埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 773|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
3 G  ~: P6 k; N& D white: how control? " D1 F# ]. h( h$ N, h0 j
hackers: white with a Trojan , G3 p! W. Y6 x2 \
:. . . . . . Where? I did not see
' i( J* c1 G+ P, t! z- ] hackers: Open your Task Manager
# M( b) Q( l. c: n6 G- [ white:. . . . . . . Task Manager, where?
2 s; H: F$ H( O hackers:. . . . . Your computer below! !
, V0 l) [( G, P) ^. k% N+ r! W white: \; & c1 W8 N9 g: N# s- p' _% ^% w
Hacker: I have control of your computer ; ^0 Q7 y9 F1 H: V, C0 x. r& k
white: Oh 7 T7 b  R) \* ^# t3 H
hackers: a funk? ! Hey
/ z* t& z% z6 _5 J. l% u white: for the just, help me kill the virus it, many of the recent problems my Lord . i% u: t# W1 M. L& ^. _6 B/ k
machine hackers:. . . . . . & ~% Y- c% G0 |- Z% e' w/ M
) G* a/ y9 Q; U  H2 K) c- E
white: how do you always in my computer and out of 9 L$ ~2 }, p& ?9 t! o  C1 _, m
casual hackers: You can install a firewall
" {- x+ ^+ ]+ E$ K* }+ K white: install a firewall, you can not access it?
% e' A8 y& f$ T6 t: e5 ^# x hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
2 _5 r( T+ @4 x9 Z  L' c % l, G8 D* y- f8 d! T9 l
small White: I heard that you will create a \! : |* Z* J' U$ W6 X$ q7 r* u! u* N
hackers: ah
3 ?- y3 W- X" E) }5 u  | white: you can control someone else's computer? !
% Q4 c+ k0 E9 H; V2 P6 h4 L4 _ hackers: General is the
4 Q- J$ _6 L6 \( Q  ^% k+ @7 }; I white: you can black out those sites? ; K9 m% ~# l# }' H  N6 s$ A
hackers: of course, did not hear people call me a \
- J+ R: Z1 A- K; g+ V1 g# Y* X  v white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
$ v7 Z" y  C% p# e3 l- c9 x \! : Q. G: ?+ @$ I( U3 H: ^
white: every day you come in, do not feel tired of it?
0 V. Z: H5 w, @ hacker: is a pain, your machine is the worst I've ever seen in one of the - U8 r3 u* I7 d- _' d: i: c& G
white: is not it, this is Brand ; x! t1 t$ j# a9 V- v% |3 q
Hackers: I was mentally retarded in addition to your yard game machine only virus a 6 r- Z+ t* }* s# [- L/ B; L3 p
white: Oh ~ ~ that you see me The \. . . . Goodbye % l& ]4 r; x. d
/ c& \4 f" {; x# J0 `, s
hacker: Hey ~ ~ ~ I come! & l6 o, Y7 K6 a9 K6 i1 x* x" H+ {+ i; v
white: not seen you for days, was my firewall blocking you? / Y: a! W2 O9 ~! W: N
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
0 U0 n; I4 ]/ x7 x8 X1 P+ C white: I want to Please help a busy
9 B* f( d( _# j hacker: What?
% |. S3 \7 Y. o, V5 Z8 S) P! ?6 s5 N white: you can not modify the point into the power system data
# `9 ~1 d" S1 y" r hackers:. . . . . . Why do you want to! ! 5 D. w9 l9 K0 E! @4 |5 B
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 0 A$ L3 ^/ U! F! S) K, W% Q6 E
hackers: die! ! % ]0 Z2 |0 M4 X8 Y! K6 G

% c0 K0 ]* f+ O hacker: you die Where is? ! ! !
) l" K! v9 d1 J  ]4 ]3 ~ white:. . . . Go out and play for a few days, ah, come to me why
2 v7 |# h4 s1 S- @  z Hacker: I'm looking for something
5 O7 H( g) w3 v+ Q white: what I find here? ( S+ c9 j$ {; L6 A8 y; R+ i$ E8 k6 }
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
6 O' D0 o+ v( [ & \2 d& f# q* q
most hackers : I come! ! & d, ^6 X  z8 t$ \5 C5 n
. . . . . . 9 Z3 f* @% s4 Y) {% @
hacker: how not to speak?
$ `1 Y# k. F7 y white: a bad mood
( m5 \2 |! U8 ]# C4 v hackers: Who bullied you?
' R: C0 G6 [* p$ v% T  E" ^: Q: \4 G white: a Q No. I have not lost inside of my first love & f7 y" O& ?+ z- C) R
Internet hackers: this simple, I get it for you 9 |3 s" e) I& p$ J$ \/ [
white: do not get back
8 w/ g( J- u/ {+ J/ n. `" s hackers: No, tell me what number? 4 i, a- x9 X. F; G5 p, T8 C! {7 g
white: Woo ~ ~ ~ ~ just do not remember . w2 X% B6 u$ p( D! @/ m

6 I5 m4 @/ J9 F2 p5 `, B white: you gave me out! ! ! ! + x6 @$ K( e1 I+ G8 T  s' E
hacker: how wrong? !
- {- |8 X2 M6 s) _7 L+ c0 G white: You are not the forum to use my ID to play it? ! !
$ d% n) U& W3 x- G3 w hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 7 \0 d" G5 |( g( `6 ?
white: it does not work! ! ! 7 R) f" f+ p3 ]5 w, o. E
hacker: how should you like? " ~+ a; T  R9 w& \$ V
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 2 c0 R) B3 P: j

% h( N& M) I7 q2 y hacker: Hey,ralph lauren pas cher, I did a lot of fun 3 y+ w5 t* m/ L2 V
white: what 6 r$ ^% y# F' W/ C
hackers: I go to the forums posted the top % a, H3 [" f0 j, N$ V
white: This very common ah
, ?' e' v4 L5 f+ D9 ?, Z Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
7 l, t8 d  O5 X  V. J6 Q0 S white: Wow, very enjoyable, and I can never dare, will be blocked! * x9 ^* N5 O9 Z2 N* o& f& w
Hackers: Yes, has been banned.
8 A* W2 x1 m% h- v white: this is also fun? ! 1 D5 n# u; M% }
Hackers: Yes, ah, because I use your ID ) Z& c2 ^4 b. [+ l2 i
white: you are pro?
) L2 c: W8 Z% i: T3 |' u0 d hackers: You can say it.
0 A+ r- i1 E. ?6 I4 ]9 Z3 q white: to what extent high? 4 A1 {, j1 W3 b: _% I
hackers: ah, I am bored when their own
6 ~* f5 A# N/ P) j4 ^- u white black: Ah, this I will! 3 |* e. d& Q5 [" [
hacker :#?%! You can? !
5 D2 l/ u/ o8 Z# s% r white: Yes, ah, a black off it. . . . .
% h5 m8 D& x, f/ y( N hackers: Go! 7 W! \/ {; s. B; _; [; g
white: Ask your question
2 R4 g0 b" L* b: O) @2 y hacker: says : @8 q1 B+ A) {2 I6 j0 _* }. \- G
white: Besides me, you can also control other people's computers do ?
+ }1 W/ q) |* Y7 n: f2 J/ @& z$ j Hackers: Yes you can. . . .
5 O! D8 `" f7 A white: no networking is also OK?
) v4 H- i( W$ j hackers:. . . . . . .
5 c4 i8 p0 b/ s6 c white: You can remote control to open someone else's machine it? ' H' y. t3 O3 E4 Q1 ~7 X" p
hackers:. . . . . . . . $ O9 ?% Z$ K. _$ i
white: You can steal top-secret file it! ! !
6 \' ]+ e2 |/ T( e" v2 D0 \+ `4 ~" d6 p hackers: I think you see more movies, go to sleep
7 C$ e/ ~. D$ t( v white wash: my computer is broken 9 u: L9 B% N+ n" }  C4 I
hackers:. . . . . . . Just checked, your computer no problem
; b" s/ H9 O# V- x0 N9 k white: that is, you bully me
( U$ k" j+ M- s4 x! s. ^4 } hackers: No ah
9 a, A  G; N4 d) w# T& U: w! P white: You are! MP3 files are passed to my no images! ) K% l  ?! Q) q$ y' @- K% r7 y
hackers: help ah ~~~~~~~
7 G0 b  a+ Q2 Q/ h white: Ask a computer problems can you answer?
5 u4 M$ H9 K4 M' v- o+ p Hackers: should be able to
/ a# T3 G/ x: S9 e& c# Q" y white: Which key on the keyboard the most handsome?
8 b3 C) c8 q$ O) K5 t hackers:. . . . . . . Do not know
+ D* C) B' C# R; D6 f white: of course, \! % @5 @# P8 i! ^( t7 s
hackers: halo ~ ~ ~ This is a computer problem? ! ! " m9 r, P! ^3 ?0 e3 t& @/ A0 d

; I. y; e3 f/ j( D; C# Z: H white: ask you a computer problems you can answer? ) ~! \8 a. M, b$ \) m! X+ G4 B
hackers: If the problem is not your idiot
8 V  i# g2 X" l0 {9 u1 B white: I am serious! ! You can operate my computer? - _5 E. Q1 c- y) P
hackers: ah,juicy couture shop, yes . d1 \* X  s8 L1 y: R
white: that problem, you can solve it
% _7 j( |  r2 t hackers: Your question is, should not be difficult ; 4 A; M) S: R; [
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
0 {8 V! r& `4 ` a hacker:. . . . I excused
( e, p% u9 {1 R' r5 q- t0 T% q white: we see meet you? 6 D# p/ y  x! A3 f" V, N
hackers:. . . . This, not so good, why should we see ' }8 G, j0 o$ a) z6 M
white: I want to see you are not the same and I would like to
0 D- ?9 V' T6 ~9 Z6 a* _% W% j, C Hacker: Oh, what you think? 7 k7 I1 y1 a" P9 ]% Q
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ( ^, l% d# I  P, i9 j2 k
hackers:. . . . You say that Spider-Man, boss! 8 c1 ^' d/ S& h  J
hackers: Kazakhstan woven ~ ~ ~
6 F! h! ~* S8 X6 s2 K white: You called every day, is not very curious about me? 4 ^# ?$ a: N, R, y2 U! b1 v
hackers: not curious, is the habit, easily came in
1 U9 v5 A& W* c! T9 Y6 y; K0 [% E' g/ y white: Well, I have a good way to change your habit % F6 ^8 b2 m& G$ T6 i! Z+ j1 V/ ^
hacker :. . . . Oh? ! Any way ; e, d4 e% M! l' C7 c3 O( \. ?" n
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ / |  Q2 C! ?. R$ \! ?2 C+ B
hackers: Genius ah! . . . . . You can also connect to it?
8 ?3 g5 |+ N! a2 [8 d white: to ah, and slowly the hymns!
% U6 i- m4 \' N6 v* m; N+ r( X7 C white: you every day into my computer, is not very curious about me?
" `" ~0 Z, `- R- y( x. U" h  l hackers: No wonder, only used + ^/ z! ~5 R2 _1 R5 h9 ]
white: no you're curious about the place?
% V# r+ q2 f6 _1 K hackers: a ah, I always wanted to know your machine so much as when the virus crashes
# g1 y$ v4 O7 }! u  U9 h
! V* Y$ l4 u$ Z4 j0 K7 [ white: I would like to control your computer
2 ?& W, [7 o! G- M0 }$ T Hackers: I will not have other people access my computer I will be mad 6 m, o! Q/ J& V1 g4 G1 A: R
white: This is not fair! ! 5 B8 [, g4 G) E
hackers: ah, well, you control the good of the 8 N* P* e+ e4 S/ y! p
white:. . . . But I will not. . . .
1 R! I$ t: }" }" l6 T2 x hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
9 {" Q% z: E" I' }+ M9 D% i. D9 r Hacker: I'm white . a/ Y0 u9 h4 E( |0 {* P7 O: ~
us again: This is probably the last time we met the 5 }3 U) f% f" U, k. Z  [
Hacker: Oh? What happened?
" f/ t8 w8 p( f7 I white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
; L4 J1 G& t( a; s- j  n1 K1 a( O hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 0 k( I" B# m/ \4 w
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
) j5 Z5 F: ~5 x- E5 i8 Y hackers:. . . . . . . . . . ' }$ `. n7 h2 s5 O; `6 h
hackers: so late, and how not offline? , x/ k% q* }( e2 ~: F; |" D
white: Oh, is the next, and I went to pull the power
% `  _0 X9 G; k: H: O' E8 |, Z' M hackers: Slow! You will not shut down?
7 J: p+ M+ |9 B3 p white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power * i% k) I: E7 W# ?7 |. G
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \6 |( M( K* i" R
white:. . . . . . I press the power to the hackers call it 9 @! r' t$ z( B5 p4 n
white: You are not really powerful & y# ?* [1 I# r& |) u
hackers: so-so friends * y- K/ W! G1 X( T* K6 d7 x  g) L7 x7 g' t
white: bragging! You have the ability to shut down my machine in the horse.
  o+ {2 }! M. b0 l, M& N, j hackers: this place is difficult! You wait : I* W2 X1 H' ]+ q1 k7 L
hackers: Haha, buttoned regret it " S$ [5 `9 K. B. e8 t; d$ y) \
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
3 x3 p: ]3 ~( f# V2 Q: b( F hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-3-31 08:09 , Processed in 0.107580 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表