埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 775|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
6 L) t' s' k, F5 M9 |( S2 \ white: how control?
; p& b. L( n- Q& [1 k$ M hackers: white with a Trojan
* _: I5 s9 v/ W, ~! J# U0 {:. . . . . . Where? I did not see " _) r4 G8 n: L. O' G
hackers: Open your Task Manager / {! j0 L' w9 r. G' e+ z1 ^
white:. . . . . . . Task Manager, where?
/ ~1 N9 O' ~1 m2 s hackers:. . . . . Your computer below! !
9 H6 M6 F' K2 i1 S& O) _ white: \; - z' ^# N& n8 e$ ^) F/ f* g/ ]
Hacker: I have control of your computer
) w/ ?$ I8 W$ G( B+ r white: Oh
/ W& z( o7 T! K$ r  V/ r. i hackers: a funk? ! Hey
7 o: l3 s; Y5 O! V, S" T white: for the just, help me kill the virus it, many of the recent problems my Lord * X3 {8 W+ M6 t, I) Q
machine hackers:. . . . . .
% m+ \4 q8 x, J - z) n* j4 x! Q
white: how do you always in my computer and out of , c' Y# p) @: v5 L( U4 _
casual hackers: You can install a firewall
: w1 Q( }: r$ z, F white: install a firewall, you can not access it?
7 r7 x( J! {$ w1 x hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah   i  U3 U6 D: b9 T/ Z/ L$ _4 n: _
2 ~2 l  F7 L" z6 Y. B3 k+ Y! d
small White: I heard that you will create a \!
% `# J( z3 _! o. q: s1 p8 } hackers: ah 8 R, W; B: A0 W( q+ ]. Y  I2 @
white: you can control someone else's computer? !
) t& x  ~$ s  i/ k7 p# ]- n hackers: General is the
! B0 R! J. u* V! M' _1 l7 T, U white: you can black out those sites?
  ?! Z6 Z- @0 z% ?, @ hackers: of course, did not hear people call me a \/ N" V! ~, l4 O4 X# e7 k
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 8 _9 N' {5 W( b/ r) A5 f9 b5 P
\!
( J/ k; e1 i6 U& ~. x2 v white: every day you come in, do not feel tired of it?
1 [& h( E$ ?  p6 h  O- x$ r hacker: is a pain, your machine is the worst I've ever seen in one of the
1 z* B6 x/ ^" b  I8 L) @ white: is not it, this is Brand
- P" c5 M5 J( j+ J7 W! P# G( W Hackers: I was mentally retarded in addition to your yard game machine only virus a
  @) z6 w, z2 Y( y* ~3 a" ^- k white: Oh ~ ~ that you see me The \. . . . Goodbye
/ v: O2 \" }3 X. s% ?8 [ 8 P8 K' r  d5 d
hacker: Hey ~ ~ ~ I come! & [' V6 l1 r2 h) Y$ [
white: not seen you for days, was my firewall blocking you?   K9 m( B3 ?4 N) q" D
hackers: Haha, jokes, on your machine is easier than my own, not you miss me ; H* S3 @# s+ g3 j
white: I want to Please help a busy " Q* g  A% }( E7 s+ L( [7 U% _% v
hacker: What? 9 g) j$ x; N/ T! d% z# |( q" k9 g
white: you can not modify the point into the power system data * R7 R. H3 e5 ]
hackers:. . . . . . Why do you want to! !
; W' ]& d, n7 T* K' p white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
) Y9 Y0 B" `$ { hackers: die! ! 4 F/ M0 Z( K0 w6 x3 C

! _" u* u1 K: v2 v hacker: you die Where is? ! ! !
! b! H8 j( o( A white:. . . . Go out and play for a few days, ah, come to me why
9 `; ]  Z3 @3 _- C4 [* i7 c9 l Hacker: I'm looking for something 7 P2 a, w5 j4 D0 N7 `# w8 A
white: what I find here?
6 W/ i7 l* v: L* i0 ^) U& X% @. S' L8 G hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
+ _  K* f6 p# }/ k3 k # a8 j- j: }9 D8 n4 ?' d9 W; d0 E/ k
most hackers : I come! !
9 Y7 l+ B* u* C( F2 J" }) O. . . . . .
; r2 ^0 H6 C5 m6 }$ {( t7 C* Y hacker: how not to speak?
8 B! W9 v* B" l. S white: a bad mood
+ @4 r% e3 U1 z- u% G: i hackers: Who bullied you? & L# |% A$ ~$ C
white: a Q No. I have not lost inside of my first love # r7 S6 N! w, A) Z/ Y( [
Internet hackers: this simple, I get it for you 1 x8 ]6 F& b$ P# w$ M0 L" \
white: do not get back
1 S  h# L. C1 H6 ~! D1 n4 G hackers: No, tell me what number? 3 w8 T3 H# |) x& K7 r6 X( \
white: Woo ~ ~ ~ ~ just do not remember
7 V( w' _# o& l2 u) z$ @
4 M$ d8 B" ?" c* T& A: @5 [$ g- C6 Z white: you gave me out! ! ! !
7 p3 m* @* F0 I$ b8 c. H hacker: how wrong? ! ' J* l/ [" h% x
white: You are not the forum to use my ID to play it? ! !
+ D9 E( m) R" b hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the * f/ e/ F) l* R2 P9 X3 h+ c; g/ |
white: it does not work! ! ! 3 ~7 \4 T, P6 A0 }3 v% Z# C( |
hacker: how should you like? 0 ^! N% ?  `& g" {# z! T$ G$ F7 D
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
' T6 `, t$ F7 i' a& r ( P+ z- |9 I. X+ l# t" n
hacker: Hey,ralph lauren pas cher, I did a lot of fun 3 R$ w. y$ K( Z
white: what 6 \! f3 f% A- s: T4 ~
hackers: I go to the forums posted the top 3 B+ k7 m* F9 O5 T0 c# W9 A. a
white: This very common ah 5 d8 U9 |" E- w2 D2 g# ^, I& O+ D  @0 G" a
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
- T6 @# P1 E4 N7 ^, h1 c white: Wow, very enjoyable, and I can never dare, will be blocked!
* }3 J' J* V  g' u6 n7 o Hackers: Yes, has been banned.
5 E9 e9 Y' A! o5 f4 \" | white: this is also fun? ! - D/ t5 k: _, j- d
Hackers: Yes, ah, because I use your ID 8 b8 p, j; x  m/ P1 q
white: you are pro?
" l( \) b5 N1 R" k hackers: You can say it. . }& {7 e, W5 j
white: to what extent high?
, z5 s# m! z* D" U hackers: ah, I am bored when their own
4 Q% g% D1 v% w# V+ A6 i+ ` white black: Ah, this I will! ) h3 M. U2 Y( P3 P) j" |$ U: @- y) l
hacker :#?%! You can? ! / W3 X' w9 r" D
white: Yes, ah, a black off it. . . . . 1 H1 |( a" {) D3 }0 P8 V
hackers: Go!
; |! L, E9 d( |4 S6 } white: Ask your question   n2 h# ]& N8 |
hacker: says
2 B. g; U: F8 K, W* G white: Besides me, you can also control other people's computers do ?
* D% Q4 r2 s! x& O Hackers: Yes you can. . . .
; k, Z' r' B0 M+ N) Y, p white: no networking is also OK? 4 |* ]" f8 ~8 T& `% F( H, k1 y5 E
hackers:. . . . . . .
( p. {+ a: }) N" l% C( m white: You can remote control to open someone else's machine it? ( q; M- C" U2 I1 U0 C3 d
hackers:. . . . . . . .
- o- \) {1 V4 |! O& q* O4 l white: You can steal top-secret file it! ! !
' Z- w, {! v9 n6 l4 h* x hackers: I think you see more movies, go to sleep
" j3 k) O) C% l# H6 } white wash: my computer is broken
( K2 _. l: f$ w3 w9 a; u$ [ hackers:. . . . . . . Just checked, your computer no problem
, j. O6 O8 I# t6 e: ?0 A white: that is, you bully me
2 y' ~) n, h% r' f5 H3 d hackers: No ah
, {9 r# ^8 B5 C6 Q( q( G white: You are! MP3 files are passed to my no images! 5 T4 V1 v" `  ~4 {
hackers: help ah ~~~~~~~
9 R. I; L: U* q5 u5 ?: v3 ] white: Ask a computer problems can you answer?   G5 B9 X8 r& _% R6 O
Hackers: should be able to ! `7 n8 Z5 [/ E& D
white: Which key on the keyboard the most handsome?
1 _3 n6 Y: g8 b8 E6 T hackers:. . . . . . . Do not know ! v8 @; Y  V: a- P; Y  t+ Q. Z' F% V
white: of course, \! . O. d: a; X/ U0 j
hackers: halo ~ ~ ~ This is a computer problem? ! !
+ S8 x- l. _5 c5 {& Y, z- i ! S- a. O% k5 l  Z8 w: K" ^; {! n
white: ask you a computer problems you can answer?
7 F' A5 c, U1 Y4 U6 h0 z hackers: If the problem is not your idiot
# B5 B4 d% {0 T' C" J white: I am serious! ! You can operate my computer?
5 B# u8 A. }: \) ^ hackers: ah,juicy couture shop, yes $ Y2 N8 d, J8 ?8 I
white: that problem, you can solve it
7 a4 E- M, m5 f/ c hackers: Your question is, should not be difficult ;
- Y9 F4 _4 E& X* @0 Q7 g0 F white: Great, my fans do not seem to turn up,nike air jordan, help me change it . Q" O! u% a! {
a hacker:. . . . I excused
$ U( i" u& D( y6 a0 v+ Q white: we see meet you? 9 y* g# j3 i" a+ k, v4 n4 B: ^
hackers:. . . . This, not so good, why should we see
4 c0 n+ \+ \' ~; z$ N$ P3 ]; _ white: I want to see you are not the same and I would like to
9 z6 [, y" H$ g, Z Hacker: Oh, what you think?   Y- Q7 c! T5 S/ a0 i, y
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
% U3 G! z$ `2 G- F! X hackers:. . . . You say that Spider-Man, boss!
  h7 z# M9 L" U* y# g- B% J; E2 Z4 W hackers: Kazakhstan woven ~ ~ ~
1 n6 }& h3 T( x white: You called every day, is not very curious about me? 5 ?) N7 A$ |# a( }
hackers: not curious, is the habit, easily came in
3 L# g: p( N) A' {2 h- s7 R. B white: Well, I have a good way to change your habit " i) l  N. X6 L0 @% g+ i) _
hacker :. . . . Oh? ! Any way
" V) V2 d% s. j7 V6 K% @8 t( V white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
/ D, I( v$ p, n hackers: Genius ah! . . . . . You can also connect to it? 4 z: s; k, u& R
white: to ah, and slowly the hymns! ! \: a  {& M; ?1 A& C  C
white: you every day into my computer, is not very curious about me?
- V: j: a7 a6 P: k- L& m+ m hackers: No wonder, only used
3 {' J$ K* o1 F- `% { white: no you're curious about the place? " V9 H/ F. n4 y- [( M7 q$ C
hackers: a ah, I always wanted to know your machine so much as when the virus crashes ( S. H: ^1 T. W; m( ~  E* l
* w: F/ A3 _! Z2 `
white: I would like to control your computer
3 L7 g9 t, K& N5 q7 `1 }/ {1 [ Hackers: I will not have other people access my computer I will be mad
: J' p+ O$ }2 a" c- c7 M& p( A white: This is not fair! !
( Y& \5 S: r4 t  I hackers: ah, well, you control the good of the
3 D; a8 x1 W+ F white:. . . . But I will not. . . . ; R- F' Y3 v# F+ q
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! # P$ j6 g" y* G$ c- p
Hacker: I'm white / ?, U7 h, f' m( ^. N% n9 }
us again: This is probably the last time we met the
. N* s- Y$ X9 [4 b Hacker: Oh? What happened? : B+ s- e6 l: |2 ~) l
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
, Y2 I& G5 A+ N. V" n hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 8 G1 \9 E5 h# e! j* N- V: y# ^) P
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
: w% `8 s" P' O  W4 b" E, t5 M hackers:. . . . . . . . . . ! s& c1 h4 J  D7 g  z# X% e$ [( R
hackers: so late, and how not offline? + F  ]/ {) G" \5 @" f
white: Oh, is the next, and I went to pull the power ! Y% I- d0 q+ U. `8 v9 g
hackers: Slow! You will not shut down?
7 f7 @; }- i; q, b* i white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
* e/ l2 f' {: L$ u% U hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \% ~, a+ H9 \3 H3 I3 Q- ?. [
white:. . . . . . I press the power to the hackers call it
( T" H7 I; x7 d& Q white: You are not really powerful
! o- ?- v  Z. J. s hackers: so-so friends 6 h; b0 W* `, x8 g" }" e- N
white: bragging! You have the ability to shut down my machine in the horse. 8 O& [$ K1 v" |
hackers: this place is difficult! You wait
) x3 u! j9 j- E. q5 U" s hackers: Haha, buttoned regret it
' E: B9 L/ N8 [ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
8 @8 r  p5 L6 X! A& M hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-3-31 13:21 , Processed in 0.096396 second(s), 11 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表