 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer ( D7 G5 D) {/ x5 i4 Z }, n. u# |
white: how control?
) r: S! C! y* y# D! [4 ` hackers: white with a Trojan
% i) I& h. ? s0 D:. . . . . . Where? I did not see ; ]7 p2 A" e+ o! i, P
hackers: Open your Task Manager
5 ?2 w) r( q& e1 \0 m white:. . . . . . . Task Manager, where?
6 G! Z: H" c+ ~. Y hackers:. . . . . Your computer below! ! 5 a1 k4 r+ A/ V$ J
white: \; - J0 x8 _6 {' U5 {
Hacker: I have control of your computer $ d4 R- v3 i1 ^+ E# k+ s' p5 Q
white: Oh
3 S, e9 C2 Y' o" [0 C hackers: a funk? ! Hey
/ S' f& R6 p7 W& h) _* N2 U white: for the just, help me kill the virus it, many of the recent problems my Lord 6 w1 P7 U$ e" U- x q
machine hackers:. . . . . . / y B/ O2 l4 `' S+ I
& o( q& Z+ E/ n7 E; c+ e
white: how do you always in my computer and out of 1 r" d; K" ~! A( v+ o9 \
casual hackers: You can install a firewall - w' I5 D: w* h- {. x
white: install a firewall, you can not access it?
' e" t" R! c# i3 {# o, h: E" I hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
* x: m9 M4 D- n4 `0 ? ! B8 g% H" v1 d a& n. {1 y
small White: I heard that you will create a \!
) x n/ T3 i3 b6 d* a$ L' o: R hackers: ah 3 |& H- X% ^; {
white: you can control someone else's computer? ! ' X* p* }9 J- d* j, a; O& Q
hackers: General is the ( V* t% g3 B% o) u2 L7 p, p7 W
white: you can black out those sites?
. T( @/ a. P- j hackers: of course, did not hear people call me a \
4 X6 d7 E& W4 k5 c0 G white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 6 N$ O" q. ?5 ]7 \) x0 C
\! ! W/ x; x( t* m, g5 [4 ~+ C0 {
white: every day you come in, do not feel tired of it?
4 j' B1 r j/ K" ] hacker: is a pain, your machine is the worst I've ever seen in one of the
0 ^6 u' k2 I w9 z2 z6 x0 d( J% O white: is not it, this is Brand : B' I3 A2 q: F' Y+ V5 W; V
Hackers: I was mentally retarded in addition to your yard game machine only virus a & H. C2 f. g' w% E4 ?9 x
white: Oh ~ ~ that you see me The \. . . . Goodbye
0 W) }, R9 V4 s 5 M- {" F/ T; j! G$ w# \/ Z
hacker: Hey ~ ~ ~ I come! 7 @8 h9 q8 z5 T1 v8 C% v" x& w
white: not seen you for days, was my firewall blocking you?
9 E+ m0 {9 J( M0 u8 Y7 F6 r hackers: Haha, jokes, on your machine is easier than my own, not you miss me
1 v/ S; B+ x' @1 Q+ l! m white: I want to Please help a busy / F, T b# K* Y. Y
hacker: What?
2 S2 }* S* R7 r; G, T( J white: you can not modify the point into the power system data
6 S5 a$ J! e9 ^! z( t) t* `" A0 R hackers:. . . . . . Why do you want to! ! 9 F, X3 n0 @( }/ L6 S* q
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . # K' n* U5 Y" d0 ~) j
hackers: die! !
- Y7 g% l/ j$ p; \# d$ I 0 i: E/ [+ J% W- |4 C! P& @5 J
hacker: you die Where is? ! ! !
& _3 r/ p/ F& l2 v& v white:. . . . Go out and play for a few days, ah, come to me why . [) V6 o6 r8 }& k
Hacker: I'm looking for something 1 R1 [' W$ T2 M: x* Z: w
white: what I find here? ; N" _% A" m8 H/ q0 |; S
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights % a# o/ r f& m
# E3 J/ K, x' c
most hackers : I come! !
+ @. t9 V+ Y( l2 N( |8 m. . . . . .
- p7 K- \5 H, B2 f: s! Q9 y" C hacker: how not to speak? # Q" c* J8 t' n5 w
white: a bad mood 0 b0 |5 k2 o. C6 G8 ]7 @) d# `
hackers: Who bullied you? 3 P, B. `5 l+ A+ h
white: a Q No. I have not lost inside of my first love
: O3 B0 v, m% Y Internet hackers: this simple, I get it for you |3 H: N2 u; [
white: do not get back
# C8 f1 P I6 V _3 h# e; V2 ~ hackers: No, tell me what number? % k$ g- m5 {: Q$ G3 }5 b
white: Woo ~ ~ ~ ~ just do not remember . |* E& b+ B5 E* J
2 ^" z; h8 g9 F6 @3 X
white: you gave me out! ! ! ! ; N+ Z- O( K1 w; K* C8 {! r1 F
hacker: how wrong? !
1 X: `% `8 Z0 x ]& R' u white: You are not the forum to use my ID to play it? ! !
7 W& s$ Z+ A4 ~$ w2 s hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 6 k" N% F; I" R1 D
white: it does not work! ! ! 6 d' v& p3 @- | I
hacker: how should you like? / t) ^$ A0 U% ~" C ^* L! e. {+ K
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! * `0 | K+ D v+ P* O9 L
6 ~/ O+ D) `. q# e4 E8 R hacker: Hey,ralph lauren pas cher, I did a lot of fun : [0 Z( A V& i" K: p
white: what 5 I) O" c; M4 B& H$ Y
hackers: I go to the forums posted the top 1 V" f2 H' c( ^
white: This very common ah 4 n5 A/ H: @' Q* m C. B
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent ! f! u7 H: Z. r( y* w; L
white: Wow, very enjoyable, and I can never dare, will be blocked! 9 m5 w5 \' |+ ^: n5 V: s+ }; v
Hackers: Yes, has been banned. : j5 ~8 {7 X) \5 q0 \4 j" |
white: this is also fun? ! " q. E9 _% L0 \% X! N
Hackers: Yes, ah, because I use your ID 5 S- u6 r' s" L/ K) m& w/ T- ?: T: n
white: you are pro? 0 a' I/ b' H& N6 [7 n$ G) ~
hackers: You can say it. 4 _$ ]( S2 x" K0 a& ^
white: to what extent high?
1 T3 `$ C+ o/ Z9 \2 | hackers: ah, I am bored when their own 4 P8 J; e2 n" \2 C
white black: Ah, this I will!
; ]+ l4 }1 `/ }0 D hacker :#?%! You can? ! & [3 s: z; p% L3 j) @6 o& m
white: Yes, ah, a black off it. . . . .
( i( }& F3 P# @6 Q7 ? hackers: Go! 4 ~. {1 k3 ]5 _5 Y4 z
white: Ask your question
) v- H( o9 N' m6 t hacker: says
! j; y9 f& }0 D! ]9 ^ white: Besides me, you can also control other people's computers do ?
5 i( U3 E; y/ g( ^0 W1 W$ ]# { Hackers: Yes you can. . . .
9 V O8 }' G& ? white: no networking is also OK?
/ b2 W# ]) Y. n' _6 } hackers:. . . . . . .
( K3 a9 q2 ?' P! S# k' _ white: You can remote control to open someone else's machine it?
4 V3 X0 j5 _- ~) f hackers:. . . . . . . .
0 _. X/ J1 b5 P% a/ I$ \9 S white: You can steal top-secret file it! ! !
3 E* ^7 @* ]" [+ g8 v" y# _ hackers: I think you see more movies, go to sleep
+ x3 p: o+ e$ _8 S9 @8 s! S+ a/ F white wash: my computer is broken
( g' }6 z. s; K- G) Y hackers:. . . . . . . Just checked, your computer no problem 9 q4 [" m1 I7 S6 V d
white: that is, you bully me : ]. M/ u! g& h" [' u, V/ A
hackers: No ah
+ Y. o1 a% f3 Z5 k0 J/ C, f0 w- S+ J white: You are! MP3 files are passed to my no images!
; m$ M* Y# D; t5 B- l9 u hackers: help ah ~~~~~~~ : n, U1 c" `, T# {# Y Z
white: Ask a computer problems can you answer? 8 T; i5 s( c( [1 N
Hackers: should be able to
, E$ n' Q& P4 R) A# y white: Which key on the keyboard the most handsome?
/ k- g* f6 r% Y) r" u z8 z: J6 v hackers:. . . . . . . Do not know * a. ?, K9 K- }1 y9 ~5 T2 d5 W& z1 j
white: of course, \!
9 `4 D' P* m* P2 y2 U0 ~ hackers: halo ~ ~ ~ This is a computer problem? ! !
( X7 }# @& o6 @# Y2 L. M" J
- C+ b* n. I7 @6 D4 [ white: ask you a computer problems you can answer?
& x, e. S, A! W, b+ I/ o hackers: If the problem is not your idiot
) B& X: K. J2 b3 s white: I am serious! ! You can operate my computer?
. e0 }+ S7 P0 [3 @+ |5 T hackers: ah,juicy couture shop, yes 4 O" `4 o! K* h) F. B
white: that problem, you can solve it
7 o) `/ f- X" z a3 q9 F v, L hackers: Your question is, should not be difficult ; + O/ l' g& k8 C: A
white: Great, my fans do not seem to turn up,nike air jordan, help me change it ( @- }' c& ?" x2 Y; ]& Y
a hacker:. . . . I excused
9 N' d! g) K5 U7 m) m- n P2 ? white: we see meet you? , N" ? T @1 z
hackers:. . . . This, not so good, why should we see
$ k* e, W3 c" ]' E white: I want to see you are not the same and I would like to . w& x1 J- u% s
Hacker: Oh, what you think?
1 n4 V) ~3 u3 U! H; K* H, \ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
O M8 b9 Y) x4 a, [- J* Z2 A" Z hackers:. . . . You say that Spider-Man, boss!
4 j! ? T) E2 j3 n hackers: Kazakhstan woven ~ ~ ~
8 |/ Y) N$ v# r( ^ white: You called every day, is not very curious about me?
) g7 ^' Z. _4 C* R; z( P hackers: not curious, is the habit, easily came in
7 Q( p& M! R- P* a( F5 ^6 N white: Well, I have a good way to change your habit 0 V- q6 a- m' T: A9 {
hacker :. . . . Oh? ! Any way & T9 P4 C; ^0 n2 i# Y6 T/ Y
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
* J/ }* N0 ?9 @5 h' Z, P hackers: Genius ah! . . . . . You can also connect to it? 0 [* q. D. L: N+ ]- A* N
white: to ah, and slowly the hymns! ( R' }( {2 A6 n0 l! O! e! Z. C
white: you every day into my computer, is not very curious about me? ( j; \9 Y+ _8 y) M6 ?
hackers: No wonder, only used 8 H( e( p0 U/ f2 Y
white: no you're curious about the place?
' e. y4 h# _, k3 b) F hackers: a ah, I always wanted to know your machine so much as when the virus crashes
8 @5 F3 w- _, T, R+ M ) r2 u6 r& ]3 e! Q' s
white: I would like to control your computer \6 D1 {- d7 w' X/ H
Hackers: I will not have other people access my computer I will be mad
# ^2 B. t+ g$ l' F x# ]$ T4 e white: This is not fair! ! 3 f" @2 T% ^ g4 ?2 ^
hackers: ah, well, you control the good of the ! D. L |4 S! U: F" ]
white:. . . . But I will not. . . . 0 m* @1 g' V* o1 _$ q8 M& r
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
$ g2 O/ J" s0 \8 h7 u8 ` Hacker: I'm white
2 i3 r1 {% x5 o9 e us again: This is probably the last time we met the ( t. m1 R5 _# O0 o: \
Hacker: Oh? What happened? ) ^0 T4 M X6 a+ d
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
# M/ ^' H8 m7 K hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
3 m3 a+ S" m) S" q white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
% P" [. r9 R( s( a hackers:. . . . . . . . . .
/ y7 s) v7 h) i hackers: so late, and how not offline? / U! F2 k; _- G$ c# ~
white: Oh, is the next, and I went to pull the power . z% e" I4 ~0 Z( R- J7 U
hackers: Slow! You will not shut down? 3 N [& z. D) a
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 6 S% B) ?0 ~4 v% U& T3 n0 P7 K
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \# Z% r6 C. R) _7 v
white:. . . . . . I press the power to the hackers call it
: t. f1 o0 H7 p. E: U, g% G white: You are not really powerful
; j1 H: |) i* E/ K6 s* z9 ` hackers: so-so friends
6 ?& t7 U" s& |7 b5 F9 ]+ p white: bragging! You have the ability to shut down my machine in the horse. - k. g1 @0 z6 v0 i9 k6 K6 H; e9 b
hackers: this place is difficult! You wait
, f2 B1 f3 R+ U% P7 L. p9 G hackers: Haha, buttoned regret it
) U% s" R6 n4 j6 x5 ^ Q1 H" ]( i% R white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
0 k: Y$ E6 f8 M! R) j! _+ h/ r hackers: halo ~ ~ ~ ~ |
|