ ~ ~ |
|