 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer . Z# C6 ~( g! c7 A
white: how control?
3 Q4 k" r9 X. T+ I. O hackers: white with a Trojan : f8 D* d3 {, j; C1 g9 z2 k
:. . . . . . Where? I did not see 9 q2 ?4 K. E9 y
hackers: Open your Task Manager 8 G1 N6 W, A% v. A
white:. . . . . . . Task Manager, where? ) }: {5 B6 j6 m Y# F6 G
hackers:. . . . . Your computer below! ! ' f: F; s3 C* |/ R1 e# N4 t
white: \;
5 Q* g* R2 h3 J a5 I9 K; d Hacker: I have control of your computer $ T* o2 @& U2 J/ N8 M# w
white: Oh 2 P4 Z( @5 f- H- I
hackers: a funk? ! Hey
, _- C( N* J5 p7 Q white: for the just, help me kill the virus it, many of the recent problems my Lord
" N/ h% {7 s( @1 b: q: X' \ machine hackers:. . . . . .
# X+ }; B" A/ J8 w+ T8 m 5 i( t1 Y f8 \ ^$ Z( T
white: how do you always in my computer and out of
; s+ [' v) j" b' l8 w# j casual hackers: You can install a firewall 3 X) s4 z. b9 m
white: install a firewall, you can not access it? + ]6 C8 y% a" D1 E
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 7 J# O% c' ]8 \* X' s3 @% n" b
: Q! p8 W) q$ D$ y, P0 x small White: I heard that you will create a \! 6 Q# b l0 c) B2 s* v
hackers: ah 4 |+ `% p0 E; r- p. D
white: you can control someone else's computer? !
( \( X0 T+ M5 p0 G3 z9 i+ U4 w) `1 f hackers: General is the
3 c6 U0 _2 e9 [4 t5 u) ]; ` white: you can black out those sites?
$ G* s8 Z x/ F5 { hackers: of course, did not hear people call me a \
+ R1 u; ^$ {2 g% M white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 4 g) [9 s3 e$ D1 e
\! 8 S# H d7 Z, L
white: every day you come in, do not feel tired of it? " D$ _' H% H+ C- R, c6 m
hacker: is a pain, your machine is the worst I've ever seen in one of the
' q. [$ P F G6 o3 Z1 P white: is not it, this is Brand
0 Q7 ?" J4 U A, o3 Z* ?! C- }2 t Hackers: I was mentally retarded in addition to your yard game machine only virus a
$ ^2 R9 G! U d3 s r white: Oh ~ ~ that you see me The \. . . . Goodbye
/ \8 W6 K' X2 a
( |5 y( d2 u( Q! y5 P* D hacker: Hey ~ ~ ~ I come! + A6 G6 n9 r* Z; w, b! L7 h& N
white: not seen you for days, was my firewall blocking you? 3 l( {9 c1 y: m; a/ L/ N
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
2 B6 Q( V1 O9 q white: I want to Please help a busy ( t: v) W- @$ @1 K3 R& o6 |
hacker: What? , O1 d5 r' V9 }- g
white: you can not modify the point into the power system data
9 t. L s" R" i- l hackers:. . . . . . Why do you want to! ! % E! L& K8 g1 a% J
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 9 B' A0 `5 S6 a+ Y7 Z
hackers: die! ! 3 c Q4 ?; s: S% c2 _2 c
) r a3 \" X& t& ? hacker: you die Where is? ! ! !
/ F# L2 `: x o' t white:. . . . Go out and play for a few days, ah, come to me why 5 c6 F, Y: _+ \2 F! N/ ^
Hacker: I'm looking for something . [- ], n# P8 n% h
white: what I find here?
" d5 {5 |+ e8 v! e- M hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights . ~; s$ x, K% N. x
+ l. Y" r8 I6 i& L: \3 |6 _6 K, N
most hackers : I come! ! + s- M7 h/ |% `3 ^
. . . . . .
! I0 w. h; C0 P' V hacker: how not to speak? - q3 t9 }/ a b d9 l+ Q
white: a bad mood
/ v. S0 R' e6 \( ^2 b" G hackers: Who bullied you?
; N' w! l0 N6 N0 ~5 r& r white: a Q No. I have not lost inside of my first love f1 M$ {5 e s0 i% h7 E! o
Internet hackers: this simple, I get it for you
9 {3 e. N g. F4 `: d" D white: do not get back
8 J" T! _+ Q1 ~; V hackers: No, tell me what number?
4 ?4 j8 _2 S3 s5 A h+ a4 ? white: Woo ~ ~ ~ ~ just do not remember 9 n1 [( R8 y: U' ]
9 S2 \$ f1 G& ]; U5 E) y white: you gave me out! ! ! !
: y4 s# [2 A0 `0 r hacker: how wrong? ! . w( a$ u% A' Y2 D
white: You are not the forum to use my ID to play it? ! ! $ G( x+ N& b" P2 H, [: L, K( `$ U
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
& {7 n/ e/ v/ ]1 A white: it does not work! ! ! ! t+ q$ d0 [5 d6 P
hacker: how should you like? ( U" n5 w3 A3 r; |* G. d0 x0 v
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! $ u! I9 M5 X7 V" i
& a* O* F# p6 Y0 ?9 T$ T
hacker: Hey,ralph lauren pas cher, I did a lot of fun 8 {0 a0 f0 b: v! _
white: what
. |) q& y/ h: _' T4 H3 p hackers: I go to the forums posted the top # N, }- H( `- G: ^) y8 Z5 L9 D4 a
white: This very common ah
; N6 @1 P: ]% F. u: U0 E' g Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
& y P6 n9 `+ P) V+ u white: Wow, very enjoyable, and I can never dare, will be blocked! 4 ~' k' N3 B* M5 i9 [# u0 N* ~
Hackers: Yes, has been banned. 7 U4 D2 ^7 Q. k& r; P
white: this is also fun? !
2 U% \$ j( f( f& D7 v Hackers: Yes, ah, because I use your ID
7 g3 H) S' E# x3 a+ B white: you are pro?
7 v6 a7 H; n% f$ {* w# g1 l hackers: You can say it. & o8 l; H5 w$ ^3 p- y% P) G
white: to what extent high? 1 M! A8 n9 t6 r* o: y& \
hackers: ah, I am bored when their own
; I+ p4 K6 m/ ? Z: z white black: Ah, this I will! . |( L+ z% W2 K6 D, K
hacker :#?%! You can? ! 4 d" F8 y/ y X$ L
white: Yes, ah, a black off it. . . . .
; S# P. K! s9 K1 ? hackers: Go!
( {1 F ?8 L- o, r& H: ~5 b0 z white: Ask your question
2 d% j. x' A. s0 p% ] hacker: says
* z- l1 b0 i1 ?2 l& V) e* g white: Besides me, you can also control other people's computers do ?
( w& N$ \' B6 g1 U/ O Hackers: Yes you can. . . .
V+ C6 r g8 d: l, o: m s white: no networking is also OK?
6 |8 e$ G1 |% _" X, n0 `+ T hackers:. . . . . . .
# d+ k9 a; ^9 e+ V' S white: You can remote control to open someone else's machine it? $ Q- ]! I s9 m' S2 P
hackers:. . . . . . . . ! p8 ^% h- H1 w) Z; M5 ~5 l; _: j& X
white: You can steal top-secret file it! ! !
, l2 V' F" t/ A- e0 H) J hackers: I think you see more movies, go to sleep & {: }7 v3 l" `8 A% y
white wash: my computer is broken
. F3 @4 _! F) U2 d1 D hackers:. . . . . . . Just checked, your computer no problem 6 M9 q& G! G+ P) A$ R1 q: L
white: that is, you bully me ' v4 T( m# z* z9 ~! z( R* x
hackers: No ah 7 j) _! q! h0 {6 n" d/ H1 |; u! a" F; c
white: You are! MP3 files are passed to my no images!
3 H# t$ `0 f4 a hackers: help ah ~~~~~~~ & F$ L) h4 T% P# r s& W" v
white: Ask a computer problems can you answer? 0 M* F, \: O$ G: u2 R4 y" r8 I
Hackers: should be able to
6 b7 e/ i3 j3 ?/ D2 B white: Which key on the keyboard the most handsome?
2 g9 E# Y6 A' Y1 V3 v3 e& \ hackers:. . . . . . . Do not know ?6 f. x* _& U# O
white: of course, \! 0 c3 j/ ~# Q4 U/ |7 S5 }) H& G4 B4 _
hackers: halo ~ ~ ~ This is a computer problem? ! !
. T) I& v; K7 f( O ~- p2 u1 G7 }$ U 1 `) O0 j( p; `5 H+ o; d9 Z O
white: ask you a computer problems you can answer?
% `3 L5 o k8 A hackers: If the problem is not your idiot & A4 {4 ^: e. }, o
white: I am serious! ! You can operate my computer?
* Y' [& a" l8 A' l2 Y h' ]( X hackers: ah,juicy couture shop, yes 9 T( t9 C! D' d/ t* [2 Z) p8 [
white: that problem, you can solve it
a* P H2 ^' e- k. _: ~6 j: X hackers: Your question is, should not be difficult ; % H9 Y* a$ g$ y9 F7 G. s; A( k
white: Great, my fans do not seem to turn up,nike air jordan, help me change it $ R4 @, ~* G* o1 F
a hacker:. . . . I excused
5 d$ r# Y$ }6 l7 X% Q white: we see meet you? ( l; t( w$ V0 n
hackers:. . . . This, not so good, why should we see 4 V. ?) s. \/ e) Q
white: I want to see you are not the same and I would like to $ y4 I( x( w, [9 D
Hacker: Oh, what you think? ' q6 r& d# w' l0 {
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
0 t1 c2 L1 T9 B hackers:. . . . You say that Spider-Man, boss! , m. ?& a$ n: Q0 a) x0 p. b
hackers: Kazakhstan woven ~ ~ ~ * ~; ^) N$ O& d8 X0 F+ U! r
white: You called every day, is not very curious about me? " x/ r. i4 y) R, u- L. B, j! N
hackers: not curious, is the habit, easily came in
# N2 x+ F$ v) X6 t T5 n white: Well, I have a good way to change your habit 3 B5 [$ C# \* [! y
hacker :. . . . Oh? ! Any way
2 a B$ ]- L/ @' q0 C: G" v white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
: }, s9 q8 Z+ E0 } hackers: Genius ah! . . . . . You can also connect to it?
3 \. x. l+ V* g3 i/ l white: to ah, and slowly the hymns! 4 v+ A; n5 m/ Q6 B$ R$ a
white: you every day into my computer, is not very curious about me?
: N5 K; F) f6 l5 N hackers: No wonder, only used 7 C& F+ a2 w" K; [: O% Z
white: no you're curious about the place? 5 A0 S6 X9 D- G( d8 R4 _- m
hackers: a ah, I always wanted to know your machine so much as when the virus crashes ' |! c9 k" Q1 N- I0 _
' g9 C3 m4 W3 d/ S. C, a* U! r
white: I would like to control your computer : q: e/ i9 C0 P& }
Hackers: I will not have other people access my computer I will be mad - L2 N. g: n" N5 h
white: This is not fair! ! 7 h _. a% G* O+ \; N
hackers: ah, well, you control the good of the 5 G9 W9 ]- o4 n2 _' I$ V( d+ ~" ^
white:. . . . But I will not. . . .
2 l2 P7 a5 t$ S' C1 G( V hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
* t; Z- A+ c$ K7 q4 M Hacker: I'm white
. H( g8 h m: W us again: This is probably the last time we met the
, @9 s; N. R8 g- P Hacker: Oh? What happened? ! ~) o, A2 x4 n C; c# h5 `' [5 E* I
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
) b. ?; I3 G5 E+ t hackers: You are so tired of me. . . . . Well, since I do not come, goodbye $ |( W# {: O3 v" y( {4 ~
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
3 i4 W ], S; D3 W( q hackers:. . . . . . . . . .
6 P4 W$ Y5 _1 l1 T2 ^ hackers: so late, and how not offline? 6 M* n( d# X; ~5 K8 {
white: Oh, is the next, and I went to pull the power # c+ B* A2 G3 d" ^- B5 Z) k
hackers: Slow! You will not shut down?
; B% W$ x$ \8 n% g6 `4 w* t) i& ^; Q white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
2 y% Q# ]) {2 P1 C/ [) |( S hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
( J' i; ~ t" n$ `) c$ O4 _ white:. . . . . . I press the power to the hackers call it
0 {/ J* l2 N2 h% M0 t e white: You are not really powerful 6 v4 X5 |6 r7 I
hackers: so-so friends
% W+ @$ I2 y; L8 m white: bragging! You have the ability to shut down my machine in the horse.
( m4 X1 @- c( u0 b3 \ hackers: this place is difficult! You wait
- P; Z" W+ ]+ q+ L$ `: `/ m0 D& F6 e hackers: Haha, buttoned regret it
' w- f( t: a& z+ S v1 v$ k; d2 \/ Z white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ) S4 Q2 w8 i( y$ _& |
hackers: halo ~ ~ ~ ~ |
|