 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
' y3 b: K; y# U4 l* @" D7 c$ c white: how control? 7 y4 e% i9 y* y( x
hackers: white with a Trojan 4 z8 w% D1 t0 T" y
:. . . . . . Where? I did not see
) l7 C- s6 S) q t3 A, J; w; _ hackers: Open your Task Manager
9 ~: S, A2 V3 ~, { white:. . . . . . . Task Manager, where? 6 I. S" _& J! T: ^4 R s
hackers:. . . . . Your computer below! ! 3 G3 ]4 M# l* \# J; m6 d/ X" R
white: \; ' q) M: e2 u% O
Hacker: I have control of your computer 4 ]( B+ e, l/ v' t; x. a# s7 ?
white: Oh
* U9 q6 V$ [7 h; e hackers: a funk? ! Hey
- }$ ?2 Y/ s. w; g& m8 h( X white: for the just, help me kill the virus it, many of the recent problems my Lord & J3 j: {( I- g$ ^
machine hackers:. . . . . .
+ ~+ g, m0 I$ B) _# Y
( z5 M2 B& Q6 n% V% i j white: how do you always in my computer and out of : d" Q. u% n/ A- C
casual hackers: You can install a firewall 1 n$ m. m$ | `% E$ e1 ]) l' r
white: install a firewall, you can not access it?
7 W# Y/ f' C* D( `% n z% C hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
8 [' M$ Y b2 G! C/ z 9 f* |& ?/ }9 \6 L
small White: I heard that you will create a \!
% b$ f2 T& W' p0 X7 C$ c hackers: ah
" ~$ f- l/ \6 L% _ white: you can control someone else's computer? ! ( e+ l3 R# R6 }$ c
hackers: General is the / x9 K3 \: X9 K. q8 @
white: you can black out those sites? 3 W2 f0 v2 S! m1 R0 y9 ?
hackers: of course, did not hear people call me a \ W! _$ Q# P" ^& E. _
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
2 @7 l+ x+ b* | [' E \!
# R1 d% u& ]/ T; r7 X white: every day you come in, do not feel tired of it?
( U( o- j8 J. E' L b' S$ H hacker: is a pain, your machine is the worst I've ever seen in one of the : q2 e" f( b: v( F! Y+ l( w
white: is not it, this is Brand 2 C3 ?+ P# W/ b% `- E% x
Hackers: I was mentally retarded in addition to your yard game machine only virus a
! j: G) R9 O3 v1 d( I white: Oh ~ ~ that you see me The \. . . . Goodbye $ m. M% |6 Y. `7 V& c- T8 r! |
* c j& s+ p* ~. p; k4 R hacker: Hey ~ ~ ~ I come!
2 o9 g3 W) S$ G white: not seen you for days, was my firewall blocking you?
& N9 y# N1 O5 t( d! a. a) R# G hackers: Haha, jokes, on your machine is easier than my own, not you miss me & q" L* L3 o( n0 t. i; G
white: I want to Please help a busy , m: G- S D4 T+ R$ x: T( T9 O
hacker: What?
% N: ]7 d6 h6 M( ?+ ` white: you can not modify the point into the power system data
+ K U0 I n- C) v3 R! f hackers:. . . . . . Why do you want to! ! 3 t# y2 V* ]# U' }3 l& `
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . L0 z# P( k! h2 _0 ?5 D
hackers: die! !
. I" z$ L/ H/ h4 g
# A. j# w4 s0 V, }# c; W: V8 L hacker: you die Where is? ! ! !
- ^& f/ l( Q* A& ?7 j" x white:. . . . Go out and play for a few days, ah, come to me why 0 O$ M5 m& T; M1 `
Hacker: I'm looking for something
+ F8 L8 g' Y( [, ^ white: what I find here?
* D1 @& G+ b% D* \4 S$ w5 N hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
9 u* @, V& |0 x. l$ H$ h7 b( K $ n. G' V+ X+ |# c/ D( ?" j' Z
most hackers : I come! ! - h. k! w: c) M
. . . . . .
. V% t8 D9 i6 U$ E$ u hacker: how not to speak?
0 [9 z( N& v2 ^. B+ v white: a bad mood
& |6 V8 K4 \) d, |7 ^* x$ k6 Q( K% L6 X hackers: Who bullied you? 0 a3 I0 G' R$ }
white: a Q No. I have not lost inside of my first love 3 Z2 j/ e9 c6 D; i1 ?. c
Internet hackers: this simple, I get it for you
- U+ T9 r" L+ k$ k6 q2 y. B white: do not get back # d* I! |5 I: k% k: F) C& [
hackers: No, tell me what number? . g8 M4 U# I% S1 P7 P' D( W
white: Woo ~ ~ ~ ~ just do not remember
6 S# p/ r7 ~# k. s# t7 i5 S; N6 V
K, b6 T2 {4 P5 H; f/ m; A white: you gave me out! ! ! ! 8 f5 W; Z$ ]" z! f# L2 r
hacker: how wrong? ! 7 C+ V% e" v- i0 U1 `( a
white: You are not the forum to use my ID to play it? ! !
Y# Z1 F8 B7 \# b+ O hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
. F" z3 X+ t5 n6 x( f4 M, j; s5 y white: it does not work! ! ! / S, I0 O M, J7 _, ]9 m
hacker: how should you like?
; N5 u/ q, n5 b! d. B white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
" }! n. }. u% Y2 H+ ~! V % `3 B. v, r7 y7 l% i
hacker: Hey,ralph lauren pas cher, I did a lot of fun 7 r- x% P6 J( f7 p5 q! ]
white: what 2 S* V; [; d% J1 m3 B
hackers: I go to the forums posted the top + X9 ^8 ?0 J' k9 X$ K$ }2 p7 O
white: This very common ah 7 ~# q, ^# p/ ~( g4 q
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 6 h/ }0 T$ x- p. z
white: Wow, very enjoyable, and I can never dare, will be blocked! 2 ?( c5 N- q9 {# w% F2 r# W
Hackers: Yes, has been banned. " D* z( x S; i- w V! h& j4 c
white: this is also fun? ! 8 D- _* S2 {0 e6 A( a P, t
Hackers: Yes, ah, because I use your ID 5 V0 V( j: M2 D h
white: you are pro?
; h3 x3 @- X. _3 ~% L4 ` hackers: You can say it.
; ^( c" w/ U4 _* z h white: to what extent high?
2 o! f% M* ~- H9 d+ i hackers: ah, I am bored when their own
) W4 L+ G5 N( J0 ~2 H. w" i) u/ e white black: Ah, this I will! # z4 o7 X3 X& P% s# S. ]+ s' A
hacker :#?%! You can? !
; I) _$ K. g) u4 Y white: Yes, ah, a black off it. . . . . ) p, ?$ ~% U0 }" Q* {
hackers: Go! * z$ J* A$ Z6 `0 f! R3 k0 s
white: Ask your question ( H9 a9 x) L2 }& x4 ~) R, S; N5 @
hacker: says 8 w: @& T4 r: B" ]5 Q4 r
white: Besides me, you can also control other people's computers do ?
* }# I" ]* ^8 E/ K( {$ A8 [, j Hackers: Yes you can. . . .
+ N8 `, D* n+ Y& o8 ? u white: no networking is also OK? , H6 c" C/ j% }4 `3 R$ e
hackers:. . . . . . .
7 f4 U9 E6 @5 S8 ^& x" D! u6 g2 b% ? white: You can remote control to open someone else's machine it? 5 q1 _) o& V0 `
hackers:. . . . . . . .
9 B% F% o* h; P7 m white: You can steal top-secret file it! ! !
" f! x5 a# T$ F hackers: I think you see more movies, go to sleep
$ o# Y* A: L' X7 p8 o" y; [5 { white wash: my computer is broken " c) i. J7 @; B" V5 x3 r
hackers:. . . . . . . Just checked, your computer no problem 1 M, }) Y7 X# t( U% A, i: c. d
white: that is, you bully me - z$ U# z' O1 h& _& c- i
hackers: No ah
( h/ c/ R1 Z4 R0 y# _+ ` white: You are! MP3 files are passed to my no images! ! F, Q! o6 Y5 O8 D& w2 J8 L$ j
hackers: help ah ~~~~~~~ 7 C& p. X3 y' K' h6 p5 W( R, `
white: Ask a computer problems can you answer?
8 l) t Q- h. F9 c% k' H4 J9 k5 T Hackers: should be able to 6 ]/ p2 W3 x7 N: B9 L" V
white: Which key on the keyboard the most handsome? , N( Q1 o% J( D/ h% J5 x
hackers:. . . . . . . Do not know , N5 j6 s/ t5 d. N
white: of course, \!
8 c6 I$ {, u3 \3 W9 k2 E2 @/ {5 o# e hackers: halo ~ ~ ~ This is a computer problem? ! ! : V- e. ~8 I* I0 w: n
- G; v3 G3 h( h white: ask you a computer problems you can answer? O$ Y! ?+ t2 T" f9 Y3 ]# }$ C0 a
hackers: If the problem is not your idiot
$ ? k( W4 m' x* t; L" z7 a; R white: I am serious! ! You can operate my computer? 0 I2 G0 W5 H; i2 @
hackers: ah,juicy couture shop, yes 8 s1 U7 O% M" k6 e% h
white: that problem, you can solve it
2 V+ B; B) B5 s0 i% x' J+ S8 a hackers: Your question is, should not be difficult ;
' L, l, z4 \: F. }4 E$ L" j white: Great, my fans do not seem to turn up,nike air jordan, help me change it / ^# a: t& ^. Y1 ?4 i9 O
a hacker:. . . . I excused 8 z* {8 ^8 L( { w/ P, }3 W$ J5 i
white: we see meet you? ) T x# ~% `; i
hackers:. . . . This, not so good, why should we see
" N& ] a5 x1 Y u* A3 l! R white: I want to see you are not the same and I would like to
* i9 `8 D6 ^3 ^1 o; t$ q$ U8 n, _$ P Hacker: Oh, what you think?
6 c8 c! q: T) K' D4 V/ C0 ~ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
$ q8 B9 C! ~7 {* e p# m hackers:. . . . You say that Spider-Man, boss!
) V/ E2 L% k2 P0 {8 b, O' b hackers: Kazakhstan woven ~ ~ ~ + n* S5 b' p/ V4 T
white: You called every day, is not very curious about me?
8 A6 K5 a5 h* B6 w* ^5 ~( C hackers: not curious, is the habit, easily came in # w. g3 @1 q& g& O, l; A; w6 R: l1 G; {
white: Well, I have a good way to change your habit
2 W3 o+ [, z9 A3 g! m8 G hacker :. . . . Oh? ! Any way
1 D9 F/ x; g* ^2 N }" p. J white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
5 }& T+ U( q8 H8 i, g3 r* {/ M" Z1 O% K hackers: Genius ah! . . . . . You can also connect to it? # T! P+ g& C, f2 o, X; a6 y; M
white: to ah, and slowly the hymns! 5 ?1 b- _6 g7 s: i, h
white: you every day into my computer, is not very curious about me? % u. Y5 n5 I0 \- ]2 S ]4 E X
hackers: No wonder, only used H$ t" d- k+ h$ L/ p6 E" c
white: no you're curious about the place? ' m: @, o/ X. {' y% i
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
. @0 i1 f6 P R" o- M* }
# G* `; m, ]/ ^) W6 l: l/ a- G white: I would like to control your computer
( G2 F. q' X; ] Hackers: I will not have other people access my computer I will be mad
6 d# P3 z) i9 P6 c3 a; Q# h. L white: This is not fair! !
4 |7 U" l2 ]5 w* Z, c' @# p6 j) o0 ` hackers: ah, well, you control the good of the , f# s% U6 v. b: Z
white:. . . . But I will not. . . .
2 m! J$ i! R# P W hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
- Y. }4 c7 B, K1 F+ w6 ] Hacker: I'm white
+ Z/ t" H/ L( r+ |0 [ us again: This is probably the last time we met the y' K& e2 l3 Q" V8 Q& V
Hacker: Oh? What happened? 1 z. h. D* C% V! L' r( D
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! # B/ p, p) u/ N+ ^
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye . T7 U6 Y5 \" Q: M
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! # O+ R( @' b5 F( Z4 I# V a: J
hackers:. . . . . . . . . .
* m. N) S1 @* ?8 r hackers: so late, and how not offline?
" d6 v; g9 K( Y8 x white: Oh, is the next, and I went to pull the power
$ r, G, X1 O9 N) c: j) w hackers: Slow! You will not shut down?
. [0 F2 Y0 E8 p white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power " n, c$ `+ U Z* v
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
/ h6 {' l/ `8 Y L, n' w: x, {/ V white:. . . . . . I press the power to the hackers call it " q7 ~9 O2 f& D s: e8 o
white: You are not really powerful
" | R. b( B2 A6 ]2 {3 ?$ M hackers: so-so friends
, _' R2 N- A( {0 Q* i6 }' K white: bragging! You have the ability to shut down my machine in the horse. * J$ c# e3 ?; A! d0 m9 ~
hackers: this place is difficult! You wait - r6 D B, G4 G4 \
hackers: Haha, buttoned regret it
" I* d/ V9 |4 q. o' [ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
: |8 p9 m3 j h& I$ E+ B8 I hackers: halo ~ ~ ~ ~ |
|