 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
: L- X7 |" c& ^% p) K. g$ P+ ^ white: how control?
1 L4 O5 {* ?6 [& f3 { hackers: white with a Trojan
5 R9 W" I, I" B& u: I l:. . . . . . Where? I did not see
6 f& @: b+ z9 ?2 ^+ o, v( _ hackers: Open your Task Manager % Q1 N& N& g1 f
white:. . . . . . . Task Manager, where?
2 g# q/ }/ n4 Z7 Q3 u) p, @ hackers:. . . . . Your computer below! ! - Q1 I2 y) Y) {. |
white: \;
3 w5 X- p' C- m8 b Hacker: I have control of your computer
d+ K; c! V. G" O1 u$ v white: Oh 6 `, d& F3 `( F; b, f }5 Y' u
hackers: a funk? ! Hey
, d, D+ \1 [; n6 p0 y0 c o white: for the just, help me kill the virus it, many of the recent problems my Lord
2 K2 a" N* Q' m, R/ Z machine hackers:. . . . . . + X! p& Z: A1 s, t
0 N+ D9 ^7 b7 T/ }. Z) k
white: how do you always in my computer and out of % D% H8 M+ H" ?- u/ G
casual hackers: You can install a firewall
, R" t0 E3 @5 p* o2 G white: install a firewall, you can not access it?
' E2 c l: H6 D hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah + c6 u, \" }& X0 q$ |, ]
( h8 I- q6 @6 Z( W. B9 Z
small White: I heard that you will create a \!
/ j: h& X( `5 k& n0 V2 | hackers: ah / L; u$ k) I/ L* R, n
white: you can control someone else's computer? ! + g5 a; ?; X |0 S
hackers: General is the 2 M' P- ~5 H3 x: ~( J
white: you can black out those sites? & M ]/ p: O1 K. q" D
hackers: of course, did not hear people call me a \
/ i; B" r) a0 ^6 C: O, f white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 n Q% y: l% W3 |6 ^" j \!
& {, s4 U7 y9 F. r7 w5 M white: every day you come in, do not feel tired of it?
7 k9 l* a$ S' V# `- p$ [4 Q- [ hacker: is a pain, your machine is the worst I've ever seen in one of the
- G M" F+ a* I, ^1 C5 o white: is not it, this is Brand 0 V# `/ V* n2 A4 B
Hackers: I was mentally retarded in addition to your yard game machine only virus a : K! t. X, M7 l
white: Oh ~ ~ that you see me The \. . . . Goodbye 1 H( i. }" ^1 ]2 G
# N; m2 }4 [: m7 ^8 ]# e' U
hacker: Hey ~ ~ ~ I come!
6 {! s4 P7 o3 V3 J( d# {5 E7 f2 O white: not seen you for days, was my firewall blocking you?
3 S5 @7 I; W& {; k0 L g1 J/ u hackers: Haha, jokes, on your machine is easier than my own, not you miss me
; J1 X; z) B+ X+ G& X0 x6 e6 Y white: I want to Please help a busy
# b/ G9 y6 m4 V9 b. `2 r' q- I* I$ U hacker: What? ) B' r: U2 K- q; ]0 Z( A# M
white: you can not modify the point into the power system data # S4 h! B2 w7 E& R8 |% ?/ T
hackers:. . . . . . Why do you want to! !
0 b# P2 f7 A5 m$ U0 K8 e white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
& k+ s. b# R1 `: `7 R* Z- R hackers: die! ! & g* j$ W6 t$ C0 z: t/ |
/ J9 I! \, b6 g0 Q hacker: you die Where is? ! ! ! ) r0 o; |2 w( V+ F
white:. . . . Go out and play for a few days, ah, come to me why - {- p( {5 R M( e
Hacker: I'm looking for something / F- d3 W+ k$ ]; I6 v1 s
white: what I find here?
/ f$ e& s' S0 m& g9 d hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ( [- [6 L" T2 M4 u$ ?
) C9 E. w$ ^! ?9 x# p most hackers : I come! !
6 i' b0 t; Z' h. . . . . . 1 }9 Q$ s* K5 @( U6 ^$ z. Z- C
hacker: how not to speak?
, |4 H: |0 T2 H, E: ]4 f0 x white: a bad mood ; u- L F2 m3 z! Q- l4 I5 E+ R
hackers: Who bullied you? ' m6 N# W/ b! O3 L5 C( t& W
white: a Q No. I have not lost inside of my first love
$ u6 s x9 p$ z Internet hackers: this simple, I get it for you
4 u4 f! q8 K; }5 G/ Q- v' c3 j white: do not get back
; F/ S3 L9 J4 N, b8 F! m hackers: No, tell me what number? : t, T, W. L: u( _
white: Woo ~ ~ ~ ~ just do not remember / m: Y; k6 V; b2 Y6 t
% N" I# a, e L% i& _$ p: {3 j white: you gave me out! ! ! !
" d6 m* W4 b, p* C hacker: how wrong? ! 5 s, d. s/ `' H/ j( [+ G0 t
white: You are not the forum to use my ID to play it? ! !
4 Z! Z% k9 u+ ~! w hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
- A) D* O7 A: m2 Z' w# ] white: it does not work! ! ! 8 {+ u- x# V/ F6 j+ x% U
hacker: how should you like? # a* N1 V9 c& f: g/ U
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
( k+ D: n8 N3 o' E' T
% x) f }; f1 O! x hacker: Hey,ralph lauren pas cher, I did a lot of fun
3 G& c7 I) A0 j0 E" O white: what
( T# P6 q' c4 N' K hackers: I go to the forums posted the top
& m9 G. E _! L* |3 D+ {7 R) M9 R8 F white: This very common ah : H2 s. @, D O. X) b; l: \: x
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 0 |" v$ e& ~, @% ^
white: Wow, very enjoyable, and I can never dare, will be blocked!
8 J$ C. y2 O. g9 Q" [1 f/ u Hackers: Yes, has been banned. # N) i3 O; H9 ?
white: this is also fun? ! " o7 @) x7 n9 `8 P
Hackers: Yes, ah, because I use your ID
; Q" e. I" Q! D white: you are pro? 7 u0 i+ @ f8 Q0 _0 q5 |$ s
hackers: You can say it. ( H; Q1 P) t! v) ], I
white: to what extent high?
- \1 v6 y' O6 [4 p5 R. Z hackers: ah, I am bored when their own
7 K( n V: _8 Q. V9 E7 J white black: Ah, this I will!
2 e& l) |4 d$ h6 ~' Z# b hacker :#?%! You can? !
/ M1 }& }4 _9 [ S) n white: Yes, ah, a black off it. . . . .
- |' A- q/ n; ?9 z0 i: S hackers: Go!
. J; e0 L( P9 N+ D$ R white: Ask your question
, o, z5 y v, u) Y0 z hacker: says o+ s \2 c i" [" J
white: Besides me, you can also control other people's computers do ?
- Z0 U8 t" ]; f$ e' R6 t Hackers: Yes you can. . . . ; w& B2 ~# ]; `, W5 z
white: no networking is also OK? ' ?8 x; [" e7 D e" w7 M
hackers:. . . . . . . : L) `1 i/ ~) P' I& W
white: You can remote control to open someone else's machine it?
, t7 N8 G L/ L% q- ~6 u hackers:. . . . . . . . 8 M! n3 }4 q6 n5 |/ c8 Z6 s
white: You can steal top-secret file it! ! !
6 X, l6 ]& h, q1 Y$ M! n7 t hackers: I think you see more movies, go to sleep
1 N u8 g3 t, B9 u Q white wash: my computer is broken ' e3 i# x0 h/ q# G: g9 H9 |
hackers:. . . . . . . Just checked, your computer no problem
& G# m, p5 ^( b6 _ white: that is, you bully me
! O8 q2 X) @1 U5 _' J1 d+ v hackers: No ah $ Q G5 a2 C$ V; |3 \
white: You are! MP3 files are passed to my no images! 3 Z4 \, [9 Q& a, a1 R1 \$ [. ]
hackers: help ah ~~~~~~~ ) d, F7 [4 Z, n$ a9 l7 ^
white: Ask a computer problems can you answer?
. W# _, g& H2 U t5 s ^4 t( Y8 o/ N9 K Hackers: should be able to / M0 s$ [4 V* }/ S! F( {
white: Which key on the keyboard the most handsome? - F% W8 }7 @6 e4 ?
hackers:. . . . . . . Do not know
+ B4 Q2 Y% u# ], c" L white: of course, \!
% \% x' S9 M( @) P hackers: halo ~ ~ ~ This is a computer problem? ! !
' ^8 ?; m: |) } % L! [7 N2 n3 e$ z3 t' u. l
white: ask you a computer problems you can answer? ! u, d$ |5 L, b# O- e; c
hackers: If the problem is not your idiot 7 J, }/ g) e3 B
white: I am serious! ! You can operate my computer?
+ _' n) T$ e4 p$ M4 D hackers: ah,juicy couture shop, yes 2 n2 \; d: `9 N1 Z% n; m# L
white: that problem, you can solve it
( Z+ E5 [) o6 d1 m hackers: Your question is, should not be difficult ; 5 J8 i7 i( F8 x; h3 z& q
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
4 d* U% E# r1 M; s4 p& n7 e0 h a hacker:. . . . I excused 9 u5 }; u+ _: `, ~" N3 [
white: we see meet you? ( s7 j7 f& w& e8 B
hackers:. . . . This, not so good, why should we see ; p* k/ [# K- F X7 j, i
white: I want to see you are not the same and I would like to
7 _; |5 x2 a0 @1 g Hacker: Oh, what you think?
9 u2 d5 W7 L3 J! e white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
( u" c5 _* b% o/ D. M) i0 G9 C hackers:. . . . You say that Spider-Man, boss!
9 y. ]5 M" g% c" w C hackers: Kazakhstan woven ~ ~ ~ ! A, U2 Y& `, ~5 e
white: You called every day, is not very curious about me? 5 o! V1 u9 b$ F
hackers: not curious, is the habit, easily came in 6 C/ D; h" G6 C& H( W
white: Well, I have a good way to change your habit
0 {* Z( \: N/ P7 t, t ] hacker :. . . . Oh? ! Any way 9 z1 a7 e9 y6 o) ? d! w: _2 M% |
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
' S! S% H) D7 S( { u7 ^" V* o hackers: Genius ah! . . . . . You can also connect to it?
) I$ v, M, f' c4 b0 \6 i* z. ? white: to ah, and slowly the hymns!
j) w# a4 w0 A white: you every day into my computer, is not very curious about me? % O% W1 @ U6 Q) i" S5 \+ U
hackers: No wonder, only used
+ V; P+ Y' W [) N- V white: no you're curious about the place?
, k$ O' e4 N" U" R- }' H hackers: a ah, I always wanted to know your machine so much as when the virus crashes & Z# v5 J4 A0 b8 u$ Q" u/ f
* J0 ^; i: u0 v, [+ Y8 K3 l7 |3 U
white: I would like to control your computer + e: J4 C5 @. F' R# K
Hackers: I will not have other people access my computer I will be mad
- _# m. w" l6 ?2 w2 _. H* d white: This is not fair! !
6 X$ ~/ X4 F) H: g8 E U. F hackers: ah, well, you control the good of the ! Q% S$ X( e6 U2 Q
white:. . . . But I will not. . . . o- w, N. |" _3 S% s+ D# g
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! $ \$ `* R2 C- R% {& Y
Hacker: I'm white q# U( A0 O; @, n$ N4 O
us again: This is probably the last time we met the
. x+ k8 p8 G8 J" [# P* j/ Z4 F Hacker: Oh? What happened? k% o. `2 i' ^# ^2 l' Z
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
3 \2 z. ~2 m' I+ e" k( j0 k% V/ R hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
' q7 A% Z- d* d. Y K6 O8 V8 m white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! " Z4 i0 Y+ V" `7 g1 w. N
hackers:. . . . . . . . . . " [. n6 u% H" ~; f/ o) D
hackers: so late, and how not offline?
( f0 r" A; |. ?; b9 t; k) d. _ white: Oh, is the next, and I went to pull the power - g# |( Q. N. y' Y- @7 |; k
hackers: Slow! You will not shut down?
9 k8 T* d8 E Z! d* v white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
! }/ T4 o9 L) V4 I. R% B- W hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \$ E; u/ [1 i0 n. O# y7 j4 D
white:. . . . . . I press the power to the hackers call it 7 D) ?( D6 l F% n' Y* J/ \) }! ?" C
white: You are not really powerful
3 c* J$ K6 X4 l0 p hackers: so-so friends ( R" Y- r* m6 ~- _5 x) c. @8 ]
white: bragging! You have the ability to shut down my machine in the horse. 1 @" Y; R6 u4 F' t
hackers: this place is difficult! You wait 4 s: a4 J4 \/ g/ ^0 f- @! ^
hackers: Haha, buttoned regret it . }( M R# a% t& h4 F1 e
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
8 E* p7 ]1 ]( {4 T# @ hackers: halo ~ ~ ~ ~ |
|