 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
+ l3 o, g+ | ~# ^* L O white: how control? ) L5 D+ m4 W3 ?% s# g! B, F8 u7 y0 L
hackers: white with a Trojan 4 \1 L+ E5 g# W3 i
:. . . . . . Where? I did not see - }- U: e5 l4 b/ i$ R
hackers: Open your Task Manager & d3 g. B8 w9 e! n
white:. . . . . . . Task Manager, where?
# v4 x1 s& N/ [" w$ `- G hackers:. . . . . Your computer below! !
/ Y& \& h7 i Y2 e+ [ white: \;
1 S7 n) P$ Q$ o; p/ P Hacker: I have control of your computer
$ C) m1 K2 |: e- a! b, T' x white: Oh
) m0 \! t! d' ` hackers: a funk? ! Hey ( [9 e4 q4 D) Y
white: for the just, help me kill the virus it, many of the recent problems my Lord : {3 J) l( y4 ~; j7 w3 C0 _
machine hackers:. . . . . .
7 a, @; z5 s! s7 O% t8 |& }
& e6 B7 @! g5 p/ R; X0 S! i8 ?" i white: how do you always in my computer and out of
d" ~- i/ R% L: e& V; I casual hackers: You can install a firewall 1 g! K' j3 p0 a/ h. r6 F9 ^
white: install a firewall, you can not access it? & M8 W# m5 T' W% y* j% H" h' s
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
) K5 J& c1 }: U! ]. y 8 l) B% E4 Q& J/ v5 z) c
small White: I heard that you will create a \!
8 W# Y/ ^# C7 _& w1 _% i, W0 d hackers: ah : @4 J+ N+ r& L
white: you can control someone else's computer? ! 8 L8 D4 _$ d% K! l) p
hackers: General is the 7 @5 k. A5 L* [" _/ ]& A5 m4 Q
white: you can black out those sites? * I, `, j _, K
hackers: of course, did not hear people call me a \1 u& P/ {( C1 x% l1 [, N( {9 G+ W
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
4 y9 G: {9 G3 x0 T( ]% u \!
0 o( V) J T' t. n; ^. n. F3 E white: every day you come in, do not feel tired of it?
+ R0 A8 O) [; W: u* t! Y4 [ hacker: is a pain, your machine is the worst I've ever seen in one of the
. d3 q; y# A3 w0 w white: is not it, this is Brand
9 i/ S: l y" Q1 Y" U3 n& P Hackers: I was mentally retarded in addition to your yard game machine only virus a " t6 ?- v6 ^" [8 e9 |, _% U
white: Oh ~ ~ that you see me The \. . . . Goodbye
1 S$ V# q w1 X % d% }0 R X% q* P s7 U
hacker: Hey ~ ~ ~ I come!
: p6 \% H5 _- J5 ~ white: not seen you for days, was my firewall blocking you? " m: ]* W# n, O, |" M2 {& F# ^
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
( Q1 V) e( p2 }; |0 x$ X white: I want to Please help a busy
# W* |. x5 z0 ^' a6 r) l# ]4 H hacker: What? / `' G1 G6 Z: a" M6 G4 a) y3 ~' g% `
white: you can not modify the point into the power system data
& g; x( U2 x- q( O/ R& { W0 ] hackers:. . . . . . Why do you want to! !
( N' B Z/ u/ q white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
: O! H5 h- Z) n3 A hackers: die! !
9 ~6 b! Q7 {, K8 H- ` W. l2 [0 w4 G* X
( A% r: K e6 \! W; B; z hacker: you die Where is? ! ! ! R( c$ ]& G, C2 `" w8 @
white:. . . . Go out and play for a few days, ah, come to me why : O( M' ?8 m6 v! a
Hacker: I'm looking for something
/ }' Q, o3 z. S$ s white: what I find here? + W9 S% g, |& V, V
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 6 z; o7 x+ x9 x s0 l+ h- p
! g! Z" ^6 g* R% \3 x most hackers : I come! !
6 O7 Z# l) `0 s! H* x. . . . . . $ [0 Y- Q U( j% M5 y
hacker: how not to speak?
]" `* J0 C: k# ~& Y white: a bad mood , S! K, h! K9 s( R
hackers: Who bullied you? 8 a2 k3 }/ z) h# N
white: a Q No. I have not lost inside of my first love
t% T, Z1 q1 `/ G6 V Internet hackers: this simple, I get it for you
0 r2 E' U) Q" d/ l# s9 D white: do not get back / i. l; \/ x f( T6 |! S- x1 ` ~
hackers: No, tell me what number?
( l% a& d, p: }9 L, a8 U* e white: Woo ~ ~ ~ ~ just do not remember
& Q. `3 M# y% S) Y. T- l
( o- W+ z. ?# n( |( Y/ `% p; A white: you gave me out! ! ! !
3 j: D" |! @' U+ D. r2 P hacker: how wrong? !
3 e% O, Y8 |1 i6 V5 w9 Y white: You are not the forum to use my ID to play it? ! !
7 {8 ]3 z/ @( t5 p4 | hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
' V; u1 E0 @# r0 h+ o6 z3 a3 }* k white: it does not work! ! !
, [/ g; J! P6 u4 W hacker: how should you like?
( ^% {7 N6 J6 R7 b6 i white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ; @% I0 n/ M/ F7 J
) a0 @+ {) w5 x hacker: Hey,ralph lauren pas cher, I did a lot of fun
) b1 G9 p7 ] k5 f3 o8 Y5 F6 i white: what ! _5 }% P0 C% O: t
hackers: I go to the forums posted the top 8 w+ f2 Z) s& D( `
white: This very common ah % }1 k: `& S* m
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent $ g0 E k1 {: i3 H9 ~1 m
white: Wow, very enjoyable, and I can never dare, will be blocked! * n$ d; t6 k; K' q9 g
Hackers: Yes, has been banned.
0 H1 F, [# q7 O6 I5 {$ O1 V white: this is also fun? !
l( W- p; P! c2 a$ k: C* K Hackers: Yes, ah, because I use your ID 8 k& K! P- D2 N1 z' _' b$ L
white: you are pro? # R+ g+ \5 b3 I8 O( _" y
hackers: You can say it. , U! E3 j* Y, u
white: to what extent high? 1 \0 X' o7 d1 |; e0 {5 g# h9 i6 Y
hackers: ah, I am bored when their own
" n% @2 q3 g2 F# m" Q white black: Ah, this I will! 8 X( G% L8 K5 ~3 m# J" Z
hacker :#?%! You can? !
1 F3 [* d! f) q3 S1 @ white: Yes, ah, a black off it. . . . . : U7 L+ j- o6 p2 c4 j/ R, ?
hackers: Go!
8 g/ e% Q2 W: C white: Ask your question
) t( r, X O! ~+ a, r+ j7 U( I hacker: says
% `; z7 [9 x$ Y; l+ | white: Besides me, you can also control other people's computers do ?
) \. Y6 H* H D. X/ s0 o: K, Z- R Hackers: Yes you can. . . .
. J5 D% B, a, H1 [ white: no networking is also OK? 3 B7 I `5 M! [8 O% y ^- t. Y
hackers:. . . . . . . d0 y/ q |/ e
white: You can remote control to open someone else's machine it?
" U2 i7 W% Y8 D0 t+ J# o# ?' s% ? hackers:. . . . . . . . $ @$ O( I8 R0 ^/ q
white: You can steal top-secret file it! ! ! * l: s f. Z& \
hackers: I think you see more movies, go to sleep * c/ W1 _( J- k% |6 s
white wash: my computer is broken ' Q k+ P: o: j9 t6 n" X: O
hackers:. . . . . . . Just checked, your computer no problem
- w( ?6 E* m* D$ E* }% a$ @: { white: that is, you bully me
! D; X7 M8 Y2 P, D( y) D/ p hackers: No ah
6 w' H# p0 @: p [% g& g& ~ white: You are! MP3 files are passed to my no images!
2 {+ ]6 ~) F. z& y hackers: help ah ~~~~~~~ $ ?3 m+ l; v4 _0 U$ F' a
white: Ask a computer problems can you answer?
4 [% L& C, \8 s V4 l Hackers: should be able to
X/ f0 b9 P. i& w% B n+ d( R white: Which key on the keyboard the most handsome?
P( t7 i6 i; ]& q. P, t hackers:. . . . . . . Do not know ) w1 F' h/ J0 o+ q' c
white: of course, \!
* x m. p: l/ ~1 d( {% F hackers: halo ~ ~ ~ This is a computer problem? ! !
$ [0 H/ A$ [* `* X: [ - x; E( p. M1 @5 \
white: ask you a computer problems you can answer? - J) P8 E; q% f4 }
hackers: If the problem is not your idiot
; I' S; N. I" b3 O4 X, j white: I am serious! ! You can operate my computer?
0 q6 s% O0 P& ^4 H9 n0 n hackers: ah,juicy couture shop, yes
3 v1 u. }3 U q. k white: that problem, you can solve it
" x7 X5 e" _" o hackers: Your question is, should not be difficult ; . h; b! R3 q2 n0 Z9 }4 P ^
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
/ O% h) x0 w y; m J a hacker:. . . . I excused + l9 R7 B+ V8 q8 R- @; S" p8 {
white: we see meet you?
. h; R) Y, I" M- [1 |5 ] hackers:. . . . This, not so good, why should we see - K: q+ M# u1 ]( x
white: I want to see you are not the same and I would like to
6 s: r& R8 [) K. @. s a# \9 ] Hacker: Oh, what you think? * M+ [& Q+ c. s6 T4 c
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
! F1 F: c1 H( f* g hackers:. . . . You say that Spider-Man, boss! 7 F9 u: [2 l0 b% O$ J# U. o
hackers: Kazakhstan woven ~ ~ ~ 7 {4 s8 j6 R9 T
white: You called every day, is not very curious about me?
9 A9 N. W8 h) J# A hackers: not curious, is the habit, easily came in
( g. r8 u' K; q: k white: Well, I have a good way to change your habit
/ c- _" V' a! B, a; V D% K0 F9 P hacker :. . . . Oh? ! Any way 9 m8 a1 g( l# J0 }; I8 \1 {
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
! w" q' Z5 N" C- b/ V, Z1 P5 W hackers: Genius ah! . . . . . You can also connect to it? 5 i3 a1 {9 |4 Z
white: to ah, and slowly the hymns!
$ @& S6 {! E2 Z6 @/ R# Z8 \ white: you every day into my computer, is not very curious about me?
1 e0 ?7 o! z o hackers: No wonder, only used
I8 T- G' {- e5 i( e+ G white: no you're curious about the place? $ @+ U, q4 S3 [; p/ z* L7 v
hackers: a ah, I always wanted to know your machine so much as when the virus crashes : ~- x5 N: J* l! s
$ m6 p# Q, T0 I4 N4 P white: I would like to control your computer
' }6 P) C- N, `7 ?8 |* m0 ] Hackers: I will not have other people access my computer I will be mad
* |6 t5 a1 o$ i* k( M. t6 g# k white: This is not fair! !
6 Z4 |; g# x4 ]: m2 J; t3 Y hackers: ah, well, you control the good of the
1 K) L- _* [. x5 `/ N/ P5 [! A white:. . . . But I will not. . . .
( S9 p) n {( c& j7 E hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 9 }1 y1 m' M' ^; Y# @
Hacker: I'm white % [( ] }. G; h5 \; c) T
us again: This is probably the last time we met the 9 R: D, c6 _, p# r
Hacker: Oh? What happened?
) H' J$ D2 l% g- {( }# W& M white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
4 W; q4 d- N2 o# V# j) ]' P hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 7 l" _+ s7 D8 D% u A& f$ M
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! # ]! }& w0 n7 M1 C& m/ J0 E) P% r
hackers:. . . . . . . . . . ; [, S2 a3 r% @" q4 g! S, S
hackers: so late, and how not offline?
( R8 t, ]6 @9 L7 N# h, j+ H* N white: Oh, is the next, and I went to pull the power
2 C4 ^5 @1 O' w J4 V hackers: Slow! You will not shut down?
/ ^* [4 N7 w7 i+ g: }6 K5 K white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power # n8 a k6 K! _- M/ j# h) s
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \* K+ D% h- r7 i2 ]" `
white:. . . . . . I press the power to the hackers call it
7 m5 u- ^: Q$ N$ L* ~) y3 o white: You are not really powerful 7 i) @- S$ ] x8 z
hackers: so-so friends
7 g8 ?% i: @5 m0 F# e5 y white: bragging! You have the ability to shut down my machine in the horse. : O+ ~/ e r" ?/ Q
hackers: this place is difficult! You wait
! R2 q5 S! x6 B% c hackers: Haha, buttoned regret it
7 j: }5 ]* S, \. d$ j* @2 r" x white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
% M/ W- k$ B, n hackers: halo ~ ~ ~ ~ |
|