埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 729|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer , r6 Y. ]& A, z7 J; c9 ~
white: how control?
" b) u8 i  ]' T, \ hackers: white with a Trojan ! `! J/ P( G" [3 W& P  v+ p, @! w
:. . . . . . Where? I did not see
0 q1 ~9 p( @* ] hackers: Open your Task Manager
5 m( K6 s8 F/ E9 X- m white:. . . . . . . Task Manager, where? - G! G% m* w5 n3 u& ~/ J; d
hackers:. . . . . Your computer below! ! 3 U: {' y, |! o9 r9 y
white: \;
+ \' o6 d# ^/ u$ v# n Hacker: I have control of your computer 5 a/ a1 Y0 t7 |; b3 u% O3 x# I
white: Oh # y9 g2 x7 I$ t9 J1 T+ T
hackers: a funk? ! Hey + {0 f# J* B$ j6 k& O+ R# e
white: for the just, help me kill the virus it, many of the recent problems my Lord
; S3 @1 K+ g9 n. i0 ]' q machine hackers:. . . . . .
0 Q' r) s( p1 Y5 s
' P  k4 c9 M6 e) d2 t* x white: how do you always in my computer and out of
. C+ v9 U7 ^+ p9 k2 \ casual hackers: You can install a firewall
1 L) U' O6 O8 ~; M* t3 H. h* Z white: install a firewall, you can not access it? , Z+ a0 w) N) N  H' o% m; Y
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 6 ^8 v" O4 u! K1 x% m4 E& u5 ^
# |/ }3 c  y/ y& o! {8 j
small White: I heard that you will create a \! 0 k" l6 ?) `, \7 J4 a, ^8 G
hackers: ah ; x% U9 W! l/ w6 l3 B
white: you can control someone else's computer? !
) `9 `  ?% f: }" w hackers: General is the
. _  @% f" G  a white: you can black out those sites?
' q# O: p8 Y% K( x" a hackers: of course, did not hear people call me a \
) N& B0 `4 z3 a9 g) s. B white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 0 \" C$ w& Q! ?( g8 t' X
\!
/ t0 l) X' U& |0 }0 w white: every day you come in, do not feel tired of it?
9 i" \( w  n% U4 x6 Z' `2 p! l6 I1 i. _ hacker: is a pain, your machine is the worst I've ever seen in one of the
# Y( K; h  T2 R5 a2 \ white: is not it, this is Brand 3 B) w+ O2 @0 f2 [: C; r. R
Hackers: I was mentally retarded in addition to your yard game machine only virus a
' F% U1 _" ^8 {3 n# W white: Oh ~ ~ that you see me The \. . . . Goodbye 7 h) \( O, G: W2 L. _5 \) ?4 H

  a! N0 a3 G; [0 i! b: C! K hacker: Hey ~ ~ ~ I come! 6 ~) a6 d- |! K7 ?3 r' c8 Y# `+ L
white: not seen you for days, was my firewall blocking you? + _9 d( K- p  h' E
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
$ O# e" R- T0 G white: I want to Please help a busy : K. @: V. m" z5 ~$ H+ c
hacker: What?
* S3 l. I8 M% m: S7 x8 L$ h! Q% G white: you can not modify the point into the power system data
4 a- u. s" V* o3 O hackers:. . . . . . Why do you want to! ! 5 m- ~* {1 m2 T+ p* V. e+ E0 i+ d. P
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . - a2 e5 Z1 d  T( g7 v6 L# {
hackers: die! !
/ K: @$ [) D! u) Q8 S
, B4 i( O0 |: | hacker: you die Where is? ! ! ! 5 L3 F; U' k. a1 n
white:. . . . Go out and play for a few days, ah, come to me why / ^5 u* c1 r9 _' |3 R4 x2 i
Hacker: I'm looking for something
1 z/ c5 g$ ]6 ~) X: ^ white: what I find here?
2 T, z" ~' ~3 v( F, ^7 \ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
3 l8 \" g; E- h0 E9 ^
3 D. j7 L0 {% P8 O! k3 b' ] most hackers : I come! !
# c) P7 Q; x* h4 Z5 s4 W  }. . . . . . & ]1 B  g: V( P& @
hacker: how not to speak?
. O0 d  s5 A4 K# t% G white: a bad mood
" Q# E8 z/ r% E4 b hackers: Who bullied you?
8 w/ V2 D3 o5 }9 _! l7 D6 m" ? white: a Q No. I have not lost inside of my first love
  Q& [9 X( D9 e, A Internet hackers: this simple, I get it for you * B" o! Y9 V% ?4 y) B& Z7 ?) F
white: do not get back
% m6 g+ ]4 x$ }& M7 r& H( ? hackers: No, tell me what number?
3 r6 S& x2 j  r" d* K8 T white: Woo ~ ~ ~ ~ just do not remember 8 i9 C& X8 r  _- G" l

: z' A. l2 f# a white: you gave me out! ! ! !
) g0 b9 J' c2 ^: k hacker: how wrong? !
' w+ q, a- L/ J0 S. ^' y white: You are not the forum to use my ID to play it? ! !   O' ?; _; T, Q/ l- H$ }6 F
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
% r# ?" w6 `9 t% I% ~4 F white: it does not work! ! !
4 K& |/ ?+ k) H hacker: how should you like?
+ U! k5 @$ Y2 u' ^3 G+ u6 Z white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! / ^/ p4 y2 ?' s1 m3 x, g

6 l9 }9 E8 j7 p6 w! k hacker: Hey,ralph lauren pas cher, I did a lot of fun 3 x% o9 z4 W2 f1 u+ `" l
white: what * D& _% E3 x& r! v
hackers: I go to the forums posted the top
( y  w/ |3 J& P/ K6 E9 `; l white: This very common ah
' _( J' S7 }( ]7 Z: n5 J Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent . p. H+ w# J& V7 [/ A1 ?
white: Wow, very enjoyable, and I can never dare, will be blocked!
# o* o! y! e* P2 b Hackers: Yes, has been banned.
' o! g+ s! A% r( j( S  a; | white: this is also fun? !
( e. \; q3 X: X$ ^" X Hackers: Yes, ah, because I use your ID 4 K# P. A; L, v0 ~
white: you are pro? 2 C- d) E4 f) }6 ?! I, z: D4 L
hackers: You can say it.
9 _, N. c6 ?: D* m4 z" u4 p white: to what extent high? ; V9 j1 ]; n6 R3 L
hackers: ah, I am bored when their own 5 D' Y, m0 S- A  E! D
white black: Ah, this I will!
+ x8 r; ?4 c# @8 F2 S6 h2 I hacker :#?%! You can? !
% ~2 b! P- N6 f& _6 g* J white: Yes, ah, a black off it. . . . . 7 x; {( M6 l2 w9 P3 t  c/ a7 Y$ a
hackers: Go!
% C4 [+ ~! l/ f# n* r: j. [2 F7 T white: Ask your question . [2 k, }0 x4 n2 C# \
hacker: says ; t& ?% I1 |) C" _
white: Besides me, you can also control other people's computers do ?
& J" @  S% \" j2 F- ?/ X6 f: I Hackers: Yes you can. . . .
2 y: g2 t, H8 ?% k( ^2 Y1 i white: no networking is also OK? + C, z" {( a# h3 J! U
hackers:. . . . . . .
3 L8 E2 G! J1 {- ^  p) h  Y white: You can remote control to open someone else's machine it? 7 v( E, R: H% K; v4 F; ^
hackers:. . . . . . . .
; [4 o! @0 h4 F3 | white: You can steal top-secret file it! ! !
# h; h9 h9 l& k  g# q( o! n hackers: I think you see more movies, go to sleep : K" u$ A3 s& t+ o, }5 h4 i
white wash: my computer is broken
; k  L: @# r- Q9 F8 m hackers:. . . . . . . Just checked, your computer no problem 4 Q2 j; t% x( z& P! E# R, G: \
white: that is, you bully me
2 f+ N, Q* A' z% L2 ?4 Y9 ], q" n) Q hackers: No ah
8 d. M1 e9 i% y+ P/ F+ O white: You are! MP3 files are passed to my no images! . P! ^$ ^% k6 I. O0 ]
hackers: help ah ~~~~~~~ : j# T- t6 `/ z. D
white: Ask a computer problems can you answer? % @7 s7 j; d: E) v
Hackers: should be able to
4 _$ k- }. z0 Z0 }  z white: Which key on the keyboard the most handsome?
; h, S/ f, J3 ^/ f* k. V* v5 r1 C hackers:. . . . . . . Do not know
7 Y, Y5 l: W: h white: of course, \! # j9 ~, o3 K$ }1 I5 k- h# `& \
hackers: halo ~ ~ ~ This is a computer problem? ! ! 7 l. f' N0 V* _8 r0 y; Z
4 C: o3 ~  j  `: [2 C( v; C' i$ V
white: ask you a computer problems you can answer? & J$ ?2 Q6 b. M6 n" m* p
hackers: If the problem is not your idiot 4 y' z! R8 e% `
white: I am serious! ! You can operate my computer? " f. m0 d& i' X* `2 T5 ]/ Q
hackers: ah,juicy couture shop, yes # n2 q! Y/ B( u" h/ I
white: that problem, you can solve it
+ U- u) x) J, @ hackers: Your question is, should not be difficult ; ) {- K- X1 B% V5 C" c0 q& l- _
white: Great, my fans do not seem to turn up,nike air jordan, help me change it $ i; a: f' ^, J: `- [% m& z
a hacker:. . . . I excused
" o1 U1 _$ P, j6 J white: we see meet you? * k: O7 w4 r# O
hackers:. . . . This, not so good, why should we see : C6 d+ V$ U4 u6 v, o
white: I want to see you are not the same and I would like to
- r, r5 D' R' v" w Hacker: Oh, what you think?
8 f. L% a0 b% o- @' ~4 _ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
, N1 `! l3 F- v' X  C hackers:. . . . You say that Spider-Man, boss! 8 Z* k% ~6 H9 b; x, m* t. A! t
hackers: Kazakhstan woven ~ ~ ~ ( ^2 u) l0 U: r5 |
white: You called every day, is not very curious about me? + P8 C5 u7 s3 W
hackers: not curious, is the habit, easily came in
; C/ k( e% G' G3 i) _ white: Well, I have a good way to change your habit   _. J0 a, U8 [
hacker :. . . . Oh? ! Any way - D% q# B/ b. @" z% n" N
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ & ~* I) [2 U) ]; A( b
hackers: Genius ah! . . . . . You can also connect to it? * W! }7 W. r% U0 ~7 L; {
white: to ah, and slowly the hymns!
  s1 X  a( M' ~7 T" i white: you every day into my computer, is not very curious about me?
3 A; z) V: J- T$ D hackers: No wonder, only used
7 ~% I, Y# {, s  E& X white: no you're curious about the place?
/ I5 ]; |& t  p' W8 v hackers: a ah, I always wanted to know your machine so much as when the virus crashes
$ x9 _+ l. b1 F) e" r
' H0 Z8 h6 ~, p3 Z- E  V% A white: I would like to control your computer 8 l% ^, [) {6 @* I+ E) o- {
Hackers: I will not have other people access my computer I will be mad
( d) x  l  @8 y+ n" j3 g white: This is not fair! !
7 o) i2 V- q; d# f1 t hackers: ah, well, you control the good of the
% [6 `0 f5 v" z* s white:. . . . But I will not. . . .
* W/ e# h- K# Z5 Y3 S2 C( @ hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 6 {! J# T# u) x' h$ Q$ G6 F8 |
Hacker: I'm white % s9 [6 G  D0 _* s5 w/ O
us again: This is probably the last time we met the
- q6 k; y( J, P" g Hacker: Oh? What happened?
( r4 p* x0 g- K+ I' V8 r" a white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 1 i+ @: O0 `9 J& J
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 7 J2 I0 c; \: R0 w
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
3 X) ^: g! M3 X5 h6 P& i hackers:. . . . . . . . . .
' u* F% x3 t3 t" M# ]' u4 n hackers: so late, and how not offline? ; f9 d( N, C$ f: A  E
white: Oh, is the next, and I went to pull the power 5 l: d9 k8 q: j8 |
hackers: Slow! You will not shut down? ; _% `1 u" K+ I( Z, g
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
% L. S3 {* j7 }5 D4 s/ n# g0 m' s hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
4 A: r& f0 q/ B+ d+ D white:. . . . . . I press the power to the hackers call it
9 Z! X5 R6 @& B) K white: You are not really powerful # K; o" g) q5 l7 K2 P
hackers: so-so friends
5 O0 p+ z' A( k- [0 b! s$ V white: bragging! You have the ability to shut down my machine in the horse.
& }$ M* B  s  {7 ^ hackers: this place is difficult! You wait
/ D" p  }6 ?; L, f hackers: Haha, buttoned regret it
$ Z. z4 R+ d5 ]6 g9 J0 e, _3 ] white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
" K* Z1 b! S. y- w, z2 g: P hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-1-28 23:21 , Processed in 0.170881 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表