 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
2 c' b0 U! m& C3 K4 y: W) X ]9 I white: how control? 8 h" V, f& F9 c8 f. z
hackers: white with a Trojan
$ g8 O6 }6 y1 z) r+ Y+ K, H- e:. . . . . . Where? I did not see 5 q! z5 Y# P5 |+ v/ b
hackers: Open your Task Manager
. Q& V! q4 D8 U6 I white:. . . . . . . Task Manager, where? 5 B8 d8 b2 B" i) l( F# a
hackers:. . . . . Your computer below! ! % t" d4 o8 [7 A7 U1 R0 S
white: \; * ?2 w( R: u# V
Hacker: I have control of your computer
. ]2 L, S6 `1 S& t/ q white: Oh 6 @: h% K' t' G' h1 k( Z+ @! z# c2 F
hackers: a funk? ! Hey % S$ h+ I* S. v' A
white: for the just, help me kill the virus it, many of the recent problems my Lord
" y$ G3 `$ c0 w8 \ machine hackers:. . . . . .
* [( n9 d6 T! Q1 r. K$ [ . g, u5 a" T- f- [! d0 _; @/ }
white: how do you always in my computer and out of
3 h* V$ a' N7 \# p- X casual hackers: You can install a firewall 4 V( Z! x( G( T v8 P, T4 S
white: install a firewall, you can not access it?
4 d: E, t0 f+ S3 y, _ hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah % P1 y9 K3 V. u R1 M9 A- G8 A' [
. z: j- C2 O5 F/ t: b% v small White: I heard that you will create a \! , I8 h4 r% g) ^/ m H0 f* D* F
hackers: ah ) H& b$ J1 |$ y8 l
white: you can control someone else's computer? ! - i9 k# y9 E9 `% b
hackers: General is the
3 ?' e( s* Z/ |) Z white: you can black out those sites?
% b# \1 @, v5 ~5 D/ m8 m hackers: of course, did not hear people call me a \* x* ~! d, L9 z: g' t5 o( W2 x( c
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 8 ]+ E: E- ]: p5 p+ U8 l4 G
\!
7 C9 Z+ z1 y, @ white: every day you come in, do not feel tired of it? ' {, A. ?8 c* f' |4 d: P1 T1 Y0 ]
hacker: is a pain, your machine is the worst I've ever seen in one of the
9 d. s; c* |- ?; g, Q white: is not it, this is Brand + U$ n7 o$ g9 M4 N& w* q! l
Hackers: I was mentally retarded in addition to your yard game machine only virus a
& o) _! L; G2 `; F white: Oh ~ ~ that you see me The \. . . . Goodbye 7 d1 w% O, o6 U
; L& ]: T- F6 @" p hacker: Hey ~ ~ ~ I come!
( H. a7 L* |' Q+ V. C+ k! q1 g white: not seen you for days, was my firewall blocking you?
& T0 K) K3 C4 }8 ?, b& w I hackers: Haha, jokes, on your machine is easier than my own, not you miss me
8 r) e* Y" |8 F' t) H: u2 [ white: I want to Please help a busy 9 C5 Q& E3 z) |5 G6 o
hacker: What?
& Z* o/ A: |/ \ white: you can not modify the point into the power system data 7 p2 w i$ U7 l* s3 x3 T
hackers:. . . . . . Why do you want to! ! " i( P. D0 D+ q
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . & v! f% L x; T2 y0 Z- Q
hackers: die! ! 8 `, q1 f, S. Z' m' o7 e2 q6 b
0 l7 Z" V) S; v6 E
hacker: you die Where is? ! ! ! 3 f. W6 s2 Z6 [. W, W
white:. . . . Go out and play for a few days, ah, come to me why
F% S9 @ ?; q [ Hacker: I'm looking for something : U2 g" ~- i( z2 g
white: what I find here? " s p4 _$ S% T
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights / x+ W: a; {/ P
" l0 n5 o* r6 e) o8 ~5 L. g most hackers : I come! !
& V) H, F( L6 h' {( F% ^. . . . . .
4 n" j2 M5 J7 h" t' } w" m hacker: how not to speak? $ S) t1 N) \: E
white: a bad mood
+ O/ m0 O4 U6 k& s" [ hackers: Who bullied you?
9 Y+ |% z. U0 u/ _& r [$ U- z white: a Q No. I have not lost inside of my first love g. F, t% @+ ]$ w# N
Internet hackers: this simple, I get it for you
" g+ U9 C- \. r/ W0 ` white: do not get back . P V. h) _; e4 |4 @* l1 Q
hackers: No, tell me what number?
) J" O# V1 A d' u% k) |0 M4 s white: Woo ~ ~ ~ ~ just do not remember
1 S/ J3 }8 D7 l+ u9 P3 e
# ?- L. ~/ p) u' h5 g white: you gave me out! ! ! ! ' g9 N' I! B# o$ B9 q
hacker: how wrong? ! 4 r; a6 W- B' R
white: You are not the forum to use my ID to play it? ! !
* I5 q- |8 P; e* ` hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
8 g6 C; b( F/ Y" U+ K; b white: it does not work! ! ! # X, k3 L+ l8 `1 e4 z: o
hacker: how should you like?
; V C3 ~3 b9 A+ L$ N ` white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ( l2 ~' Y+ H5 O$ x5 O
: p1 l' @7 a% Q hacker: Hey,ralph lauren pas cher, I did a lot of fun , y- k& P& z5 @2 L
white: what
( V, {0 C( @$ ]! }$ S" d# j4 \$ n hackers: I go to the forums posted the top ; I4 [- k4 I+ |6 q
white: This very common ah
; `4 X3 b0 l, {, r3 H" j c Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent % I5 o4 f, g3 h- o
white: Wow, very enjoyable, and I can never dare, will be blocked! : x. Q% A2 u5 }& N% Z7 X* E
Hackers: Yes, has been banned. * s( U' G9 \) {/ y: q
white: this is also fun? ! 2 @, L9 u1 c( Q+ z
Hackers: Yes, ah, because I use your ID 7 G/ q; ^* ^ x
white: you are pro? 3 [0 T+ l# N$ \
hackers: You can say it.
- y( @1 N: _# k2 X) P white: to what extent high?
. i3 k0 M9 A& h4 u' t: v; _ hackers: ah, I am bored when their own
: V) `0 O7 F7 E3 ~9 _* _ white black: Ah, this I will!
$ `, ^4 e6 o" d! d; g hacker :#?%! You can? !
- Q2 X/ m/ g! \' V white: Yes, ah, a black off it. . . . . " I& W& T% }( T- v1 B
hackers: Go! 1 q# v }$ L9 ?* S( l9 l
white: Ask your question + C+ J$ T# z/ L9 Y7 P' Q
hacker: says # {* T" E1 f5 ~& X- [$ h, i
white: Besides me, you can also control other people's computers do ?
. s7 B# U/ g! @0 N- l& A2 r Hackers: Yes you can. . . . ) `9 C6 Y& S/ `1 [! r+ u! z
white: no networking is also OK?
+ [0 B0 o, e1 H9 r7 o0 L; ? hackers:. . . . . . .
9 f L; f. E& C( u% z" j white: You can remote control to open someone else's machine it? + P% T) G, _3 D
hackers:. . . . . . . . ( d$ [$ m3 N) t% M3 y/ j2 a! i
white: You can steal top-secret file it! ! !
' f! _- b" G$ Z# B. E6 M" L hackers: I think you see more movies, go to sleep
* d* i. G: ~: A: G3 G2 A4 o: y& b$ k white wash: my computer is broken
# r6 w0 I! T* M. k hackers:. . . . . . . Just checked, your computer no problem
a: G8 Y& n! ~8 O& G( b( V4 J @ white: that is, you bully me 5 Y# f0 G0 I( ]% E& h4 H* F z# [
hackers: No ah - J% C* z- v4 d5 g5 l1 m
white: You are! MP3 files are passed to my no images!
' w/ F% O. u/ n8 h2 J hackers: help ah ~~~~~~~ , @% L+ {; Y8 C0 e V& v9 o1 k0 l2 T
white: Ask a computer problems can you answer?
9 K& m) J, d! v- t9 @; ~( A Hackers: should be able to
; h* y8 z E8 ]. ]% \, T white: Which key on the keyboard the most handsome?
1 o. P5 }( S, E0 {/ y/ w hackers:. . . . . . . Do not know
% n8 g' p$ f( l# M5 ^8 U8 W% } white: of course, \! ! B# _: q' z1 e
hackers: halo ~ ~ ~ This is a computer problem? ! ! : k4 a! v0 v- C' V% y7 f" Q3 O
1 f1 a) w/ ]0 D% E( ^ }
white: ask you a computer problems you can answer?
3 G( R: f, u! |1 ]$ R+ w6 Q hackers: If the problem is not your idiot
1 {; e" U, |& Y$ A k0 X, x5 Q white: I am serious! ! You can operate my computer? " L# {) q- A. p, k3 W- O
hackers: ah,juicy couture shop, yes . o/ v: {. U' ^. w$ \/ d0 R
white: that problem, you can solve it ) i: j# T0 x) B5 ~5 u9 D x$ ~
hackers: Your question is, should not be difficult ;
' i" }* F) j- V( O white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 n; B4 X# N a2 [* {- R a hacker:. . . . I excused
9 G" c( g; E, N/ f1 w8 f/ p white: we see meet you? % S& X: H8 L7 [+ r
hackers:. . . . This, not so good, why should we see
0 }8 ?2 X) g& c6 ?# e6 U white: I want to see you are not the same and I would like to . K- j: J( [; g' t+ U
Hacker: Oh, what you think? - G/ L/ L' B+ K" q: {5 A
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 6 s1 j7 Q1 e' D. l0 j1 p
hackers:. . . . You say that Spider-Man, boss! 8 N+ f6 k4 D2 d* l
hackers: Kazakhstan woven ~ ~ ~
* ?% O; J, }3 p white: You called every day, is not very curious about me?
0 {) w2 X$ e ^% X hackers: not curious, is the habit, easily came in 0 H' E' \+ O0 f- B' A( b+ M' w
white: Well, I have a good way to change your habit 6 h2 w* z, T* G: W
hacker :. . . . Oh? ! Any way , i2 Y+ Z$ z$ z' K! l; i
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ & |0 @ G; m4 Q- O* d0 n
hackers: Genius ah! . . . . . You can also connect to it?
, U5 \- o7 X. E% V2 j1 H white: to ah, and slowly the hymns!
% A. Q( R& C# Y white: you every day into my computer, is not very curious about me? 0 I. t1 {4 U S; o& j+ J9 G
hackers: No wonder, only used $ _1 ^) _. ~- h% E% }! p, q
white: no you're curious about the place?
. H1 j4 }1 w" G hackers: a ah, I always wanted to know your machine so much as when the virus crashes
1 e' k) F' H4 u/ h- n6 L9 O ! j" _( y1 e# M1 X" Y
white: I would like to control your computer
: N, ?* @% G; v1 H$ d2 y Hackers: I will not have other people access my computer I will be mad
# R+ B. |% E* K1 a- p2 E white: This is not fair! ! 9 i/ U" C) B+ M2 d: ]
hackers: ah, well, you control the good of the
% q0 X8 f2 `' i* N) q8 f$ U5 U white:. . . . But I will not. . . .
! {! |, {2 o$ V2 H9 l# y4 i hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 5 l. D, p8 C' _) ]
Hacker: I'm white
4 f/ e; T( i; M0 j# Z4 ~ us again: This is probably the last time we met the ' n9 `0 c9 J) s6 n
Hacker: Oh? What happened? " i) k( I8 W ?$ N! y
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
4 U5 K8 R) ?; Q5 j* ~ X" k hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 6 S0 M' a7 K8 o* u3 V
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! * |$ q% F1 ?1 D+ l) B
hackers:. . . . . . . . . .
9 B; p: _2 J% ]& M2 Q" o* \# n K hackers: so late, and how not offline?
2 f. k f& V* ?3 E3 v# Q white: Oh, is the next, and I went to pull the power
" K$ C) z c; R7 A4 i/ ?' A* O hackers: Slow! You will not shut down? & u/ k3 f' y0 m/ n; Z2 }6 S
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 9 k4 a4 ?" W2 ]6 m& U
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \" l7 {% n) z3 ^* T7 \" N; k
white:. . . . . . I press the power to the hackers call it
5 K3 p' D9 n( g1 z white: You are not really powerful - ]+ V. `' ]- c2 b
hackers: so-so friends
) [8 m& _" V$ `7 \& j white: bragging! You have the ability to shut down my machine in the horse.
$ a# x+ H* n0 X- X hackers: this place is difficult! You wait
' W. I. D* U. P& n hackers: Haha, buttoned regret it
8 G/ Z! F2 V' y% T6 _$ H9 |' Y) q white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . H0 Q+ t U5 ]& T) Y$ o4 G+ O* x0 v
hackers: halo ~ ~ ~ ~ |
|