 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer * x: j, Z! Y# W4 R
white: how control?
( d; g: k" g9 i: n: ]# O6 H hackers: white with a Trojan
0 f6 M- z6 c0 ^( B8 Q n" |# R4 s:. . . . . . Where? I did not see
6 m- @ _$ C, g8 k$ T: l* u* S+ c hackers: Open your Task Manager , {# H# n6 d/ ~* p/ ]
white:. . . . . . . Task Manager, where? $ v" S2 y' {0 A1 E" A$ h9 t6 g) R
hackers:. . . . . Your computer below! !
. T7 f* s1 ^3 t3 t! m; A5 T white: \; 6 l5 H% }1 ?5 f( H3 U1 ?
Hacker: I have control of your computer
# {+ q( w- T5 X$ U4 K white: Oh
7 Q7 K+ d3 q. Y3 a0 @3 N hackers: a funk? ! Hey
/ X. k: Q3 N7 X- x4 N white: for the just, help me kill the virus it, many of the recent problems my Lord ' \3 x, D" f/ O7 C+ ?. B9 r
machine hackers:. . . . . . ' G( I% X# _9 s: d) q( j2 M
9 a4 O% S, J( I) M; } white: how do you always in my computer and out of " b% H% C' S& b! D0 g8 t1 c
casual hackers: You can install a firewall
! P" }( s! F# [* B" z, E/ g white: install a firewall, you can not access it?
' z9 n. Q4 }" ` hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
# X, k. N! P; t( p; b & e( g7 ^' f d; d
small White: I heard that you will create a \!
3 ]4 D/ @! j1 D* h, \ hackers: ah / ~9 ` H2 M# p& Y
white: you can control someone else's computer? !
5 k7 I# r. {9 u/ ?! Z: u7 S" p) ^ hackers: General is the
: {6 L0 i% Z1 T* U* N) @$ E white: you can black out those sites?
4 q2 }& M" }% Q! J. O hackers: of course, did not hear people call me a \" {; q( \. k! s8 ~/ k' k, f
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
/ H! F" V- M9 |% i8 l) T7 o \! 9 A- e3 c; g7 i' ^) w- e$ K
white: every day you come in, do not feel tired of it? 8 Q2 G+ ?4 _$ u- f7 c, G# g4 o4 j
hacker: is a pain, your machine is the worst I've ever seen in one of the
& V& p; I7 I) D$ G6 N2 }7 s white: is not it, this is Brand
6 u' t/ V% t' _ ` Hackers: I was mentally retarded in addition to your yard game machine only virus a $ c+ R+ |- z0 L3 U' ~+ G% l
white: Oh ~ ~ that you see me The \. . . . Goodbye
4 D. Z! |/ b% E: ^, x% ]$ s/ i- y3 G
$ W" f1 o% D- C8 p hacker: Hey ~ ~ ~ I come!
e. \2 B* i. W; p white: not seen you for days, was my firewall blocking you?
- E4 [8 k6 |& y, R! o( {+ Q hackers: Haha, jokes, on your machine is easier than my own, not you miss me
8 |8 m& G- A9 ?; V" y white: I want to Please help a busy
0 A2 h: d `* X8 `# d, {5 E$ z hacker: What?
$ ^. D4 y5 a9 E5 J white: you can not modify the point into the power system data c9 _# E$ @8 C# n- d
hackers:. . . . . . Why do you want to! ! & ^" \' _7 o+ C. H5 \) b: P$ G8 P
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
- S, N( w. Y; b( {! X$ S8 R hackers: die! ! $ U+ g$ I" f0 B( w$ n9 x! i) Y! d
0 E- h+ s! J) v9 H& {. w, }$ d hacker: you die Where is? ! ! ! + p( E% h m! R+ v9 X [
white:. . . . Go out and play for a few days, ah, come to me why
, P; E+ b! `. H2 U Hacker: I'm looking for something + A9 V* o O: F& b! m& a. n6 a! G# b
white: what I find here?
8 i! A! d/ k6 s6 b0 N7 w6 ^ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
! d: E" i+ @3 v2 V$ O% f 7 }% r; d5 D' K' q/ {3 Z% K R% `- e
most hackers : I come! !
6 w/ e9 M& ~; l+ T6 J. . . . . .
9 T M+ H; S+ b hacker: how not to speak? # {- Z2 a5 C# D3 P
white: a bad mood % n7 y) d; x. x
hackers: Who bullied you?
% R$ l0 v. H }+ ] white: a Q No. I have not lost inside of my first love
9 L* i* |& i, b" A- w& h Internet hackers: this simple, I get it for you 2 J4 o* r6 y- i* J& N
white: do not get back
& \8 A2 G3 B4 v hackers: No, tell me what number?
4 }" C2 q: `: X) L& P white: Woo ~ ~ ~ ~ just do not remember
% o% p6 z+ r% q5 u5 ?
) @$ I: u, Z5 z; K+ J g white: you gave me out! ! ! !
. D" ]; v+ D7 F, X hacker: how wrong? ! & H7 b4 ^( Y6 u3 ]2 J( V
white: You are not the forum to use my ID to play it? ! ! 8 ^) D$ [' R: ]
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
6 p, R. S8 R' Z- \7 _8 L white: it does not work! ! !
! R2 [+ N9 i/ P P3 ?5 n4 Q hacker: how should you like?
; Y5 M4 a) `; d. s, e white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! & h. \1 z$ m3 t3 j$ [' \2 q- P
# B4 x0 Q- u* T7 X% t; w hacker: Hey,ralph lauren pas cher, I did a lot of fun ! `, c' A) |6 n' b1 G! B$ ?
white: what
0 z- d! P8 [* N/ K3 H hackers: I go to the forums posted the top 8 M# l/ F9 P4 l( ^5 J
white: This very common ah
6 V: ?" a) t; k" _2 b1 q Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 5 z" h& O+ {4 R
white: Wow, very enjoyable, and I can never dare, will be blocked!
% \, s, S' l' H6 Y Hackers: Yes, has been banned.
, T% K, V$ ]& H+ e7 X+ G white: this is also fun? !
+ i8 y% E/ i/ Z1 b: I/ ]# y6 _ Hackers: Yes, ah, because I use your ID " D8 z+ p# Z9 i. j
white: you are pro?
- R7 u E! Z/ q hackers: You can say it.
7 v7 S; t2 h0 z7 U8 C white: to what extent high?
3 n/ Y0 Y, l# _4 z- x# K' x/ |& G hackers: ah, I am bored when their own
) s# [$ t+ @/ L white black: Ah, this I will!
, t2 y$ {; y8 |. m: ?+ s, l hacker :#?%! You can? ! & _3 w8 t0 y' V4 Q% [4 o6 q
white: Yes, ah, a black off it. . . . .
5 R6 ^7 m3 V. u. Y" x hackers: Go! 9 [3 k" [. w8 u2 r' _ V
white: Ask your question + v6 C9 }- G+ H& h) b) b
hacker: says
* b* [) E! B. S8 F& R white: Besides me, you can also control other people's computers do ? 0 [7 C [$ }$ \3 V8 x6 ^
Hackers: Yes you can. . . . 6 f) G0 o" u* A( d4 Y( O* P
white: no networking is also OK?
5 t* e! A# A& c8 B% } hackers:. . . . . . . # n N. [" S' l2 s+ k% l, [: R
white: You can remote control to open someone else's machine it? ) B+ ?$ K( u# v" L- D! G+ N+ o
hackers:. . . . . . . . 2 P' {. H# n0 O; N4 Z! [
white: You can steal top-secret file it! ! !
# w5 K/ m0 U. U& s9 P; {: C9 y0 a! n) e hackers: I think you see more movies, go to sleep
) a6 U, i& z$ ?; {" K white wash: my computer is broken ! z4 V- v0 I! f+ f' l# Z) X
hackers:. . . . . . . Just checked, your computer no problem 5 y4 D; F. @% ~' J
white: that is, you bully me
7 `4 Z: ^$ A! G! ?( v" R hackers: No ah ! z1 \4 m D: f( o( j
white: You are! MP3 files are passed to my no images! ' T6 C! I: v6 e6 t/ M2 P
hackers: help ah ~~~~~~~ ! k# W6 j7 b- `5 `, x
white: Ask a computer problems can you answer?
- Y9 J- ~4 B* A! x# b1 }) v Hackers: should be able to
# ^& x7 R6 v1 v white: Which key on the keyboard the most handsome?
8 l+ d+ L2 Q% x6 X+ k hackers:. . . . . . . Do not know ) ^; u, A0 r% y" k+ q# E8 Z+ a- p
white: of course, \! 7 k9 F7 `* Q5 G( v1 A' L0 I$ D: V
hackers: halo ~ ~ ~ This is a computer problem? ! ! ! K: t" T3 e" \' Z/ P
+ k' r! r4 ?) j L. j
white: ask you a computer problems you can answer?
: m2 M' ~: c* X# P. ~) y9 @0 ^ hackers: If the problem is not your idiot 5 p& u$ ]; c9 S& R+ Q! Q& s- d
white: I am serious! ! You can operate my computer?
& J$ {/ |) x9 ?9 B; U9 B hackers: ah,juicy couture shop, yes + l2 a% f; |: O
white: that problem, you can solve it
, i; R6 c$ c3 O* C A2 M; k) e hackers: Your question is, should not be difficult ; 1 m% K; S2 r! [. s, b0 j: q
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
& Z" q+ n. i& i/ c! _1 n) ]: p( c a hacker:. . . . I excused ) i7 O! ?! P; p5 ]' t# g0 i
white: we see meet you?
+ ^- k: ?- y1 V* D hackers:. . . . This, not so good, why should we see ' N- x* i( n0 ]9 x1 D# r, \
white: I want to see you are not the same and I would like to
! X7 o; g f* h8 V s7 w Hacker: Oh, what you think?
! m. [1 x6 w/ V2 F- `5 X white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
$ Q7 y: ^# `4 S+ i# M4 j hackers:. . . . You say that Spider-Man, boss! 6 r7 A8 i* y; o8 J
hackers: Kazakhstan woven ~ ~ ~
5 k5 @. I6 d& l, C white: You called every day, is not very curious about me? : b, k, }# }* ]7 W0 ^
hackers: not curious, is the habit, easily came in / J9 b6 u" J. w- Z% J2 N
white: Well, I have a good way to change your habit
$ u8 S4 c# {4 T' l hacker :. . . . Oh? ! Any way ; x1 r2 s3 `2 H; E" n( {
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 8 E5 `5 w8 F) D' I
hackers: Genius ah! . . . . . You can also connect to it?
: k; a. r! E4 m7 J white: to ah, and slowly the hymns!
' M9 @" g( Y' |4 a7 B- D+ f white: you every day into my computer, is not very curious about me?
0 m: @3 t* l/ `3 {, Z, s hackers: No wonder, only used $ }( b2 f6 w+ B0 I4 h9 U4 f
white: no you're curious about the place? ) n- c8 p* ^ r" W9 \& r; {
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
; @6 e3 F) r* z, X5 N6 r6 ~. V
N9 a3 R1 _" [/ H9 N white: I would like to control your computer / g5 m* \5 z. ?( `9 d: [, G
Hackers: I will not have other people access my computer I will be mad 0 a' _: P" Q/ A- ^
white: This is not fair! ! + ^/ r0 f& i4 r. d
hackers: ah, well, you control the good of the 4 O9 ]4 B+ w- `" W
white:. . . . But I will not. . . . 8 I3 `+ Z) G) _
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
8 U: M y. R, N& o7 Z) N) _ m- R: M5 N Hacker: I'm white
4 d8 ^/ N9 i4 C _" B, M us again: This is probably the last time we met the
0 t3 r. E3 r) b: I# K* _% v$ v) p Hacker: Oh? What happened? ]* r" M6 G1 r! M. k% a4 t
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
0 ~0 b3 ~! H1 u0 X- W B3 D; w% ? hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
1 ~5 e7 F0 @; Z( k0 d white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 0 ^8 D4 ^# C% |( L5 t" p" c0 U7 h. U
hackers:. . . . . . . . . . ! {4 v) V$ J# L! f2 d# l/ g
hackers: so late, and how not offline?
, |5 i$ R7 f$ ?+ v# J white: Oh, is the next, and I went to pull the power 1 I) n0 Q6 m4 J+ }( p
hackers: Slow! You will not shut down?
) p, }% b0 X# l! c4 V, G4 F, s: U white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power / e0 s" u# Q8 F5 }7 e( T
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
8 m/ S. Q2 e U5 Q; b white:. . . . . . I press the power to the hackers call it $ F$ W/ M8 l U- L+ ?- ^' P! ^0 i
white: You are not really powerful ( S2 `3 p' i) ?8 w; w
hackers: so-so friends
1 W8 Y7 Z) h6 f9 X- K0 N- U7 ^ white: bragging! You have the ability to shut down my machine in the horse. + ]; J8 \1 U" K A0 J7 B
hackers: this place is difficult! You wait ! t) t4 i/ r* S5 H: w1 h
hackers: Haha, buttoned regret it
d) S! w: k3 Y' l l5 U4 l& ? white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
5 E7 \: _5 C5 u* F: C3 d# x$ v9 ~) x hackers: halo ~ ~ ~ ~ |
|