 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
9 L" h, \ m6 s+ T' o# t white: how control? ! t! {! R1 Y- v5 \; O! H* R
hackers: white with a Trojan 3 _/ s: U* d( I! I
:. . . . . . Where? I did not see ! s0 V7 q1 K$ K; t; `
hackers: Open your Task Manager * t# X7 P8 H$ @$ T1 _, Q$ [1 H
white:. . . . . . . Task Manager, where?
6 d" B1 {; Z, g- W7 Q/ X; q hackers:. . . . . Your computer below! ! + D& o8 q! m( r' u
white: \; : q/ G) H b" L+ x* `% q3 r2 d
Hacker: I have control of your computer 6 M3 e" `4 u1 B8 `9 q' j: W6 |
white: Oh $ z7 |; y4 V, q/ _# y0 u
hackers: a funk? ! Hey
- ~. G) I! j- t P. ] white: for the just, help me kill the virus it, many of the recent problems my Lord 8 b4 l% b! p4 R# F" s
machine hackers:. . . . . . ( b! |3 V5 v r
+ k8 o, H& S; M" [! g! X9 c7 S white: how do you always in my computer and out of . v& @+ v6 X: [* }) @2 @7 @
casual hackers: You can install a firewall ; W' H j3 p/ u6 u
white: install a firewall, you can not access it? + @" |- }3 G; n* R2 R$ g
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 0 w0 h5 H8 N% n$ X
" D/ `4 ?: g3 e- P+ p. j
small White: I heard that you will create a \! 4 W' _4 m0 P1 w: |+ C; g( J, h
hackers: ah
! | a* \ d# m7 X/ J white: you can control someone else's computer? !
8 o6 f& O. u0 e hackers: General is the
" G# d% c( o2 A. j# h# \/ q4 C: J white: you can black out those sites?
o# R; h1 ]1 h/ H hackers: of course, did not hear people call me a \" ^& f2 z) m8 d2 a& V$ |8 u- p* k
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
7 c: f3 ^4 s( l+ h2 }/ n \! + ?' K7 l$ l2 O f4 X/ C
white: every day you come in, do not feel tired of it?
, G0 f$ [ {7 q& ]- X hacker: is a pain, your machine is the worst I've ever seen in one of the . O+ M3 _* _4 Y, p' _; |4 X
white: is not it, this is Brand , x) g: O/ z: K3 {( y% @3 \, _
Hackers: I was mentally retarded in addition to your yard game machine only virus a 6 V6 d F, c: X, G W' z. t
white: Oh ~ ~ that you see me The \. . . . Goodbye $ L. h' M @' Y3 n4 F
3 ~, l; a# D7 e* j8 H hacker: Hey ~ ~ ~ I come! 4 C* l! P9 k7 U6 b; S
white: not seen you for days, was my firewall blocking you?
. n4 B+ Z9 a3 I( k7 f( w" k2 K8 h" q hackers: Haha, jokes, on your machine is easier than my own, not you miss me
4 k# ]" t5 ^* y" V% C white: I want to Please help a busy
" T; f6 c4 i& c hacker: What?
3 ~& d+ \: U4 N+ g8 { white: you can not modify the point into the power system data
3 \% d/ X/ e5 ^$ A: _; V hackers:. . . . . . Why do you want to! !
+ {5 {$ X( h, e2 t white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
, K4 o, G, ], p" l) ` hackers: die! ! / Z* U6 J! d" K. a
3 k; S9 n8 j- B hacker: you die Where is? ! ! ! ' W9 b/ O( _" q( W5 ]8 A
white:. . . . Go out and play for a few days, ah, come to me why O$ ?; p: s. B5 E1 V; y( H
Hacker: I'm looking for something
4 t6 W3 [/ {9 y E white: what I find here? - b" m( N2 X. p% R
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 7 m x# X7 q0 \ G+ Y N0 l0 H, X* E
9 U" B# T! `5 s6 s6 k" C e/ m
most hackers : I come! !
) n: V% B) A' i3 D. . . . . .
0 Q, Q3 E( z9 N7 r5 H hacker: how not to speak?
7 w) W+ X5 f6 i4 } white: a bad mood 2 Z2 q5 g: U$ u3 ]" `$ E: Z
hackers: Who bullied you?
8 y( l k( {+ m white: a Q No. I have not lost inside of my first love ( v. g8 @5 @) M" P' h
Internet hackers: this simple, I get it for you
/ Z0 S" H0 M) p white: do not get back - I, p. Q& M. J$ S# M; b* ~
hackers: No, tell me what number? 1 z6 o8 V6 s& \! p1 @, j1 I
white: Woo ~ ~ ~ ~ just do not remember " `. _1 D) }( B. i' {
8 N6 p( k8 @; v X- B. U white: you gave me out! ! ! !
! v& W6 [- F0 C hacker: how wrong? !
- m1 P. y* }) j% i& w0 z/ n: Z white: You are not the forum to use my ID to play it? ! !
+ R# {+ l6 x4 t* z8 M1 d+ q hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
7 ~! b" J! R2 U( c( h* n& Z white: it does not work! ! !
% x3 t; N3 }6 w+ }* d2 I hacker: how should you like? . [% H }$ l4 U% x9 ~8 u
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
* A) Y: Z; i0 x8 O3 q
2 [* _/ H: ?- `) i* M( g hacker: Hey,ralph lauren pas cher, I did a lot of fun
. ^, p, A- C7 R9 ? white: what : q3 R4 u+ }! w: |( ?
hackers: I go to the forums posted the top . R n0 t _# e" [
white: This very common ah Z9 `- L+ x2 K6 u
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent $ @# O* U- d$ _: q
white: Wow, very enjoyable, and I can never dare, will be blocked! . ?( U# I$ W& F
Hackers: Yes, has been banned.
: c4 q4 R3 Z+ L5 D white: this is also fun? ! ' h5 ^$ [2 q4 n0 ]
Hackers: Yes, ah, because I use your ID
8 i0 H# F; D1 [4 t9 y4 ~ white: you are pro?
u' r% T. [9 \6 d hackers: You can say it.
; T6 ^% r6 [6 k( g! k white: to what extent high? / A' X1 [1 n Q: ^: `
hackers: ah, I am bored when their own 5 s) \! a Q9 K8 z8 Y( o* Q
white black: Ah, this I will!
+ W S( O" F# J1 n) t { hacker :#?%! You can? ! & C, |/ F% F& T: Y; s
white: Yes, ah, a black off it. . . . . - ?; f/ ?" ]; Z- O' Y( M
hackers: Go!
( y' h: z; {" t! g white: Ask your question
& [4 e( n9 M; A. G! R/ ^, k hacker: says * `; z! M" z; a3 f, S
white: Besides me, you can also control other people's computers do ? ' {& H5 O) k) ]. \$ y: h7 R! R
Hackers: Yes you can. . . .
2 x. ]9 y: U5 x* R6 Z4 N% w* ~" r white: no networking is also OK?
1 b* q5 h9 d: v, y, B6 B3 q hackers:. . . . . . .
/ n4 F- r4 G' f/ V- W) J+ c. ` white: You can remote control to open someone else's machine it? ( t1 F. ^( X, M6 D3 p
hackers:. . . . . . . . 5 ?+ M( A, ~- O% R" x. T! `2 m7 Z
white: You can steal top-secret file it! ! !
: S2 i* x& X9 S3 L: R1 v& H hackers: I think you see more movies, go to sleep
% l0 ~/ V0 O( O- W white wash: my computer is broken
+ n8 a' B- [- h$ p hackers:. . . . . . . Just checked, your computer no problem - S* B+ @$ K/ Q! h B7 ?$ T
white: that is, you bully me
" |* h% T0 ~2 ?4 y$ u5 | hackers: No ah 5 r/ z( d1 T+ W: e
white: You are! MP3 files are passed to my no images!
1 P; A0 r- C( H% s# c hackers: help ah ~~~~~~~ 1 W# Y, B/ f7 m: u5 J
white: Ask a computer problems can you answer? ! v* q+ v q+ {0 z
Hackers: should be able to 5 M5 w7 x5 C' o* ?# u
white: Which key on the keyboard the most handsome? % u0 z, O9 ?0 t6 K4 v& [
hackers:. . . . . . . Do not know A8 w' l3 F1 g4 R+ @- R0 K
white: of course, \!
1 |* h4 {3 Q4 e% P' q8 D, M hackers: halo ~ ~ ~ This is a computer problem? ! !
1 H( R* y) c) N( ^3 X' r
! i% g4 V! R6 W' ]$ `& | white: ask you a computer problems you can answer?
& M% {0 X$ p/ ^9 B+ [ E$ G0 I+ K hackers: If the problem is not your idiot ( O. z% |& d; `* e! V5 E* t9 E+ K# P
white: I am serious! ! You can operate my computer?
, H) t, y8 m0 b7 S- @( ] hackers: ah,juicy couture shop, yes Q' g% a+ ?2 G4 R- H
white: that problem, you can solve it
* v' _7 V1 G5 L# l- D* `) _ hackers: Your question is, should not be difficult ; ) \1 R/ y9 D: d1 L+ K* `
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 0 }: g. E7 ]8 N
a hacker:. . . . I excused
/ Q9 j# \+ `2 M$ K- b- M white: we see meet you?
$ A& A: k; y5 _; I. \8 f* j/ n hackers:. . . . This, not so good, why should we see , z4 L2 H: z$ K/ Q6 i8 U
white: I want to see you are not the same and I would like to 5 D4 L. O0 z7 i+ D
Hacker: Oh, what you think?
# a A" \4 k0 L! G4 a" V' S white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 9 I( f1 O: H/ l) n. T% E
hackers:. . . . You say that Spider-Man, boss!
) O- @/ I) x* e. x hackers: Kazakhstan woven ~ ~ ~ * F+ v# K9 F2 A# k
white: You called every day, is not very curious about me?
2 b/ x# }. L5 C4 d$ W6 y( J0 V hackers: not curious, is the habit, easily came in , k1 P# g, V: p, `6 I
white: Well, I have a good way to change your habit . d Z1 R; x# N# D! h. B
hacker :. . . . Oh? ! Any way * f: o' ^8 F! ?/ O1 A0 U8 g
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
/ S0 r0 G' s. a! h7 \( Z hackers: Genius ah! . . . . . You can also connect to it?
( P; U2 I0 V' V6 E, q white: to ah, and slowly the hymns!
9 {$ y& y4 _$ G e3 Z0 g- f |" Y% v white: you every day into my computer, is not very curious about me?
" R+ ~$ I2 m) Z2 Q2 B hackers: No wonder, only used
0 Z2 Y* B1 q0 x9 a( | white: no you're curious about the place? 5 E5 S- s7 @3 V1 P7 ~& e, c. h/ w/ i
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
' ?1 I( l) A7 W" Z! Y" ~+ P! x: |7 d 4 \5 y0 y H6 ~0 K$ R+ S3 C
white: I would like to control your computer
/ r/ b7 J& X8 R/ f4 F/ g Hackers: I will not have other people access my computer I will be mad
* u8 u, X5 I, N9 F% l' F white: This is not fair! !
0 K$ L' r3 H* y) o& ^. O! k hackers: ah, well, you control the good of the / C8 Q4 f r% j4 R
white:. . . . But I will not. . . .
. e1 H7 T3 t0 M* Z5 C$ v- a3 R hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
! ]0 s. g& h0 X0 {; A- D Hacker: I'm white
$ o. h- S2 }# u& m0 X4 @/ W( ]+ ^ us again: This is probably the last time we met the
- x7 j R! h/ B: f6 f Hacker: Oh? What happened? ) p/ D: m7 ~9 p! s
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
) T& v7 j8 c" Y. X, w' Z/ D hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
F+ F, F6 v! @, x% t white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
4 G' l3 W9 R5 Z8 J7 Y1 _; @ hackers:. . . . . . . . . .
1 D4 F/ L/ Y% q7 h hackers: so late, and how not offline? ' B2 o, ~. m8 ]( |8 G
white: Oh, is the next, and I went to pull the power ) M4 X; D0 u/ l: g! G$ `
hackers: Slow! You will not shut down? % q# X" I- Y3 ?3 A, G% p: Q/ X: g- \. j
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 5 j1 Y$ Q9 d6 [% J3 x$ N8 u
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \- r; Y2 F7 |0 V {9 M" v8 V; |1 Q
white:. . . . . . I press the power to the hackers call it 9 }7 \3 B, D+ V9 \% Y9 f! e
white: You are not really powerful
/ n/ g6 N( q* D: f5 W* } hackers: so-so friends . t2 Q- l; z' e& e" q4 E
white: bragging! You have the ability to shut down my machine in the horse. ( a) \9 G4 s R, h
hackers: this place is difficult! You wait
& G! o8 `5 i a% ^ hackers: Haha, buttoned regret it : Z, r! {0 J, ]8 O* Y9 o/ y F E1 b
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ( _ d! z; ]' N* O
hackers: halo ~ ~ ~ ~ |
|