 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 8 x( B, L0 ~8 c- u7 r) r0 ]
white: how control?
0 h7 X; S1 o% q8 _9 I& R, Z hackers: white with a Trojan
$ @* Y3 u9 `- J! R+ K4 w:. . . . . . Where? I did not see 8 [6 {- r+ H# X& @4 Y
hackers: Open your Task Manager * [8 _ ]1 W6 H
white:. . . . . . . Task Manager, where? q$ [, Z' c% c- A# @$ n
hackers:. . . . . Your computer below! !
2 o* }# S7 ^1 Y; e# ~ white: \; % J- B$ ~+ a4 W; W S) @ V
Hacker: I have control of your computer - w2 z4 |8 d0 m5 M- r1 J
white: Oh
6 W& N. g+ Z2 @4 P% @, X7 d hackers: a funk? ! Hey
7 E( u. b4 ^/ Z# I% g8 H white: for the just, help me kill the virus it, many of the recent problems my Lord - t) C5 l1 r% y) j z9 @
machine hackers:. . . . . .
! m+ B* n5 k9 x, V- j$ \ * s5 Y3 a' F$ V% p9 T" F5 N8 t. j
white: how do you always in my computer and out of
0 c/ a" G) m, R, [* C" ?, ]9 |1 U casual hackers: You can install a firewall & n- |; v( J5 m
white: install a firewall, you can not access it?
U/ [4 b, T2 B+ @ hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ; _2 y$ ~5 m4 [
7 o2 `0 I7 b6 B" R6 @% Y9 A
small White: I heard that you will create a \! : d3 u' ?5 D% ?1 U v! ~
hackers: ah " i* n% `4 v' t8 E
white: you can control someone else's computer? !
! J: G: Z3 s" Q" h- F4 p9 z hackers: General is the % F0 G# ~8 ^2 p2 f- Y" c
white: you can black out those sites? + q/ M0 J1 M) q2 a* z7 [
hackers: of course, did not hear people call me a \! O/ J5 R5 w: r
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
! W, z9 Y* d4 |$ E$ ~! \ \!
# n6 \. F& v3 L8 `+ c# e white: every day you come in, do not feel tired of it?
) [) Z# j% S2 ^ |/ e# L hacker: is a pain, your machine is the worst I've ever seen in one of the
( u9 r6 `/ E1 L5 k, @9 r$ H white: is not it, this is Brand
! m9 e" D: M, w% ` Hackers: I was mentally retarded in addition to your yard game machine only virus a
: L& y- @2 w/ t/ V7 a white: Oh ~ ~ that you see me The \. . . . Goodbye - I) f, e; D9 L- H( D
* I+ i# w, j4 j5 ~! J$ Z3 k7 Z
hacker: Hey ~ ~ ~ I come! " e: a) u- Q* }9 h, E" {. C" k
white: not seen you for days, was my firewall blocking you?
6 f9 H' q3 ?: i6 D hackers: Haha, jokes, on your machine is easier than my own, not you miss me 2 }- W2 |" {* X7 x8 R+ _& n
white: I want to Please help a busy
# j8 j$ C3 Z z; S" n hacker: What? C' ?; t. d0 u K: C; [. m( J
white: you can not modify the point into the power system data
/ W+ k: H" G1 ^! ]% m hackers:. . . . . . Why do you want to! ! 8 [ a+ L- Q' V' M; G5 _
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
! p1 ~* G, d+ E1 w/ P hackers: die! ! 2 p% G# h7 h3 |9 U% ]
7 V) E; t. t8 O6 m- B6 d6 s
hacker: you die Where is? ! ! !
5 `" ~. c) v' y; J1 D" f white:. . . . Go out and play for a few days, ah, come to me why
% j& p9 Y- V3 `8 k( g Hacker: I'm looking for something
! m5 C# V4 C d2 y6 M white: what I find here? % c, t5 q4 m# d% v
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
8 M, _' W: m% O ! [$ A) ^. x' R+ Z2 T N
most hackers : I come! ! ( _$ K+ o4 ~! w7 m [
. . . . . .
" _& S! @* ]2 r hacker: how not to speak?
0 N! o& H/ n9 z$ [ white: a bad mood 4 e( D+ d3 O0 @
hackers: Who bullied you? 0 G I2 X' g" ^8 w9 m
white: a Q No. I have not lost inside of my first love 2 q* W) Z! }* T4 Y% F
Internet hackers: this simple, I get it for you ! H8 f% Z/ r* I0 |0 U
white: do not get back
+ ?0 ^: Y, H) ?! U5 h hackers: No, tell me what number?
1 d6 `- q9 {* a4 W8 z# Z white: Woo ~ ~ ~ ~ just do not remember
" D. ^3 f: H8 Y9 v" L3 G( Y
d. ]/ O6 \) [) P' Y: N8 ? white: you gave me out! ! ! ! 3 c) K4 A; E2 g& k1 a+ r- [
hacker: how wrong? !
* V, f% s6 I4 v6 E E1 D( _1 T1 m; p white: You are not the forum to use my ID to play it? ! !
: B1 o$ \ h1 y- v, y& h: r hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
1 e$ n7 [( j: w white: it does not work! ! !
* J2 N2 T, }! S. V* ^* l# v# _ hacker: how should you like? ( l! Y$ Q! }: w& `9 F& N
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ( u' l( v% S' c0 d0 {
% c4 D J# I$ r3 }3 h! ~4 Z6 l hacker: Hey,ralph lauren pas cher, I did a lot of fun
2 }5 ]0 R3 E# n/ T+ a4 T! a0 b. F! S white: what
) G# _0 A% ] A% |7 B6 A: d6 L hackers: I go to the forums posted the top
- X, b% ^0 I" `0 L; E: M* n white: This very common ah ! U* U& N4 _! l2 Z$ x1 l
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
N: |* T- D7 V0 i" t& r& Y* g; e* J white: Wow, very enjoyable, and I can never dare, will be blocked! . v8 y* \- b" {( I3 k
Hackers: Yes, has been banned. ; C& C" I& i" l
white: this is also fun? !
: i" U0 W) [8 r& R) v$ r Hackers: Yes, ah, because I use your ID / h' g7 k: I3 K! e U I2 T
white: you are pro? . t2 w9 M4 \( v5 M, K# C' O
hackers: You can say it. 7 E3 w6 m$ _+ {4 {' C. K' a
white: to what extent high? c" r; \0 e) N/ ^
hackers: ah, I am bored when their own % z5 R5 w7 s q) N& e: A
white black: Ah, this I will! $ q) w: u. B) K7 p7 [6 z9 Z+ ^
hacker :#?%! You can? !
8 @6 l) p7 r5 }# k0 T6 B white: Yes, ah, a black off it. . . . .
]+ ?4 K4 w" f S hackers: Go! 1 E' g g: B. S. r: @
white: Ask your question
: Z1 t* [# w3 R' `! G7 p% k3 G I hacker: says
0 `' m3 j0 x) k' g white: Besides me, you can also control other people's computers do ?
2 c2 \* I/ y& B, n Hackers: Yes you can. . . . ' ?1 i0 z5 a) z
white: no networking is also OK?
, p z% ]8 m _( ]/ B3 d6 N hackers:. . . . . . .
" l9 V" b& [0 m1 v+ k2 C white: You can remote control to open someone else's machine it?
; a3 X+ H6 h0 r/ v hackers:. . . . . . . .
& L; Z: Y' }5 H, h' t white: You can steal top-secret file it! ! !
$ y9 L" ^" ~4 z. r) e7 l hackers: I think you see more movies, go to sleep
* s+ x. J$ R! j) U. B( R5 h white wash: my computer is broken 5 ^9 T) n8 T9 A3 S
hackers:. . . . . . . Just checked, your computer no problem 9 _, P! ]& N! h- R/ q7 Y
white: that is, you bully me 4 @& q4 D# l1 a) X3 t! M2 i& i6 Y- S
hackers: No ah 5 A+ X$ k- M6 y
white: You are! MP3 files are passed to my no images!
$ }! [ U+ [8 \. ?! z# D hackers: help ah ~~~~~~~
* Z, V5 T6 }" C white: Ask a computer problems can you answer? 1 S) |/ s$ P$ H' d# l4 [8 t" @; H
Hackers: should be able to
# |6 R7 \: m3 O0 w% m- j$ }6 z white: Which key on the keyboard the most handsome? , e: \2 u2 U7 k5 @) X" ^3 J
hackers:. . . . . . . Do not know 4 S9 g/ `% P& x! X5 m! a. L0 @
white: of course, \! 7 }% ^8 A) x( z$ {+ `" L
hackers: halo ~ ~ ~ This is a computer problem? ! ! : d8 V3 v8 f! ~- T; D
4 X* _9 i) `7 E. D) q9 G/ M+ \ white: ask you a computer problems you can answer?
4 b- Z* o/ L4 @% J hackers: If the problem is not your idiot ; P, W& D* V3 \; m- s t
white: I am serious! ! You can operate my computer?
+ O7 v( }+ x( V9 g# I+ B4 `" { hackers: ah,juicy couture shop, yes
# ]$ V7 R# V. l# U9 \ white: that problem, you can solve it
5 h3 o3 F% p/ g* [8 q hackers: Your question is, should not be difficult ;
, Z" _: M \# ~3 F9 z0 i: V9 d5 E white: Great, my fans do not seem to turn up,nike air jordan, help me change it
" `" {0 x- s* ?6 e; ]" n a hacker:. . . . I excused ) }( ^/ I; G8 q9 i R2 l0 `
white: we see meet you? : ]# a: X& _: J
hackers:. . . . This, not so good, why should we see
8 z) T3 {- s0 O" P! i2 a white: I want to see you are not the same and I would like to
$ ?; a" a6 F% e8 O. ] Hacker: Oh, what you think? % R ~0 y1 n- |" m' O" O* Z5 m
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 4 z% [ Z3 P# p. n
hackers:. . . . You say that Spider-Man, boss! 0 ^* ?! c3 y5 Y% c
hackers: Kazakhstan woven ~ ~ ~
( y3 W' P6 P C% \$ h I3 P white: You called every day, is not very curious about me?
3 W }- ^& |$ t hackers: not curious, is the habit, easily came in
3 L+ p* u' g' M3 n: C2 l! D O U white: Well, I have a good way to change your habit & v1 j# a7 t. B- p5 w. x
hacker :. . . . Oh? ! Any way 7 v+ q( {5 w# ?3 L
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
: r u; V8 n2 h1 n0 Q hackers: Genius ah! . . . . . You can also connect to it? " b7 t, L+ l% _ a8 Y9 l# X5 d
white: to ah, and slowly the hymns! 0 l6 F9 `+ x1 Y, C8 U
white: you every day into my computer, is not very curious about me?
2 e- I0 S0 ^. C* w( g$ |7 h hackers: No wonder, only used
9 [. b1 E+ g2 ^% c" O- G white: no you're curious about the place?
8 G4 a8 U8 z0 ~# ]( C hackers: a ah, I always wanted to know your machine so much as when the virus crashes
/ E# Z4 k* f# a8 B' W* W% L
7 F! |, G# p3 h8 a, r% z8 F white: I would like to control your computer
& N6 W0 @, r+ u) G) K0 ~2 R0 K b1 w Hackers: I will not have other people access my computer I will be mad ' O" K* ?# g5 F c* b
white: This is not fair! !
" E4 x6 N) x) u7 E; @4 O hackers: ah, well, you control the good of the 8 e/ g' c6 Y) k& G8 M+ D9 U
white:. . . . But I will not. . . .
# D' j: `: Y; { C9 ?9 Q' J) |( ~: N hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
% {7 Y! s) c: Q: A- j# V$ [ Hacker: I'm white
6 Q: p/ L5 S3 A/ q5 m us again: This is probably the last time we met the
1 S3 R+ T- a. z$ o$ w: M& X Hacker: Oh? What happened? $ a* v+ f( g& {$ ^% r; M
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! {& D, v5 K- M9 a
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
' D- i7 H9 t2 Z! W& s" B7 J( G white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
9 V4 @4 h) Z- f! e, _ hackers:. . . . . . . . . .
6 G5 r, ~8 F% P, ~+ n hackers: so late, and how not offline?
5 l+ b. u1 c9 z" T j white: Oh, is the next, and I went to pull the power % n: D% a3 t/ O: D4 D
hackers: Slow! You will not shut down? 2 P0 |1 t1 z- D3 M7 h' c. Q& H
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 3 x6 E* w5 f/ F; Q4 _' O5 B
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \" L- \( \4 [8 \% u4 v- F
white:. . . . . . I press the power to the hackers call it 0 N0 b1 e$ u/ \9 z
white: You are not really powerful
# } ^. p3 c( I! Z: }/ F hackers: so-so friends t5 s4 F* @) ^+ `
white: bragging! You have the ability to shut down my machine in the horse. % I0 M. Y4 ^8 T, }2 e- C8 y& P
hackers: this place is difficult! You wait
- n1 ^; K4 J% Z( }( T4 @4 a4 ]6 P hackers: Haha, buttoned regret it : W+ K. B+ R8 v
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
1 U/ s/ n; P4 u" d: y) [" S ?/ p1 O hackers: halo ~ ~ ~ ~ |
|