 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
, m8 F5 g/ ^* [6 G; ^5 s7 U$ |1 \ white: how control?
' L& q F" v, ~) V1 D# Q/ v5 S hackers: white with a Trojan
7 R- v6 ]: x N/ ~:. . . . . . Where? I did not see
E! m8 n* {( S4 j7 T hackers: Open your Task Manager / b2 v" |$ w, ^2 w$ Z0 \8 F
white:. . . . . . . Task Manager, where?
: O( @% K. ^) [4 Z hackers:. . . . . Your computer below! !
. ?( ?3 Z& H5 t, R2 \+ q" l white: \; / p. G( f& H4 n
Hacker: I have control of your computer
# O3 @ X9 S$ Q: R7 i7 Z white: Oh
9 g) T' ?' _) H5 c4 ~$ b) q! s hackers: a funk? ! Hey * z+ H; M& `( \4 ?) Z; I
white: for the just, help me kill the virus it, many of the recent problems my Lord , H2 Y4 Z0 x9 r% f4 k
machine hackers:. . . . . .
; ~6 x3 \* k( E# W+ s: X0 _ $ D9 f7 }6 |' F) W" @, I& I
white: how do you always in my computer and out of % i4 x: m1 u1 P0 v+ x5 o' [" z! W$ j
casual hackers: You can install a firewall
$ b7 B4 Q6 N+ S4 ^$ V white: install a firewall, you can not access it? ( k: s3 J ~% x4 X$ U" p
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah & L8 K1 \$ v+ J* z0 W$ G# Y
1 B. q- }( g/ h/ A& y6 F/ W
small White: I heard that you will create a \! m$ m0 ?% S6 V4 f. |4 N' ]) {
hackers: ah
2 a( a6 @% o) Z* u+ T white: you can control someone else's computer? !
& x" O' m( r! v) L hackers: General is the
2 |# b5 {4 `" f& f- `5 z& s' Y white: you can black out those sites? ) N5 f" l4 k( a5 w0 l( t e
hackers: of course, did not hear people call me a \ F8 s. [ I$ d2 Y3 Y$ ~1 h
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . : j7 W. i4 g9 g& T/ Y
\!
* _( r9 Z; E, q4 Z+ n( p9 F- J white: every day you come in, do not feel tired of it?
@6 q0 x w' _$ o( b hacker: is a pain, your machine is the worst I've ever seen in one of the
$ O# ?& X0 z% ^' }" u9 {, G- h3 R7 @ white: is not it, this is Brand : S$ ^$ m) K, I" R2 [
Hackers: I was mentally retarded in addition to your yard game machine only virus a
" a. L$ w9 n4 K% A white: Oh ~ ~ that you see me The \. . . . Goodbye 6 {4 C1 A4 k7 Y2 Y/ i" {/ \
, e$ \* k/ v) M% Y/ R
hacker: Hey ~ ~ ~ I come!
d* Y q5 I- D; U$ c white: not seen you for days, was my firewall blocking you? + x8 b( ?0 c) i0 P8 j
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
$ n6 |% P) `; e/ f. F4 }. b9 ] white: I want to Please help a busy , P$ D I* Q( {& T! \; Y' v
hacker: What?
/ T3 _) F/ N, r: W7 |% l1 } white: you can not modify the point into the power system data
% H* J& B. P/ w4 T% K! ^0 A3 t hackers:. . . . . . Why do you want to! ! 8 j% Y, @! A) q) m9 m
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
4 ]4 X; {% z7 e& K$ z hackers: die! ! : A, ^4 Q9 y9 t$ I( ]9 k
. E9 d5 Z! v3 ^3 w; m6 ]1 R hacker: you die Where is? ! ! !
0 A) ^5 Z J3 I9 H: ~) O3 W white:. . . . Go out and play for a few days, ah, come to me why
$ |& u! T: @" W: X8 _ g, x5 E& y Hacker: I'm looking for something 5 b9 d+ B3 ?9 w5 F& i
white: what I find here?
% |, J8 A- j- U7 O1 s hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
l$ S8 j* x2 ]( ?( w # r y' S5 s# C4 r# \0 Y! Q9 `- M" g, ?
most hackers : I come! !
" C: X! j' t5 D3 y. . . . . . ; n: w2 \$ T# U+ P
hacker: how not to speak?
1 C% e9 H+ P, y1 ?; f white: a bad mood 9 B/ i% ?% H! }; ]. ~
hackers: Who bullied you? # @# r" b+ i! T% J: [; x
white: a Q No. I have not lost inside of my first love 4 @! J0 s. D8 x4 A
Internet hackers: this simple, I get it for you 2 O" T. {3 y8 K3 m) l
white: do not get back
3 C- K0 ]1 C f+ v: H) h hackers: No, tell me what number? 8 d% ?, D- G% V N1 J7 F
white: Woo ~ ~ ~ ~ just do not remember
0 K- @$ E1 l8 m3 Y( ~# [4 X6 O+ a 0 }5 e$ y4 L) y+ i& z7 T: L, Y! }+ z2 l
white: you gave me out! ! ! !
7 ]% ], F% c* g, G hacker: how wrong? ! 3 p& M! D& Q# h
white: You are not the forum to use my ID to play it? ! ! , h; E9 @; Y6 o+ I( q( T8 T8 U0 |
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 8 ^- a% D& t/ g$ P4 e5 h7 S D
white: it does not work! ! ! ; e' r; H! o, `7 @0 I- V
hacker: how should you like?
& k. W+ m/ R7 `( n6 ]: `: D white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
: r& |2 \0 Q$ o* N $ g6 y* V* D+ G
hacker: Hey,ralph lauren pas cher, I did a lot of fun
4 Q. e) U4 S( ]8 V2 M; O% P( ^ white: what 6 l3 Y5 Z: Y+ J9 \% I( R. q
hackers: I go to the forums posted the top 8 {6 b3 H* j: S. \ T& R7 C
white: This very common ah
% r$ b! P& ?, `" O Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
* R" }3 ]" N) g* G white: Wow, very enjoyable, and I can never dare, will be blocked! 1 k5 g" s# D4 h$ e" v2 @! y1 l) R
Hackers: Yes, has been banned.
; i' k4 _& Q9 m2 K3 L) @ white: this is also fun? !
% R( o9 I' H: N7 k' n, i Hackers: Yes, ah, because I use your ID # w% J# \- A2 d% \$ r; K3 p+ \: w
white: you are pro?
) ^' U9 n3 X# X' w6 Q% S hackers: You can say it.
+ d1 R8 W- N: K# K; t w8 ] white: to what extent high? 9 P. @# e: a4 R$ _, Q: E5 x6 b% g
hackers: ah, I am bored when their own
; o, J, e# ?" m6 C! a0 B/ E* Z( Y white black: Ah, this I will!
; u+ u1 l, o2 x5 G hacker :#?%! You can? ! 8 \1 @! O: p' j" L1 W& q1 T8 L
white: Yes, ah, a black off it. . . . . 0 y. [) ?$ ` L; v
hackers: Go! " n o* h) L; {5 z% k7 W
white: Ask your question
" e# o9 _% X6 x& P/ x e hacker: says 9 A$ q* c6 L/ O; S! i: ]+ H6 N
white: Besides me, you can also control other people's computers do ?
, r) ^- j! R+ M& v/ J) w Hackers: Yes you can. . . . ! }; B6 s6 W! k- M; J3 o
white: no networking is also OK?
v( T& B: e. T7 y3 c, n' ]3 E hackers:. . . . . . . , e' s# H b$ m& l
white: You can remote control to open someone else's machine it? % R% S/ b1 K; s$ B
hackers:. . . . . . . . ' ^- N3 g# V+ |1 p* n4 N
white: You can steal top-secret file it! ! ! - u! ?" d. [4 q& U
hackers: I think you see more movies, go to sleep
0 d2 f L" v$ q7 \: e5 r white wash: my computer is broken + r. `0 q- D+ Q8 u
hackers:. . . . . . . Just checked, your computer no problem
/ r; P- p9 E- z! w0 u% i8 u white: that is, you bully me
- e1 D5 l/ L7 r: i% S hackers: No ah
% j4 D* t2 }4 ^4 m" }, a white: You are! MP3 files are passed to my no images! 2 I+ v/ Q* y$ e# E# y2 ^/ i2 ?
hackers: help ah ~~~~~~~ ( Z ]9 @6 V k5 F
white: Ask a computer problems can you answer?
9 K6 F ~2 Q0 X- o3 Z Hackers: should be able to : Y: T; }6 z1 K3 T
white: Which key on the keyboard the most handsome? & a; @4 U8 T/ n1 i f$ M* |
hackers:. . . . . . . Do not know . ~) l, i$ R) X
white: of course, \! % F9 O8 P1 E7 s$ x
hackers: halo ~ ~ ~ This is a computer problem? ! ! ( P" Z" W, G9 u
+ d% z; A. {! n- [' ` white: ask you a computer problems you can answer? $ k4 }" B% s% r
hackers: If the problem is not your idiot 9 T# Y" a1 \: W, j5 `: c
white: I am serious! ! You can operate my computer?
0 n5 Z, i- M" O7 D; M. Y hackers: ah,juicy couture shop, yes
" b7 H+ ]* E& E* w% l white: that problem, you can solve it
4 {5 `: |9 w% S4 b6 C hackers: Your question is, should not be difficult ;
' c. X" Q7 E" m0 N* I: a2 J white: Great, my fans do not seem to turn up,nike air jordan, help me change it
' a, ~7 f4 g) f! P9 A% N& W a hacker:. . . . I excused
$ [8 n- v% }) M0 N$ z white: we see meet you? 5 `; @9 b4 d0 V _0 Q- ?$ _
hackers:. . . . This, not so good, why should we see
8 Y+ P) f4 ^( b# ~* R white: I want to see you are not the same and I would like to % I- W1 A4 ?" n/ M2 k) `
Hacker: Oh, what you think?
7 x# T$ ]" h/ a% t white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 7 G3 J* M: P- _3 w
hackers:. . . . You say that Spider-Man, boss! + Y8 k4 J0 y- E6 O) @
hackers: Kazakhstan woven ~ ~ ~
3 j% A7 e+ w2 F) E/ V5 m white: You called every day, is not very curious about me? z- Q( r r# I
hackers: not curious, is the habit, easily came in 5 N2 [* {" g2 |1 a
white: Well, I have a good way to change your habit 2 M7 [- g# J2 [. ?( b
hacker :. . . . Oh? ! Any way ( I9 `# e! B2 _" l
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ " P- T/ ]; t/ e7 F9 h
hackers: Genius ah! . . . . . You can also connect to it? , R( r( D% e* V% P
white: to ah, and slowly the hymns!
( m% Y2 v% w3 v: X white: you every day into my computer, is not very curious about me? . A, y; D) z% H# ~( q& {
hackers: No wonder, only used 4 ?; Q- T) N4 v" Y, D, S$ }/ v$ f
white: no you're curious about the place?
; x4 `! H" [# T$ {' f( j* g hackers: a ah, I always wanted to know your machine so much as when the virus crashes
9 e& A3 \" ^9 x+ ^# i' z 6 k. U* p4 \" u8 U6 @: m! b9 I+ {% H$ S
white: I would like to control your computer
2 Y- t" k, q% @$ F Hackers: I will not have other people access my computer I will be mad
; Y) k5 u0 b) d# x- F white: This is not fair! !
0 M- M; j. Q4 N1 S hackers: ah, well, you control the good of the
5 h: r5 \* V, u5 ~# s white:. . . . But I will not. . . . : L$ e9 D s; M: M. F( X5 \
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
6 n- ?, j5 O L9 E Hacker: I'm white
9 R3 O2 A1 H7 A# v; ] us again: This is probably the last time we met the
" |" C& p; N2 V+ Z/ @- T) }; _ Hacker: Oh? What happened?
% L, M7 p M9 a white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
. K2 @2 {; G. g; T4 d+ n, G, \! D hackers: You are so tired of me. . . . . Well, since I do not come, goodbye & s: u5 K- B8 n. B3 O$ F4 ^. H, t
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! . B4 Z) B$ o0 P" P. t
hackers:. . . . . . . . . . 2 y7 J% M3 p5 i! m
hackers: so late, and how not offline?
; N ^- s0 c9 k( Q! P white: Oh, is the next, and I went to pull the power 0 C/ ]& ~3 u* p
hackers: Slow! You will not shut down? " c6 h5 N5 B6 H. G. w* k3 T
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
- x: K$ f1 b! C- M; [" ^3 m hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \, Q7 T Y; Y! ~' D- y
white:. . . . . . I press the power to the hackers call it
0 g, a' R; m5 s( R white: You are not really powerful 7 B# `" o8 r; B5 J# I2 r( l
hackers: so-so friends
4 ?* t" L, V ^( g- V1 ?- {! g white: bragging! You have the ability to shut down my machine in the horse.
, o* W ?2 @! P7 R8 K" t; k9 x hackers: this place is difficult! You wait 2 l0 ^4 r" {* S' n) u# G
hackers: Haha, buttoned regret it
; C: `. q* v8 s% W7 q* h; \# @" D white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
& v+ ]# M0 M9 ?; V& d hackers: halo ~ ~ ~ ~ |
|