 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer & z/ u k1 K$ H+ h6 f5 ?
white: how control? 1 ?. c+ y2 _7 V
hackers: white with a Trojan
% s0 { g2 ]7 R! X# K/ h+ P/ h; n:. . . . . . Where? I did not see
. p, V i* C7 I7 j7 A1 ? hackers: Open your Task Manager # f7 b% }* L' y" m: _! r
white:. . . . . . . Task Manager, where? 6 T5 G4 j, i2 {8 J* D( j% [
hackers:. . . . . Your computer below! ! 3 @: ~6 k c. a. a6 C
white: \;
* X% D. n. M) G0 B Hacker: I have control of your computer * N# Z+ A+ T4 D$ S3 U, b
white: Oh ' ?6 K u- X, H- r) j; X
hackers: a funk? ! Hey
; ~& p+ c& ^9 J& l white: for the just, help me kill the virus it, many of the recent problems my Lord
. {. ]! r9 O5 d: ?; c machine hackers:. . . . . .
' X/ J7 `# E$ G' L: X9 x, w - v9 B; \& y4 R0 ~! [) ^
white: how do you always in my computer and out of
* C7 j- j4 G6 v& @/ c casual hackers: You can install a firewall
* s$ ?/ z" K! ?6 B8 T3 u7 i white: install a firewall, you can not access it?
( m( ]& X! n3 `* X; @: K9 I, p" E hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
6 K4 l/ ^3 m B- L* q3 v
9 m8 ^# K4 j9 r' R2 P R small White: I heard that you will create a \!
: f( R1 f8 t r9 U: k+ \! n hackers: ah 3 ^' `* d" q& ^% y1 k3 H. U
white: you can control someone else's computer? ! ; ~) c+ c! \1 B
hackers: General is the
, T7 J" f: ^. m- J( V white: you can black out those sites? 1 \" _1 \) Y4 I6 F3 P! e
hackers: of course, did not hear people call me a \
( c, V& l! n+ w) ?! V6 I white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
8 v$ N% n+ H6 M8 W \!
, S* t" N# U' w4 I white: every day you come in, do not feel tired of it? - }. ^% m$ H' t
hacker: is a pain, your machine is the worst I've ever seen in one of the , P. Z) B/ U/ U+ u) ?' w3 Y% e
white: is not it, this is Brand ! ]1 k) b Q2 f3 m! t: ?9 B
Hackers: I was mentally retarded in addition to your yard game machine only virus a 8 l, A. x1 _- x
white: Oh ~ ~ that you see me The \. . . . Goodbye
- \8 ?7 V, X I2 o/ h0 w3 W
) C2 u* H6 e" M' T" a6 j1 W' f hacker: Hey ~ ~ ~ I come!
4 B) C, b0 R& g' B+ u white: not seen you for days, was my firewall blocking you? ) L% k8 Y C4 `, {% u5 n5 c. }
hackers: Haha, jokes, on your machine is easier than my own, not you miss me , e a6 `. H& x7 s: o( @
white: I want to Please help a busy 6 _( r7 o& Q* ~; W+ d
hacker: What?
/ G7 |4 C& R- u7 N% | white: you can not modify the point into the power system data
! e8 V3 @6 G: P5 e7 d6 o6 c$ L; h hackers:. . . . . . Why do you want to! ! 2 u. K2 G/ q3 a) j$ w
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . : U5 I z$ `2 k7 {5 N% T
hackers: die! ! 4 M$ ], {- z* o) |7 m4 [
* n! g1 U; ]( P' Z0 `6 q0 N hacker: you die Where is? ! ! ! " v* B i/ u& A5 V4 r. A! A9 X
white:. . . . Go out and play for a few days, ah, come to me why
( J; F/ j; m' K% v& o Hacker: I'm looking for something f$ t: L4 f/ o( w; K2 J6 C
white: what I find here?
0 p) u% J/ t0 M( L hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
; @ Y9 x, l! P8 i1 H1 |: ` ! n# B6 ^8 `; v$ J4 v
most hackers : I come! ! # G# s4 E1 @$ {. y* }
. . . . . .
9 I5 X( S( |+ ?5 h0 ?0 b hacker: how not to speak?
0 v% p: i* n9 a6 [6 j @3 V white: a bad mood
, M& z. V4 X$ V hackers: Who bullied you? ) u w- Z1 g1 S4 S/ Q% [% G/ t
white: a Q No. I have not lost inside of my first love
; H/ @* A1 A+ S4 G* ] Internet hackers: this simple, I get it for you 3 F7 ~! A/ L* H8 x( V7 s; |
white: do not get back 0 s& W9 Q: \; u
hackers: No, tell me what number?
" G) m) J8 o3 m/ o) N( K white: Woo ~ ~ ~ ~ just do not remember
I! q8 b! s' E2 y3 W
8 b& k w4 u! w white: you gave me out! ! ! !
+ U9 V7 D+ m" {- G hacker: how wrong? ! 3 ^5 g% o; _/ Y% `; u
white: You are not the forum to use my ID to play it? ! ! 3 G! T# n7 b- U( d5 x2 c j& a, p
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 9 \% W3 }1 @8 ~- p
white: it does not work! ! ! - I, a9 G5 i* A4 m, ]
hacker: how should you like?
* {% \0 Z: R( d) r. z. K white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
q ]2 z4 {9 D# f0 A9 }* U+ X
5 ^' i3 L- Q% y hacker: Hey,ralph lauren pas cher, I did a lot of fun
: F9 c, Q% i, h1 Q' N/ y& B% ~% M white: what
4 M8 J$ q0 A) w5 [0 k$ Q3 Z+ n hackers: I go to the forums posted the top 8 q* _4 d2 b3 A9 _
white: This very common ah / Q0 t, `* k, E+ \1 H' Y: `& N
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
* m9 V2 ?+ e; o* ]: B* v white: Wow, very enjoyable, and I can never dare, will be blocked! 6 @, y+ d( B; q3 z- K7 B6 d( r
Hackers: Yes, has been banned. 7 A( f7 O' E8 R1 G+ `6 \: d
white: this is also fun? !
% E: u1 a% K9 G Q6 _ Hackers: Yes, ah, because I use your ID
1 J. R8 E) x' b white: you are pro? / a/ d4 u# E% E. [
hackers: You can say it. 0 l9 K8 e F& O- Q
white: to what extent high? ) v" X1 a4 Y$ k. C' r8 p& Y
hackers: ah, I am bored when their own
c$ `2 n7 b+ y5 A! p3 o6 Y6 l% x white black: Ah, this I will!
# }, q7 x* m# k- N hacker :#?%! You can? ! . S% V; ? N6 y4 D: t- W" J
white: Yes, ah, a black off it. . . . . # g! b: g' Q. B9 x6 z( J
hackers: Go! l% ]* @$ y3 ]/ v
white: Ask your question
; E; P8 X a: @6 s' L: D4 H' Z hacker: says ) j4 l4 I+ g! Q8 B( L7 c3 d
white: Besides me, you can also control other people's computers do ? 8 ^- F* ]' R2 w: t9 O2 v/ v( o
Hackers: Yes you can. . . .
; `* M! w4 Y, O) k i( Y* I. _ white: no networking is also OK? 0 U$ |) t/ T& R3 D: ]: t
hackers:. . . . . . .
% N; S! e, h; `2 l% A0 r: O white: You can remote control to open someone else's machine it?
[5 p7 w0 x5 ? U+ W4 b: r hackers:. . . . . . . . s5 r7 V+ T) j% f
white: You can steal top-secret file it! ! !
# X- S* m! P8 l! ]0 H j hackers: I think you see more movies, go to sleep : q. A3 y0 S4 A6 b0 k% I% w* }" ]% V
white wash: my computer is broken + h/ L$ `- z. [8 W# r: }
hackers:. . . . . . . Just checked, your computer no problem
0 H2 T3 X% k( \" M white: that is, you bully me
" j9 U2 X: A" Z3 H# } hackers: No ah $ s( I$ i/ ^/ c2 z: J4 _
white: You are! MP3 files are passed to my no images! ! @9 h: j& `+ ~( L$ K# z: m, L
hackers: help ah ~~~~~~~
) k9 o. }/ ]( p- J- u; c white: Ask a computer problems can you answer?
+ L" i& }) b1 |4 g9 a Hackers: should be able to
( P0 o/ T* L6 R9 w& C7 f& n white: Which key on the keyboard the most handsome? ( f3 {5 U+ B: a) ~
hackers:. . . . . . . Do not know 3 j9 M9 s$ S2 ]8 L
white: of course, \! ( z* R$ H2 u% d/ T) c
hackers: halo ~ ~ ~ This is a computer problem? ! ! & l P1 t1 K, m- E9 M
" l# o3 K) d# i0 o white: ask you a computer problems you can answer? 0 e8 Q0 ^4 _- G6 h! {* M- e% E: N
hackers: If the problem is not your idiot 9 X5 {. h: v8 M) C( y$ t* |4 H
white: I am serious! ! You can operate my computer?
" b2 T1 `( o r+ h, B hackers: ah,juicy couture shop, yes 1 ]2 g$ U2 W. R0 b
white: that problem, you can solve it
* H% M! ?8 K3 {. V; y. O hackers: Your question is, should not be difficult ; 2 T) W4 f' G/ m- i# y0 P
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 {8 H9 `+ ]2 X+ ^3 T) ] a hacker:. . . . I excused ) I0 S! \2 f+ A4 v' i0 z4 \
white: we see meet you? ? c: h# N# h1 M* x- x) y
hackers:. . . . This, not so good, why should we see ( W( S: ]" D7 M& D; Z) @
white: I want to see you are not the same and I would like to
$ u, w" h' x) ?8 F- a! h3 i Hacker: Oh, what you think?
. U/ H, B2 Y& \$ U9 w# y white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
" q$ j8 h$ N+ w* a' ~' |8 t hackers:. . . . You say that Spider-Man, boss! $ c- e* u4 z4 _
hackers: Kazakhstan woven ~ ~ ~ ! a. x- r0 H2 w: `
white: You called every day, is not very curious about me?
9 S6 c+ \! K3 |; `3 [ hackers: not curious, is the habit, easily came in
9 j* ]; L" t, s8 [5 Y* s2 u white: Well, I have a good way to change your habit $ g# N9 k l& g! Y2 k9 S
hacker :. . . . Oh? ! Any way - f# Q- Q( S) T* T2 `" Q
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 4 w: |( N+ f Y: a8 c9 L
hackers: Genius ah! . . . . . You can also connect to it?
4 b- y- X+ V2 Q m& F# E white: to ah, and slowly the hymns! 1 O4 r( I9 ?: c5 T1 g
white: you every day into my computer, is not very curious about me? ; ^; f6 V! c+ H$ S9 M& R$ g
hackers: No wonder, only used 6 g% y$ J2 n* n: r/ K
white: no you're curious about the place?
- ^6 F7 |/ `+ |! Y4 U& c+ p hackers: a ah, I always wanted to know your machine so much as when the virus crashes / b G% y4 d8 l7 Y, @; c0 ~
4 z& u& @5 m7 w. q G
white: I would like to control your computer
. ^7 T$ S, e# B; y Hackers: I will not have other people access my computer I will be mad 6 M5 \( F( v) |
white: This is not fair! ! % `( z" q$ j* m" d# ^
hackers: ah, well, you control the good of the
) } v, C( K" q' D5 h2 U. ~. o' } white:. . . . But I will not. . . . / S0 L( V- q$ ]5 o4 _( J0 U
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 6 ]; Q4 m, ~ y/ N; B+ k
Hacker: I'm white
' ~+ X9 x. ]9 F) j# T3 y us again: This is probably the last time we met the ! E- X' I# ^6 k' E; R6 ~ f
Hacker: Oh? What happened? ( i6 ?+ E. P. C) n/ B
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! $ ?3 J8 G1 P# n4 m6 @# Y/ ?5 u/ u
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
& z% C- P+ O% Q) V white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
k; N1 l$ O% H( j' W% j: B3 \9 c hackers:. . . . . . . . . .
$ ]& _! j+ ]4 x- y/ v hackers: so late, and how not offline? , a( _+ p8 E# B# E2 _" }/ s
white: Oh, is the next, and I went to pull the power
5 Z% f9 y" F2 f/ `4 w) G hackers: Slow! You will not shut down?
. _9 O* z" y6 ]1 v$ z+ y$ w white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 7 s' E: r: w% p2 B! V- A+ i* T
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \$ A4 p2 o* f7 m5 g: F4 Z6 \2 {
white:. . . . . . I press the power to the hackers call it
9 s3 }$ _0 t! p0 e, C: ]9 g8 g white: You are not really powerful 7 S2 x$ b6 S. Q. X2 S
hackers: so-so friends $ d; v3 _* ^" h5 }1 C) t" o& {
white: bragging! You have the ability to shut down my machine in the horse.
# f+ A, O2 i" \ D" E3 n; u& D hackers: this place is difficult! You wait % U- P8 X. j! _( c
hackers: Haha, buttoned regret it & i- N5 }% ?$ ]" }; b5 x
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
$ U, x8 V1 B7 W0 H( n9 d hackers: halo ~ ~ ~ ~ |
|