 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer ! o9 }3 `8 |! v# c! J1 M
white: how control? o- [ K& _ W0 N5 f% K
hackers: white with a Trojan
' J* d( e3 Y! W; \+ N8 |:. . . . . . Where? I did not see
, n4 `+ V5 c! y2 w hackers: Open your Task Manager , O. V1 X" s2 r" N' T# _
white:. . . . . . . Task Manager, where? & t% I2 @: n w" o: g. k
hackers:. . . . . Your computer below! ! # v5 Z4 \, V/ c, V; h6 H5 R3 u- b! y$ l
white: \;
& W# C: Z; w2 H Hacker: I have control of your computer F& V; ~* l7 R4 m/ u
white: Oh " b0 Z3 z( E8 `1 H! T2 {7 G
hackers: a funk? ! Hey 7 @# P5 J8 j) j }, l1 p
white: for the just, help me kill the virus it, many of the recent problems my Lord " \, m( @: b2 a$ z6 X. i
machine hackers:. . . . . . : ]# ?' [" g8 {2 h9 k5 R4 w6 C) n& U
) M/ d/ ?& @0 q* u5 t( W' z: U( E white: how do you always in my computer and out of
+ X" `3 ]3 G" |' P* H5 }5 g casual hackers: You can install a firewall
8 {+ o) w0 X% \6 G2 B white: install a firewall, you can not access it?
3 @( W3 U; ^8 y" C hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah : _8 B4 e/ o# [: Z! n1 `! F
' K* g4 I1 [) o0 X7 e4 G
small White: I heard that you will create a \! [# N) D1 Q- T5 t3 Z& L9 L) U3 o# N `
hackers: ah . J: x* c$ O6 N4 b" W
white: you can control someone else's computer? !
$ T! W4 o6 s, Y. D2 i hackers: General is the
1 y) C a# K" H3 ? white: you can black out those sites? 2 u3 e+ `6 @7 |$ z, W& p
hackers: of course, did not hear people call me a \
$ X8 }% \$ M( F) c white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . # I" f; S, C) z3 y6 f6 Q9 a& d: G4 o
\! e( g3 W; b% f, g0 o
white: every day you come in, do not feel tired of it?
" Y/ u, I! l+ a5 [+ X% o hacker: is a pain, your machine is the worst I've ever seen in one of the
* G% O: X' @8 z' N white: is not it, this is Brand
$ c" L5 V T" Q! g% K2 K; O Hackers: I was mentally retarded in addition to your yard game machine only virus a ' l# z2 u' P% _# V$ H
white: Oh ~ ~ that you see me The \. . . . Goodbye
7 f$ ~* b; s; @$ J, Z
8 Z8 J/ |. r0 u* G) l! J, Z: L& B hacker: Hey ~ ~ ~ I come! 2 h: L. h1 J: _% K @3 F
white: not seen you for days, was my firewall blocking you?
. A0 p& g1 E K9 h0 H hackers: Haha, jokes, on your machine is easier than my own, not you miss me ) y( k* P/ O8 q# {% y
white: I want to Please help a busy
9 o; | g* Y d) O hacker: What?
4 j, z. D6 w: H" M/ u9 f/ R: q+ Z white: you can not modify the point into the power system data
- a3 p# j4 h8 A; a hackers:. . . . . . Why do you want to! !
0 B& Z" O5 t8 ~$ n white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . - m: N7 R Y# L0 W- k; n
hackers: die! ! $ J1 {, X' w4 A( r/ @2 [; p
u& y5 k% e8 V hacker: you die Where is? ! ! ! * P; l8 K2 } a: R9 c+ t
white:. . . . Go out and play for a few days, ah, come to me why
; m, ] A& Q. I. l c1 t; ` Hacker: I'm looking for something * ?! z+ U1 P; Z$ w
white: what I find here? 9 F# \1 p- r& [6 y
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ' M/ e& M! h, d T& n7 G& Q" x, T
. e5 y4 o- J7 c8 ~0 d
most hackers : I come! !
+ }! a1 p1 D1 f! m+ h b. . . . . . , U6 A1 p6 Y. w
hacker: how not to speak?
- d1 h2 \7 [* v4 S. A white: a bad mood
7 `& u6 \+ I8 q! G2 h+ I hackers: Who bullied you? 4 b2 M7 S a' \ T
white: a Q No. I have not lost inside of my first love
6 U* j* E6 S3 ~' ^7 X1 y- X8 _ Internet hackers: this simple, I get it for you + ^4 m# Z) z6 `: `& U: M3 X* q
white: do not get back
, _$ W$ t P, `6 [ R% l3 } hackers: No, tell me what number? . E; N+ b9 y+ _
white: Woo ~ ~ ~ ~ just do not remember - { r% n P# W6 o5 Y1 O. r
7 Z9 ? Q* }5 R: C4 }9 k
white: you gave me out! ! ! !
2 Z' ]- o+ f% q. Q; r hacker: how wrong? ! + Z" L4 `5 _ g# o; L# N
white: You are not the forum to use my ID to play it? ! !
- x; W- A) h8 Q2 q- ]; s. N! b hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
& [' [- [7 Q- q( n6 }1 C& ^3 D white: it does not work! ! !
4 z' K& Q% {, `/ x hacker: how should you like?
: u3 l: G/ r' I+ L9 n white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
( y8 w# h; r' S2 k, ? + | ^1 k4 ^4 g; H1 b+ S9 |
hacker: Hey,ralph lauren pas cher, I did a lot of fun ) e+ a5 a5 C8 N$ q% I! ~
white: what 1 R2 Y ]# {% g1 U1 \8 h
hackers: I go to the forums posted the top . P8 j* a) Z0 F9 @4 F: J+ T B
white: This very common ah
& A9 S Z0 `5 ] Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 0 `7 E+ _' W7 M5 p
white: Wow, very enjoyable, and I can never dare, will be blocked!
( M5 p5 L; q, L- V- G1 b Hackers: Yes, has been banned.
9 \3 r- L! S# n* e( h white: this is also fun? ! 2 u8 z U9 d A+ G- ]1 w' M
Hackers: Yes, ah, because I use your ID ' q3 O: a$ |1 w5 d0 T% {0 f7 R' M) |
white: you are pro? 4 w2 L& W) R9 X: [; y6 L% r
hackers: You can say it. - Z1 ~2 t7 @; I! u! z9 e: D7 i/ j
white: to what extent high?
' @3 L0 _9 e: ?9 O% w hackers: ah, I am bored when their own
7 C3 Q0 m4 Y5 ~3 P9 p/ F) f white black: Ah, this I will! " p+ `$ e6 C+ V: t& j H- z
hacker :#?%! You can? !
5 }$ a" |, I7 }1 c white: Yes, ah, a black off it. . . . .
+ d# s6 D# a4 ]) h hackers: Go!
1 k; Z7 X: i7 R; b5 [ white: Ask your question
7 Y3 Q W# W8 {% S5 m( }* f hacker: says 4 H) H3 j& p3 K+ h' s
white: Besides me, you can also control other people's computers do ? ' ~6 U* s" ~5 c' q n6 _
Hackers: Yes you can. . . . 6 C! y, f2 f0 I4 D# f4 P$ o4 f
white: no networking is also OK? : D+ Z q4 N$ {/ K& s
hackers:. . . . . . . ; B! F0 h. u! j8 h
white: You can remote control to open someone else's machine it?
8 i& V; K; ]1 d* H; `1 g/ p hackers:. . . . . . . . 2 R0 i1 i6 ]$ S4 [
white: You can steal top-secret file it! ! !
" ^. K: o! t+ M7 H: F hackers: I think you see more movies, go to sleep 7 U4 O6 o. I1 K+ V7 P
white wash: my computer is broken 6 ^& {4 c; P4 d3 m2 z
hackers:. . . . . . . Just checked, your computer no problem % q3 u2 M2 K M8 m. g* |, d; b
white: that is, you bully me $ d. d) S3 k4 h5 L
hackers: No ah
- L5 \. S" @6 D) ?/ f2 w8 ?3 k white: You are! MP3 files are passed to my no images! - }$ H+ ]: I4 f; G" I5 S$ O' e
hackers: help ah ~~~~~~~
$ k( V3 ~! A0 r0 O# a* W5 } white: Ask a computer problems can you answer?
; A+ ^- m- X/ n* T Hackers: should be able to
* U* i( L! ~9 B white: Which key on the keyboard the most handsome? . `1 g9 S/ X/ O& @. L$ r6 C1 c
hackers:. . . . . . . Do not know
3 f |$ T' C8 n white: of course, \! 5 H& D4 L$ n( @) L) v
hackers: halo ~ ~ ~ This is a computer problem? ! !
) g& ]. i5 N: O" N% F
, b. c" r/ a# y0 m9 l white: ask you a computer problems you can answer?
! ]% h* v+ N+ b1 @0 f0 j1 q hackers: If the problem is not your idiot / _! ?% L3 l1 v/ n) ]' D
white: I am serious! ! You can operate my computer? 5 `* y2 R* w& F- C# k
hackers: ah,juicy couture shop, yes
% M8 N8 k: P, z1 T. o white: that problem, you can solve it
! t3 N4 W% V$ f3 F9 K! D hackers: Your question is, should not be difficult ;
; P9 F' C4 b! }/ v: k+ Z white: Great, my fans do not seem to turn up,nike air jordan, help me change it 3 }) c5 `. [8 q N
a hacker:. . . . I excused
5 H/ r* d! ~, W; J, o& U# j N white: we see meet you?
! X! }* P! F4 v! y/ n hackers:. . . . This, not so good, why should we see
- j; c; |1 y% F( J4 \( s white: I want to see you are not the same and I would like to ' I" ]# S' X& _# R3 n
Hacker: Oh, what you think?
: @$ I3 X' z. K white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights $ z; Q3 i: W$ u: y) e: n0 i
hackers:. . . . You say that Spider-Man, boss! - _* b8 l" D3 C/ u9 _
hackers: Kazakhstan woven ~ ~ ~
; v( g( B- k8 t/ i white: You called every day, is not very curious about me?
1 o Q; F4 Q0 j& O8 ] hackers: not curious, is the habit, easily came in 0 a4 S8 [+ e, \, ^" r
white: Well, I have a good way to change your habit # Q" p8 [0 x4 ~2 }
hacker :. . . . Oh? ! Any way * [# G2 _$ D' E( Q( _& }/ S
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ . L2 h* C1 w2 l- U+ Y
hackers: Genius ah! . . . . . You can also connect to it? 4 s" ?! u2 I5 ], l* w2 J
white: to ah, and slowly the hymns!
1 ^, o! L. a$ [% Q8 `$ d1 e3 z& { white: you every day into my computer, is not very curious about me?
+ I; }" t4 C, y% G hackers: No wonder, only used
( Y5 u9 l- m3 H, Z, v4 B4 } white: no you're curious about the place? % ?7 f" }$ l4 M& G$ }" x) @# @
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
( y7 P5 o, P) g2 w- j& p: s
1 v" h/ }& T4 h7 Q. I9 W2 O white: I would like to control your computer
Z: J8 }" W6 E& K+ n5 q9 q ] Hackers: I will not have other people access my computer I will be mad
! p. V; S: E# y- X2 A+ o" y- D white: This is not fair! !
+ ~# M& A t! L: G hackers: ah, well, you control the good of the
2 C9 x1 H+ t9 u, O8 w1 a3 B white:. . . . But I will not. . . .
: u& s4 f0 ^$ L3 k hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! / [- u; w8 `7 f8 F! r
Hacker: I'm white
% m* D F/ o) A$ s" c4 t: P! F& } us again: This is probably the last time we met the
2 j( X- K. T! J* h* U$ F" l Hacker: Oh? What happened?
7 j$ ]7 R6 S* L9 y! O white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
" |9 z; h% L! d1 n hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
$ L3 ~. L# f7 H) E white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
) b2 x i; X" E. `8 l hackers:. . . . . . . . . .
+ \) Z1 T2 j: S( h) L9 q0 n s hackers: so late, and how not offline? - w' n" L) H; w2 l: q
white: Oh, is the next, and I went to pull the power & r/ a) O0 D+ {, p2 h
hackers: Slow! You will not shut down?
! P) \, s, r% `" K! @* @/ g white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
+ B" X) d8 f9 l$ a* t- s hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \$ k) t' o! h0 w" N+ E9 U+ m3 q; I D
white:. . . . . . I press the power to the hackers call it
+ w y1 b* p' V( {! M, W# P2 u white: You are not really powerful
- G, E3 s' x& ?* s- }: l! H9 V hackers: so-so friends 9 R! R6 W: n& n X: V N( T
white: bragging! You have the ability to shut down my machine in the horse.
% t" w% V" v3 S+ W( A- B: ]+ X hackers: this place is difficult! You wait
4 }: r8 @; P) P7 y1 J hackers: Haha, buttoned regret it
7 K6 ?! N; z; |! R" F white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
( L8 ~$ n" u8 `0 ]% _ hackers: halo ~ ~ ~ ~ |
|