埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 705|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
- {7 \/ e' p- K7 g& x white: how control? . e6 f. U7 w; e/ ?4 \  Z  p
hackers: white with a Trojan # }: e- d3 n* {# E: s$ ?
:. . . . . . Where? I did not see
3 \1 J3 |* S3 p" O# j1 ]7 B hackers: Open your Task Manager : G6 m* L8 c8 H+ U) d1 ?3 P) W6 }; N
white:. . . . . . . Task Manager, where?   O$ l" ?* p9 G8 F- z2 c
hackers:. . . . . Your computer below! ! 1 {9 S+ R) O9 r! o: }
white: \;
) B0 t! U: O6 A2 b% {2 C% ^/ N+ O$ B7 H Hacker: I have control of your computer
% B3 t8 I7 k5 Q; v white: Oh
" i7 {, A, s6 X7 t6 [ hackers: a funk? ! Hey
% |+ v2 {' Q: Q! T# R white: for the just, help me kill the virus it, many of the recent problems my Lord & p5 e) f; E/ i5 ]4 Y# o$ z# F
machine hackers:. . . . . . ) Q( {3 ]* L. @! b1 B; {

$ A0 ?0 V6 Z8 |; O0 r& W white: how do you always in my computer and out of ! c6 Y6 W9 @( G+ [
casual hackers: You can install a firewall & U8 `2 g; K3 C; ?  Y# K
white: install a firewall, you can not access it?
3 b% u' r+ R" _+ |% c hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
' f  E8 k5 P" ^: `7 J. u / D9 J5 k4 S1 u; }2 ?; o5 V
small White: I heard that you will create a \!
$ D. R! W; K0 H- a* m: x hackers: ah ) q' ]/ E) ?' p# p  [9 R  H
white: you can control someone else's computer? !
; a& M: |) C9 N7 w hackers: General is the
; N$ o5 A- m4 K! D/ U( s white: you can black out those sites? ' `$ @4 T  Y! l+ F. l* o9 ~2 N7 J" x
hackers: of course, did not hear people call me a \9 y5 ~6 B9 \# O# r1 f% z
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
8 q% S3 ^/ l: {( e  I \!
6 `7 E- A; {, |4 F" A8 V white: every day you come in, do not feel tired of it?
% Z. X! n. q) O! l9 h1 \ hacker: is a pain, your machine is the worst I've ever seen in one of the
4 b! Z0 y+ a4 n1 j8 ~) Z  f8 w white: is not it, this is Brand $ R, W; h& I  Z3 h  Y
Hackers: I was mentally retarded in addition to your yard game machine only virus a
) k' m8 U* a" [' M# K3 u0 s white: Oh ~ ~ that you see me The \. . . . Goodbye & H+ }" X; W( Y+ K; ]

& A0 O1 x7 p! j* p' M hacker: Hey ~ ~ ~ I come!
+ E& U& D/ y+ B, v0 L$ U white: not seen you for days, was my firewall blocking you? % t' e1 L6 P- O$ t+ d
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
) J* @1 m. t1 W) [9 I, m white: I want to Please help a busy ; W) q8 V! k8 w
hacker: What?
" V+ i9 ]1 N7 H, F white: you can not modify the point into the power system data
+ j$ Q* p( ]8 W3 n hackers:. . . . . . Why do you want to! !
7 u' u0 C. E4 e' E% p% F, _2 z1 ?* @ white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
# q$ n) M0 A! Z$ T$ p hackers: die! ! ' @# B2 p9 H/ y) f7 }0 u

4 w( s' j6 J0 _! L hacker: you die Where is? ! ! !
. N  e* B% {* ?' U1 e7 B* } white:. . . . Go out and play for a few days, ah, come to me why
1 h* K6 J, e$ g9 |8 H Hacker: I'm looking for something : F: |+ m$ h! J6 R- R, g
white: what I find here? 0 N3 I) b) s0 o
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights   z3 X0 G- r6 X5 w& C% Y% \
) Y! j& W+ l9 o( x  v
most hackers : I come! ! . q0 N# J9 I, V! g
. . . . . . $ F4 g4 n! E2 C: A
hacker: how not to speak?
* k4 l8 Z  D$ [! S& S7 p( v5 s white: a bad mood 7 C: i5 _! h+ b
hackers: Who bullied you?
9 L4 O4 M/ `/ t  e white: a Q No. I have not lost inside of my first love
' f) r, p0 ^! \) I# V% H7 T/ b Internet hackers: this simple, I get it for you , N) `0 S# y9 \5 t+ e) i7 D
white: do not get back 1 I0 j7 L4 Y. {& r
hackers: No, tell me what number?
% j) L0 N  R2 O% [6 ?) a9 M1 g white: Woo ~ ~ ~ ~ just do not remember
( x8 p9 N4 \: a- `- D7 `
- M, [: W* w. E, g4 M( X white: you gave me out! ! ! ! . Y; l5 ~( T1 k# a
hacker: how wrong? ! ! ]0 }4 Z  V0 J5 u& x
white: You are not the forum to use my ID to play it? ! ! * s, }3 n( v+ ]' I5 K# m+ @
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
$ j9 H1 U6 }# k% l# w7 J. T white: it does not work! ! !
5 R) C9 e$ k  q9 o9 j9 j1 G" E hacker: how should you like? 0 K* g/ b4 @: T
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! " [3 c  W, T# w5 b/ ?0 l$ z

7 V# T7 w! ~) a- O2 W hacker: Hey,ralph lauren pas cher, I did a lot of fun . u( E2 j% |8 D% t3 L
white: what
& `2 ~5 ~# s5 n hackers: I go to the forums posted the top & B2 u' a& k4 L" Z: H
white: This very common ah
3 S8 i' R" T, k7 W" J5 K Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
0 P1 L& v3 |# m white: Wow, very enjoyable, and I can never dare, will be blocked!
$ N" ?0 w6 q* }& V. _, ~ Hackers: Yes, has been banned. ' b# @! L5 z( D# S% c  n0 j/ H
white: this is also fun? !
2 ?8 o6 _; ^# s0 z6 h( n9 q Hackers: Yes, ah, because I use your ID
  R" Y0 T0 l% d0 M8 s" X2 ], Q white: you are pro? . g- `7 v- J( ~9 W6 L# M
hackers: You can say it. : r8 P5 L/ q5 l' @
white: to what extent high?
7 b/ F/ X" |2 A8 ~' J4 Y hackers: ah, I am bored when their own 0 A1 K# T7 m# S1 f1 x
white black: Ah, this I will!
0 e2 `% q/ l# s% d5 O* g# Q hacker :#?%! You can? !
8 y1 y3 y0 p  @0 H( u; o  Q white: Yes, ah, a black off it. . . . . 2 V9 q. O7 p4 J- d$ J
hackers: Go!
4 T' w. l( ~$ H& s; U white: Ask your question
( c6 J7 O8 M! V. C% l# \ hacker: says
! j) r; P% Q$ X2 i' p" ^ white: Besides me, you can also control other people's computers do ?
" E2 f5 h. ]3 U/ M Hackers: Yes you can. . . .
& Z* @7 J/ {  d( A* J! \ white: no networking is also OK? ) l4 {$ q# G; }" G
hackers:. . . . . . . 5 ^0 a: U$ T: ~! a' I
white: You can remote control to open someone else's machine it? 0 \( M8 d8 F: ]" H
hackers:. . . . . . . .
8 O( Z, }, }# n$ N5 e white: You can steal top-secret file it! ! !
% S/ ~& e- M2 W9 `% X  B. |4 d hackers: I think you see more movies, go to sleep . ^& w- R  r! Z4 K( O. N" R
white wash: my computer is broken
. C: q; A; h+ c hackers:. . . . . . . Just checked, your computer no problem ; @2 C) a  X( I2 e. k' u  n9 {: Q
white: that is, you bully me   z* d7 e! \# Z
hackers: No ah
6 W0 _+ y1 l1 V7 e$ N white: You are! MP3 files are passed to my no images!
" t6 e- R4 o, x% b3 a: w$ e; Z hackers: help ah ~~~~~~~
. \# {! g* b# e( W3 @, o3 z white: Ask a computer problems can you answer? % f* |  z3 i0 O. D1 F7 t
Hackers: should be able to / K- z* G5 X# J( q& Z* y) O) @$ \
white: Which key on the keyboard the most handsome? " T6 X$ ]1 C* d, T1 s$ V  w& m
hackers:. . . . . . . Do not know / u/ [  M" A% `
white: of course, \!
* ?3 t. d- k2 X/ z$ h0 O! B hackers: halo ~ ~ ~ This is a computer problem? ! !
8 R# |. J. }5 \6 z. F
; P" }9 g9 V; f* `4 I6 o" z% A white: ask you a computer problems you can answer?
5 ^0 J/ q( E) ~ hackers: If the problem is not your idiot " ~7 K4 Q$ e) Z: T5 A1 H& d
white: I am serious! ! You can operate my computer?
# T- o8 H( E1 X3 u' X( [ hackers: ah,juicy couture shop, yes
% `& T+ X/ c5 }$ M! w( U white: that problem, you can solve it : U1 _% m2 r& R
hackers: Your question is, should not be difficult ;
/ h/ ^) _" p7 P3 l: I6 l2 x white: Great, my fans do not seem to turn up,nike air jordan, help me change it & W& S# ^2 P) N
a hacker:. . . . I excused 1 C9 r+ G$ {; ~+ f8 \$ c* T
white: we see meet you? 1 H2 |, X9 y( k
hackers:. . . . This, not so good, why should we see . J0 ?; m) ^$ M+ T' n
white: I want to see you are not the same and I would like to 9 L2 P; j7 C/ e4 B- _
Hacker: Oh, what you think?
5 o( V, Q$ R7 w* {( A2 p white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 9 t+ y9 B4 T9 |6 W# J+ T, T. N
hackers:. . . . You say that Spider-Man, boss!
/ R% M3 `' P5 i hackers: Kazakhstan woven ~ ~ ~ % ]  J- u' g+ b6 V. S; A
white: You called every day, is not very curious about me?
$ X: O/ P6 g7 m) I3 S hackers: not curious, is the habit, easily came in
; \* t  F4 j0 U4 m& V( t white: Well, I have a good way to change your habit 5 e$ x+ ^- j) ~7 i' \$ Y/ ^
hacker :. . . . Oh? ! Any way
, n5 L2 K% U/ F# b0 j white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ & V1 d( F7 \8 Y. z: \% c, |
hackers: Genius ah! . . . . . You can also connect to it?
4 O9 W' e3 Q9 h6 ` white: to ah, and slowly the hymns!
. Q4 o' V) g0 q3 o0 e  S white: you every day into my computer, is not very curious about me?
5 i, p2 D- L3 h$ k% X# O1 ^ hackers: No wonder, only used
* ^+ `$ a9 i7 G( r- }; y3 ? white: no you're curious about the place?
; v9 R4 [4 B/ b( T! F3 s# ] hackers: a ah, I always wanted to know your machine so much as when the virus crashes ! |$ q( b5 K2 {0 O
4 t" n, g. ~% R0 w/ G% u
white: I would like to control your computer ; O! B7 y8 Y! {$ c
Hackers: I will not have other people access my computer I will be mad
2 v! e' ]' _( u9 @6 y% { white: This is not fair! ! 1 W% _1 _( `/ q  N. e: o6 V5 u
hackers: ah, well, you control the good of the . W, D8 i. ~+ r- A' P0 i
white:. . . . But I will not. . . .
$ S  R- \% a! K" e2 y0 D hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! . k3 j* Y3 J+ O' X
Hacker: I'm white ! E, U, @  t: X3 v. L! t6 Y
us again: This is probably the last time we met the
9 C0 C$ }) \: f( s: z Hacker: Oh? What happened? 8 s% R* |. G: X
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
: j! T! d/ V  v- s hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
) {  G. ?5 S6 \; l0 \( T9 z: U5 V9 t white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 9 ~9 e( F3 b( i3 Y7 i
hackers:. . . . . . . . . .
+ |; W: u/ x  g8 C& e5 R hackers: so late, and how not offline?
2 P0 x$ n* Z( d4 S7 z white: Oh, is the next, and I went to pull the power
4 a) N' v1 W6 X/ o6 K7 ? hackers: Slow! You will not shut down? 7 o! `/ @0 `/ d' {' ~" R/ }3 L
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 5 z5 W  ^5 x, ^
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
, v9 v6 ^$ a4 n8 P, o8 ?' m white:. . . . . . I press the power to the hackers call it 8 g: V" X# d) T1 q' X
white: You are not really powerful
8 p' r& }7 ^4 r hackers: so-so friends ( O$ C+ f/ y1 U. D' j+ j
white: bragging! You have the ability to shut down my machine in the horse. 3 q- e- Q' B) p3 `/ c& ^8 \2 ~: l
hackers: this place is difficult! You wait
0 L, e% ?9 a) d- X hackers: Haha, buttoned regret it
. g* `9 Q  H! ^* l$ A: L- i white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 5 g7 i% `7 D8 L/ y9 a" k
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-12-22 06:28 , Processed in 0.131773 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表