 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer $ B6 a/ w( [' d; I
white: how control?
! Z% F- W( j" K1 }( f- l1 M8 Y hackers: white with a Trojan 6 @. L8 }- x: [/ S5 X5 O& d
:. . . . . . Where? I did not see # W+ [' v x- n+ n* `+ I2 ?
hackers: Open your Task Manager
% Z' B6 A$ }+ H! g white:. . . . . . . Task Manager, where? R# d' W. g; s- m( F% q; |
hackers:. . . . . Your computer below! !
/ K c( x1 D9 R1 X white: \;
4 o, _" j8 e8 O, ` Hacker: I have control of your computer
! F0 G9 Q( A r w7 c8 T white: Oh * S" }$ V; @6 r, }
hackers: a funk? ! Hey " e; G+ _6 l n7 R: }8 `6 ?( O
white: for the just, help me kill the virus it, many of the recent problems my Lord
# z' ~; k: p% Z7 ~& X1 O% D machine hackers:. . . . . .
! j* ^5 y5 C0 d0 z M8 N X+ m . v- i0 W, u# ~0 F/ x- G
white: how do you always in my computer and out of
" Y, _' b( C- i casual hackers: You can install a firewall / p) S" A2 D9 g* n5 q" s
white: install a firewall, you can not access it?
: `& _( j/ k& G4 o7 ~# k! ~! K hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
/ ~, Y; c' [0 }9 ~: _! `
8 J. o' L2 t1 Y- x# Z small White: I heard that you will create a \!
1 d! A2 ~, R# |2 u& {7 b, u9 O8 D hackers: ah * E, n5 \1 B6 ~( x8 M: I
white: you can control someone else's computer? ! 8 b8 o8 {! [, _& q: W) R# b
hackers: General is the
3 X% p1 m4 B5 F2 l white: you can black out those sites? $ O+ G& a- Q$ G$ Z2 N/ a
hackers: of course, did not hear people call me a \3 o+ t7 I d9 Y# | A9 z8 j: M' k$ o
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . # C$ m1 t+ k( Q' d
\!
8 q& D. F# I x9 n white: every day you come in, do not feel tired of it?
* Y) B( k4 ]% K8 o& N" i& r hacker: is a pain, your machine is the worst I've ever seen in one of the
( _2 ]6 |. a% H white: is not it, this is Brand
5 Q/ y8 X2 T2 s$ s% P Hackers: I was mentally retarded in addition to your yard game machine only virus a
8 B, s# N* q$ e6 ] white: Oh ~ ~ that you see me The \. . . . Goodbye
/ O& f c2 m* c1 m! Q
( e8 `* b. _9 n, X( g6 ?' h hacker: Hey ~ ~ ~ I come! 7 k0 P* |8 }( [* ~. G+ {4 x; X
white: not seen you for days, was my firewall blocking you? 9 B/ {/ o. [0 O/ d. @
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
: b) w7 D2 j* G' D- C F0 a white: I want to Please help a busy " R t7 H7 ~& a/ \2 p
hacker: What?
1 D0 w8 {2 _- P3 X( G white: you can not modify the point into the power system data
7 U* ~5 [# V8 N* r! X hackers:. . . . . . Why do you want to! !
( {- g! d3 g4 U6 H- ~! l: i white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 9 i+ U, t) |" O' x8 v+ G: M
hackers: die! ! + c A; I5 J' E" d/ ]' x7 i$ F
$ m6 v( o0 l, f X, l
hacker: you die Where is? ! ! ! 8 C- x3 T5 ?+ t1 t, M! U/ v
white:. . . . Go out and play for a few days, ah, come to me why
9 ? y- x$ [+ d6 c! i Hacker: I'm looking for something * y7 }+ t2 o: k' g+ l
white: what I find here?
( m: c, U/ n( z hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
/ q( K" y L/ D- p. w: ~ , }! f0 \/ Z% |: Q# D6 D1 z7 N
most hackers : I come! ! 0 e: x& A4 X1 R3 [
. . . . . .
2 q [/ L9 a" B0 w$ o p% D0 I2 [& B hacker: how not to speak? + r! a' W' m @# T+ p2 A* S+ o4 {7 j
white: a bad mood ) B+ }8 e' \. n" ?, ?6 K
hackers: Who bullied you? 3 m' V# X% m1 c% D
white: a Q No. I have not lost inside of my first love 7 ^: J! Y- e* Y- I1 b
Internet hackers: this simple, I get it for you
0 F) V1 s6 i. v# H- P, H" R white: do not get back ) a$ U( D4 L/ d8 `1 a: x
hackers: No, tell me what number?
* V" X6 B9 u9 A# o# s6 l white: Woo ~ ~ ~ ~ just do not remember 5 m% c8 u& k8 x. \
0 n+ R: ]! {; H* b) [6 I white: you gave me out! ! ! ! $ D2 ?% k) }- P/ Q# G* g7 A
hacker: how wrong? ! * a: j, I' r% E! Y9 w: o
white: You are not the forum to use my ID to play it? ! ! $ y8 `) |, t# w+ o& a% U6 l) ?8 T
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
) i4 m, f2 y5 U3 \0 u% {: l white: it does not work! ! ! # V0 Q: ^- u& [+ }1 K- D9 ^, ]! L7 ^: M
hacker: how should you like? " a4 }: s% z0 @' ?2 x7 |. z
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 2 k5 Q# g# A: S% n6 }" O% N
! s( Y% _, k/ c9 d- S. O6 T
hacker: Hey,ralph lauren pas cher, I did a lot of fun ) y# w/ E. D! P# c F w8 a
white: what
4 |5 `/ s9 P9 F, @8 n, t& z hackers: I go to the forums posted the top
# u8 O. k, C6 f4 V, u white: This very common ah : J4 d4 z2 f0 W% O: r- }
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent # ^ h: ]1 J, Q# y' Z+ U
white: Wow, very enjoyable, and I can never dare, will be blocked!
9 x0 u. `$ j/ b8 z Hackers: Yes, has been banned.
. G" A! B$ E$ K. Q white: this is also fun? ! 5 N4 o: P. L1 M# h* r6 e" X
Hackers: Yes, ah, because I use your ID % u" a% J- [! d S7 t; o
white: you are pro?
& @6 ~' l+ ]$ c" H& e7 b hackers: You can say it. a. f' S% ~3 Z7 R! k
white: to what extent high? & T9 x/ ^7 J" U. H& q: u) U( m* c" u
hackers: ah, I am bored when their own ; ~1 D* Z: ^6 I8 G: s6 m* j) l# F
white black: Ah, this I will! 5 O6 H* a! {3 f
hacker :#?%! You can? ! 7 B& e, ~) A2 y6 B1 ^! z
white: Yes, ah, a black off it. . . . . / Z4 b/ O( O: E9 b: ^
hackers: Go!
! V/ x V8 w" o/ K* ~, y white: Ask your question
; u" p7 ~' \4 f. ` hacker: says - J/ N$ `* ^7 o9 g7 a
white: Besides me, you can also control other people's computers do ? 0 p/ q3 z8 R/ g2 V# O8 K
Hackers: Yes you can. . . .
9 E1 }" z& O9 i4 r1 R* P" I; U white: no networking is also OK?
; w; O. M% r# A hackers:. . . . . . .
) U9 S3 s8 Z g6 s white: You can remote control to open someone else's machine it?
( ?5 V6 U9 x: H2 g8 L hackers:. . . . . . . .
3 w' P/ k4 E8 q7 a9 s white: You can steal top-secret file it! ! ! 6 \1 l0 `! ^$ ], k; q3 G
hackers: I think you see more movies, go to sleep
; w Z H( N# u white wash: my computer is broken : W( z9 v2 ]( x. v' O
hackers:. . . . . . . Just checked, your computer no problem 8 W& |. I/ v/ K Y
white: that is, you bully me $ x: H8 n0 i3 w( @. A) x4 @
hackers: No ah
3 Y4 B E+ _6 r2 N# }" w' u, v; ~ white: You are! MP3 files are passed to my no images!
) p+ a4 j* `9 g3 D* g hackers: help ah ~~~~~~~
( W* \6 T; Z! q2 L C white: Ask a computer problems can you answer?
$ Q' T H/ H, z m" z# z W Hackers: should be able to
/ K6 q3 Q) X B# c white: Which key on the keyboard the most handsome?
9 C' j! N0 {9 T! K4 n# Z7 ~5 i hackers:. . . . . . . Do not know
, d1 z8 A6 r( ?5 V! \ ?# ~ white: of course, \! 1 G1 w3 J; ^ r2 k& B
hackers: halo ~ ~ ~ This is a computer problem? ! ! ) ?5 G8 z1 @9 ~7 n% i0 F
" A% [" R: G" l1 m" ^: b+ ? white: ask you a computer problems you can answer?
- e7 R+ [' C, @4 X3 [, B hackers: If the problem is not your idiot 5 x6 _9 P: d: y% P. S9 p/ B
white: I am serious! ! You can operate my computer?
: U. h/ C: D9 W2 Z0 F- L$ P hackers: ah,juicy couture shop, yes 6 Y; U2 c& p. L. P! {
white: that problem, you can solve it . K9 e3 W: X. i+ ?) H1 p; u" g/ a
hackers: Your question is, should not be difficult ;
& E' @. y) J! h* M white: Great, my fans do not seem to turn up,nike air jordan, help me change it 6 C; U7 D; |. p7 Y* w
a hacker:. . . . I excused
9 V0 S: X- c: d l& z N+ g9 S white: we see meet you? }: P& H" I3 f% K7 K4 n$ w
hackers:. . . . This, not so good, why should we see
* G" U8 x- b+ L white: I want to see you are not the same and I would like to ' C7 d( D+ Q' ? R
Hacker: Oh, what you think? 4 s" ]3 Y! Z; ]$ F: A
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 5 b1 ]# k- i, w- _: I( P5 \* c
hackers:. . . . You say that Spider-Man, boss! $ r/ L% M( Q% P, I9 i: C
hackers: Kazakhstan woven ~ ~ ~
& ^& a3 w2 ]/ w$ i" O/ ? white: You called every day, is not very curious about me?
7 n) M `2 {' l5 @" E$ ~ hackers: not curious, is the habit, easily came in
' o: E5 _7 M% b; a! M0 P5 W. { white: Well, I have a good way to change your habit
; @" t I& [ g* }& D hacker :. . . . Oh? ! Any way
9 }8 K4 F. t8 s/ E' h white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 2 y5 g2 W2 p. t3 N3 G: o: u
hackers: Genius ah! . . . . . You can also connect to it? - ~6 X$ ]2 L8 t, v1 w# O
white: to ah, and slowly the hymns! ( m2 Q/ s7 }$ M
white: you every day into my computer, is not very curious about me?
5 U1 v) d4 F; s' J! o hackers: No wonder, only used
1 V% H% m: {9 b N. |1 I! p) z white: no you're curious about the place? , p8 L! L5 X. g. D' c ?7 Q- U
hackers: a ah, I always wanted to know your machine so much as when the virus crashes * V* D* ~4 a( r6 h' p
7 e: i9 b# ^% n$ p# h
white: I would like to control your computer
" j! N5 w W3 l) S/ \ Hackers: I will not have other people access my computer I will be mad
% Z' O4 Z( M" S; n& r) y, \8 I white: This is not fair! ! 5 C j) ~; J9 k8 M- O3 y2 |
hackers: ah, well, you control the good of the
8 k, U3 K- e+ g r3 h" | white:. . . . But I will not. . . .
+ h( Y0 u6 P" B4 y1 k2 Q hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
0 F N+ d9 B7 o& R Hacker: I'm white
7 }7 ^ F1 j4 n3 E us again: This is probably the last time we met the ~0 N* i, R+ k `# n( X9 v
Hacker: Oh? What happened?
5 C' L( ]5 R) v- e' d( j white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
- q3 y: {$ W/ i6 H, D ~( X0 R: C hackers: You are so tired of me. . . . . Well, since I do not come, goodbye & ~5 x) {+ Y% v2 u H- f
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
+ D8 L& I4 x' B' r hackers:. . . . . . . . . . _9 d0 `! W* a8 C! D7 t4 K
hackers: so late, and how not offline?
; Q' A# Z+ Z' B5 N4 z) k white: Oh, is the next, and I went to pull the power 7 E0 Z: o5 o# J- n- H" c I2 x: F5 T
hackers: Slow! You will not shut down? 7 k& c' J0 }3 \/ E
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
$ X4 I/ F7 M. B( ?; |) v hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
$ [ E1 w' `$ o% A! q' C% V' n" l white:. . . . . . I press the power to the hackers call it
8 b6 T; W3 w m* T white: You are not really powerful S1 G& A) x% r5 U/ {
hackers: so-so friends
' |) {/ K d7 O, l5 O white: bragging! You have the ability to shut down my machine in the horse. ! H+ _0 |: \ l# g; \
hackers: this place is difficult! You wait
& l6 {: t+ P7 g; a+ ]2 \ hackers: Haha, buttoned regret it ' i: K' A6 V" X: F6 X
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 5 K& j0 G1 ^8 M: j1 ` S$ }
hackers: halo ~ ~ ~ ~ |
|