 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
$ c2 a* t5 ?- `4 J white: how control?
. N T* {5 s/ q' ]( X8 Q6 A8 C hackers: white with a Trojan , d j- @5 H6 q/ ~
:. . . . . . Where? I did not see
+ @6 [+ s6 @) a7 A M! f, k- a hackers: Open your Task Manager - y; \, k; O& {/ K2 s! D1 U
white:. . . . . . . Task Manager, where? o: l/ z0 z$ j0 l9 Y
hackers:. . . . . Your computer below! !
8 t) l, V$ T# r white: \;
j+ } N! v' T( H Hacker: I have control of your computer : ]+ H) @# f6 r9 C; ]! ~
white: Oh * a8 {( Y$ G7 M) `3 _9 {2 J7 @
hackers: a funk? ! Hey
. g' e) G; r$ _& |- I/ [ white: for the just, help me kill the virus it, many of the recent problems my Lord $ d9 t; b" n* [$ ?1 Y
machine hackers:. . . . . . ; _' d( j! B) w$ C
! W( S* c6 M( O) f" A( K9 \
white: how do you always in my computer and out of
k ?0 X. }+ t. y, l casual hackers: You can install a firewall
' ^/ K; V6 r1 z0 k2 q) q- D2 z( _4 ~ white: install a firewall, you can not access it? 8 H8 z4 }" f- d5 @" k/ ?7 b
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 8 U+ W8 Y* `/ t* k
. ]: `+ L1 q2 c+ U4 h$ X small White: I heard that you will create a \! 5 z$ Z9 e: z# I# a3 L. F9 G, w$ x
hackers: ah ( u' f0 X8 h q5 |) D
white: you can control someone else's computer? !
7 A2 r6 }$ s. p, Y/ |4 C hackers: General is the
4 a5 R1 q6 {& b. ~9 v white: you can black out those sites? 7 W* x, `6 B" q2 ?0 i
hackers: of course, did not hear people call me a \5 p0 ^* ]: f) ~5 S' M* k2 l8 t5 G
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ; _/ q S; j8 y0 T4 Z
\!
- C |# W& l& B O white: every day you come in, do not feel tired of it?
6 g: h4 Z, ?3 K5 u# }' B& q hacker: is a pain, your machine is the worst I've ever seen in one of the
* Z' U8 P+ w+ ^$ T white: is not it, this is Brand 8 e3 Q$ x) ?% k8 @/ H J# T" s$ J/ r
Hackers: I was mentally retarded in addition to your yard game machine only virus a
% b$ ^7 f' g' G) r6 s white: Oh ~ ~ that you see me The \. . . . Goodbye , J/ I' I& s/ T. c
* q: w. O2 V: }) A- u/ P% n# ]
hacker: Hey ~ ~ ~ I come!
4 t( ~& ^. Z: F0 ]- T6 z; F3 Q: E7 l white: not seen you for days, was my firewall blocking you?
" z( w7 B+ q0 o$ C hackers: Haha, jokes, on your machine is easier than my own, not you miss me
& @/ ?, f- _0 P7 S6 o8 n3 Y1 ?4 ` white: I want to Please help a busy
( u: @' [) |- y9 n& {) g; K hacker: What?
6 p9 N5 d. U0 @- ] l5 o3 c2 I0 J# h white: you can not modify the point into the power system data / r5 ?/ R3 t! e6 }0 F. f
hackers:. . . . . . Why do you want to! ! ( U W: Y3 U% B- ?' K0 k# J7 M
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ' E: P* z( C: s8 e: m# k& ~9 [0 ?; {! \
hackers: die! ! 5 z3 y, @* h9 F+ d f+ s4 t& z
+ b; X$ F9 K+ N! t hacker: you die Where is? ! ! ! 9 z* E$ ^- X, X* x% y
white:. . . . Go out and play for a few days, ah, come to me why 5 _9 j- R- v. H& B/ v# [. ]0 [
Hacker: I'm looking for something ! w/ [2 g, N) y! ?& m
white: what I find here? 7 R0 w6 o5 g' o2 b& q
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
: j+ q2 h( ]! u2 t4 u1 a5 h$ K
3 Y% {) s) R3 m4 P# x, w. T most hackers : I come! !
- m$ t |4 x/ D8 y! d4 n+ C. . . . . . 9 [- R$ A- i* q
hacker: how not to speak?
3 Y9 ^5 v: z9 U9 \ white: a bad mood
8 f, T! F5 h/ S4 T* ]" s4 }, L hackers: Who bullied you? 7 w/ N T+ X7 I; ]6 C9 P- J# s) ]
white: a Q No. I have not lost inside of my first love
6 b/ S/ j! K% X+ I) D5 {6 [, R# m Internet hackers: this simple, I get it for you , }& w& ]. h, x. o! ]: @
white: do not get back
+ |6 Q" J2 v8 _7 y hackers: No, tell me what number? , C+ B& X: e( }) t/ j/ x7 y
white: Woo ~ ~ ~ ~ just do not remember
( p& I7 L$ g& U8 s 2 h; n8 k% ?9 D4 b4 {" X
white: you gave me out! ! ! ! 7 O% k. o% r' P4 N
hacker: how wrong? ! / A% F: B8 |2 Z
white: You are not the forum to use my ID to play it? ! ! a) R; d6 p* c* p- X, s* J8 K
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ( b# U5 w1 o' j6 `( m2 n9 V
white: it does not work! ! ! 6 M6 B& W6 C# U, {: {3 e6 T
hacker: how should you like? 3 h/ l5 ~4 A, b4 S# J
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
- q. o D. K! o5 q' w. B
d+ m2 V" C& ^" W7 r6 b) d hacker: Hey,ralph lauren pas cher, I did a lot of fun , h! C4 F ]5 Y; G4 W5 K
white: what / N$ |% i O% e& I! ^
hackers: I go to the forums posted the top
) U/ d6 q, R* s, ^& ~0 ^ white: This very common ah + i$ {8 B! e+ R) \
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
/ l0 Z3 t$ r- l+ w% x. } white: Wow, very enjoyable, and I can never dare, will be blocked!
* k# V% \5 _8 M Hackers: Yes, has been banned. 6 t( E& J; [, k- w
white: this is also fun? ! - B8 d9 G2 v( _% T" u: ^: T+ Z
Hackers: Yes, ah, because I use your ID * F4 C% v1 B3 q" ~% ?( u
white: you are pro? # ^4 u* z: u6 h
hackers: You can say it. # `/ C5 X$ r/ {3 n
white: to what extent high?
4 r0 d, Z& P; q/ G _ hackers: ah, I am bored when their own 8 l! m X7 E% O
white black: Ah, this I will! 7 A" c* F' \4 ?( p7 [
hacker :#?%! You can? !
, g: k$ G" Q3 X, Q white: Yes, ah, a black off it. . . . . 5 o+ P& ]( l0 z. _/ k6 j4 i. n/ L
hackers: Go!
* D! Z: W- Y) b5 c$ C4 r white: Ask your question
8 a2 E. F# _ I* l. `3 I hacker: says , A5 J8 T0 L3 u7 m: @. y- E) w( h
white: Besides me, you can also control other people's computers do ? % S# r W& @1 H* r4 ]; T) H
Hackers: Yes you can. . . . # D" b' ]3 u% {0 o6 y
white: no networking is also OK? " f9 x7 s- H* ~% z
hackers:. . . . . . .
) s7 J! d, N. c; N white: You can remote control to open someone else's machine it? 6 d; X# y5 }' P4 Z. x
hackers:. . . . . . . .
; t. v- ?5 `) n" p, C white: You can steal top-secret file it! ! ! 2 B) G) C; s# g3 H; ]1 k
hackers: I think you see more movies, go to sleep
1 y4 H6 }% a# r. L( V8 s. W white wash: my computer is broken
, p4 Z; F2 n% J8 w hackers:. . . . . . . Just checked, your computer no problem
; A5 U5 r3 ]: a; S [ white: that is, you bully me
1 K" q, b. L* a i0 Q& x0 V$ H hackers: No ah 3 m# b$ J- h( a# Y9 E
white: You are! MP3 files are passed to my no images!
4 N0 ?# b( W4 B hackers: help ah ~~~~~~~ $ B9 i! q7 s9 c5 P8 \
white: Ask a computer problems can you answer? : l9 F5 D. ?9 N4 h% G
Hackers: should be able to
) n3 k& X, v. L) J3 Y white: Which key on the keyboard the most handsome?
3 w* X" N7 E2 ]9 o& D H hackers:. . . . . . . Do not know
M1 u$ g2 E5 m1 u9 {2 b white: of course, \!
& t/ Z/ @8 \4 o/ Z2 t1 s hackers: halo ~ ~ ~ This is a computer problem? ! !
, L4 }% \1 x! V7 M ' u+ Z7 U- B1 Z$ z3 ?3 `9 A
white: ask you a computer problems you can answer?
5 B. `9 k3 \2 J hackers: If the problem is not your idiot ! ~4 ^. F# I7 a1 |- q% k6 W- x0 e) Q
white: I am serious! ! You can operate my computer?
! M, o, n; \$ I- b+ {7 z8 g3 b+ q hackers: ah,juicy couture shop, yes
( y+ G* A4 ~ m( b white: that problem, you can solve it ' V- P$ _6 g* q; f, g' p; T
hackers: Your question is, should not be difficult ; " U! o4 c( i0 }. q# Y
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
9 \: |; {* L$ t: Q$ E5 f: q" C a hacker:. . . . I excused
! A5 I1 O+ G0 j; I+ f ~ white: we see meet you?
7 Y$ m% m2 v$ m6 `# P hackers:. . . . This, not so good, why should we see
( N1 ?- U8 \4 w$ Q/ G white: I want to see you are not the same and I would like to " v- w" q$ k5 u4 b
Hacker: Oh, what you think?
1 ~$ ]" ~# u, n: o4 ^: ~; t white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 9 R# d- ^- D# X* H+ m) C) o
hackers:. . . . You say that Spider-Man, boss!
4 R; Q/ G; I c% q- a7 v. |8 L hackers: Kazakhstan woven ~ ~ ~ * S0 _" u5 I5 R' _# j! {
white: You called every day, is not very curious about me? ( G* }' N0 ?" W
hackers: not curious, is the habit, easily came in 5 ^' L$ [! v3 v: y( b' q; j+ G; X
white: Well, I have a good way to change your habit & c( d8 y1 F* W1 X
hacker :. . . . Oh? ! Any way
* X8 E, e a- L3 A' y0 K$ r white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
: T$ ~3 F& h `' E5 f hackers: Genius ah! . . . . . You can also connect to it? . r, |4 H2 {" x
white: to ah, and slowly the hymns!
, Z( Q7 D! U6 l9 b; | white: you every day into my computer, is not very curious about me? 3 M- v* ~% r6 u9 T
hackers: No wonder, only used
3 F, Z/ v- R' V white: no you're curious about the place?
( \) o( l! u5 ?; Y hackers: a ah, I always wanted to know your machine so much as when the virus crashes
! r( I$ K' O# ^- z, c- Z: L
3 f1 x0 l5 H* T. M) E# X) p6 z white: I would like to control your computer ; e3 F, v, L( e) X
Hackers: I will not have other people access my computer I will be mad
7 z* m4 w# p# X white: This is not fair! !
( S1 P* j3 u' a9 v- K' I hackers: ah, well, you control the good of the % L; C0 I2 x4 _! z
white:. . . . But I will not. . . .
8 I$ i$ V" F0 M5 L: ^! P hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
7 i. F$ m' s" k. s5 E Hacker: I'm white
$ _: c; g8 k6 o8 Z; F3 G2 W us again: This is probably the last time we met the
& C2 |) |( c+ X) N! @ Hacker: Oh? What happened?
/ x2 N! a( x8 P( {* {7 \ white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ) V/ z6 L! c0 `; a
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye : m+ @" _) X/ c
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
) M. ~! ?% N: U& m2 W6 \8 | hackers:. . . . . . . . . . 2 t2 m1 e8 g. t( |5 r9 k
hackers: so late, and how not offline?
4 S& @3 y! t$ c/ U. Z+ F$ n white: Oh, is the next, and I went to pull the power & O, M3 I' F! C
hackers: Slow! You will not shut down?
% Y2 X" m. Q5 W7 ? white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
8 k- F j7 k: d& }, o hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
' K. d2 s L3 {) M/ ^+ X white:. . . . . . I press the power to the hackers call it 8 K/ W$ L9 P( W/ t
white: You are not really powerful 3 [! @+ u* i3 z+ G x
hackers: so-so friends
* B& E$ l) {$ h6 g- t) O) n white: bragging! You have the ability to shut down my machine in the horse. + Y- \1 f! h7 s) ?# V
hackers: this place is difficult! You wait
# ~8 K3 n& i* S hackers: Haha, buttoned regret it 6 h% l. n( N% \+ O* W/ R. ~" n& n2 \
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
0 a6 H# {8 P; I- D* v( }6 D hackers: halo ~ ~ ~ ~ |
|