 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer $ B. {7 l: U" D0 N
white: how control?
1 d* ]1 W3 T0 x& T7 x hackers: white with a Trojan
5 L, p/ [* x( P z* S:. . . . . . Where? I did not see 2 K3 \9 n. ^4 J& P! _
hackers: Open your Task Manager
+ U- l: t a6 x% x6 h3 s* T white:. . . . . . . Task Manager, where?
& |* b% ~6 b2 O; x hackers:. . . . . Your computer below! !
% ]! I- r" ]% m6 h white: \;
+ M# Z2 _7 Q. X( s( X5 l6 [9 g Hacker: I have control of your computer 2 J2 {# L' c3 `: u) q
white: Oh
% X7 G H* V4 D0 v# D hackers: a funk? ! Hey 6 O( C9 W/ j! k+ {+ V
white: for the just, help me kill the virus it, many of the recent problems my Lord
) g* [5 z, Q- Q8 e- a8 e3 A4 Y0 { machine hackers:. . . . . . 7 f' w8 A0 o% f$ {
7 ^. ~! ]2 v0 [
white: how do you always in my computer and out of $ Y; ~+ T( f; k6 e
casual hackers: You can install a firewall ' I+ d: |, E9 y, x
white: install a firewall, you can not access it?
9 o! d% W! v$ g4 A hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ( }6 I3 X0 s" P: P
5 q- |# a- c* V* G/ k; H# F
small White: I heard that you will create a \! 3 V# \6 q: x0 m# t6 W8 ^. w
hackers: ah X7 `0 T( ]# ]4 f* ^1 I3 B
white: you can control someone else's computer? !
/ `( l8 q, B/ P5 q/ f( D% j hackers: General is the
1 Y) ]/ s6 h$ R& Q' s% J( ? white: you can black out those sites? 8 m# q/ x; u( Y# q$ u! G3 A4 z# f
hackers: of course, did not hear people call me a \
4 J1 l3 W; |6 b# y9 x white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . " u( K* r% q, D. v: i# l
\!
( e; `, g% M" \& U1 M3 h% n s white: every day you come in, do not feel tired of it?
/ @; p- j& f2 A7 A) z0 I- f* i hacker: is a pain, your machine is the worst I've ever seen in one of the
9 w4 \+ y) m! e; B4 M white: is not it, this is Brand
( ^1 j' K7 Q# J) S+ h9 d- N Hackers: I was mentally retarded in addition to your yard game machine only virus a |2 Y5 b, a8 Z2 U# t, z" U
white: Oh ~ ~ that you see me The \. . . . Goodbye 8 Z4 V+ u3 Q8 p
& O8 d. R) U4 D6 Z3 B
hacker: Hey ~ ~ ~ I come! 8 E2 G0 R6 x1 K! h6 g/ F6 m
white: not seen you for days, was my firewall blocking you?
% n7 ?" g; N! M hackers: Haha, jokes, on your machine is easier than my own, not you miss me 4 t# S4 C- M# Y0 B7 Y8 _" G
white: I want to Please help a busy
4 v K0 z2 E! g1 x8 c( D$ B hacker: What? , r: \* m7 L: w
white: you can not modify the point into the power system data 0 c. t; v* Y) [
hackers:. . . . . . Why do you want to! ! # v1 m9 k; H$ J# C
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
: G1 k" E$ b+ _; x" S ~ hackers: die! !
+ Q4 b. ]" u+ y' \& Y, ?7 {/ Z
5 e* T x* R- D/ s3 C, @2 |# R* _# s hacker: you die Where is? ! ! !
% A. a" T/ F" K& b white:. . . . Go out and play for a few days, ah, come to me why 0 v2 e) }/ J! r8 ^ H" a. ~
Hacker: I'm looking for something * E7 u+ Z+ a; B7 I0 {
white: what I find here? ; ~5 D% ?) ?6 W: V& _
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
4 M5 e/ L* S G3 l% G
$ Y3 D' {7 e) W( L) s most hackers : I come! ! * Q5 c/ L0 @- A5 Z8 O
. . . . . . 0 A) z" u3 e' o
hacker: how not to speak?
: @+ o/ \4 v% h. ~- e white: a bad mood 6 n8 z3 {% w/ n2 G! x; O% ?/ ^
hackers: Who bullied you?
1 P. H, Q; p$ x0 \ white: a Q No. I have not lost inside of my first love * }7 `: ?0 N/ m3 n' j0 V5 ]. }4 t0 _
Internet hackers: this simple, I get it for you
( G; p" c9 i: S% a/ h" c5 } white: do not get back
; P) |' M% g. d( A6 S/ }8 k hackers: No, tell me what number?
5 @* L, P7 z1 F6 c9 | white: Woo ~ ~ ~ ~ just do not remember
4 d' d, f) Z; J" G# d( n7 Z1 Y' J
' ~* A' I' }2 U white: you gave me out! ! ! ! 9 l2 e' e D% S! x* Z& h
hacker: how wrong? !
$ q8 U9 ?6 {( f6 a, o& w white: You are not the forum to use my ID to play it? ! !
2 y( Z& F; ~ F2 k5 m T2 G0 z hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the & e, F7 A& Y- k+ `3 {
white: it does not work! ! !
5 R+ n4 a" c9 |+ i) T" O. v9 f hacker: how should you like? # `: }) a" U; r; O
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
- t3 I) n; ~/ |3 J7 [$ Q9 o0 ? % g5 |$ n5 t# y% u; N
hacker: Hey,ralph lauren pas cher, I did a lot of fun
) L$ Q1 Q$ ]9 _+ O2 F white: what / A. z' p* C. B3 W/ L
hackers: I go to the forums posted the top
8 Z- {$ L: s* J white: This very common ah
4 O( X% w2 F- x& d* [ J' \ Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent ; `0 N! j# i+ [) D* j1 ^
white: Wow, very enjoyable, and I can never dare, will be blocked! " z, P# X# f# S+ ]: i! |5 u
Hackers: Yes, has been banned. 6 F: _; M3 \; t
white: this is also fun? !
4 x" A+ D# a) g3 d Hackers: Yes, ah, because I use your ID
, g; Q- x; k1 S white: you are pro? 6 J- |( w+ H- y. k- o
hackers: You can say it.
: q7 S: u1 z0 B# | l white: to what extent high? ; i4 S4 T8 r0 Y; H F" _! T
hackers: ah, I am bored when their own / j$ R" b9 M4 s6 A/ G( g7 b
white black: Ah, this I will! 9 T/ [7 m3 W: F7 T* N# M0 _
hacker :#?%! You can? ! - @. M' G7 o: f4 ~4 x9 j" E
white: Yes, ah, a black off it. . . . . 2 m7 D; a& q' z! k9 @
hackers: Go! 6 ?) f* _$ q: `5 D) Z
white: Ask your question 1 z0 ]7 i* i# E0 I) [
hacker: says
+ g( M- [& k& X- k) V7 B white: Besides me, you can also control other people's computers do ?
2 _: o) g- k& M# ~& _8 i3 L3 W Hackers: Yes you can. . . . + t' N. S) l7 T" u7 K/ B0 c
white: no networking is also OK?
6 R3 d! i$ u5 s' d1 a6 ~" a, f5 M hackers:. . . . . . . ' N9 R7 {" F$ M9 z9 }
white: You can remote control to open someone else's machine it?
( R5 O4 g; h+ {/ E7 P hackers:. . . . . . . .
+ [' f0 S; ?* W% a white: You can steal top-secret file it! ! !
1 ~9 ?/ u; w1 `- G3 s hackers: I think you see more movies, go to sleep
' Y& s, y- D- j5 o: A0 x0 F white wash: my computer is broken
, r) Z9 `2 b5 ~; ~. \ hackers:. . . . . . . Just checked, your computer no problem
; e l5 l( q# h, @7 j white: that is, you bully me
, b3 @. V8 N2 M4 R, N hackers: No ah
; w) c& L+ r/ @' O% ~ white: You are! MP3 files are passed to my no images! + J- J, [8 D$ G1 _, x+ }: W8 t
hackers: help ah ~~~~~~~ ( v' y' b% o; S! T
white: Ask a computer problems can you answer? 7 Z/ ^' A9 t4 M0 v
Hackers: should be able to $ [/ g* J* y, |9 x
white: Which key on the keyboard the most handsome? ' {; ~4 F' [0 O2 I5 @
hackers:. . . . . . . Do not know
6 r1 v8 T' ]( v0 P$ l+ _ R9 d white: of course, \!
! M: i5 w2 m$ y& n hackers: halo ~ ~ ~ This is a computer problem? ! ! 9 U- L9 y8 Z+ c- w T
1 ]- Q% y! @8 d7 d/ R+ \; t, H
white: ask you a computer problems you can answer? 6 C6 `3 \: q0 s/ V
hackers: If the problem is not your idiot 3 } g6 H7 s4 @2 V3 [) x
white: I am serious! ! You can operate my computer? Q! g! \1 T3 |( H5 H2 M: F A
hackers: ah,juicy couture shop, yes
% `: c$ k- s. ?+ M0 r& J! O white: that problem, you can solve it - R; e$ [+ b: g( a
hackers: Your question is, should not be difficult ; & \0 G' k0 Y6 t. y& T+ l5 D' G
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
6 i. u4 g4 @% ^0 d( M5 H a hacker:. . . . I excused
3 U/ l" ^# I5 e5 f white: we see meet you? 6 w; |5 ]$ V; H, G3 X; a2 |2 s+ p; j
hackers:. . . . This, not so good, why should we see 6 B7 ?. ~- ^0 c" K; Y
white: I want to see you are not the same and I would like to 2 W3 ^; Q! C$ O" G2 l
Hacker: Oh, what you think?
/ D/ f+ e2 b" Q white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights * w' v* _6 c7 A) ?$ \! O
hackers:. . . . You say that Spider-Man, boss!
8 m: A R4 s- x5 H3 z1 C( X hackers: Kazakhstan woven ~ ~ ~
, U. h" [) p8 Y- F% z white: You called every day, is not very curious about me? 0 l8 K+ j* |& T1 I7 z, {9 X
hackers: not curious, is the habit, easily came in 3 K8 x; W i3 H+ \
white: Well, I have a good way to change your habit
# ?0 n- q/ }7 g4 Y+ U e hacker :. . . . Oh? ! Any way & y; m, ?4 |* Z9 r6 n
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
' [# v' r' v- ~# a6 C4 P$ [8 e hackers: Genius ah! . . . . . You can also connect to it?
2 F& [" {. V5 ^* T$ Q9 h3 r white: to ah, and slowly the hymns! * C+ s$ e. C' t t$ N% x
white: you every day into my computer, is not very curious about me?
6 J3 R& O2 u* t+ R' c hackers: No wonder, only used 6 W) v/ K$ w; Z7 L T$ t
white: no you're curious about the place? 9 G1 {& g0 x( o, C% c1 c
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
9 h6 x* X0 P, H: i# |; P ( d1 k) w* P- J( {
white: I would like to control your computer
1 ]6 [9 ]7 g* E Hackers: I will not have other people access my computer I will be mad " M7 J8 k3 C+ I: W8 x6 V2 ^/ I
white: This is not fair! !
9 ~/ C5 l: a) }5 K3 J! p5 }, f i+ P hackers: ah, well, you control the good of the
% C1 r" r/ Y0 N" ^* I8 c white:. . . . But I will not. . . .
2 J+ d2 A/ K& {( B; c( g) B# z hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! + {6 ?8 F1 a# @3 s4 g6 d9 b, n
Hacker: I'm white % Z; l. s, Y: u4 N; `3 x+ F$ Q* i4 R
us again: This is probably the last time we met the
9 U$ m' m/ x& O7 `5 P Hacker: Oh? What happened?
0 j0 P0 G" v0 |! W white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
5 d: B$ |0 S5 j& N& Q. i hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
6 `! _6 c8 E) N. p; Q white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! - Q% p8 {" D& V0 L/ f# [' M
hackers:. . . . . . . . . . 3 N# |5 l8 B$ O" z( {
hackers: so late, and how not offline?
5 l! M9 M( @; m+ d5 X white: Oh, is the next, and I went to pull the power 1 L: j9 E/ h$ J" H/ P5 o5 Y
hackers: Slow! You will not shut down? - ]6 N+ W3 K6 N. a8 C0 I
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ! w; E% Y3 j8 Y( W& S6 A
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \' d# |+ q: K5 Y7 h' M6 D9 V/ Y& R
white:. . . . . . I press the power to the hackers call it " ]1 i( @9 I& {4 g9 C5 V% ~1 ^- R Q
white: You are not really powerful 1 b, O/ m3 C$ M4 f2 Q( P5 l( V0 }
hackers: so-so friends
7 g( S" B* H+ I c/ S( E white: bragging! You have the ability to shut down my machine in the horse.
3 @0 U/ e d/ X: ~" A0 F hackers: this place is difficult! You wait 6 R4 Q& z+ c( B ^2 F
hackers: Haha, buttoned regret it
9 ]2 s) E; b, X4 O' K white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
5 t$ i5 `5 u9 ?. D4 d1 U9 n" n hackers: halo ~ ~ ~ ~ |
|