埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 767|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer ' b  R( l0 V+ }0 B1 P1 c: x
white: how control?
( T3 B2 o/ r( k( m1 z: ]4 O2 _6 ^ hackers: white with a Trojan
( c, A% L8 ~! F; r7 `:. . . . . . Where? I did not see ( i) ^' y0 N* @
hackers: Open your Task Manager
/ g( C2 P1 K- Y# Q, J white:. . . . . . . Task Manager, where?
" [4 s& f4 b! p0 E, Z2 U hackers:. . . . . Your computer below! ! : v$ _% T- A; v* H  Z: _1 P$ `
white: \; * }2 y) ^8 v5 L1 Y9 b
Hacker: I have control of your computer 5 q6 f5 r- ?2 q, t& {/ Z
white: Oh ; h. o6 F# C" D9 C3 v3 _% j7 \( q
hackers: a funk? ! Hey
9 {! k7 b# q+ w" N" X, R& X white: for the just, help me kill the virus it, many of the recent problems my Lord
4 j+ ?' o+ Y+ f# o0 ? machine hackers:. . . . . .
; f+ Z* F8 \0 n/ {0 x0 u8 e( W ! L  E9 D6 p9 `, I# e
white: how do you always in my computer and out of
7 T, l5 {* U% o1 I. ^0 Y casual hackers: You can install a firewall
! s4 R% j3 I, A1 n8 U0 _ white: install a firewall, you can not access it? 9 j# v$ S% a% G; P9 t
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
: g" z; ~# g% U) R" C6 E$ G 5 @% \/ q0 k: w3 S" y0 j
small White: I heard that you will create a \!   u  n. q) \6 H; @0 e+ J
hackers: ah 3 T. M! S$ Q5 Y7 A6 u" P. _, _
white: you can control someone else's computer? ! 3 b; u2 }# e$ S+ `& P- M+ l# D
hackers: General is the * \6 a8 u3 I# r, D( q
white: you can black out those sites? " K2 u6 v0 r  M' s0 l8 L
hackers: of course, did not hear people call me a \
& f' k7 u5 o: l/ |5 Y( t. L$ ` white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
, {% h9 ]/ a- j# b \! 8 Z' @  n: ?+ J# O% k
white: every day you come in, do not feel tired of it?
9 i$ ^9 i" B/ s1 f hacker: is a pain, your machine is the worst I've ever seen in one of the . J. N5 i* m8 F: `
white: is not it, this is Brand + r& X7 v5 l: g1 C1 @
Hackers: I was mentally retarded in addition to your yard game machine only virus a - _- j8 j2 ?7 x/ x& M7 j5 t4 M
white: Oh ~ ~ that you see me The \. . . . Goodbye % E9 |& T# l1 l' f' q: k5 s
7 G# e1 }5 H! K3 J3 `
hacker: Hey ~ ~ ~ I come!
  |/ R; n5 o; c2 S white: not seen you for days, was my firewall blocking you? 7 R# T- [: V. o1 T1 w( h$ N8 u9 d
hackers: Haha, jokes, on your machine is easier than my own, not you miss me : b) c3 @  o& V9 e0 K+ K, `
white: I want to Please help a busy
( Q+ `5 v+ {9 Y3 c/ D% n8 { hacker: What? ) N3 M  u, i" ^
white: you can not modify the point into the power system data ! g3 Z# o! |- q
hackers:. . . . . . Why do you want to! ! & h, u  X: O% C
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 0 y) g  t  G- p+ M7 g$ T7 Z
hackers: die! !
1 g: @0 ?: ]1 U6 Y6 G% R# f 8 v0 F0 Q% d5 W" w
hacker: you die Where is? ! ! ! - n- A4 W$ N6 Z" v# s* g5 d/ T4 Z3 K
white:. . . . Go out and play for a few days, ah, come to me why
/ W& y. I/ Z. {9 I& E/ B Hacker: I'm looking for something 4 P2 H& R2 V4 g/ O9 j& h7 o+ G
white: what I find here?   H; s/ Y8 Q; e1 B$ G
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights , F8 |% J& Y' G) W: c" i

; R" l9 m( H) G. u5 ?4 C most hackers : I come! !
/ o* s( W2 P! u, G3 ]# A( Z. . . . . . + {. h. K( J- K* X, x: z( Q
hacker: how not to speak?
) o& M+ {3 o, T% `, L white: a bad mood 4 x, A( D) {# g, J- c
hackers: Who bullied you? 9 E0 }  p) l- i/ ^  L& d, ^$ Q
white: a Q No. I have not lost inside of my first love
( w& A, c8 E/ R5 B: `1 z3 V Internet hackers: this simple, I get it for you
$ S1 _6 U& [, v- m2 t7 b+ d( M white: do not get back ( `2 r  i3 ?* N2 s/ t+ M
hackers: No, tell me what number?
6 }+ E& z- u6 a. c* G9 ?* O% W2 T! h+ g white: Woo ~ ~ ~ ~ just do not remember
/ |) C/ j! k, d4 q
' G3 Z$ Q- B0 O5 E white: you gave me out! ! ! !
3 Y8 X4 g. i- j" L  S hacker: how wrong? !
2 |1 c9 I+ ]. M6 P. m& u: N white: You are not the forum to use my ID to play it? ! ! + D$ [, w$ ^9 e$ J0 ~
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
( T0 s! z/ A2 f; L+ J( n/ u white: it does not work! ! ! 7 Q7 l! Y9 X8 b+ y7 g1 W( ^1 h: d1 M
hacker: how should you like?
* A% z5 n: \+ Y* c/ o8 H white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
0 |7 q# ?, M# d+ L0 y
" T: L+ k: e6 A hacker: Hey,ralph lauren pas cher, I did a lot of fun ( O& k% @0 T0 c7 X
white: what
. U( `; u# y: |  X; P hackers: I go to the forums posted the top 1 o( ^) ?, |6 I& W4 ?: i. Q
white: This very common ah ( }. |- M" Q$ W. L9 Z( E- E% D* P0 M
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
, A; P" j7 B! j( V  g5 l1 v white: Wow, very enjoyable, and I can never dare, will be blocked! - \1 t0 B: G) H9 l3 ]
Hackers: Yes, has been banned. 5 C$ D9 `) E; V) Y5 J, H
white: this is also fun? ! ( f" S! T, F2 u0 p1 w+ _# q6 s/ s
Hackers: Yes, ah, because I use your ID
( @8 C$ C1 ^1 A; [$ L white: you are pro? ( B% `  ?8 X6 C1 g9 J# j
hackers: You can say it. - F; w2 \9 [) o$ c' r
white: to what extent high?
9 S' {' J* E% I4 r8 U: ~7 ~& M hackers: ah, I am bored when their own - v! c. A0 w# X! s% A$ C
white black: Ah, this I will!
+ e1 d* Z- e4 r& Y+ D hacker :#?%! You can? !
: a# n6 L9 I! h' |1 ` white: Yes, ah, a black off it. . . . . ) B3 p, T" |: K  n0 y4 @* j
hackers: Go! 1 C+ z+ h1 @+ x! [; @- B( Z. F$ o
white: Ask your question 9 G* o! g" r& `+ G$ E8 a5 K5 k
hacker: says , v# `6 W, r/ s6 j1 ]. S
white: Besides me, you can also control other people's computers do ?
5 e. E7 w5 |6 U3 j7 |4 | Hackers: Yes you can. . . .
' b% h2 r0 m1 v# Y5 i. A white: no networking is also OK?
. e' d* v0 p# N( ^" W  ? hackers:. . . . . . .   k8 a1 E/ x  a8 _2 k
white: You can remote control to open someone else's machine it? + ~! F/ T! ^. F1 A% i' u
hackers:. . . . . . . .
: V7 {, N3 L2 p+ j% O9 F/ H: r white: You can steal top-secret file it! ! !
: y0 Y; G1 e$ A hackers: I think you see more movies, go to sleep
- a4 j8 L% o* a4 b+ e white wash: my computer is broken 2 k! b% F" ], K" W3 b7 f
hackers:. . . . . . . Just checked, your computer no problem + k. p( w8 V$ Q' B0 |6 F1 w( L
white: that is, you bully me
9 r. d% q% N" o: i9 l: n hackers: No ah
; W: Y7 ~& ?+ _6 R9 m$ Q2 I0 j white: You are! MP3 files are passed to my no images!
  w6 A8 w2 T3 `% R' A" U! J% Z hackers: help ah ~~~~~~~ 0 O5 j% e+ O0 I9 f, _
white: Ask a computer problems can you answer?   R8 c: L: U1 J' W+ S, I
Hackers: should be able to 0 L/ }2 z2 T9 ^3 U5 n3 z7 ~9 X5 x
white: Which key on the keyboard the most handsome? 7 Z, L- M) q7 B- b8 X9 Y
hackers:. . . . . . . Do not know
, h- K' K+ k" Q( o white: of course, \!
% p; o) l5 P' e, ^# z hackers: halo ~ ~ ~ This is a computer problem? ! !
7 d* ?9 g4 O" `% m# w" F: @$ Z6 N
6 q% M0 }- S7 k/ M) L# _2 J5 ` white: ask you a computer problems you can answer? 0 j/ R( \! S* e; z
hackers: If the problem is not your idiot , d! X, _1 \7 g7 i- {3 v$ q
white: I am serious! ! You can operate my computer? : a1 A( W$ q( C7 l! ^! M
hackers: ah,juicy couture shop, yes ) K8 y7 r7 e, W& g
white: that problem, you can solve it
/ a! z7 }7 A9 H) U* o8 F8 s2 K% ] hackers: Your question is, should not be difficult ;
5 k; M" K% \- l( s) z; v4 z white: Great, my fans do not seem to turn up,nike air jordan, help me change it
! E! R1 B7 ~! p1 M  k( w a hacker:. . . . I excused 6 B; q7 l/ Q2 @, P) t, Y
white: we see meet you?
2 {( `1 [# h* n6 F6 l$ w hackers:. . . . This, not so good, why should we see : i) S$ Z4 |3 s1 `
white: I want to see you are not the same and I would like to 8 `- e0 z$ H' b2 z  P; w0 @
Hacker: Oh, what you think?
2 A! z0 r* v5 a0 O6 Q7 g white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights - G; q" o9 Q: a; v' h- [
hackers:. . . . You say that Spider-Man, boss! ' o0 B" o" R7 q  j4 E) i& V4 D
hackers: Kazakhstan woven ~ ~ ~ + l7 L! Y- H4 _/ ~9 `2 p; J1 w
white: You called every day, is not very curious about me?
1 L+ d. l% @+ _9 ]7 | hackers: not curious, is the habit, easily came in
0 z  k/ s% K1 @7 U. Q9 ?$ }; q white: Well, I have a good way to change your habit
3 @/ t7 K- {$ Y hacker :. . . . Oh? ! Any way ) h* {, N4 L; q  W  D. J
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
! H- J3 ^0 t* _9 l4 R hackers: Genius ah! . . . . . You can also connect to it? 5 D9 N# y$ y2 ~. G8 `( \9 Y4 {2 b
white: to ah, and slowly the hymns! : p+ b) x' [4 y4 j  z: y" Q
white: you every day into my computer, is not very curious about me?
" W& I& B5 \" Y4 r  N% | hackers: No wonder, only used 6 q" A- G, O( d. R' ~( T+ @1 V
white: no you're curious about the place?
3 y! B% ?% a* \* [, {$ O hackers: a ah, I always wanted to know your machine so much as when the virus crashes
; T7 f/ ?+ r& h* L6 `% d
. N: D" p8 a& z, z/ _: c white: I would like to control your computer
6 L4 q+ z, L" K# X Hackers: I will not have other people access my computer I will be mad % g$ m% S. c2 T1 v
white: This is not fair! !
% x, p7 j" j2 A( }+ d- C/ t hackers: ah, well, you control the good of the
. {0 k  u# a3 D white:. . . . But I will not. . . .
8 m7 c! a, P* H) @( I7 s6 Z/ Q hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 5 o1 n7 a- U2 q
Hacker: I'm white " D* |3 Y, }$ o+ V: V7 u
us again: This is probably the last time we met the
/ V8 k, D$ f% W) l3 ^ Hacker: Oh? What happened? 0 ?. I+ }3 `+ }6 \
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
1 }! J& w. s1 v hackers: You are so tired of me. . . . . Well, since I do not come, goodbye # N3 R* X( D. j6 M+ Y, Q
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
' ]0 m8 E( `: k) d3 w6 l  b hackers:. . . . . . . . . .
- V6 z  b  Q) X hackers: so late, and how not offline? 7 x  r" T- Y  ?$ B" F8 j
white: Oh, is the next, and I went to pull the power
  \; |; u% e: O( ] hackers: Slow! You will not shut down? ! J9 |2 t& w. f- @# u' D. x
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power   Z# y  G+ s, _5 I
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
3 R* i, R4 A9 M1 Y! _/ f! G- Z white:. . . . . . I press the power to the hackers call it
2 W' M9 W, E: z- O8 h white: You are not really powerful , Q: M% r: H' s6 u, Q1 M3 N7 C* L% K
hackers: so-so friends
8 S3 [3 S& K% h; E1 X# k4 m4 `) V white: bragging! You have the ability to shut down my machine in the horse. " Q% l" E5 t6 x% @
hackers: this place is difficult! You wait
; I+ S& P9 |) \7 ~3 \ hackers: Haha, buttoned regret it 5 t5 h5 [, B4 B7 d8 }& Z% j
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
: ]) E! y  O) E, D- O8 b hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-3-25 13:24 , Processed in 0.187429 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表