埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 632|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
, B2 o: B# ~3 f white: how control? " U2 j7 {- R6 S. h- m/ V" F2 k7 o
hackers: white with a Trojan
7 g3 t. ^% `* k7 e9 ^1 x# i( J:. . . . . . Where? I did not see
6 M: p4 I. K9 c: ~* U% L0 { hackers: Open your Task Manager
; l% @* k: P# D' S& ?3 n5 T& I4 { white:. . . . . . . Task Manager, where?
# V# v0 j' t/ H' K7 H6 p" w! m8 h hackers:. . . . . Your computer below! !
' `9 |: y( n7 l3 u white: \;
) Q+ A9 g, O' j$ W- p. R5 F Hacker: I have control of your computer 1 t7 O! a0 f$ F" S4 `1 x8 X
white: Oh + e: c" |8 D$ F) l) {! Q$ E7 O
hackers: a funk? ! Hey ( ^) {# ^6 q2 i1 M7 N
white: for the just, help me kill the virus it, many of the recent problems my Lord " b9 B& I% n) @0 Q. w
machine hackers:. . . . . . . V1 u7 C- r2 R
3 y; S7 [" F/ @& c  k  V
white: how do you always in my computer and out of
0 U5 y" M0 L$ r+ U7 ~9 ^" G casual hackers: You can install a firewall ( [/ }" Z; s# O( y1 i/ N
white: install a firewall, you can not access it?
9 q' @$ a' G& _8 |+ g  G% q4 L hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
5 o; [6 \& }; V& r) r
  b! v3 u1 w8 W2 i8 r* _ small White: I heard that you will create a \!
- o& G- c/ {0 t5 |2 T5 d0 S hackers: ah " k4 ?& \- @' W2 P$ Q2 j
white: you can control someone else's computer? !
7 Z6 @( C" P1 c# n# g hackers: General is the . p3 U3 z6 y- V6 b* k
white: you can black out those sites?
$ w; `+ D& ^+ C- t7 d! @& s hackers: of course, did not hear people call me a \
4 E! B0 h9 p) {) y* Q. [ white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ( e! C4 J# \$ X' R; D5 j$ t( N
\!
: _- H+ G9 }* ~3 @. p/ ^ white: every day you come in, do not feel tired of it? & Y* W% @- c) i+ U: K, F- }6 L4 _9 [
hacker: is a pain, your machine is the worst I've ever seen in one of the 1 `# i0 q. U% [2 G
white: is not it, this is Brand " q; |8 t. b8 g) ]! d
Hackers: I was mentally retarded in addition to your yard game machine only virus a , i" [6 M& F8 M  p8 \
white: Oh ~ ~ that you see me The \. . . . Goodbye
6 U6 m: f$ S* {) Q: O- X' k   M' j, }  {9 s$ e- Z* w- Y
hacker: Hey ~ ~ ~ I come!
; r2 R7 J% C; y  s# L white: not seen you for days, was my firewall blocking you?
& F* j5 M$ o* B6 {4 J, G! `. _. E* T hackers: Haha, jokes, on your machine is easier than my own, not you miss me % A3 s: ^3 l8 |7 v8 f2 ?
white: I want to Please help a busy
9 H/ X4 z6 F( L, }0 S- L/ Q( L# I hacker: What?
+ t9 e' T0 P0 f' C5 l$ B9 P. { white: you can not modify the point into the power system data   {/ j% y  [, l. @2 |; H
hackers:. . . . . . Why do you want to! ! ( F8 Z) D/ S4 y7 u% p
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
9 R7 L, J  D0 ^& O# R* u hackers: die! ! 2 A, G9 D" T9 H) o: }& t- N8 z

0 j6 C+ ]. ]1 p$ X7 {# e hacker: you die Where is? ! ! !
& D! E% I6 i- J$ L; j" N9 l& W white:. . . . Go out and play for a few days, ah, come to me why
: O. ]0 `0 ~4 X8 Z Hacker: I'm looking for something & F! B* Q, a1 Q3 F( A6 S; [
white: what I find here? " ]+ x: L8 L$ G- N, l
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights + j* w7 h8 q1 F9 _" V; s- X
7 _) d" L) ^! q$ V
most hackers : I come! !
: s( N4 G! Y- C- _8 R4 \. . . . . .
1 F- ~' w, f$ N5 L hacker: how not to speak?
8 P6 d- {$ x2 T6 C9 |, R) Y( C white: a bad mood 6 u$ r, g6 r0 K2 {3 C2 z' `/ ~: s
hackers: Who bullied you? 3 }2 t% k. Z& [$ L( Y
white: a Q No. I have not lost inside of my first love
$ R+ x2 o) j5 I# a" z Internet hackers: this simple, I get it for you 8 Y: A4 w6 {* d
white: do not get back 9 y0 ]+ M5 S. B. x
hackers: No, tell me what number?
4 L) A$ o  j9 p9 e$ [' E: s  R white: Woo ~ ~ ~ ~ just do not remember 8 g, U. D1 q3 A% U
+ }/ d/ a# z) ^$ u% n% z
white: you gave me out! ! ! ! - p$ a9 h, t# I0 w' E: z
hacker: how wrong? ! 2 R8 \& c& H7 h2 t' M% x
white: You are not the forum to use my ID to play it? ! !
/ h4 R/ ]1 e, p" B' H7 Q6 u hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 9 V) m$ @8 G- x: ]- r- P
white: it does not work! ! ! # M8 t( Y6 J6 _/ C. i6 g$ }
hacker: how should you like? $ E- P; R+ {/ R& Z' u+ V2 i
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
0 ?3 J# w: h/ |% k) o* i : n& l. W$ v, a2 Z0 K3 M  H9 I
hacker: Hey,ralph lauren pas cher, I did a lot of fun   f3 j( {$ U0 E- j# t+ N* b0 \/ `1 N
white: what ! h# }) a2 S" q( j' B# d
hackers: I go to the forums posted the top
9 F+ ]# t  R, { white: This very common ah 1 ]  }8 H, }0 c# {& s  T5 O7 O3 r
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent . B% E% b( o4 S8 c6 j7 u
white: Wow, very enjoyable, and I can never dare, will be blocked! 2 r8 @& j2 W9 L4 w# R
Hackers: Yes, has been banned. 8 ]7 V7 k$ h- x0 z1 M# h
white: this is also fun? !
$ U3 h$ n6 d- T: V Hackers: Yes, ah, because I use your ID
; E5 a" _- U9 O0 N3 B" a3 { white: you are pro? . }& {2 h5 o2 x9 m+ I1 x
hackers: You can say it.
$ w  h! d0 L  n2 R. z3 g white: to what extent high?
3 e( {1 A, U: G+ W" N7 z hackers: ah, I am bored when their own / p' {3 V% m  R1 Y, ]
white black: Ah, this I will!
9 P" T* [% S: q( u9 l. n' J8 E' { hacker :#?%! You can? ! ! |1 k  T* ?/ q% b  R% Q2 \
white: Yes, ah, a black off it. . . . . * a7 z+ k- j% f0 C4 \3 }
hackers: Go!
. w) e/ u& l. B7 h8 i' t$ p9 ~ white: Ask your question ! W/ q" C7 w! i2 [
hacker: says
' l* U3 \' \" t4 ]! m5 X white: Besides me, you can also control other people's computers do ? " b  o' B6 Q5 J- d+ y1 }
Hackers: Yes you can. . . . , _: M" p" |4 _. ]! U' K- e5 d
white: no networking is also OK?
! N. q# ~, c+ W0 i* s( ^: Y8 X hackers:. . . . . . .
5 E7 p; H, v) X, G white: You can remote control to open someone else's machine it? 6 @9 X/ q/ J& r$ r- \" ~
hackers:. . . . . . . .
7 ~% {* _  Q% {# r. [' J2 v+ | white: You can steal top-secret file it! ! !
1 M; k. W* b8 K- f- | hackers: I think you see more movies, go to sleep ' U  E  g/ Y& U# Z/ f' ]* s
white wash: my computer is broken " {; f9 O- r, }$ z" a+ r
hackers:. . . . . . . Just checked, your computer no problem
9 O& k0 K' Z  u! p3 U white: that is, you bully me
5 }; I$ m8 w8 h( z4 n, E hackers: No ah
$ _* A9 K3 j& U2 U) j white: You are! MP3 files are passed to my no images!
, c" q/ ]- X7 K hackers: help ah ~~~~~~~
5 m4 n) h, I  N& g1 e& L& {) | white: Ask a computer problems can you answer? 4 F' y9 o* \0 y% Q8 R0 Q* h& J" w
Hackers: should be able to ! [1 t; P3 Z$ p; e7 r
white: Which key on the keyboard the most handsome?
; q# b( Q" }( M hackers:. . . . . . . Do not know
+ r, y# l; r' Y4 Q8 ^/ F white: of course, \! $ |) k+ E. W# P
hackers: halo ~ ~ ~ This is a computer problem? ! !
2 Z  E8 J5 Z! E3 G$ h' P 8 W3 }! n8 y0 _  _2 R8 k
white: ask you a computer problems you can answer? ( D4 |5 ~! v& O( p& I
hackers: If the problem is not your idiot
- M, Z0 {$ g# G  ^5 T9 s1 m7 `7 W white: I am serious! ! You can operate my computer? " z' ^( ?. f! @: [$ C# O, a( Z
hackers: ah,juicy couture shop, yes
8 [8 Q& j( W) a white: that problem, you can solve it 5 N' h6 P; u# \- g; |
hackers: Your question is, should not be difficult ; " z1 D$ M' h1 x7 e1 _
white: Great, my fans do not seem to turn up,nike air jordan, help me change it ! V' C! ^2 @4 a1 w6 I+ h/ [9 l% m8 g
a hacker:. . . . I excused 9 T3 O7 H% a% I% a0 l/ c) F: m
white: we see meet you?
* E* r; E# T  |1 h+ ]+ k hackers:. . . . This, not so good, why should we see 5 z% E3 q0 c# P- E+ s& u2 O1 g
white: I want to see you are not the same and I would like to 3 |7 S& V4 E- j
Hacker: Oh, what you think?
/ L* t8 D1 j  h" p white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights . W7 g; i6 h8 s$ L8 t( u4 \+ j. L
hackers:. . . . You say that Spider-Man, boss!
9 q3 ^- @/ R1 o0 A6 ] hackers: Kazakhstan woven ~ ~ ~ * t3 M  e; q, F. @
white: You called every day, is not very curious about me?
: r* x( B' ^. t# z) f) t' U6 E hackers: not curious, is the habit, easily came in . D& Z) t: ]; i
white: Well, I have a good way to change your habit 2 |1 m* d- h8 d9 t
hacker :. . . . Oh? ! Any way
$ D6 N/ P. T, } white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
2 h. D+ m+ B# M& M5 n hackers: Genius ah! . . . . . You can also connect to it?
1 y* O, t! {  o& c- R% o& Q/ n white: to ah, and slowly the hymns!
" \2 ]7 i! [/ r. A1 Z% |- i white: you every day into my computer, is not very curious about me? ! R/ S% z7 E! S0 ?+ s+ O
hackers: No wonder, only used 8 Z2 p! v$ `# M, |
white: no you're curious about the place? / E0 A9 W- s4 l* H1 C5 S+ b. R$ h
hackers: a ah, I always wanted to know your machine so much as when the virus crashes + A: U) y9 z1 R( }. ?1 v
4 Z+ t" p6 l3 }
white: I would like to control your computer ; I, o! [+ ]7 c" Q4 A. u
Hackers: I will not have other people access my computer I will be mad 9 _/ Y' O. r" k( f
white: This is not fair! ! ; L5 i7 u8 _) f5 c
hackers: ah, well, you control the good of the
% e- V4 J/ `3 o4 M. R9 f: n  M; | white:. . . . But I will not. . . . - Y/ a0 r% w7 U8 F0 G
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
" F9 v/ `" a9 V9 W  Y Hacker: I'm white
  E, i+ R% z: _3 Q us again: This is probably the last time we met the 3 L& G0 }7 v! k% e: `, I- R% W
Hacker: Oh? What happened?
7 T1 R" U. G* m  t- q3 m7 ] white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
- B1 d/ C2 Q8 f6 Z; y  l3 l) W" E hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
6 s; [. v" ^/ @2 C9 q! N9 G6 ?( D white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! , u/ h8 }0 C2 t6 l& S
hackers:. . . . . . . . . . # i$ ^1 J0 ?- Z7 _, ~
hackers: so late, and how not offline?
& q0 D. _4 F" ~; B! E white: Oh, is the next, and I went to pull the power 0 y7 P& @; W6 ]) B% |
hackers: Slow! You will not shut down?
" _6 s$ P/ `4 }' D white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 6 P9 i0 E7 l# f9 x: g0 ^( Y
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \, B7 O# l' J$ k6 W
white:. . . . . . I press the power to the hackers call it
% ^) Q5 r0 V6 S- P white: You are not really powerful
/ |" M* h9 X  y# F hackers: so-so friends 3 a1 c: w7 `! k9 J' Y9 G, T
white: bragging! You have the ability to shut down my machine in the horse.
* \4 S5 o8 j* `: U% E hackers: this place is difficult! You wait
9 D* a$ Z2 y) d% V- `. q hackers: Haha, buttoned regret it
0 ]4 y0 M9 q: E white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
$ z1 Q8 S' ^1 `; H, E9 P& ]- M hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-8-22 04:36 , Processed in 0.157152 second(s), 11 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表