埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 641|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer / S$ U4 P" R3 _) `# h. k
white: how control? . U/ X" d+ t$ }4 ]
hackers: white with a Trojan
; _2 w; Q6 y; f* z5 w1 F3 |& f5 m:. . . . . . Where? I did not see
: a! ?$ j) M) `; Q/ f' L5 c hackers: Open your Task Manager
5 ?' z( }$ ]: D4 U, {( z white:. . . . . . . Task Manager, where? : w5 u2 U- t: z0 F7 \# s6 z9 |
hackers:. . . . . Your computer below! ! 8 G/ L! `# J; o5 {$ g# M+ c
white: \;
/ e1 ?9 z2 B& G: \6 B$ F9 n7 [5 T Hacker: I have control of your computer : Z/ l  D/ \; O( `: x4 p6 W
white: Oh
9 j/ V7 b5 ^' H$ w hackers: a funk? ! Hey ( J: L2 o" d6 ^6 I
white: for the just, help me kill the virus it, many of the recent problems my Lord ' n8 x& f+ y. Y7 }. u; O1 z
machine hackers:. . . . . . 4 }, Q* `7 {  p" F# E
3 q- y; I( m7 F# R
white: how do you always in my computer and out of 0 o8 }" W1 R9 c
casual hackers: You can install a firewall 2 v5 U& _# s- m% E5 D
white: install a firewall, you can not access it? 3 t/ F. ?8 z/ x9 O+ ?
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
* d; C3 S2 C  ~1 p
/ I, d& D5 r1 w/ b small White: I heard that you will create a \!
6 ]% s8 y0 g) [  j hackers: ah ; }* R! w2 h% W: u- D
white: you can control someone else's computer? ! 9 b8 e4 O; ?3 [. ?$ R
hackers: General is the : C% J" L# V# t! N! u+ b( L" {/ h) Y
white: you can black out those sites? 9 a( e0 O# N9 K! i$ ]+ m0 K( c# u
hackers: of course, did not hear people call me a \
+ U4 {/ [( d# C8 K: M white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
2 s$ b- w7 _' n8 T1 a) q \!
3 X8 M7 r) s  ^, \2 Y$ ` white: every day you come in, do not feel tired of it? & q  E1 R$ n  b( K9 f$ E7 h& A
hacker: is a pain, your machine is the worst I've ever seen in one of the
& r4 `, c0 c1 | white: is not it, this is Brand ; P, m# l! a* j" x3 n
Hackers: I was mentally retarded in addition to your yard game machine only virus a
/ V; K+ S& v5 z8 U. A2 ` white: Oh ~ ~ that you see me The \. . . . Goodbye & T$ P; U( a! P9 p0 V, }0 W8 a

9 Q/ `9 S" n$ [0 X: b: b hacker: Hey ~ ~ ~ I come!
0 c/ E! y2 r# i( x# y0 ]2 b white: not seen you for days, was my firewall blocking you?
4 t( x0 \' T3 D& F; \( }& t3 k hackers: Haha, jokes, on your machine is easier than my own, not you miss me : ?" z" h) G/ y4 h" X9 G
white: I want to Please help a busy
! R( c; V6 m4 q3 p0 } hacker: What? ( M( L0 Z" E  W, z$ `
white: you can not modify the point into the power system data # O7 V. U) {) ^  k# z
hackers:. . . . . . Why do you want to! !
8 g8 f, q8 ?2 ?* ~- W& B white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
( }2 A) f4 a$ `/ q hackers: die! !
% X; J7 w" D* |1 p) X! J- j & i3 ?% {& E: Q) {1 q3 u6 A
hacker: you die Where is? ! ! !
& T' K5 z, t- d, m white:. . . . Go out and play for a few days, ah, come to me why
  Z- I% r: V! ^ Hacker: I'm looking for something : p" h( l3 w, l" l2 U6 k
white: what I find here?
9 V( e" o5 B2 K/ ^. ? hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
. ^* i1 N- p! O5 ?& B ! ~. q1 v/ {( j- u2 ]
most hackers : I come! ! 3 Y& C5 O6 H  h3 u
. . . . . . $ }) d. d: V; j' J) s3 I
hacker: how not to speak?
# g5 W! I+ g1 z$ k white: a bad mood , G6 T  K6 H" b8 v2 Q
hackers: Who bullied you? $ _& v5 j; o- ]; k+ ?
white: a Q No. I have not lost inside of my first love $ P' h  L$ ^- g6 I9 l  P/ G
Internet hackers: this simple, I get it for you
' g) N# ?# [, t white: do not get back 9 b8 z0 z4 k: Y( A/ u, q2 H3 @
hackers: No, tell me what number?
6 v0 u9 B. ?! U$ T  _ white: Woo ~ ~ ~ ~ just do not remember
4 O/ W: F; h  i ; s# o7 O7 Q1 b  S
white: you gave me out! ! ! ! 8 \; Q* M1 x5 h" H1 \
hacker: how wrong? ! 1 C; J: t8 z  I, R, v
white: You are not the forum to use my ID to play it? ! !
4 t% B6 u# k8 g( h hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ; p; I# g" f$ I& R6 ]1 f
white: it does not work! ! ! . W/ j2 ~( d; |7 [+ {
hacker: how should you like? ) ?4 k) ]  h+ [
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
* p/ O  L% n- v3 V8 ]+ z( |
  g/ l3 |/ r- d1 m  d3 Y- _6 c hacker: Hey,ralph lauren pas cher, I did a lot of fun 1 p: |1 d% {  @8 _! i* m
white: what
0 I& W' ?, }1 Z hackers: I go to the forums posted the top
7 W2 n: ^6 |! H. f4 X- g- n/ L( K white: This very common ah
( V( |; U1 ^) h0 H1 X Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
" L) \! t) H) r# }' } white: Wow, very enjoyable, and I can never dare, will be blocked! ) e; ?# H8 E; W' E! Z: r. P( V
Hackers: Yes, has been banned.
' h; }5 S9 E8 b( x white: this is also fun? ! 1 S8 Q; g5 p; j
Hackers: Yes, ah, because I use your ID
4 M& s5 r, w; Y3 G( V. q white: you are pro? 4 N) K( u0 ^% k' ?
hackers: You can say it. ( U" F3 [. B# z( K0 W& v
white: to what extent high?
- i+ l, J$ E, _) E7 r hackers: ah, I am bored when their own
! A1 {, @& q8 e white black: Ah, this I will!   Y" X% Q( X& C
hacker :#?%! You can? ! 2 D# m5 K( i4 s' _/ B2 @
white: Yes, ah, a black off it. . . . .
5 o6 r) J" U- W0 M- s1 |. u hackers: Go!
# B( A$ c3 U" T white: Ask your question 3 r2 G+ R( g& Q0 E
hacker: says 7 m# h- V; S) C- W
white: Besides me, you can also control other people's computers do ?
% Y, O  }2 Y' ? Hackers: Yes you can. . . . / E1 ~; Q* ]0 f
white: no networking is also OK? $ Y' a3 J; ~5 U8 Q* s6 q
hackers:. . . . . . . - }% Y$ [* H( k7 Z! f3 Q
white: You can remote control to open someone else's machine it? ) @& }7 }8 l+ Z/ S6 N
hackers:. . . . . . . .
' g" w. S, t9 \2 j/ K* t) K: k white: You can steal top-secret file it! ! !
" \+ b6 q# \5 q% n% N+ U/ C) L1 f hackers: I think you see more movies, go to sleep 2 f( R" ~: L5 H* |3 @
white wash: my computer is broken / S# n) y; A# G: E" N
hackers:. . . . . . . Just checked, your computer no problem 1 J1 k7 A3 J3 {5 |, c7 J
white: that is, you bully me
2 C3 w3 q* n* E5 F, n8 D2 P hackers: No ah
0 b4 e( T5 q1 f, ^8 p white: You are! MP3 files are passed to my no images! 3 c/ `5 a9 l  W1 o
hackers: help ah ~~~~~~~
. m7 t- B- e, @- u, D white: Ask a computer problems can you answer? ; w  @$ r1 o/ U
Hackers: should be able to + u+ f8 n/ R4 D1 b. q
white: Which key on the keyboard the most handsome?
2 C8 N7 H% W( \6 b hackers:. . . . . . . Do not know
$ j+ d: f& h, M1 w1 k/ v* Z white: of course, \!
5 e/ f3 K2 A5 c, l+ E hackers: halo ~ ~ ~ This is a computer problem? ! ! 9 z# _1 A; H+ [) D8 u8 \$ ?$ [, x
& Y/ x. t, S' x+ ?1 F0 `# C
white: ask you a computer problems you can answer?
* e& z+ {0 ^1 V, k, D hackers: If the problem is not your idiot
& I1 q- Y( `* C  d) [! L# F! c white: I am serious! ! You can operate my computer?
. o* p. [2 k* m3 c3 e0 z0 t3 J hackers: ah,juicy couture shop, yes
$ s) n+ `' I0 e8 W$ _, `% l$ w white: that problem, you can solve it
+ p6 k$ j5 h) @: {2 |  f& {' n' I- U hackers: Your question is, should not be difficult ; : S% [" H7 p2 E
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
" h* Z+ x) B4 v5 u/ ` a hacker:. . . . I excused - L2 E& T8 |# q7 Z: [. E
white: we see meet you? , c9 O# G/ q* M  ?! J. K& g. a
hackers:. . . . This, not so good, why should we see
0 w! s; P2 X7 O" D. y  Q2 z8 ]8 F white: I want to see you are not the same and I would like to
/ d$ k4 X8 B, _ Hacker: Oh, what you think?
  C4 A- A6 j" q* L white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ) t: ~7 s+ S/ k. \2 w3 ~
hackers:. . . . You say that Spider-Man, boss! ; D: I. A7 ~% }9 R1 i0 J: C
hackers: Kazakhstan woven ~ ~ ~
- H( I2 l% a, C( m# r6 b: j8 K5 b white: You called every day, is not very curious about me?
7 O$ G7 a4 R% d% s( U  Z hackers: not curious, is the habit, easily came in - \( }2 B; t: v; @! ?8 A  k
white: Well, I have a good way to change your habit
5 z) u+ G2 V. g hacker :. . . . Oh? ! Any way
9 f" X8 Y: w. g( K- a3 E! c5 }+ p* ~ white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
( f! M- g' b5 L hackers: Genius ah! . . . . . You can also connect to it? 7 j0 ]9 G+ a/ Z! [
white: to ah, and slowly the hymns! 8 ~4 e2 x/ g' p0 D5 s6 o9 {
white: you every day into my computer, is not very curious about me?
: s2 G! O9 r& P hackers: No wonder, only used
( {. {* t1 c& d/ Q2 L, h4 ~8 ~/ m white: no you're curious about the place?
7 T$ B+ b' S/ u7 O1 W/ H* R5 |- M$ r hackers: a ah, I always wanted to know your machine so much as when the virus crashes
4 O2 s. u2 t6 m6 i$ b; u1 K / c0 c8 V9 b' b  n& J: P- i
white: I would like to control your computer
2 U! Z0 v$ d: i Hackers: I will not have other people access my computer I will be mad
& N2 {+ t) b8 D/ |0 V% c white: This is not fair! !
) W7 l) E' b, ]: }. D$ E6 n hackers: ah, well, you control the good of the 3 y! h5 e& L, V1 m+ I$ m
white:. . . . But I will not. . . . # d1 H8 R  \! O5 M2 z
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 0 R2 K% ~9 I, B9 ]# t; p
Hacker: I'm white ; @! j+ o& t: p- o/ @" y, K, m& l
us again: This is probably the last time we met the   B, G2 [/ x4 ^* X& i1 \, ]7 U, m* G$ j
Hacker: Oh? What happened? 4 k, J' x% y/ c0 G+ G
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! $ [9 o9 d" V, g8 a# z
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 2 q; r. ^! J1 m. _! {
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
* ~- g/ _0 @/ H6 P hackers:. . . . . . . . . .
" F- h8 W5 {* L5 ~# Y9 }( c) u4 N) K hackers: so late, and how not offline? $ m' K3 g1 E5 Z$ o; e
white: Oh, is the next, and I went to pull the power * n2 F5 |& d7 b2 T8 c  ~" O* K
hackers: Slow! You will not shut down? ) p) i( F2 D" c& a3 f2 t2 p
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power " O/ O& B6 ^5 K7 a% d( T( C2 k
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \1 w1 O  V6 H; x/ }
white:. . . . . . I press the power to the hackers call it 7 b5 X4 T" a8 M8 n" Q0 z  E8 }
white: You are not really powerful # R3 u% H: h* t" B  X$ K7 l* k
hackers: so-so friends
: @& L- O7 x, B  @( Q2 ]6 s6 g- L white: bragging! You have the ability to shut down my machine in the horse.
- D- ]  V2 G6 x8 `9 T hackers: this place is difficult! You wait / F2 V+ }5 J* I) q  I  L" s# W- W- H* `
hackers: Haha, buttoned regret it
# {, j+ u; n) d% t. I; } white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
/ q6 n% k) h* q+ E" V  ^4 I hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-8-25 02:18 , Processed in 0.080097 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表