 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
1 R& \5 k" e4 ^ white: how control? O: ]! F: @7 _* l l
hackers: white with a Trojan
# L1 q. @6 z9 O4 M I7 L:. . . . . . Where? I did not see . n) L' C# S5 _3 s. ~7 v3 J8 o
hackers: Open your Task Manager
! G9 G- \' M, o+ Z/ d white:. . . . . . . Task Manager, where? + d0 K" u# r/ J* Y- q. j- ^/ G
hackers:. . . . . Your computer below! ! / J p0 r! K- a" X3 O M0 M
white: \;
' R" U0 z+ l4 v3 d3 c Hacker: I have control of your computer ) v8 q* ^0 ^0 N5 o) h) l" | \( I) p
white: Oh 4 J+ _* F0 ~7 I7 g7 a
hackers: a funk? ! Hey
1 v. h& s/ N8 H; b white: for the just, help me kill the virus it, many of the recent problems my Lord
# o a' u I, W% B% A machine hackers:. . . . . . + Y- m4 d+ r2 @+ x
5 L3 Q$ A! t0 ^) N9 o5 ^% u
white: how do you always in my computer and out of 5 U3 Z {! O7 B' {" h8 M
casual hackers: You can install a firewall
% R5 `1 I0 T0 z4 g: q7 z% B white: install a firewall, you can not access it? 8 N9 S8 s( j6 C K) i1 |* k
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 3 t* a( X5 R% [6 p" s* R
2 f( I) K! @( _; ` small White: I heard that you will create a \! $ j' `3 M. {1 }
hackers: ah + b/ h6 y% |' g3 e- [
white: you can control someone else's computer? !
$ W' k4 L+ X5 C0 X6 M- L w hackers: General is the
0 T. z( {0 J! H" ? white: you can black out those sites? 2 {. I3 g1 Q( C
hackers: of course, did not hear people call me a \# I% |0 L2 R! Q, Y, m
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 7 i; ^6 a: f* M3 e- l+ q9 h. F
\! 5 z6 e/ o$ y# h7 P" Y7 d4 X f
white: every day you come in, do not feel tired of it? 1 l" C! Z" N$ T$ t- M
hacker: is a pain, your machine is the worst I've ever seen in one of the
2 ^$ K- e$ P' ~6 U white: is not it, this is Brand
: U: z- Y) Z6 j- P Hackers: I was mentally retarded in addition to your yard game machine only virus a 3 \1 P' F, ~" b$ x
white: Oh ~ ~ that you see me The \. . . . Goodbye
6 {: W V. P* Q4 n, C7 P: S& |
" _9 f, W0 t0 u/ G hacker: Hey ~ ~ ~ I come! . v. N3 A/ V! u8 _) _; a
white: not seen you for days, was my firewall blocking you?
$ ]: \% y: x* P% a; G hackers: Haha, jokes, on your machine is easier than my own, not you miss me
1 w; {, P0 B4 s! o: i9 i white: I want to Please help a busy * W( I$ }, m, j7 \
hacker: What?
$ [' l$ J+ d* l- c& b' e* C3 _ white: you can not modify the point into the power system data
( j5 S/ n" s! k" ?! k hackers:. . . . . . Why do you want to! ! 4 K7 [' Y+ i6 [4 F5 ]
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
3 _4 K4 K2 m' g% O3 ]" K% \5 A hackers: die! !
/ f5 c5 w$ U9 k3 C
# v. ^9 _! ]% t, L, ^3 A hacker: you die Where is? ! ! ! 6 M( D. x* j4 I: Y
white:. . . . Go out and play for a few days, ah, come to me why
* U* e! K! o) v- r( x* V d Hacker: I'm looking for something : S2 F- H2 G8 g" G
white: what I find here?
( r, w& r: i% J hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
; |" f3 c9 N$ `* e' B
9 D+ |- x# ]- h% }% C most hackers : I come! ! ( M8 L* J/ x4 W$ q. P& d9 v
. . . . . . 2 @/ S5 E. `" C- j' i e; s1 ^
hacker: how not to speak?
- b9 G6 \- [1 S2 j/ X# K white: a bad mood . M0 M2 f6 ^: u8 }7 D2 a
hackers: Who bullied you?
$ Z! [$ ]; ^8 T3 v9 y! n white: a Q No. I have not lost inside of my first love 9 F7 C4 o5 w! Q( F- _
Internet hackers: this simple, I get it for you * s. }% m9 C, N( a6 X
white: do not get back
& k) U2 W3 P" f# e$ Y6 b hackers: No, tell me what number?
8 k' F3 _7 Y0 ?9 i5 [3 x7 R white: Woo ~ ~ ~ ~ just do not remember @/ }1 ~) Q1 l7 B8 W1 H7 i* u2 S
6 f) z! J* P) @5 Y; f white: you gave me out! ! ! ! 4 E6 k% j2 b* |4 x$ j% I0 g
hacker: how wrong? ! 1 ?' g. `3 n1 G5 q
white: You are not the forum to use my ID to play it? ! !
' Z7 t( a, c% [* S, m hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the , N" r" c; u, b4 B% h+ f
white: it does not work! ! ! 4 N9 m% ^: Z2 L# M" z& l+ A& k! g. N
hacker: how should you like? % ^& m }$ P Z4 q6 R
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
4 q9 e0 A; ~2 K9 k) o
% E+ j4 o4 | }, [9 L hacker: Hey,ralph lauren pas cher, I did a lot of fun
2 |! z6 x2 {- D* n! g5 t white: what ' \, n+ {# `& B- d
hackers: I go to the forums posted the top 7 M! f3 {, P0 T& {! v9 K
white: This very common ah " l4 e& A2 S0 g/ }
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
5 ?4 y# G, z, m2 q5 U: z. y1 u white: Wow, very enjoyable, and I can never dare, will be blocked! 2 a0 H0 J' F" C0 A! \% p: N
Hackers: Yes, has been banned. ( U5 i6 r7 ~6 ~) [/ n7 Y7 t
white: this is also fun? !
9 C( _8 T* @; t! y Hackers: Yes, ah, because I use your ID
. }/ ?# s) n( f% n" ?9 V- K white: you are pro? c' ]/ K/ _4 f7 z: j2 O- l% m2 A( J
hackers: You can say it. # U I1 Q. `; O N6 }* ~+ i/ X
white: to what extent high?
7 @* e0 n' a: X$ s hackers: ah, I am bored when their own
( b/ j2 i4 S7 B8 a, K- B( f white black: Ah, this I will! 2 ^9 j% k' l% e: ^$ `6 V2 a
hacker :#?%! You can? ! $ l1 k! T* }/ E4 v# T8 k2 M
white: Yes, ah, a black off it. . . . .
0 `/ V" v+ Z, e% l& F. y, ^ hackers: Go!
, A# P3 i1 F1 s5 C white: Ask your question 0 K$ j( M" `: [8 \1 B& n
hacker: says " M T$ W% V8 S2 h0 J5 p8 N
white: Besides me, you can also control other people's computers do ? * b! ^9 A7 f/ h s) |
Hackers: Yes you can. . . .
& N2 l# \/ ^! r- m white: no networking is also OK? - R# H5 z- j- [% N- Z8 Z( d
hackers:. . . . . . .
1 A4 L( a' y [! l- h white: You can remote control to open someone else's machine it?
& [0 V+ l" }$ J+ S! a% k1 S/ l hackers:. . . . . . . . * i# T. D S* j& V' ^- A% H
white: You can steal top-secret file it! ! !
0 E* I9 _0 l, k" H7 f hackers: I think you see more movies, go to sleep
* ]# e: U$ `8 J/ x; K% A white wash: my computer is broken
; V" y8 {! n$ K: H hackers:. . . . . . . Just checked, your computer no problem 7 u8 J; A' m" t% v1 u4 W2 d
white: that is, you bully me
8 L! I2 x8 k3 {# D$ z- j% L f hackers: No ah - y( D# L$ q- g+ a; ?
white: You are! MP3 files are passed to my no images! & _- G9 Y' [9 i# Y! E% ? S9 h8 ]
hackers: help ah ~~~~~~~ 7 J3 U: o6 s! z, ^+ m
white: Ask a computer problems can you answer? 9 @$ w7 m$ W4 m6 Y" }
Hackers: should be able to # R) w3 b* i; j
white: Which key on the keyboard the most handsome? & }. |- B6 [) q
hackers:. . . . . . . Do not know
$ D0 a6 d. r s- ?' v$ T! e white: of course, \!
/ A! d( w1 i7 O5 }7 z# s! M5 x hackers: halo ~ ~ ~ This is a computer problem? ! !
* z+ n/ l$ A: c7 J * a$ {% ?0 s* r2 S- l( s3 [, l# Z
white: ask you a computer problems you can answer?
3 A: j8 x2 F" o; B0 _( n5 {1 N: B# C hackers: If the problem is not your idiot ) w$ D! m2 i' \- p2 i
white: I am serious! ! You can operate my computer?
2 t% q/ p, V! t9 w7 ~% D) n" ?, f1 p hackers: ah,juicy couture shop, yes
$ e- k/ y% b! [5 p% P) n& ^ white: that problem, you can solve it 2 J3 ~0 I; n* `" N3 I
hackers: Your question is, should not be difficult ;
- L+ p2 O( B; `) K" P white: Great, my fans do not seem to turn up,nike air jordan, help me change it $ d' |% `* `4 Y4 I. H
a hacker:. . . . I excused % l/ t' F- M3 j
white: we see meet you? , @4 o: b4 G9 e+ E3 O3 L9 @/ S
hackers:. . . . This, not so good, why should we see $ q# B& K4 f( D
white: I want to see you are not the same and I would like to
2 i! w4 H6 g1 ^1 Z1 e Hacker: Oh, what you think? ( \: n) ]2 {& u- K
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
% k5 P6 m( ~/ B6 C hackers:. . . . You say that Spider-Man, boss! ) s0 F/ }# t! n- k
hackers: Kazakhstan woven ~ ~ ~
9 X+ y( N+ O+ `6 V white: You called every day, is not very curious about me?
2 D- o. y0 X' ^$ |; z8 f hackers: not curious, is the habit, easily came in ! S% T9 [- O+ t" }3 w
white: Well, I have a good way to change your habit
' g& r) B$ Y/ i3 {3 [1 v% I' }# Y hacker :. . . . Oh? ! Any way
/ N) k* g! @- D" i white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ S# c& t: _) {& {
hackers: Genius ah! . . . . . You can also connect to it?
% Y- v% ~8 E: L4 i; N, \# Z white: to ah, and slowly the hymns!
7 y9 P! u- Y n; w; o$ t2 R white: you every day into my computer, is not very curious about me? " m% d' {4 a* @. i$ [
hackers: No wonder, only used 6 J2 P7 l ~6 v l! K/ a: G7 O7 E
white: no you're curious about the place?
- ^5 y! @8 I. I, ~6 ~! A& l( x# m hackers: a ah, I always wanted to know your machine so much as when the virus crashes + [8 [' j4 O/ K
( Q' K$ C. @( x
white: I would like to control your computer
" S4 H( s3 e5 N# t' @ Hackers: I will not have other people access my computer I will be mad 4 A7 I3 Q6 N% T! g+ p" l8 y& ~
white: This is not fair! !
2 {' H% Q0 V- \& R6 I) b1 J8 M hackers: ah, well, you control the good of the
) I6 U! n2 H0 h7 o; w/ M white:. . . . But I will not. . . .
% \# Q: g+ z6 O& B hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! $ h, h* L' t/ {/ @( E
Hacker: I'm white
/ L2 x3 |( X- ?$ S us again: This is probably the last time we met the 4 E! M9 x5 e- o- S I; m5 r% Z
Hacker: Oh? What happened? : s2 u: a, b. T! F" z4 Y+ y
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
$ c/ s2 `7 z6 W7 ]! b( S hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 7 T, s2 O: b; V8 j0 [6 h" [
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
/ r+ C) M1 Q* n: i1 c, g8 F hackers:. . . . . . . . . .
1 P, L9 g8 g9 l$ ?/ r hackers: so late, and how not offline? + {9 h2 k( {5 ?- C' w% r$ @
white: Oh, is the next, and I went to pull the power 8 e7 Y+ V" @& i3 ?& g+ ^9 [
hackers: Slow! You will not shut down?
1 r/ M" y$ Y9 W- j+ b/ H white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 z" O# [, A; \- C1 l hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
7 c& J* W* T( {/ w5 r' d n0 W white:. . . . . . I press the power to the hackers call it ! i/ B7 c1 w" r. e6 x
white: You are not really powerful
+ S( p) C9 d+ _5 g- N& e hackers: so-so friends
! @# Q" S+ P1 T6 J& v white: bragging! You have the ability to shut down my machine in the horse.
; O6 K% z; w; |1 H' V; p6 v hackers: this place is difficult! You wait
# T& x8 j+ Y5 J# a hackers: Haha, buttoned regret it ' m! _& L! Y, {* k- T
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . . s/ n; R* Z4 Q4 j! Y
hackers: halo ~ ~ ~ ~ |
|