埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 638|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer 4 W' a0 T2 z! B# Q
white: how control? 7 [! f8 }5 c' o* |0 J0 O: ^( y5 {
hackers: white with a Trojan
, h6 ?5 B" L7 o& e' b/ j  k* Y:. . . . . . Where? I did not see
$ b1 f* n. r9 |* z+ x hackers: Open your Task Manager * J3 q; F+ A# Q$ s
white:. . . . . . . Task Manager, where?
( V3 f1 G" J* M- C- v7 k; k hackers:. . . . . Your computer below! !
: k6 D! I4 N5 C( w9 s/ [0 {# C% R white: \;
" H# h" @! P5 v) x Hacker: I have control of your computer
0 h$ K  [$ @) F: ?6 c7 |7 d white: Oh
3 C7 H( S8 o8 ]7 k8 h hackers: a funk? ! Hey % t  f7 B) S7 i! q1 L* Q" ~8 m7 g
white: for the just, help me kill the virus it, many of the recent problems my Lord
: o5 J+ t6 L0 a1 |+ j machine hackers:. . . . . . 3 R; j( q7 S: _/ O. U/ c4 K

7 K( u, C/ S1 o+ J" H8 R white: how do you always in my computer and out of
' m) e; n. W7 f  J8 k% g: \3 X% h casual hackers: You can install a firewall ' T; l, W5 C0 f, v' s  t
white: install a firewall, you can not access it? 6 P/ ~; W) V8 H4 g! K2 c
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ) f  D- e1 |9 s

1 ~3 g" ]% I# l& E small White: I heard that you will create a \!
  P  \# [6 Z( F, q9 r1 q  _, v1 P hackers: ah 1 _9 E& F" _+ \6 r
white: you can control someone else's computer? !
9 ~6 Z# X3 z# H$ l. n hackers: General is the
  S6 M$ l' o  w& I5 @ white: you can black out those sites?
/ C1 p9 {7 u: d! v" ^! K hackers: of course, did not hear people call me a \
+ A  U; r$ j2 y# ^8 Q- `" p white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
* `0 Z' w7 |/ _( {9 }/ G \!
$ s3 d  _2 U% X. Y$ E white: every day you come in, do not feel tired of it? 2 _! |; |* k6 O1 w* o. n9 e
hacker: is a pain, your machine is the worst I've ever seen in one of the 3 n2 F- o6 _  u8 A9 I! @4 E
white: is not it, this is Brand
3 Y2 v9 i" }# r1 N8 z Hackers: I was mentally retarded in addition to your yard game machine only virus a
2 _$ x! x* z7 b$ r. r2 n8 c white: Oh ~ ~ that you see me The \. . . . Goodbye 4 \& U. Z+ C" V& |" N
7 T  N' H6 @7 ]& \
hacker: Hey ~ ~ ~ I come! ; _; h" O. X5 x: P8 J5 u- K
white: not seen you for days, was my firewall blocking you?
$ _9 q% M9 r5 S hackers: Haha, jokes, on your machine is easier than my own, not you miss me
2 g9 l& O3 i  ~6 s2 P3 F: H! W& M white: I want to Please help a busy
9 M: t2 N; Q1 H! c hacker: What?
( H+ `2 Q0 s5 X# a, t% V white: you can not modify the point into the power system data
; j: ^" v6 `" k) E# m hackers:. . . . . . Why do you want to! ! " {9 o: T" a2 _7 ~3 h" i
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
& \3 _& a0 L6 ]: K- B, H hackers: die! !
- W9 a/ X# g) _8 N# ^' K; t
/ k* T) p% R) ^4 `" F8 S% m hacker: you die Where is? ! ! ! 5 {: J( f1 x; C" c
white:. . . . Go out and play for a few days, ah, come to me why ' I3 F& j" g) [, }0 _% N
Hacker: I'm looking for something
* c( B. l) O3 K$ E0 N  v3 h white: what I find here?
! ^, d: ?# T, _ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
2 X& D0 G+ X( \- ~9 M3 r* S/ x ; a" V  C) {! Z* _! O" Q
most hackers : I come! !
. s6 Y5 Z3 h) E$ T0 }, [; R. . . . . . 3 W  E, [7 U0 }8 A1 D: ~
hacker: how not to speak?
3 c' q0 ]6 @' b- a& W8 r6 w- k& v white: a bad mood
: p9 _  N3 h" {7 o9 Z, y hackers: Who bullied you? / M2 l$ [2 R( d% i+ Z
white: a Q No. I have not lost inside of my first love
8 ^6 C/ ~/ u# V Internet hackers: this simple, I get it for you
8 D; D: E( k# u9 c) h white: do not get back - t: w6 x) [* ?1 D( m1 |; n
hackers: No, tell me what number? / Z' t/ j* R4 Y( i/ I5 o3 p: T
white: Woo ~ ~ ~ ~ just do not remember 3 E* D* n( t" W1 X* Y2 y
# U5 W. Q+ }) I5 c6 A- w) N& D
white: you gave me out! ! ! !
0 P: k/ ~$ A4 T hacker: how wrong? ! 1 O  c  b4 V3 c
white: You are not the forum to use my ID to play it? ! ! # |, ?; J; X4 B9 X# |
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 0 f: O. M; S4 }) g/ M' D  ]
white: it does not work! ! !
# Q" x' w" {, B3 ~& ?; T6 t9 H hacker: how should you like?
* `5 k! }: N- ?5 V. c5 g; b% ?$ N white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
' d1 i/ Z3 z* W+ t* |: @# ~: ]
( U( T- o' Q7 C% N hacker: Hey,ralph lauren pas cher, I did a lot of fun $ k+ K  z9 d# Y$ _
white: what : N' p5 W% o* R/ G2 V0 g
hackers: I go to the forums posted the top
" _' ?+ p# b( @2 S; K5 Z( M8 g white: This very common ah . z" S: P9 C, h( D6 n
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent ; i6 @' j; R; f, t: p0 n1 P
white: Wow, very enjoyable, and I can never dare, will be blocked!
2 o0 ^$ X/ k) v) T* @9 E Hackers: Yes, has been banned.
! K) |* C3 H. ?0 ~3 t, R white: this is also fun? !
4 ?% V" i3 O* A3 E Hackers: Yes, ah, because I use your ID
% T1 Y+ R9 m3 l3 ?7 j white: you are pro? ' w$ u7 `! @' s' u! W
hackers: You can say it. & Z* h( _3 T2 u3 `  x4 c
white: to what extent high?
/ L' v) U1 G7 b0 p+ l# U hackers: ah, I am bored when their own 5 T/ Z) _, x( q7 J- z
white black: Ah, this I will!
3 |' a8 u* z/ B" {- y hacker :#?%! You can? ! ! U$ t5 s$ L: B
white: Yes, ah, a black off it. . . . .
7 `1 [2 d: |$ j/ ^& O' I1 X hackers: Go!
/ P" d5 u; S) P7 A: E$ G white: Ask your question 9 Y: \3 m5 j; G
hacker: says " o5 H8 C( t1 [  v8 J9 S. J3 h
white: Besides me, you can also control other people's computers do ? - \% c; k: h: N
Hackers: Yes you can. . . .
& ~9 t  m5 J1 [) u white: no networking is also OK? & I7 }, r3 i) R: u& P& Y9 j- G1 N
hackers:. . . . . . . 9 ^+ I) G" L% D" G- k) |
white: You can remote control to open someone else's machine it? 1 Z8 q& J: n% M" \4 i. e( L
hackers:. . . . . . . .
# L* Z9 C5 X, I+ }+ a  j6 y white: You can steal top-secret file it! ! ! $ l% d9 q" z1 L2 a' Z/ _& ^
hackers: I think you see more movies, go to sleep
$ |4 z6 ]+ ^  h" R2 w3 s white wash: my computer is broken 9 X4 [3 r: l4 ^) S. y
hackers:. . . . . . . Just checked, your computer no problem $ S+ [) P! ?$ E
white: that is, you bully me 0 m9 z  B  Z2 r4 j" w
hackers: No ah ' \! v( C. a; O9 j* ]. P
white: You are! MP3 files are passed to my no images!
& |3 c$ X* u7 _' z hackers: help ah ~~~~~~~ & J& T% u1 [8 y8 b. K7 U+ m6 b
white: Ask a computer problems can you answer?
5 H- O* e- _7 x1 t Hackers: should be able to % Z% A8 n7 c7 Q+ s, N! o8 c
white: Which key on the keyboard the most handsome?
6 x3 K% j% |5 V, Z" O hackers:. . . . . . . Do not know / b7 T! Y" ^* j4 }! v
white: of course, \! 9 R: T0 b' I8 g- A# d2 X
hackers: halo ~ ~ ~ This is a computer problem? ! ! + h& p: X" u, W; C1 m" e& a9 a! C

2 ~. Z$ C8 v( a! R" d- u white: ask you a computer problems you can answer?   @9 t( n2 C2 P* c9 j
hackers: If the problem is not your idiot
$ X" R; A* g5 @ white: I am serious! ! You can operate my computer?
4 u3 V; O* n5 ~3 B: T3 L& Q5 D( r hackers: ah,juicy couture shop, yes . w4 i7 a4 z: L6 H% G
white: that problem, you can solve it
' Y" e5 h" q, N0 B  `; k1 L hackers: Your question is, should not be difficult ; 4 h8 T* \4 q9 j& s- x- g4 l
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 T! M, Z2 v, G* | a hacker:. . . . I excused
7 V2 y3 _6 |2 U4 e5 g+ Q  v" l white: we see meet you? 6 a! u  @! F3 Z, E/ M
hackers:. . . . This, not so good, why should we see $ m) ]# f: W& k% M, U6 \
white: I want to see you are not the same and I would like to
: p5 e7 k" n6 V) P; u0 \ Hacker: Oh, what you think?
4 H; U+ y% ^3 G# @+ ~7 c white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
( \. n) p0 W$ W3 k8 @1 x( d hackers:. . . . You say that Spider-Man, boss! 4 m; e. N+ W) d% `4 p
hackers: Kazakhstan woven ~ ~ ~
) L: l9 Z& j# e white: You called every day, is not very curious about me?
7 O3 P- ^3 r7 j4 V8 f4 B# b hackers: not curious, is the habit, easily came in
' H+ x* U0 t4 T6 Z white: Well, I have a good way to change your habit
0 j8 U6 X6 h, Z! s" h hacker :. . . . Oh? ! Any way / V3 _. a2 W% u7 ^3 c8 |
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ / B! L9 i% S( K1 Y
hackers: Genius ah! . . . . . You can also connect to it? * w3 s6 T7 b3 y  v
white: to ah, and slowly the hymns! 7 r  K; F/ u1 y! k9 Z+ s2 B  y
white: you every day into my computer, is not very curious about me?
( |8 O/ \1 c3 r  B* n$ J hackers: No wonder, only used
2 S* K0 c7 \: b white: no you're curious about the place?
1 d) P+ X7 s  d  ^/ @( ] hackers: a ah, I always wanted to know your machine so much as when the virus crashes
  K1 V$ H, J4 E+ i) `$ d 4 [/ u6 e5 l/ x1 U! W0 H
white: I would like to control your computer . |, d6 x6 Z* Q: ?
Hackers: I will not have other people access my computer I will be mad
1 l  M* e) w+ {( Z( q1 n0 V white: This is not fair! !
- R4 S  Q0 ^( O' i6 o1 s$ W hackers: ah, well, you control the good of the
$ {3 |# D7 a$ o( s white:. . . . But I will not. . . . ' ~& i! x1 A1 L& H" @1 O' {+ p) Q
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
0 j2 u+ ?' J0 f$ H* a Hacker: I'm white " k' y% S6 ~: j8 h- h2 W) C6 s
us again: This is probably the last time we met the 9 `$ h8 U% B0 |+ X- q( t. y8 [
Hacker: Oh? What happened? & T6 u* x: ]' u) O' E
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
6 c  J! [+ V9 Q6 C hackers: You are so tired of me. . . . . Well, since I do not come, goodbye " j" W: c) a5 ~. s
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
8 w( Y  |3 G" S5 W" Z4 x0 C) F hackers:. . . . . . . . . .
$ ?8 m7 U$ e3 |2 E hackers: so late, and how not offline?
' f( V6 k4 z  w, j6 o3 I& |! G  k) ] white: Oh, is the next, and I went to pull the power ' N% u! a7 W* S3 M. y* x
hackers: Slow! You will not shut down? 3 L5 N7 f/ W; u
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 x. l9 D6 v6 f8 \/ Q, e hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \0 a; [- ^, g) R' M. [
white:. . . . . . I press the power to the hackers call it
4 O6 {' r0 w4 {% z white: You are not really powerful
/ d( X) ~* o  {  x hackers: so-so friends
7 \- u5 v. d; e' Z; w white: bragging! You have the ability to shut down my machine in the horse. ) G% d2 a( o  B
hackers: this place is difficult! You wait
/ H6 s& L6 e+ D8 ~" [ hackers: Haha, buttoned regret it . @8 p* j7 `+ S
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
# B! A3 g% M( p* r+ [' e hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-8-24 17:25 , Processed in 0.205484 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表