 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 6 R* w5 t; N0 A; Y2 S$ }: N
white: how control? , X& w! Y1 a4 B- V0 O( k( _2 Z
hackers: white with a Trojan 2 h. Q( f* I( m. S% A+ F
:. . . . . . Where? I did not see / [2 s Q: l' b# \
hackers: Open your Task Manager " H" u/ Q0 ]8 ]1 O6 s% l
white:. . . . . . . Task Manager, where?
' J2 X0 R5 s D hackers:. . . . . Your computer below! ! : n3 |7 E2 P4 G* F% W+ N R
white: \; ; {. p! f" `7 T, K( {' i1 e3 Y
Hacker: I have control of your computer 1 H7 ]3 i' X7 r4 f; H
white: Oh . K8 x; U- Y8 l. m) ?- ]4 A& ^9 B
hackers: a funk? ! Hey 9 L1 W5 U3 H' R; ]7 U; n f
white: for the just, help me kill the virus it, many of the recent problems my Lord 6 m7 U0 G8 ]& [! H
machine hackers:. . . . . . : T% O, g( @* X' X
z3 k6 ^) l0 z; w( ~6 T0 x- Y; c
white: how do you always in my computer and out of
2 c9 z/ E1 o* s8 ~5 y) i" h casual hackers: You can install a firewall 3 z7 e6 V d/ u5 p: C: C6 ]8 x
white: install a firewall, you can not access it?
! {9 f* w& p: z* H v hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
5 t/ C( Z- A9 ~$ `. I+ ^, k* N0 ~6 Z o: N# Q) K! W3 ]$ k. e
small White: I heard that you will create a \!
5 ?2 {9 y+ V3 R( Y0 C8 s hackers: ah
/ C8 r3 }( j1 ^! f0 ~( G' u) I8 b white: you can control someone else's computer? !
, T- H: g2 N% Z" L F3 _: p hackers: General is the
+ ~, O; j2 T- a' H2 P2 A white: you can black out those sites?
+ F# H! b, P1 } hackers: of course, did not hear people call me a \% H3 p! }( U; w' U' o! d$ F
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 2 v3 Q$ B8 Y r5 n9 c
\! 8 w! l6 Q* @6 k A8 f8 v# d( c
white: every day you come in, do not feel tired of it? % [3 s, |9 z4 i- U- S/ T
hacker: is a pain, your machine is the worst I've ever seen in one of the 6 U2 `2 V2 @* p6 \- r. l5 B
white: is not it, this is Brand 9 _8 s" K# }! P1 R
Hackers: I was mentally retarded in addition to your yard game machine only virus a
P$ o c' K8 A M# `' l4 R white: Oh ~ ~ that you see me The \. . . . Goodbye 6 N( Q% K+ g: I0 K% ~& i2 Z' y# A" ^
) j: e2 u$ b( _% T4 \# @: f+ t/ [ hacker: Hey ~ ~ ~ I come!
" T4 H9 I( I1 O) s white: not seen you for days, was my firewall blocking you? . q/ S0 ?+ c; u: u
hackers: Haha, jokes, on your machine is easier than my own, not you miss me ' `( Q; r* G h& O, D
white: I want to Please help a busy
( V I& }: u$ p hacker: What? ' ]/ w1 s5 m& w# O' w" d
white: you can not modify the point into the power system data
% f% Y9 ~: T" |* i; @$ _3 L hackers:. . . . . . Why do you want to! ! " i+ m* L+ c; y( I+ b
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . - P9 s! X ~: \5 N" f
hackers: die! !
' G1 S/ I. i. }) T8 j: c# b; D/ a
! z: U& r6 W$ o hacker: you die Where is? ! ! !
$ H: j5 |6 ^1 Q0 L& e white:. . . . Go out and play for a few days, ah, come to me why
5 a& D' W0 B3 E2 q/ V$ N: U Hacker: I'm looking for something 5 A; e0 m2 w: T& ]# v" L @# K7 M/ |
white: what I find here? - _* h8 p0 n9 E0 K3 \# Q9 C
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 4 G4 }9 q! {2 N5 J
$ X6 l0 A2 j+ O& Z# n6 v
most hackers : I come! ! 7 ?7 S) n8 S9 u9 s: ]
. . . . . .
; H8 d' t5 ^+ Q5 P2 i hacker: how not to speak? , e6 g3 w# K% T H% j4 L% ]1 q
white: a bad mood # y3 i3 C8 `: O/ W
hackers: Who bullied you?
0 E7 V: K2 b! t" w white: a Q No. I have not lost inside of my first love 2 s" B( x3 x: s) K g, h
Internet hackers: this simple, I get it for you 8 h; r6 \% N& V- z
white: do not get back , W$ _) I' g. U
hackers: No, tell me what number?
@( l8 f& T: Z" ]% F! W3 L& z white: Woo ~ ~ ~ ~ just do not remember
9 b3 F2 @8 g1 ^- Y* z; j0 a ( c' \& u+ l6 n' ]- q: q; S
white: you gave me out! ! ! ! $ \% {) x2 k6 }* x
hacker: how wrong? ! 6 U1 `4 I+ {8 ^, D0 u1 i
white: You are not the forum to use my ID to play it? ! ! # x& p' \! b# w0 P* F% ^+ y* b
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the " m( X8 A+ d/ {2 D' a6 C4 m9 `. x
white: it does not work! ! !
) S' b" y% c) S7 f0 g" n& W hacker: how should you like? ' ]) W' `% t: d2 M; z9 d) ]# V
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! / v5 j4 D2 F% c5 y' R+ D. @ y
! F- ]. e1 j4 q6 E2 L' o# O hacker: Hey,ralph lauren pas cher, I did a lot of fun
1 j8 ^7 U& Z% p$ x white: what
1 y# t O3 q6 F5 d! O hackers: I go to the forums posted the top
: o1 Z1 b% U3 q T; k, B white: This very common ah
' |6 X. h8 y4 T5 m4 Y+ S Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
8 T5 I" N# e" U" ^" X4 U4 y white: Wow, very enjoyable, and I can never dare, will be blocked!
1 o8 }6 X5 F; y: Y; ]( F Hackers: Yes, has been banned. ' M C( e" Z" y7 c
white: this is also fun? ! * S1 M" U9 {/ a& C5 u
Hackers: Yes, ah, because I use your ID 4 M' W& U& P2 J+ E& k- x
white: you are pro?
6 A9 g( W7 o/ K/ x8 a hackers: You can say it. # {% f7 L2 T- {9 p* j C
white: to what extent high?
) n3 g8 e9 I F/ q6 Q2 n hackers: ah, I am bored when their own 8 U# d5 p* [( ~3 P9 R% g
white black: Ah, this I will! ( g1 J/ ?$ T% C S3 P; ? y8 G
hacker :#?%! You can? ! 1 u8 o, ~0 C0 t- A
white: Yes, ah, a black off it. . . . .
! i2 T/ g* L7 `; R hackers: Go! 5 e+ p4 t! l8 m' L+ J# V. U
white: Ask your question 0 P- U* t! I( j4 _' R) J
hacker: says ) \6 m# O$ I2 j: o$ }
white: Besides me, you can also control other people's computers do ? b* y, T# I4 x9 F5 [; `9 @
Hackers: Yes you can. . . .
5 l1 a' H% x! L$ b0 W! E* Y( L white: no networking is also OK? ! I& Q: D" F* i! \( i4 n
hackers:. . . . . . .
( g# b- n( }7 u. B7 y" |% C white: You can remote control to open someone else's machine it?
e- d& D D' ^* W) g hackers:. . . . . . . . $ b5 I3 ?! X E* [3 ^
white: You can steal top-secret file it! ! !
: R) b: \3 C/ [' k& S8 Q hackers: I think you see more movies, go to sleep 5 z3 s/ o5 l0 G& O/ r# K
white wash: my computer is broken ( ^3 n3 e' `& B0 i
hackers:. . . . . . . Just checked, your computer no problem & G& s8 a4 p+ ^" f; s1 g
white: that is, you bully me
; F2 }: |, m$ Q0 P, ]" f. S hackers: No ah
/ i/ {5 |" Y, @ white: You are! MP3 files are passed to my no images!
' q" {$ ~5 }( W8 D hackers: help ah ~~~~~~~
6 g% y+ \4 x( ?9 X3 n0 G0 {2 p6 T white: Ask a computer problems can you answer?
% z5 ~ }: W* w0 A; z. b$ T+ i Hackers: should be able to ) @' v" f2 J( T$ A2 B
white: Which key on the keyboard the most handsome? & } H) _4 S" M; u1 b
hackers:. . . . . . . Do not know ( \+ K t8 M4 V$ W+ {
white: of course, \!
' ~# T9 t3 K* t( H hackers: halo ~ ~ ~ This is a computer problem? ! !
2 d* h( C& D, A0 w. h* c7 n7 y
1 f7 c/ d* [! C9 T# q white: ask you a computer problems you can answer? j' `% q3 j/ o6 M0 i& [
hackers: If the problem is not your idiot 1 S7 G/ ]& k' i7 B0 C
white: I am serious! ! You can operate my computer?
" l3 q5 y; V0 b" j! g1 D+ F hackers: ah,juicy couture shop, yes + D# ~; Z& v7 w( T) s" _, S7 u, C. k
white: that problem, you can solve it # H! \/ s1 B7 A" q
hackers: Your question is, should not be difficult ; * P) q" z5 N) @9 U e, |
white: Great, my fans do not seem to turn up,nike air jordan, help me change it ( V* n& W1 c5 z) N# R
a hacker:. . . . I excused
, C+ z) Q0 G1 t9 _$ ] white: we see meet you? 1 Y/ a$ a$ I' R# x
hackers:. . . . This, not so good, why should we see & f v6 W" a! j o( W+ ?: @, F
white: I want to see you are not the same and I would like to
! n0 D& ]% a" [7 y( M5 e3 d Hacker: Oh, what you think? % d2 _# N0 Z. v2 H( u5 m1 m/ l6 u
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
: t6 m- o4 b& t9 w# W; z7 k hackers:. . . . You say that Spider-Man, boss!
9 u. U& f6 T% f2 g hackers: Kazakhstan woven ~ ~ ~ % l* a+ x# {/ b4 @; B3 [( z
white: You called every day, is not very curious about me?
: p- h' \+ S" L, Q0 a& P! n hackers: not curious, is the habit, easily came in
* r8 O, |% J9 p' A white: Well, I have a good way to change your habit
/ c/ R) o- J4 @- h3 Q- v hacker :. . . . Oh? ! Any way " Z( T1 j! n6 W9 v; F ?
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ - W" F3 v0 o' W- G: [
hackers: Genius ah! . . . . . You can also connect to it?
# a! q; B% L5 e' o9 _; |' r white: to ah, and slowly the hymns!
, Z. ?+ }3 n- `* r! ]( F: Z8 t white: you every day into my computer, is not very curious about me?
2 N# h( X, I6 X7 ` hackers: No wonder, only used 7 R7 y- T/ k ]7 r" w
white: no you're curious about the place? ; _, u5 F* K" G5 q, p$ P: ~- a2 \
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
. \- Y9 I. Z" Q b' ^" Z
! `& S0 I& R9 A( I white: I would like to control your computer 6 [/ H6 n" H1 m: U1 A1 X- O; `' S" [
Hackers: I will not have other people access my computer I will be mad
7 S2 ~: q" w) Y( d+ c white: This is not fair! ! * x5 T' {/ B. ]0 V( \
hackers: ah, well, you control the good of the
0 B4 W+ z s C white:. . . . But I will not. . . . ; ], g7 t% K2 z
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ( ~! `" O# ]0 H
Hacker: I'm white 3 Z% k2 _; [' F: P* y+ H) S
us again: This is probably the last time we met the 5 m: A5 r R4 F' u" V2 W3 [. a
Hacker: Oh? What happened? 3 f+ U4 U. S) Y
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ) c- a9 F- U4 D$ N- ^0 `
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye # }4 Y7 K s# Z* o2 Q% i0 [$ j6 G$ c
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
- ? Q: R; ]6 Q( j hackers:. . . . . . . . . .
/ i! ]$ U3 h8 e) }) y3 @ hackers: so late, and how not offline?
3 Z* |* S' ~9 X white: Oh, is the next, and I went to pull the power
P: v9 r' z: @, d3 O. f hackers: Slow! You will not shut down?
5 J) L2 d4 g$ q6 w" \ white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
$ K( E: E& p, \1 k; y U* j7 E hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \: m3 u3 c! c, \2 c' `& _1 p0 L* g
white:. . . . . . I press the power to the hackers call it
1 V5 q5 z F5 J9 |, n" R white: You are not really powerful
7 w- X" \# W9 J9 I- }0 _ hackers: so-so friends ) H, E( ?, K/ k1 a" ]
white: bragging! You have the ability to shut down my machine in the horse. 9 ^1 [2 D( t) u: i
hackers: this place is difficult! You wait
+ Q: k ?; D Q8 D/ a hackers: Haha, buttoned regret it 1 H% K. I5 c! X0 G
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ; k' P; _5 o5 p6 W* l: x
hackers: halo ~ ~ ~ ~ |
|