 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 3 n* S/ S% v# O6 C. B) {2 u! Y4 j7 y& ^( c
white: how control?
- ?: U+ T' L Y& q( D hackers: white with a Trojan
4 p7 M4 o: t# N6 w1 k5 l:. . . . . . Where? I did not see ) y: A2 b# p$ L2 ?
hackers: Open your Task Manager . z% p+ A8 l: T5 S" L2 O7 f3 ^
white:. . . . . . . Task Manager, where?
\; a/ u- K/ u/ ^, d- ` hackers:. . . . . Your computer below! ! 6 {! ?: ]" j6 t; z1 n' \: `9 i
white: \;
3 L7 U% \' d+ {$ L7 C Hacker: I have control of your computer 9 U' f4 b R( j$ q$ ?
white: Oh
2 Y/ _; O5 l8 t' V hackers: a funk? ! Hey
. z+ L3 V, O3 I2 z1 w: Y white: for the just, help me kill the virus it, many of the recent problems my Lord r' X! A8 m0 Z$ y5 h3 L2 w# ~" B
machine hackers:. . . . . . - g& l; Q1 d3 |
7 }3 \; w# ~' W/ F4 F+ q white: how do you always in my computer and out of 3 B n# |# ?2 e# J* i" W
casual hackers: You can install a firewall
- c0 B! y8 a: B7 u2 | e: x Z$ @ white: install a firewall, you can not access it?
9 z( R& \3 R3 ^3 z; M hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
. j7 X( S7 q+ [$ B W+ M! t9 G
9 E: q0 t8 d4 ^ small White: I heard that you will create a \!
/ d3 H1 v+ R& H7 B hackers: ah / X) L) Z! j3 h& z; U2 `2 T
white: you can control someone else's computer? !
" u4 [) Q- A$ @4 ` hackers: General is the ! n2 E6 r. }& y+ J, {2 S
white: you can black out those sites?
' z; s6 h* L* V# w2 B# D( F- P hackers: of course, did not hear people call me a \8 B. a% {0 f7 u: W8 N/ w8 M
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . % w! t' e) R. I5 O; Y
\! ! A$ ~& V% Q6 D' Y* z$ l9 K
white: every day you come in, do not feel tired of it?
, a# R2 S/ ], }7 H$ k- h7 R3 N1 P0 f hacker: is a pain, your machine is the worst I've ever seen in one of the ; k$ a( ~) Y7 L: d2 F( V
white: is not it, this is Brand
" W {7 X, H4 v7 l Hackers: I was mentally retarded in addition to your yard game machine only virus a ! o9 D" n0 ?$ v
white: Oh ~ ~ that you see me The \. . . . Goodbye ! X, |0 e E' L+ X
& R2 n. W6 d) R hacker: Hey ~ ~ ~ I come! 1 X! {6 ?7 S, \1 H+ M
white: not seen you for days, was my firewall blocking you?
) N8 C: ` m0 e% B, O+ q9 O hackers: Haha, jokes, on your machine is easier than my own, not you miss me
0 W; N2 F0 S- x | white: I want to Please help a busy
& B0 {& F7 D: J% e6 }/ A/ l hacker: What? 2 `3 l4 Y' V7 G) c6 I
white: you can not modify the point into the power system data
# `& \" F: ]% ^) p* ^8 d# b& P hackers:. . . . . . Why do you want to! ! 4 I. Z0 u. v$ ~+ `
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
. e& o* ^4 s- C" j1 o' p- X9 n hackers: die! ! 5 a% @3 F: u Y$ K& ^( C
, j$ b/ ^; c' w hacker: you die Where is? ! ! !
Z( F( r( K2 [1 e white:. . . . Go out and play for a few days, ah, come to me why ( W6 o F4 |6 q+ k) j$ O
Hacker: I'm looking for something % e( U7 F" ^/ F* `
white: what I find here?
/ G. j% R1 y( z9 p hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 8 B3 R( X* {$ P8 z" F
8 z1 K, a- p2 y% y5 s
most hackers : I come! ! 3 N5 Y% s8 l p
. . . . . . - U) R0 ]: P+ J7 W
hacker: how not to speak?
& M% g8 U5 g- j: T( h) b" L' n white: a bad mood
% b5 n! v% X" y7 W5 H- C" T# p hackers: Who bullied you?
) w( z0 T8 r. A7 ^ white: a Q No. I have not lost inside of my first love ' h# N& u5 P+ t( B! }, ^ b+ U
Internet hackers: this simple, I get it for you
6 O+ a0 k, g0 K, M' O9 z white: do not get back
! y. L$ n! G# ?+ ?: W hackers: No, tell me what number?
& z" A5 |; }9 I! T. v) X$ ?4 Z white: Woo ~ ~ ~ ~ just do not remember
; V, B# v. c& s& N
L) {$ e; |' O! q4 I6 Q1 h white: you gave me out! ! ! ! / n6 \! ~ Q: ]) v
hacker: how wrong? !
: |4 ]+ }, {$ n& C7 P4 B0 I white: You are not the forum to use my ID to play it? ! ! 8 P! o9 `* R" u# {
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the - j8 m, P- O5 l- n" W, P, c
white: it does not work! ! !
% G/ }- d- m2 x) N# O' t) D hacker: how should you like?
( X, C, v3 V! y: c; S9 m3 P3 }7 I white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
/ v: a+ ?$ [, |* |* z+ B; g+ U3 i 6 A/ ~$ f6 o; ?3 G( Y" |3 O" G
hacker: Hey,ralph lauren pas cher, I did a lot of fun C1 u( a5 n4 E9 ]' O! s
white: what
; a: o6 P" |, G6 D% E6 f, A hackers: I go to the forums posted the top 0 ~7 p' a1 B) J% s0 Z; T. t( b# T! ?
white: This very common ah
$ @! V! ^1 s$ D9 l3 i: \5 [0 V2 I$ c6 E7 m Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
: O- O4 D- r8 q8 n8 d white: Wow, very enjoyable, and I can never dare, will be blocked! 5 z, S+ @ w- L% ?$ f
Hackers: Yes, has been banned.
8 E8 O- }% t, L white: this is also fun? !
}+ G) r' B, y; M; Y Hackers: Yes, ah, because I use your ID
( G0 k7 W; U; R0 y white: you are pro? , e, a) U/ f% G+ a: x- r
hackers: You can say it.
. }3 o) k' y% D7 m* v2 t: B- T white: to what extent high? . C! d+ m4 i6 n4 ^6 H
hackers: ah, I am bored when their own
1 _) ? ?7 P/ `: U- d' ~ white black: Ah, this I will! 4 H5 ?# `/ b/ {' C9 Y. {: `0 U
hacker :#?%! You can? !
4 H% e$ v( x; y white: Yes, ah, a black off it. . . . . ( u* j N" X6 A9 ]8 g' \; J$ \8 Y3 Z
hackers: Go!
4 k/ e# X( E9 P$ J8 W white: Ask your question ) p2 P9 K* i" f- k
hacker: says
7 R8 ?8 ?: L7 G white: Besides me, you can also control other people's computers do ?
# y- j7 P$ d3 H9 N- e Hackers: Yes you can. . . .
9 N \0 D2 o' a( B [ white: no networking is also OK? 2 C( ~/ u% _3 b4 ?, e
hackers:. . . . . . .
' g: Q1 J/ Z( E2 D4 g: | white: You can remote control to open someone else's machine it?
* T$ _/ [. ?4 y' ?8 }4 I K hackers:. . . . . . . .
B# z5 I1 x7 h9 w) R white: You can steal top-secret file it! ! ! . R1 s2 V1 z7 T5 L# E9 I' D# j
hackers: I think you see more movies, go to sleep
. x. ]" N" d) ]# W8 m; m8 p) R% Y white wash: my computer is broken ( b8 \; A- |" O! y6 W, E9 t
hackers:. . . . . . . Just checked, your computer no problem ! h$ w) V& i( e, ^
white: that is, you bully me
1 H% ~. ^: K/ H hackers: No ah , S* C/ `9 I+ y6 ^; j
white: You are! MP3 files are passed to my no images!
: o' r; K0 y! B2 e hackers: help ah ~~~~~~~ * Z2 h) K9 q) B. g/ Z0 C
white: Ask a computer problems can you answer?
3 y% E! s5 h1 f4 S% u0 i3 O/ v Hackers: should be able to
8 F+ A5 k) `- b9 h% C7 e white: Which key on the keyboard the most handsome?
) h5 m6 D' v z: V8 h hackers:. . . . . . . Do not know 9 ?8 D. Y2 \ N9 K) Q( D
white: of course, \! 5 m. [* o) s9 G- F7 b( n* u
hackers: halo ~ ~ ~ This is a computer problem? ! ! ; Q: o: L R& Y: R. y1 U4 t
$ ? k( R# q- i f( O/ } ^ white: ask you a computer problems you can answer?
0 K5 _3 S( {: U6 k; J" c9 L# j hackers: If the problem is not your idiot
2 c1 M3 j9 l* x5 M5 O0 @ white: I am serious! ! You can operate my computer? ]- w! ], p h& ]# I( ~2 d% y( n
hackers: ah,juicy couture shop, yes
! z) y. t# \* T3 {1 v white: that problem, you can solve it
2 ]$ V c6 j% s+ R$ [% L) |. \' f hackers: Your question is, should not be difficult ; 2 X9 B- g" G7 O5 @3 V
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
' _# J- N, Y+ X2 P9 B a hacker:. . . . I excused
! z* ?3 B! v4 V9 K( n2 Y white: we see meet you? ; L7 @1 b {. m: m
hackers:. . . . This, not so good, why should we see 8 B5 o4 f3 [# o/ R* L
white: I want to see you are not the same and I would like to . B# o# X* l0 ? n/ P2 P0 [0 g$ I
Hacker: Oh, what you think?
0 U/ i9 W$ x3 s7 ? white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights / Q5 t0 B/ j" E6 i6 a, S+ U0 J
hackers:. . . . You say that Spider-Man, boss!
* a: U$ A5 e; F- w v2 L hackers: Kazakhstan woven ~ ~ ~
# A0 l+ M+ q3 q white: You called every day, is not very curious about me? 8 F2 T8 ~" B2 i( s* g7 H% }$ W
hackers: not curious, is the habit, easily came in 8 h( o9 j) Y" H0 d7 a+ i
white: Well, I have a good way to change your habit 3 V5 L% c i+ O
hacker :. . . . Oh? ! Any way 3 k' p; s5 d+ R( n
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
- [% S3 L: ?6 y; O7 i hackers: Genius ah! . . . . . You can also connect to it? # v+ O X2 P' l
white: to ah, and slowly the hymns! . C; \3 q. f! D3 A
white: you every day into my computer, is not very curious about me?
P7 t5 _' p6 |% F. s* H* G hackers: No wonder, only used
6 r' Z8 k" r: |4 } white: no you're curious about the place? ~4 x- j" y% R0 E
hackers: a ah, I always wanted to know your machine so much as when the virus crashes # U0 ]; |, ~" K3 \, x9 Q7 I. r) I
2 E; a' E5 D9 T/ M0 B' o white: I would like to control your computer
* \& q" N4 Q6 N, o) L/ j4 T, Z Hackers: I will not have other people access my computer I will be mad 3 R- c) U- T6 Z% d5 i- g* B7 C
white: This is not fair! ! * S, y3 Z; M; Z0 E: K
hackers: ah, well, you control the good of the
* j, p$ A/ r1 B$ D5 H" T# [+ @: I white:. . . . But I will not. . . .
! q% |! z' W; Q# z4 M% J: d: M hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 0 R, g* n4 x' G3 K& K! @
Hacker: I'm white * T$ e2 A% [% l5 y/ q5 j0 V
us again: This is probably the last time we met the
8 v- @8 `* `2 f7 _ Hacker: Oh? What happened? + Q# V, l9 R6 C% _# B+ J# C$ O: a
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
4 u9 M/ o5 R( c% P! P hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
' y' E, ^: l* G8 w white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! " C+ S3 I* c4 h/ S5 |/ M# h7 ~
hackers:. . . . . . . . . .
( e; Q. |2 S; B1 H$ Y! w9 L4 A hackers: so late, and how not offline?
+ J! e8 ]& y0 ?) u% Z white: Oh, is the next, and I went to pull the power 5 [ f' Y# X2 r! P$ _7 J9 Z2 j9 ^9 \
hackers: Slow! You will not shut down? 2 _ Q9 I. e! x7 A
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 4 e2 E4 G6 l7 F8 K! P
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
: E: a3 `! ?& O( m7 ~& _, ~7 q; A& ~ white:. . . . . . I press the power to the hackers call it % D5 O+ `& F/ h: h
white: You are not really powerful 8 y+ z, ^) V' o1 m
hackers: so-so friends ; P* e6 ^2 d& Y+ G/ p2 Z
white: bragging! You have the ability to shut down my machine in the horse. 8 F! I1 J& Y$ j8 c6 O
hackers: this place is difficult! You wait
9 E- |: W0 r6 X: z/ V hackers: Haha, buttoned regret it ; q+ k) n i1 V# f3 e
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . - L5 L- z, @7 G8 n
hackers: halo ~ ~ ~ ~ |
|