 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
9 R) v6 q% u) { white: how control? + N* c/ I: F: X1 m
hackers: white with a Trojan
, ~7 _; \$ F$ G6 q0 C:. . . . . . Where? I did not see
$ [3 G3 L6 y* m! I8 R: b hackers: Open your Task Manager H1 M; {4 I. D" h/ a( x3 j
white:. . . . . . . Task Manager, where?
8 p) D$ C+ Z, G# E( c( W4 ~7 J3 u z' p3 u hackers:. . . . . Your computer below! ! 7 v4 U# Q" Z6 I0 H
white: \; 7 R7 A0 R: r, }- o% H
Hacker: I have control of your computer # ]# X3 |6 A# F u
white: Oh
: k2 K. B( X: I hackers: a funk? ! Hey + K3 G* @7 B8 _4 t9 R
white: for the just, help me kill the virus it, many of the recent problems my Lord
1 ^2 f4 Z: x1 d1 z& w) X9 i machine hackers:. . . . . . ' ]: P9 a: E+ I2 `0 F: L- ~
9 @3 u c6 C3 q6 H: J2 f" X- w* X1 A white: how do you always in my computer and out of
# M7 j" F/ I* W casual hackers: You can install a firewall , `& N9 d! E, J; g) t0 j6 ?: o
white: install a firewall, you can not access it? - X# z* G4 _ b% R/ r; j4 D8 \0 S5 O
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 7 f& H- ?* J0 k( D: K% s+ }
1 u3 ^ B+ @! }. q small White: I heard that you will create a \!
% `+ Q1 |% O2 r, r2 w1 l hackers: ah
+ d. o, x3 O$ r. v4 k white: you can control someone else's computer? !
% Z8 J( ]7 ]& m* a2 I" A. ]& S/ V hackers: General is the . i8 w) V. ^ p3 b/ V8 S* I- N
white: you can black out those sites? & g; t0 D; `2 x$ v/ w! |5 G
hackers: of course, did not hear people call me a \) [6 w( X8 p3 L
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . $ a1 Z) A7 I. U z* y
\! : W8 H' l' ]1 o5 Z; \9 o" l
white: every day you come in, do not feel tired of it? . {+ `% c8 p. `5 i7 F1 q4 B; g
hacker: is a pain, your machine is the worst I've ever seen in one of the
; w2 O0 V ?& E: } white: is not it, this is Brand ! u% }1 ?" j [2 _& y8 x4 f, o7 K
Hackers: I was mentally retarded in addition to your yard game machine only virus a
% X4 H0 R E6 i: ` white: Oh ~ ~ that you see me The \. . . . Goodbye 8 ^2 b( E- S% y. \( n
1 s; {7 x( I* `5 n: w$ ^" q hacker: Hey ~ ~ ~ I come!
/ r* ?/ V y. c/ D8 X white: not seen you for days, was my firewall blocking you?
0 e( c- x( g; g6 P% h hackers: Haha, jokes, on your machine is easier than my own, not you miss me . c, O1 B( y* }% \0 a
white: I want to Please help a busy
$ Z8 U, [: _3 v; _ hacker: What?
+ S# [; x& S( t% Z: C2 m white: you can not modify the point into the power system data
7 V, X) K" [' w4 [$ C% E) g% ?6 O hackers:. . . . . . Why do you want to! ! 2 L5 j3 D( V8 i" D8 w6 U
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ' A+ L- i4 P0 c* K# ^0 M
hackers: die! ! & b7 Z8 `# k q% x# Y' h/ d
0 g: a7 F! m8 X: c" a$ D8 W3 @
hacker: you die Where is? ! ! !
; h5 _7 h" X- E% J8 n& _: J: Q white:. . . . Go out and play for a few days, ah, come to me why
6 K; o f9 @( e. {" _- } Hacker: I'm looking for something
3 _ C5 e! r$ F. u8 ~- Q; E! a white: what I find here?
& ^3 w- j- C9 L; @ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
7 l4 W3 c; h0 d+ I* U5 G4 R 8 P* ~* q C: `8 N) k% j( }& ]
most hackers : I come! ! - y" c7 ?$ y& w) U8 p( V
. . . . . . ; E5 R( l" i; ^/ k7 |
hacker: how not to speak? Q/ x, c9 i6 `6 o
white: a bad mood
5 J) y: q+ ^" n hackers: Who bullied you?
8 X& ~: o- c! R/ ~( h white: a Q No. I have not lost inside of my first love
/ p" L9 G; V# p1 M; W Internet hackers: this simple, I get it for you & w% M8 g) K& b, ?7 c
white: do not get back : a! G: r s# S' M
hackers: No, tell me what number? ) f2 U1 C) I2 i6 a" [3 F! v9 ?
white: Woo ~ ~ ~ ~ just do not remember : a5 d$ G6 d; ?9 ~2 o2 v5 f
2 M9 a2 O; ?" L8 t) p( C
white: you gave me out! ! ! !
+ _1 }% X/ [ R9 A& V8 w0 b6 j hacker: how wrong? ! 2 ^- o) p- J4 U8 \8 `8 }, M
white: You are not the forum to use my ID to play it? ! ! ! y% i' o) s- y, I# B$ b
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the $ _- k m; G" b% @% K
white: it does not work! ! !
6 `% }- p* D$ P& E, e( O! z& P hacker: how should you like? : T* [, U- n% J ~4 U2 R' B# k2 y
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
7 u# g- K" F/ J9 |1 V- M6 B
6 w/ N! X5 c, P9 \ hacker: Hey,ralph lauren pas cher, I did a lot of fun % a; r' c |: K9 p2 c
white: what % G) } N1 S* Z: ~1 B
hackers: I go to the forums posted the top
" y; [: Z) {# _. M% Q& f% ] white: This very common ah * k9 H/ Q* a) x* M+ Q1 a
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent / E& w9 s6 i9 y5 A6 T
white: Wow, very enjoyable, and I can never dare, will be blocked!
& G1 H" h/ K! |" N' M Hackers: Yes, has been banned. ) \, z( @1 s- ~( h0 K4 N
white: this is also fun? ! 1 @$ j/ n. c+ @6 z5 e! ^& v
Hackers: Yes, ah, because I use your ID i, Q! S$ A2 }1 T- v$ Z0 S
white: you are pro?
+ ?' z/ o5 X0 q: j9 ^) M hackers: You can say it.
+ `" q" p5 h5 l+ Q, { white: to what extent high? : O0 l# l/ f4 ?6 X" o& f6 ]
hackers: ah, I am bored when their own 9 q: E5 f C A
white black: Ah, this I will! / R% r+ A M. h9 a% ^! K& x' T$ q
hacker :#?%! You can? !
7 r5 {7 |- t9 `% M# b- T white: Yes, ah, a black off it. . . . . + o* o# }6 X0 ?% ^$ j( [ R. i
hackers: Go! % \! C3 o6 d2 O/ v& G2 a
white: Ask your question ; t% \3 Q) q& D+ N8 g
hacker: says
& J& C9 M: [) D white: Besides me, you can also control other people's computers do ?
/ q3 S b) ?4 n Hackers: Yes you can. . . . 1 r- E- ^! g- K7 {: z% E
white: no networking is also OK? " H- b; c8 i8 s$ E d
hackers:. . . . . . . # _( U; U6 x' K3 B
white: You can remote control to open someone else's machine it? % u, K' F' J$ ~6 L- e2 W3 ?% s
hackers:. . . . . . . .
( t, r3 C3 t& C" n white: You can steal top-secret file it! ! ! 4 ^2 r* A1 \+ r* G2 ~
hackers: I think you see more movies, go to sleep ! Q8 p+ {' O- z) A7 U7 U
white wash: my computer is broken
2 Q- X2 x$ H( E! I, l& y6 x hackers:. . . . . . . Just checked, your computer no problem
1 l, o) c# r; B+ s0 @5 k7 G white: that is, you bully me ; L; H5 C5 X& j% v8 V) \
hackers: No ah % e0 s/ N/ U% X* d& \* {: R
white: You are! MP3 files are passed to my no images!
3 A6 ]6 C/ B; D7 Q- M/ o hackers: help ah ~~~~~~~
- i2 b& M$ \* ^! j white: Ask a computer problems can you answer? 3 f1 b" a% n: W8 @9 y( t- V- B
Hackers: should be able to 8 z& `! N9 A9 d [5 v# p/ a
white: Which key on the keyboard the most handsome?
6 n$ ~, a( e* @+ f j* l0 r6 D( I hackers:. . . . . . . Do not know
) i2 C3 y; h, d, r' N3 h) m white: of course, \! # D" {3 v5 j7 F$ v, U1 M+ {* E
hackers: halo ~ ~ ~ This is a computer problem? ! ! 1 P7 ?3 j, D; f8 C8 J/ k
2 e7 r" W1 E9 j/ [+ ~) [
white: ask you a computer problems you can answer? 9 P6 ^" t- t) T) }6 P
hackers: If the problem is not your idiot ; S3 R4 S$ {. N; T
white: I am serious! ! You can operate my computer?
3 w7 ]5 e5 m& H: y% |( v3 | hackers: ah,juicy couture shop, yes + d9 j( A% P8 H+ I6 _1 Q0 |
white: that problem, you can solve it
1 H3 y4 }: `* [) J hackers: Your question is, should not be difficult ; 4 W; ]# e# M$ P& L$ A, e
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
& N/ i& j" F! u a hacker:. . . . I excused
! j7 d+ I2 J" K4 U( s# | white: we see meet you?
- P: r2 G, z( |! F0 _, G3 t hackers:. . . . This, not so good, why should we see
, L: Z2 Q; [8 K) M8 x e white: I want to see you are not the same and I would like to 9 s) ]) d4 \0 a
Hacker: Oh, what you think?
/ c+ f( r4 g! r" ^ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
0 Z* f6 I0 _- Z; D* n hackers:. . . . You say that Spider-Man, boss!
5 w' f8 _8 q$ M5 X! _ hackers: Kazakhstan woven ~ ~ ~
0 Y% ^4 E; {" B; k# F white: You called every day, is not very curious about me? 1 V3 Z; L: I$ }9 b A
hackers: not curious, is the habit, easily came in 2 G3 y3 ~% M: {$ F- B' N
white: Well, I have a good way to change your habit
4 U" P" w( J+ D+ m hacker :. . . . Oh? ! Any way ! a0 [9 T( O1 @" V
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 2 n( T6 T: |# k$ { x
hackers: Genius ah! . . . . . You can also connect to it? ) J: V, r! d8 q% z
white: to ah, and slowly the hymns! & P. G# u; b" I0 \" X; X
white: you every day into my computer, is not very curious about me?
3 o" f4 ^- q! L2 m# e hackers: No wonder, only used $ s$ n2 ]2 t" z! v
white: no you're curious about the place?
+ u) t! o3 A0 j/ ^2 X hackers: a ah, I always wanted to know your machine so much as when the virus crashes
5 D2 y; h, L, p& S ! u, x0 y5 t, U ~* ?0 j$ O: Y6 @# T5 ~
white: I would like to control your computer
2 X( e2 s. A' r# D) |' e Hackers: I will not have other people access my computer I will be mad ) K ?( m3 g3 M. u& k- A
white: This is not fair! !
! r) J2 |$ H3 Y& a1 ?" r2 o5 C2 K hackers: ah, well, you control the good of the
8 t- Q% H# t) Q; g w# t1 i6 V white:. . . . But I will not. . . .
+ Z- c7 v; r" v hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 5 N2 b% R7 I& \7 C2 i: X2 b
Hacker: I'm white , Y0 P3 Y9 n0 K( a8 a! x
us again: This is probably the last time we met the
1 S/ y6 M4 b5 o5 a Hacker: Oh? What happened? 4 R: t- O" m# u% z: k3 o8 V2 s" @
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
) V# d# T; h( y4 ` _; W2 w9 E hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
& [) X$ B. r. r/ D. R white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! * z. d' F% K! @$ c' b0 O3 E- s
hackers:. . . . . . . . . . & |; U: R1 v" f6 d4 D# ]/ n+ s7 r
hackers: so late, and how not offline?
1 l9 k- i1 M/ u% {( T white: Oh, is the next, and I went to pull the power
. } [' [" z2 t1 |8 w7 B hackers: Slow! You will not shut down?
, O/ _) d" z' S8 H4 M# B1 ? white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
9 z1 Q$ |, L6 s) X7 h hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& ?. y3 Y$ T. q. e/ w
white:. . . . . . I press the power to the hackers call it % s2 Z$ B# n- l$ l
white: You are not really powerful 8 O" K# i2 c- H' V
hackers: so-so friends ) X! O# u, B" G: O" V4 L# K
white: bragging! You have the ability to shut down my machine in the horse.
5 Z8 _5 k! R* M5 O+ y hackers: this place is difficult! You wait : q* N- b6 F# }. S
hackers: Haha, buttoned regret it
+ X6 i- D7 I; I% T% r white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
( \5 E( w! Q7 i2 D1 W hackers: halo ~ ~ ~ ~ |
|