 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
" k# X) N& a0 p! }( K. T" L8 X P6 ` white: how control?
0 q9 v) H; q3 V$ |8 V0 q. | hackers: white with a Trojan
, b% t% r# ~+ y" |* n:. . . . . . Where? I did not see 6 X2 r# `+ {& K) q+ y, k7 F0 h
hackers: Open your Task Manager
9 q5 V7 J' y' |/ I" ` white:. . . . . . . Task Manager, where?
9 D( Q. o1 ~, X1 u, { o hackers:. . . . . Your computer below! ! 1 D5 X) s' H% u5 s$ \, D
white: \;
' a" y+ }5 Z! \3 a6 z1 k d Hacker: I have control of your computer
5 ~7 \- b& d* O: \9 c+ Z( z white: Oh
& Z$ l$ h/ q y, H3 H/ S- F& ^& g hackers: a funk? ! Hey
4 B9 C* u* W5 S- j( ~+ ]1 ]0 ~, E1 u white: for the just, help me kill the virus it, many of the recent problems my Lord & M- Y8 S ?2 ?0 r
machine hackers:. . . . . . $ R! H0 _( j8 a0 e4 _/ _
" t3 u* F$ W7 m0 @( V3 g: z7 ]0 T
white: how do you always in my computer and out of ( w9 z" Z; y) U2 f
casual hackers: You can install a firewall
/ S7 {# V/ ?' h, ~ O4 t( M white: install a firewall, you can not access it?
, X; f* M n. f/ ? hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
7 ]; `% r6 L6 i1 O* ^8 n5 D+ {' [
7 w: a3 C2 ~* L( N0 U small White: I heard that you will create a \! ' F& l* } P, }" \7 ^2 Z( S% s
hackers: ah ! \8 F% y! Q& I5 W3 P* A; X
white: you can control someone else's computer? ! % N5 l6 N6 C9 ^* e- l+ m
hackers: General is the 3 \: O$ `; {5 Q8 Y1 m
white: you can black out those sites?
$ Q2 U/ H, ^. p2 m- Y6 P% x hackers: of course, did not hear people call me a \: B/ X, {' y; P
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 Y& }( ?) ~' }8 L \! ( o) D: K" Z' s. P( Z
white: every day you come in, do not feel tired of it? + V, y4 d0 v1 g% V5 B
hacker: is a pain, your machine is the worst I've ever seen in one of the
D9 e$ v/ }+ [ white: is not it, this is Brand ' }$ c$ r3 Z) [: n, l2 y! f% A
Hackers: I was mentally retarded in addition to your yard game machine only virus a
' e5 f3 K6 h# {7 f white: Oh ~ ~ that you see me The \. . . . Goodbye
+ I& j+ Q1 N7 ? $ t& m+ a2 O- |0 c3 }# ]
hacker: Hey ~ ~ ~ I come!
% W' I/ r+ _+ t8 @* E$ E" z1 r white: not seen you for days, was my firewall blocking you?
$ z D# O/ e7 W% T: x, m& s hackers: Haha, jokes, on your machine is easier than my own, not you miss me
) K+ Z0 `" l! @ }: Q0 f8 f' t white: I want to Please help a busy ' b; i y8 N: v
hacker: What? 1 z5 u( K* q! }( w% I' ^+ R; U
white: you can not modify the point into the power system data
' @; q8 S6 ]; L) D1 E. a1 z hackers:. . . . . . Why do you want to! ! , ?5 K. L/ r/ w4 U0 o( i
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
& v2 I; g6 x' [ hackers: die! !
# A% H9 `' s% u# D 4 a1 \6 C% c0 n( p" z6 X
hacker: you die Where is? ! ! ! + j$ E7 s1 Z' R% r
white:. . . . Go out and play for a few days, ah, come to me why : x' ^' K% G& p! H9 Q, Q
Hacker: I'm looking for something 9 C: N! Y j' m& p
white: what I find here?
, m5 L2 V" K3 J3 b$ `" J, _ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
6 m) r% Z! {% A7 V5 O7 K! s 7 [; L9 k3 c+ R& `. z
most hackers : I come! !
0 g& ]1 f! x9 @% @" g5 E$ u2 N4 ]. . . . . .
2 _! z% d& s- H hacker: how not to speak? ; z' S% l3 a3 y0 Q1 t
white: a bad mood , E% y/ J( S% f( }% X, W" J0 Y3 Q- C
hackers: Who bullied you?
* m. W( v; W6 h. w8 c) a white: a Q No. I have not lost inside of my first love
" g" l/ r0 B/ [# f* @# g; X Internet hackers: this simple, I get it for you ( P. b9 A1 _3 v9 D2 p/ Y* J6 s
white: do not get back
( j" S. T" z, N+ F5 I. T hackers: No, tell me what number? 5 z" `8 K7 t& P: e
white: Woo ~ ~ ~ ~ just do not remember 5 y# G S4 b1 S a) v8 E
& m& }2 w8 z6 W4 v
white: you gave me out! ! ! ! - a, v" C/ N! g( c: b, E F) t
hacker: how wrong? !
5 [& g4 Q2 j! w/ y$ }, D- s white: You are not the forum to use my ID to play it? ! ! + z/ l8 [& n5 d# J: j1 F& ^6 Y/ K& ]
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
r! [, V) r) Z- B$ w; N& ? white: it does not work! ! ! 1 n- }- F+ X6 e4 @8 w0 O, G3 {
hacker: how should you like?
2 c* x- Z5 y" ~2 s* g8 F3 m white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
7 R- V7 A2 U) p" S4 l& Q 5 I! V4 ]0 Q& T8 {8 B& w
hacker: Hey,ralph lauren pas cher, I did a lot of fun
3 y+ v9 B. k: G- l: M4 J& [5 r white: what 1 h* I3 \4 Q5 m5 S9 t: ?; k8 p' V
hackers: I go to the forums posted the top
% E1 f8 Z& M2 S* M+ I7 p+ \* ~ white: This very common ah 6 D! n) j( C9 A( |# J& g
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent - e: c% w# c5 q2 K8 M
white: Wow, very enjoyable, and I can never dare, will be blocked!
: Q. ^$ v) @8 x9 J+ g Hackers: Yes, has been banned.
9 b4 z+ B2 E6 B0 @3 u0 g% l' ^ white: this is also fun? ! 3 W2 B1 f e8 L1 W
Hackers: Yes, ah, because I use your ID # \4 `8 j d) m3 j
white: you are pro? 6 U9 P( k* V) X8 `' P3 T' v
hackers: You can say it.
/ R; p5 G+ g! \, j/ Y$ M2 r white: to what extent high?
* E; S3 I h- t hackers: ah, I am bored when their own T% {( [; Q, Y9 B; I
white black: Ah, this I will!
9 ` c. o6 x7 E, S; `8 M hacker :#?%! You can? ! $ Z6 z# ^- g: }; O `0 t
white: Yes, ah, a black off it. . . . . 3 |) I% n) ^2 \+ v% d
hackers: Go!
4 J4 ]4 U. @1 C ~1 q white: Ask your question - j; a8 n9 ^' c6 D
hacker: says
3 t3 w8 J3 }" G* O white: Besides me, you can also control other people's computers do ?
. z$ c; G4 [( v: x Hackers: Yes you can. . . .
5 z8 A3 @+ T% f# I- ?$ j white: no networking is also OK?
$ R% [! t. V: x( {6 z hackers:. . . . . . .
# x" R4 b! x: d$ b5 a! V white: You can remote control to open someone else's machine it?
$ Y" ], U0 X& c hackers:. . . . . . . . # T2 f. x( w: i% }
white: You can steal top-secret file it! ! ! 4 q8 L( B- c* Z* B- a
hackers: I think you see more movies, go to sleep
% K" U; A7 C) K white wash: my computer is broken - o; u8 a+ Y2 }% Z7 T8 N% d5 y/ _2 p6 g
hackers:. . . . . . . Just checked, your computer no problem 0 n) F/ j- I% }$ B1 ?0 @0 t
white: that is, you bully me * d' o( r" |4 M7 ?5 S4 |
hackers: No ah
/ Z+ B1 y- O4 A$ O1 D2 C white: You are! MP3 files are passed to my no images!
7 c; p9 p& f8 L' C- R8 Y/ X" ` hackers: help ah ~~~~~~~ ) R% E5 N; _! `1 c
white: Ask a computer problems can you answer?
6 t q; _6 v2 l" `2 K Hackers: should be able to
* z" }' C) H D. ~ white: Which key on the keyboard the most handsome? * f$ j, V1 A- Z7 I( P, H4 E
hackers:. . . . . . . Do not know
1 b# p5 n7 J; l% O: X5 A8 m white: of course, \! . x* i0 b1 L% b2 \* z
hackers: halo ~ ~ ~ This is a computer problem? ! !
) q5 C5 P' r1 A. q9 M6 p 3 I6 o8 W) r" R! P* Q* w
white: ask you a computer problems you can answer? 5 S3 b/ r6 w+ b; K. ]5 z
hackers: If the problem is not your idiot
, e. A3 N% A% @3 ?. X( G" p- h white: I am serious! ! You can operate my computer? . E+ H( K1 ~8 M7 z$ p# L
hackers: ah,juicy couture shop, yes 9 ~+ s, F# U; }+ `9 T Y
white: that problem, you can solve it
" f1 U) w: Q f" P hackers: Your question is, should not be difficult ; % C" u4 A6 t4 \, C' C% p; J
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 1 u: E0 X6 {* G! l
a hacker:. . . . I excused ) X1 }0 C* V6 A6 h5 e" M1 K. q: H+ ?5 j, _
white: we see meet you? # V' ^0 Y# u) l0 T. O9 }" ^8 m
hackers:. . . . This, not so good, why should we see 9 T4 ^6 W2 O3 Z( |) g
white: I want to see you are not the same and I would like to
* J. A. [4 v/ M Hacker: Oh, what you think?
& a& ]. `6 }" ? white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights * H7 b0 d3 a ?6 y: E
hackers:. . . . You say that Spider-Man, boss! + \ M7 E# R1 J) X8 l# A7 s9 d
hackers: Kazakhstan woven ~ ~ ~ 2 n% r% _8 h Y8 e- n
white: You called every day, is not very curious about me?
& @# Q. E8 w) t' j+ r# V hackers: not curious, is the habit, easily came in 5 h( Y1 k7 Y5 m/ o1 o. ^+ G. ]' U
white: Well, I have a good way to change your habit 5 L2 r0 O4 _+ j4 {$ P9 S7 C
hacker :. . . . Oh? ! Any way
! v, k( w6 I F white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ % `$ y2 H0 \' f& {, h
hackers: Genius ah! . . . . . You can also connect to it?
- k3 @" A3 @" X2 ]. i: [ white: to ah, and slowly the hymns!
& m9 [0 A0 |* S8 _ white: you every day into my computer, is not very curious about me?
1 V5 A5 v7 {. D, m' f/ W1 X9 G2 n hackers: No wonder, only used & Q# U0 ?( F7 V9 ?) ]& M0 m
white: no you're curious about the place? : N; s! z, K# z
hackers: a ah, I always wanted to know your machine so much as when the virus crashes . o2 ] n) h/ R8 d8 }, i+ _; h
5 y+ P2 ?* i% e# e) \- K& N1 Q8 I0 I white: I would like to control your computer + {! ]4 l+ O _6 C
Hackers: I will not have other people access my computer I will be mad
3 Z9 W3 ~3 x- B white: This is not fair! ! 3 y0 I8 O2 _$ i( M1 q
hackers: ah, well, you control the good of the 9 f" b0 n: j ]% K [9 ]4 b& C2 ?( e
white:. . . . But I will not. . . . ! D5 p. q5 p8 @. B* [6 f' T$ N
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 1 `2 G5 b7 ]% S
Hacker: I'm white # o& i9 E/ i1 [- N6 x" @% P# N
us again: This is probably the last time we met the 6 r/ P/ T7 @& Z: F& Y7 ~7 }
Hacker: Oh? What happened? " E3 M/ E* f/ I5 h6 }# }. Q
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
% \1 s; q3 @4 q hackers: You are so tired of me. . . . . Well, since I do not come, goodbye " |' m5 f/ j; {5 P% P* w
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! * N" K& [7 C" i8 r4 e b
hackers:. . . . . . . . . . # K6 {! K1 i# Y: u6 Y" k. v
hackers: so late, and how not offline?
5 n# R' S8 N2 C7 h5 S1 E$ y, l3 H white: Oh, is the next, and I went to pull the power 2 H6 |( ]# A3 L# i1 m6 ], M
hackers: Slow! You will not shut down? " F! e( T" H( H
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
! C P& G. e9 V+ q: x: e9 d hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \* P% v2 s" c2 O5 _ U9 n$ }
white:. . . . . . I press the power to the hackers call it 3 C# j) I( X4 J% ?1 \
white: You are not really powerful
8 \7 @' R% K/ f hackers: so-so friends
& \! N- y/ _0 @; L white: bragging! You have the ability to shut down my machine in the horse. # n9 ` x% P3 K- @( F
hackers: this place is difficult! You wait
8 q6 n# r- C8 A2 A hackers: Haha, buttoned regret it
' V6 G7 [! A' d9 c- k3 Q& d white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ! X' b: ^3 T4 {7 u4 p9 ?
hackers: halo ~ ~ ~ ~ |
|