 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
+ Y6 w) W; W. q3 i" T; p white: how control? 4 D1 h# Z# {8 Z) E, d7 {3 B
hackers: white with a Trojan
3 U. B: D# _- Y4 \: P$ V:. . . . . . Where? I did not see
, S& `; ^5 h" Q; n& `2 k hackers: Open your Task Manager . i2 N9 Z9 B; ~$ g) ~& [! g+ B1 H
white:. . . . . . . Task Manager, where?
# x/ S2 O2 n) w+ f" ]1 R. n1 W hackers:. . . . . Your computer below! !
# o( ]" {" M# u" M: M5 Q( N white: \;
: d. B- z/ Q1 a1 ~+ ~8 P, s! x Hacker: I have control of your computer 0 l+ Q' {8 z9 ]1 B& m6 x
white: Oh 9 k; w) |5 Y. Z, H; D+ x6 h2 I
hackers: a funk? ! Hey 6 y3 w1 ]( D, N. Y! j, @
white: for the just, help me kill the virus it, many of the recent problems my Lord
! R/ T. S% l+ @8 q% `8 a% r machine hackers:. . . . . . ) H6 _5 [. V4 @6 U4 `: j
5 D$ j0 }+ W# e7 N" f* ^4 S3 ? white: how do you always in my computer and out of
; l! }* H- `2 o& W casual hackers: You can install a firewall 7 p# M) c& c- j; _+ U
white: install a firewall, you can not access it? . f" e; V7 j6 N0 r" q$ P; l
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah " E! u6 @ ~3 ^+ x. H
0 z. c! v/ ^* N& Y3 U+ s
small White: I heard that you will create a \!
% _" J. z4 @4 f* N hackers: ah 9 W! o' |/ m+ ? m4 k' C
white: you can control someone else's computer? !
/ ]; W u# Q/ e hackers: General is the / O h' T- j" v0 G; G$ R1 X
white: you can black out those sites? - Y4 E r7 k+ c( o! }
hackers: of course, did not hear people call me a \5 b) ?+ n Z) ~8 d, b+ A
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
3 D' C! w( I/ K+ L6 D' m \! * e u) J% C6 J( k
white: every day you come in, do not feel tired of it? 4 \3 C+ m; Q( t7 E+ j0 t
hacker: is a pain, your machine is the worst I've ever seen in one of the
_6 M; z& A8 _' {5 h white: is not it, this is Brand
/ M( V' K* \) Y) ^* U Hackers: I was mentally retarded in addition to your yard game machine only virus a # _+ n: g1 l+ }1 t
white: Oh ~ ~ that you see me The \. . . . Goodbye
! d$ F* t7 |+ a* r) Y, b6 s $ B$ C8 [% }. P3 E4 T3 R; r
hacker: Hey ~ ~ ~ I come!
( Z$ K2 q+ l2 [# E white: not seen you for days, was my firewall blocking you? , B0 S5 }2 j/ C( k5 ?5 {% Q2 }
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
, i" p6 J2 T/ V* C9 \2 D white: I want to Please help a busy
/ [( y5 w& T2 T# g/ t# M7 Y hacker: What?
! E% R# }# Q6 P3 t white: you can not modify the point into the power system data
) V% g8 o- [/ F$ {6 `" R" j0 X hackers:. . . . . . Why do you want to! ! 1 n+ v8 \7 P+ V
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
4 V7 U; t& K, Q( C% k+ \ j hackers: die! !
2 `% f' B2 o! [- C$ r" o8 o' T
9 d6 @4 O' i* b( n4 D hacker: you die Where is? ! ! ! : Z% s$ g- ^+ ]* ^0 V
white:. . . . Go out and play for a few days, ah, come to me why - q/ `/ R4 {8 O8 y- C, d! [' b
Hacker: I'm looking for something
! w+ o' L& ^0 q B- ^8 R white: what I find here?
8 E% M W$ T3 u4 ? s3 b" O% g7 b7 T hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
! U; x' A0 p. O/ p# U9 r . p( g& a6 ?5 m" [- H- C
most hackers : I come! ! d' ~9 y' ^7 Z$ J
. . . . . . * @- f1 e- ~/ e) @) R: z
hacker: how not to speak?
! F. k/ b$ X5 |8 X$ h& P white: a bad mood 5 G# L$ e1 @( o- l* o
hackers: Who bullied you? # f- r/ }+ V" _' a7 y: @
white: a Q No. I have not lost inside of my first love
" V$ M7 |8 ?/ E2 e8 ? Internet hackers: this simple, I get it for you
; m3 k% x0 e7 b% z" K" n white: do not get back
1 H7 @- D. Q% C9 m/ E% j! L, E( Q1 D hackers: No, tell me what number? : J+ u* |1 W; M$ g' n0 ` y
white: Woo ~ ~ ~ ~ just do not remember
, T% o$ g' h3 Z0 {; f6 h( M6 j- i
B/ u/ |7 [; ` C$ G white: you gave me out! ! ! !
% i( S9 i! I# e: M0 }( Y4 Z f hacker: how wrong? !
8 \ i5 t3 y# T7 f. o9 p white: You are not the forum to use my ID to play it? ! !
% G3 g6 _; w) D/ P8 b( H: ? hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
- P- L/ C y2 S2 ]4 C1 | white: it does not work! ! ! , b K4 D; X: r5 Q7 w: d- i3 m5 {
hacker: how should you like? 0 e, p6 e) r9 v1 A V4 I
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
8 B* H8 j/ \9 ~" |5 E- U ' t4 D$ A( ?' l
hacker: Hey,ralph lauren pas cher, I did a lot of fun ; e6 Z1 f8 d# J; U1 S9 }
white: what . ?/ m: ?0 J5 |: t+ k% K* c+ b8 J
hackers: I go to the forums posted the top ' V$ i- {0 Y4 l1 P V% L' K7 ^! l$ m7 ^% |
white: This very common ah
3 N% P9 |( P6 T/ p0 |8 \ Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
1 Q' ?$ C/ T5 @: ^% H4 z white: Wow, very enjoyable, and I can never dare, will be blocked!
6 m" G8 E$ H' `! {# \7 Z1 y Hackers: Yes, has been banned.
0 p( L7 G8 A) `; m" e5 z! y white: this is also fun? !
; l$ k( ?5 l$ R6 ~- | y Hackers: Yes, ah, because I use your ID
$ X2 F6 {3 M/ L white: you are pro? : B3 |# t2 R$ {) {
hackers: You can say it.
2 ?5 M _9 K! _ white: to what extent high?
5 V# _% d# c0 }1 S W hackers: ah, I am bored when their own
: \$ j7 e# L* i6 i9 V3 ^7 j1 s white black: Ah, this I will!
! a L- p6 N" ]3 G$ r* [ hacker :#?%! You can? ! # f9 [, B `; j# K
white: Yes, ah, a black off it. . . . .
1 ?2 o# `: m. m3 s hackers: Go!
/ S. Y, M2 M% L+ H white: Ask your question " X3 V9 P- h8 o
hacker: says
3 l1 g( I/ z0 {$ e white: Besides me, you can also control other people's computers do ?
9 y( s! w% p. G& n: y* [& @3 P, h Hackers: Yes you can. . . .
; y4 _1 ~% z: z6 T+ p1 ^* f white: no networking is also OK?
6 i# q2 s5 w7 D9 l hackers:. . . . . . . 4 x- Y- C9 ?- J. S! Z) K. [5 W. ^
white: You can remote control to open someone else's machine it?
9 K" I+ i: w$ n0 E4 H hackers:. . . . . . . .
4 ` L- y8 m# X+ I/ f& b6 C( k white: You can steal top-secret file it! ! !
" p3 m! b% T' u8 o4 b hackers: I think you see more movies, go to sleep
3 h: V! H2 o+ X8 d+ A( Q white wash: my computer is broken
! \; J' i7 g" k6 n V H hackers:. . . . . . . Just checked, your computer no problem
8 G- s) \1 h% {6 x* x white: that is, you bully me
5 A+ N: T* @; x0 N* t hackers: No ah 9 `" Z2 { P# m9 p5 V8 _6 Y
white: You are! MP3 files are passed to my no images! . H, s i* O7 I, C* C, r( Q
hackers: help ah ~~~~~~~ * S3 ^& B: y9 m
white: Ask a computer problems can you answer?
; k1 h- b% \# F; Q9 K% E Hackers: should be able to / u2 y' ~) m2 ]0 k5 f
white: Which key on the keyboard the most handsome? / a' O! K6 V7 o3 c+ T. ?6 z
hackers:. . . . . . . Do not know . g7 z) s: k9 d8 `3 S: X
white: of course, \!
+ A: p: L% t+ v$ O+ E( Y hackers: halo ~ ~ ~ This is a computer problem? ! ! / e" r5 k! }; \3 \0 p/ y
4 l: O$ y; d, {! t% ^7 J white: ask you a computer problems you can answer?
6 _% u2 x3 G4 U+ O hackers: If the problem is not your idiot - T4 Z. S1 z: a+ A3 y
white: I am serious! ! You can operate my computer? ( k/ V: J' q) [2 g/ R
hackers: ah,juicy couture shop, yes 8 N f. w6 A3 R" ]6 D
white: that problem, you can solve it
2 r1 A% d( J5 h7 U hackers: Your question is, should not be difficult ;
; V3 Z0 R) n' m/ W! d white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 j M# I7 ]+ O- q3 ] a hacker:. . . . I excused % z0 W( b0 \$ a
white: we see meet you? 9 e r& K( Z0 P1 M7 u, w9 x
hackers:. . . . This, not so good, why should we see ) f) ~, W( [3 H
white: I want to see you are not the same and I would like to ( P; ]0 B5 B( o/ p1 e
Hacker: Oh, what you think?
$ w9 @3 J/ J [2 M- E1 s* D white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights % ]7 E: y( O1 @; p- e5 E l3 C% z
hackers:. . . . You say that Spider-Man, boss!
4 E a {$ w! l- j hackers: Kazakhstan woven ~ ~ ~ % Y$ k; `; k! s7 @, H% M4 O0 E2 k
white: You called every day, is not very curious about me? : G/ F3 [9 v% Y! x
hackers: not curious, is the habit, easily came in
' ?% u6 K4 g5 f2 ^9 G, p+ m7 D white: Well, I have a good way to change your habit $ P9 ~/ R4 ?! ^
hacker :. . . . Oh? ! Any way
# z Y4 t- N1 d X+ ^# M" p( k white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 7 Q4 `( \8 r, U4 x
hackers: Genius ah! . . . . . You can also connect to it?
7 ?: }! m% w- O" y3 A8 x& h8 O white: to ah, and slowly the hymns!
( `) {) {5 Q: S1 |- e/ z( i0 V white: you every day into my computer, is not very curious about me?
; c* l7 W6 r* F; Z# K7 X" d" w hackers: No wonder, only used 3 H3 L. D, @+ ~0 `7 L& Q
white: no you're curious about the place?
2 S) H8 ^+ |' R* X( t# x hackers: a ah, I always wanted to know your machine so much as when the virus crashes 7 o& A0 f# u4 f! i$ A; T
3 h3 o7 h7 m* c- H2 X white: I would like to control your computer
+ {+ P: w# P7 z. o! L2 H Hackers: I will not have other people access my computer I will be mad
$ {5 i$ u8 v% R! M- y/ @ white: This is not fair! !
, t$ S/ l3 I0 f, |; j" V hackers: ah, well, you control the good of the
, j0 K9 |( Q& `0 N' m- V* L white:. . . . But I will not. . . . 1 n" T# y5 X, r" L1 ]+ s8 r- }* H7 E" a
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
/ l- r z4 ?) ]) N7 o( k Hacker: I'm white
! N9 M5 C+ B. m! R2 N0 @ us again: This is probably the last time we met the
; K8 I8 e5 T% j$ f Hacker: Oh? What happened? $ M& y1 O0 Y" A
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
k3 i) l2 Z% |) S) ]+ j* w) S hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 0 W, l: t3 E2 }: e5 W7 ~6 y
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! & m/ U8 m: b% h2 f7 H- C# c
hackers:. . . . . . . . . . 9 r- N4 x, m5 |# P! e! B* n' j
hackers: so late, and how not offline? , W8 t0 B- y4 z8 C6 O
white: Oh, is the next, and I went to pull the power
* [; U k5 X* G3 c hackers: Slow! You will not shut down? - \% f& B1 ^/ b' [
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
. F6 F2 P8 D, n- i+ s# |% q hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \9 o3 W& t8 N% d7 K( S$ A
white:. . . . . . I press the power to the hackers call it G/ w o- f0 s( c! y T! P, a
white: You are not really powerful
* d: U. t; ]! P: W+ t hackers: so-so friends
; ]5 v% J' R8 d, Z$ {. Z. D white: bragging! You have the ability to shut down my machine in the horse. , H& B5 m( _( i2 F
hackers: this place is difficult! You wait / e! i1 @* `! o5 }9 \9 G
hackers: Haha, buttoned regret it g+ ^, {9 _; S% C1 N" v
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
# z+ D+ J' `+ b" X hackers: halo ~ ~ ~ ~ |
|