埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 748|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
+ H4 t2 r, |3 [( L  P4 s white: how control?
7 z- }6 v3 {6 @7 j9 o hackers: white with a Trojan
) v- K* }8 V* S1 K  X:. . . . . . Where? I did not see % X* a9 N& {% U  t1 |
hackers: Open your Task Manager
* P; `# O3 V; P white:. . . . . . . Task Manager, where?
$ _# m4 d6 x) G# N: y2 e( R hackers:. . . . . Your computer below! !
" g4 F, {; p" [: w. ^ white: \; , M1 E, I# X/ g# @7 Z
Hacker: I have control of your computer ! }/ P/ s" c- V5 w) o
white: Oh
) P( F+ m) t6 i2 u/ x" O hackers: a funk? ! Hey ) X4 A& e) ^( k. D& w
white: for the just, help me kill the virus it, many of the recent problems my Lord , R$ D3 |# }& O1 J1 f. p
machine hackers:. . . . . .
4 @1 K1 O, q, E& v* X8 E9 r
1 f9 y' q$ V1 i white: how do you always in my computer and out of
" V/ n% i6 c' \4 W/ e casual hackers: You can install a firewall
  j3 @3 G- m1 Z' z; N white: install a firewall, you can not access it?
" s5 p% f5 j. p0 b hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
" q# t+ q" \$ ?0 |% ?9 l# {: A   T! Q: p0 V; Z8 n
small White: I heard that you will create a \!
, Z$ P. S. m6 m" `+ w hackers: ah
" s2 j. M# ?) S" p' U  ? white: you can control someone else's computer? ! . T2 J+ ]/ L1 t! Z
hackers: General is the
9 t, H, R6 {# d( d white: you can black out those sites? 4 ?2 n+ [4 ~$ s1 S
hackers: of course, did not hear people call me a \
0 L' \" R6 D' p/ C3 |) U$ u white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
! b4 @6 S. Z5 @3 t \! ) _, R% m. m0 d; y
white: every day you come in, do not feel tired of it? 6 y4 g! r8 ^) ^2 J" x
hacker: is a pain, your machine is the worst I've ever seen in one of the " W9 ~& c) ~- b! q+ t
white: is not it, this is Brand
$ P: U+ g6 y! E, A+ h5 ]: [ Hackers: I was mentally retarded in addition to your yard game machine only virus a ) [0 U( O, B; \$ P8 j$ P* ~
white: Oh ~ ~ that you see me The \. . . . Goodbye & ?3 M" c8 E; ^9 [7 x' b
, p3 r1 T3 b! a/ R) ~
hacker: Hey ~ ~ ~ I come! 2 j7 d- l3 A# T$ L# r' u" g
white: not seen you for days, was my firewall blocking you?
$ H, `1 T1 E0 T3 l hackers: Haha, jokes, on your machine is easier than my own, not you miss me
4 l! C8 d9 T+ e2 t( ^9 k8 e! V white: I want to Please help a busy
' z1 u; e+ ]$ R) m2 [ hacker: What?
  h6 v- C% \$ o white: you can not modify the point into the power system data " {, Z6 h( y5 ]
hackers:. . . . . . Why do you want to! !
7 E% Z. M+ S: X( W* ?1 p3 R white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ( q1 P/ V) q) n+ G1 R. }
hackers: die! ! ! G# P' s/ m, T0 A0 a) N' x$ V& A
9 N4 [" M6 P" i1 M0 r/ y$ Q
hacker: you die Where is? ! ! ! : J/ S" g" e4 g
white:. . . . Go out and play for a few days, ah, come to me why
9 r1 H4 M9 Z8 }5 I# I Hacker: I'm looking for something : o( w$ J# {- Y# G1 _6 m( Z9 _
white: what I find here? ' V3 |7 j! x1 K( `
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
+ x( h5 C% N6 ?
- n6 u7 b1 ~& l0 e, T! ~ most hackers : I come! !
7 j2 h5 _, n/ n* l. f! J. m. . . . . .
! v( x; @: O, a+ D/ l8 l& O hacker: how not to speak?
! O7 O" k5 T% \7 K white: a bad mood * ]2 O4 ]" _( h7 A9 g6 ?) G
hackers: Who bullied you?
( n2 f+ Z1 M/ K8 e# J5 M! c white: a Q No. I have not lost inside of my first love : ?" |0 \& }2 x8 a% k% s$ ]' \
Internet hackers: this simple, I get it for you
' \: E5 n) o+ c6 F white: do not get back
! V" U6 R# L( l/ N0 v7 K# W* f, v# n hackers: No, tell me what number?
4 t. U1 d' b1 o' ]8 z: h0 N white: Woo ~ ~ ~ ~ just do not remember
4 r- b- A& g; @) M8 h' J
" r! R- j7 g6 { white: you gave me out! ! ! !   F9 I9 Y3 I+ n# X; `
hacker: how wrong? !
2 m9 Y" X7 R, X( z7 k5 K white: You are not the forum to use my ID to play it? ! ! ; t4 g; U4 b3 f! ?' B
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
* {; K5 i* U5 u$ y white: it does not work! ! ! . ?/ }* V# v1 @; }# `
hacker: how should you like?
" O- B- d& q3 ]9 D/ B white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! ! m3 U; t! d1 A$ L0 ?$ C) f3 K+ ~

+ j# F* T( Y; w hacker: Hey,ralph lauren pas cher, I did a lot of fun
( D8 n4 x0 d" N0 b8 k# O white: what
2 a( ]) W9 Q- I' M hackers: I go to the forums posted the top 9 K1 e2 ]1 N8 e& v0 N7 H- a
white: This very common ah   n# w+ Q% g: ~$ Y7 F8 y
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
( t  M+ M& B; ] white: Wow, very enjoyable, and I can never dare, will be blocked!
/ P- F! i% w1 w& l8 ^. ~/ H4 n Hackers: Yes, has been banned.
* ^/ e8 T- a+ q( U  {6 P white: this is also fun? !
, @1 w! J6 U, R Hackers: Yes, ah, because I use your ID
. \+ V( z6 B2 I' T1 R- O" X# m, G4 v white: you are pro?
- w5 L0 B) `3 a8 _/ m, X( C hackers: You can say it. 1 a1 {. y) @0 p4 l  B( ?2 C2 I
white: to what extent high? % |: W* a+ c% S- ]& M: W
hackers: ah, I am bored when their own & p% c  Z; Y0 x+ e9 x3 w% a
white black: Ah, this I will! & b$ Q! ]& R0 w+ q3 _% ]6 W8 }
hacker :#?%! You can? ! ! W' e6 O# \7 g. o1 L
white: Yes, ah, a black off it. . . . . % U& W+ Y. |7 _5 u3 K3 x1 Z
hackers: Go!
' [7 G" C4 l, R1 b6 C white: Ask your question ( U1 ~0 Q6 m% r! M2 K
hacker: says 8 V0 |5 O+ Y: f+ ~2 _% Y  t
white: Besides me, you can also control other people's computers do ? # u$ K* N7 h7 x# i
Hackers: Yes you can. . . . $ E/ H! A) a* J$ Z. b* y
white: no networking is also OK? # V4 w5 F/ G3 Q: N
hackers:. . . . . . . " ^1 C* @% v! p& w, I
white: You can remote control to open someone else's machine it?
+ J  n  ~! \7 C/ U8 y' E0 [ hackers:. . . . . . . .
! |$ x: m/ T% ^( D: O& D white: You can steal top-secret file it! ! ! 7 H" F: p1 X& S/ E1 V) V
hackers: I think you see more movies, go to sleep
& f7 y. \. X9 S" q" P/ X& I, } white wash: my computer is broken
2 v4 N3 o* |" V2 Q hackers:. . . . . . . Just checked, your computer no problem
* b# b* G0 F; l4 u9 |+ B, A; w white: that is, you bully me ; J; M" x9 g5 N% f9 L9 n. d: W
hackers: No ah
/ z/ ^' ^( h/ w white: You are! MP3 files are passed to my no images! , N5 j6 B, \0 e& p) U: L
hackers: help ah ~~~~~~~ " Z0 F' ?" B1 G4 \' H$ v
white: Ask a computer problems can you answer?
& l: V1 O, |* Z' y* q4 a" s5 x Hackers: should be able to
" d- v* }: c- a. O white: Which key on the keyboard the most handsome?
+ V+ t, g  F$ ]# j6 u. } hackers:. . . . . . . Do not know $ K3 ]- _( m* o$ K
white: of course, \!   T3 `7 }8 Z# q
hackers: halo ~ ~ ~ This is a computer problem? ! !
& z' u- ~5 f& q$ k
8 F" G: W; a% o- _" d# j white: ask you a computer problems you can answer? 1 ?0 I  L  w$ O7 \
hackers: If the problem is not your idiot 4 e) q! `+ W8 D1 N1 G, a
white: I am serious! ! You can operate my computer? ( o' h6 {4 i! R6 |
hackers: ah,juicy couture shop, yes
7 F% R3 T% B$ i0 N& D+ O- X' E white: that problem, you can solve it ; M5 \1 Z) i# t3 O! C
hackers: Your question is, should not be difficult ; + A7 Q: T% b1 F. _$ e$ h
white: Great, my fans do not seem to turn up,nike air jordan, help me change it , q; L+ W8 k- M+ z: P( r' w
a hacker:. . . . I excused % O! x4 ~) N4 u* g# }2 E+ T
white: we see meet you? 3 H1 ]6 r& [5 Y# ^
hackers:. . . . This, not so good, why should we see - A( d/ Q& r' q/ t
white: I want to see you are not the same and I would like to & j. n! l0 X+ H' C$ w; a- a
Hacker: Oh, what you think?
. B; V. y4 R. ^7 k+ f# K8 N7 E white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
# _+ ~8 }3 H5 B: B* j& l7 R3 m) i hackers:. . . . You say that Spider-Man, boss!
# c2 }$ b) `) p! |5 i hackers: Kazakhstan woven ~ ~ ~ $ ]* A0 I* U6 O$ y$ F% |& ]# y
white: You called every day, is not very curious about me?
8 B% u( p! c/ V! H" x( P9 F hackers: not curious, is the habit, easily came in 6 o, e: F# B8 e. S
white: Well, I have a good way to change your habit
( M1 H+ V7 D+ i& y% j& f0 } hacker :. . . . Oh? ! Any way - q. v; f+ G/ r9 V! q
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ / Q- Y* Q5 S. X, x
hackers: Genius ah! . . . . . You can also connect to it? ! z5 _( s/ v- A+ Y, P
white: to ah, and slowly the hymns! 8 |6 }5 o' w7 `- t$ D8 a; l
white: you every day into my computer, is not very curious about me?
  p/ I3 ^+ ?$ w- b. _- S6 [ hackers: No wonder, only used ( }" M  D3 D( @
white: no you're curious about the place?
- n! G! o4 a" t hackers: a ah, I always wanted to know your machine so much as when the virus crashes ; ?( M# T6 }4 R, b
3 C: T$ @% ^. L& j% x
white: I would like to control your computer : s2 n3 h9 y7 P2 X
Hackers: I will not have other people access my computer I will be mad
4 f0 L4 S1 X  m/ A# h; }: [; K white: This is not fair! ! + Y% U/ o; O# h8 `0 ^
hackers: ah, well, you control the good of the
, K# b3 n' y& m white:. . . . But I will not. . . . 4 d8 R0 ]- p& @7 U3 N, U
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! # ^7 X% q' s* K6 R! \7 w
Hacker: I'm white
  J8 p! E4 h8 \9 f us again: This is probably the last time we met the 9 P( I3 Y1 o' {6 D% n
Hacker: Oh? What happened?
8 G' t, @; ?. d  H) U+ T* j* _- | white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! / {8 \8 P8 v; I0 k
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
& S: T# J+ |  t5 T: t white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! ; _" j' }+ d# H; [) Z* ]
hackers:. . . . . . . . . . 3 M( j0 ?* m6 }5 a
hackers: so late, and how not offline?   m& e6 _8 m$ K  F1 q* ~* J+ E
white: Oh, is the next, and I went to pull the power
" E5 f* E4 w8 F hackers: Slow! You will not shut down?
5 u( x1 a: G5 v2 F; O$ h# I white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
1 \! ^8 V& E7 v6 [5 r/ a2 ] hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
! \6 s' e  C+ H7 g* R; I/ Z white:. . . . . . I press the power to the hackers call it
5 ^$ J5 G! `% v7 {2 L6 H. [- {4 t7 f white: You are not really powerful
# x' O" W" P7 l: ]+ F: s hackers: so-so friends ; X/ X4 B+ |4 L$ C: I+ [! [3 ^
white: bragging! You have the ability to shut down my machine in the horse. 9 F$ d8 z. W$ ?2 ~
hackers: this place is difficult! You wait 0 q7 E) T* ~( d* j, i: u
hackers: Haha, buttoned regret it
; s( S2 m, A/ k( z white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
5 J- P) y( {4 Z: E hackers: halo ~ ~ ~ ~
理袁律师事务所
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-2-25 10:26 , Processed in 0.129556 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表