埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 814|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
0 G, e* k. N. `) _3 P& F white: how control?
5 t  p! l0 j- ^1 R2 [ hackers: white with a Trojan ! J0 l0 V! q9 W7 l  w
:. . . . . . Where? I did not see
* a7 k& ~0 V$ R5 E' O7 i0 g hackers: Open your Task Manager , D5 U. A& d% s5 {
white:. . . . . . . Task Manager, where?
6 V$ }1 e) t+ m0 U hackers:. . . . . Your computer below! !
" p0 ?0 m% _1 l( _: L6 I white: \; : l* s+ t% `: J( Z
Hacker: I have control of your computer $ K1 v! e# k& M  `9 `
white: Oh ( ~& a7 b! R7 f5 C8 J
hackers: a funk? ! Hey ( J; t! C' F2 P; C5 ]
white: for the just, help me kill the virus it, many of the recent problems my Lord
9 k: o8 M  E5 V6 V machine hackers:. . . . . .
$ H" M# a9 W* l& c+ Y& Q
9 n" F) w; f1 T white: how do you always in my computer and out of / V" h3 _0 \" `2 O( |% [  s2 D
casual hackers: You can install a firewall
& C$ B; A% Q" F7 d& ^" N4 c9 t white: install a firewall, you can not access it?
, W. {5 q! u3 ?% l! h hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 3 N1 o$ ]  @. v
2 P# T4 j! [( @2 o
small White: I heard that you will create a \!
" \7 z3 Q, F" `+ |5 \ hackers: ah
7 F! F/ G. c$ m& j: k, n6 Z! H white: you can control someone else's computer? ! 2 A/ D% h/ v; X, ~
hackers: General is the ( x& M" _& P( Z7 R. a% }
white: you can black out those sites?
( I* i; k8 m% E4 v, n; l hackers: of course, did not hear people call me a \
+ B8 s. T! H# C; ?5 I white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
3 X/ ~( m1 k, u( X3 e \!
1 B0 w6 T( L3 ^4 @+ M* n white: every day you come in, do not feel tired of it?
0 I6 m; R4 ~- \+ Q hacker: is a pain, your machine is the worst I've ever seen in one of the
4 M/ {/ A6 w# y3 d) i  E. W white: is not it, this is Brand 1 h( T5 x/ [# i
Hackers: I was mentally retarded in addition to your yard game machine only virus a
) ^9 B/ X/ C* U5 J" u% u% a white: Oh ~ ~ that you see me The \. . . . Goodbye
7 A  Z5 N; ]0 k( U " V. [9 [9 I& W# p& z9 D* s1 O
hacker: Hey ~ ~ ~ I come! 4 c5 G( r" \$ l1 W
white: not seen you for days, was my firewall blocking you?
0 |* T6 E4 i6 M& G hackers: Haha, jokes, on your machine is easier than my own, not you miss me   i! i  Q6 W+ @: R, X- ?
white: I want to Please help a busy
" w+ k; X; v6 c' Q4 |7 a hacker: What?
' V$ H/ }. g; m white: you can not modify the point into the power system data 2 Z1 q# O( M/ j3 F
hackers:. . . . . . Why do you want to! ! 3 }$ @# K4 `+ c# s4 Q. A
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . / w- ^# X. R2 z( ~( s. b* i- w
hackers: die! !
7 I) n6 T0 h6 n. { 0 s$ Y3 D! T" s( ?
hacker: you die Where is? ! ! ! ( Z9 Y; }  H  f3 O' n0 _1 J+ g: B( [# c
white:. . . . Go out and play for a few days, ah, come to me why 5 `; U& }$ P8 k( x
Hacker: I'm looking for something
; I: @; Q, ]3 O7 p7 ^ white: what I find here?
# m3 E- f2 V  p8 D, e* N) C$ j hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights # D5 I  p( t1 K9 p8 |
( R- l7 G, B: a; I3 a) E9 P
most hackers : I come! !
' x: H8 b7 `5 _9 U6 N' q: S0 D. . . . . . 0 P# u% L/ H# o7 S' I
hacker: how not to speak? 1 a8 e; B( `1 R0 h/ Q2 G# ]# {" z
white: a bad mood
: z7 w1 k. g; _/ w' L% v: j) w" v hackers: Who bullied you?
! ^2 x* d" x$ F1 U+ l8 q white: a Q No. I have not lost inside of my first love 6 {' T  S% o4 G" z5 x- J* q9 C( s
Internet hackers: this simple, I get it for you ( s# s% Q1 |4 r$ V8 E
white: do not get back ) B  e3 a/ l1 h" F9 H3 o
hackers: No, tell me what number? , v' L1 g8 v( ]
white: Woo ~ ~ ~ ~ just do not remember # b5 O7 s/ s, v% W6 b3 [' z

; O# M) G1 y$ ]9 W; E6 F+ P white: you gave me out! ! ! !
7 V8 E% @8 }1 t8 w' G% X+ N0 i hacker: how wrong? !
# Q# d/ X3 H2 {( g9 ^ white: You are not the forum to use my ID to play it? ! !
' N7 M! }; m/ A- [8 v; N. U6 } hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
4 K. W9 r+ j2 g- I: I' G/ L# B white: it does not work! ! ! 0 l; K# D! a& r! ?. }% M
hacker: how should you like?
' F) [: @0 v2 J white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
' ]8 o/ ]1 z, @0 }' E  ]  f
4 i6 _; `+ C$ p1 n/ {, Y# M hacker: Hey,ralph lauren pas cher, I did a lot of fun
; E( n) j. v  S6 j, B white: what + b2 B. {% C: S# E
hackers: I go to the forums posted the top
5 m/ A! D! p3 I, r9 V white: This very common ah ) S% m" V" B% y) a) G
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
8 [- ?9 J- t/ E* D3 f' W; [ white: Wow, very enjoyable, and I can never dare, will be blocked!
% f! L% ~  r- l! a- p. p Hackers: Yes, has been banned. . v( U" @' r: [
white: this is also fun? !
2 W- I. d) p( S" Z# W Hackers: Yes, ah, because I use your ID
* _/ k) H9 Q! z) B white: you are pro? 2 r4 W' m& E- E+ e) G/ V
hackers: You can say it. * X: Q  h7 s: B: o  a
white: to what extent high?
2 V/ L* w; j  z hackers: ah, I am bored when their own
  i* z8 T. t3 A7 B0 Z white black: Ah, this I will! - @; }2 W0 }  w4 G+ H/ Q
hacker :#?%! You can? !
2 X$ H8 t: }8 {1 T white: Yes, ah, a black off it. . . . .
$ z3 b* Z9 T1 f4 E8 N hackers: Go! # c- }. A" n9 _
white: Ask your question 3 {7 s8 ~9 ?2 g1 w. y$ i
hacker: says
: f# q  X/ Z( X white: Besides me, you can also control other people's computers do ? . Z5 ?# j* E& l* A0 m5 E
Hackers: Yes you can. . . .
1 m8 q: O6 X' _ white: no networking is also OK? / K+ j( T' j8 X5 n/ v3 }
hackers:. . . . . . .
, }* K! f# e# l white: You can remote control to open someone else's machine it?
' F. c9 i* f# `6 d hackers:. . . . . . . .
+ }; p. F! i# Z0 R& O8 _6 { white: You can steal top-secret file it! ! ! ) ]' Q! u7 [, V5 m. n
hackers: I think you see more movies, go to sleep
: r7 h7 |: ^8 S7 \ white wash: my computer is broken
5 r0 q% j3 C# v+ N. i: o" I9 U" q hackers:. . . . . . . Just checked, your computer no problem , F4 z* e# ~# v, _
white: that is, you bully me 0 n5 j: r- G2 ~
hackers: No ah 7 k- R! u! ]/ b: M" }
white: You are! MP3 files are passed to my no images! ! ]9 k9 ~$ N+ L
hackers: help ah ~~~~~~~
2 a$ k% @0 }, S, o* ]$ T5 o0 H  b white: Ask a computer problems can you answer? & H% q4 W: T. \
Hackers: should be able to ' S( m9 b$ ~- l
white: Which key on the keyboard the most handsome? 3 P3 O# q! `) a8 B/ N- F! f
hackers:. . . . . . . Do not know
4 Y: K/ C6 n6 W& @9 y white: of course, \! ) L  j3 ?2 d0 Q; P. H4 p
hackers: halo ~ ~ ~ This is a computer problem? ! !
: o$ \+ Q' J9 A: o4 { 3 E. ~5 @; l+ W; B3 ]) }& ?
white: ask you a computer problems you can answer? , N- P! n) {/ f9 {
hackers: If the problem is not your idiot
% o- e! d# K5 y white: I am serious! ! You can operate my computer?
# G1 `* m5 \. u" U% _& m hackers: ah,juicy couture shop, yes , N* u; y. g! O. U3 H
white: that problem, you can solve it
9 @6 N3 T8 |9 U hackers: Your question is, should not be difficult ;
% m7 N% y5 k) Z* u- N8 K. e white: Great, my fans do not seem to turn up,nike air jordan, help me change it
. r5 M. Z/ @" C) ?* S a hacker:. . . . I excused 4 o0 @- a/ I& x0 U8 i
white: we see meet you? + R; C: M6 I; D- V) z8 V  I
hackers:. . . . This, not so good, why should we see - T) ^- Z* l" t; f! ~' Z5 a
white: I want to see you are not the same and I would like to
1 ^' ]9 I5 G2 z Hacker: Oh, what you think?
! e$ C$ o6 e$ l& y5 e1 \" r# Y; m+ t+ w white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
# W7 M' M! {) X! ]6 j hackers:. . . . You say that Spider-Man, boss!
6 r' _- C4 ^% g, J8 n: P" c hackers: Kazakhstan woven ~ ~ ~
6 {( ]1 u0 e6 l3 `! Q) R8 t white: You called every day, is not very curious about me? 2 a* ~5 l9 C, g: L+ x- B4 d
hackers: not curious, is the habit, easily came in
# x; W) \1 ~; u white: Well, I have a good way to change your habit & T& x% ^# [$ T  h: S
hacker :. . . . Oh? ! Any way ! p. t- d; _3 e  Z2 G! Q
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
" ?. d8 e# Y9 d3 {# Z hackers: Genius ah! . . . . . You can also connect to it?
1 n: i+ M. C+ z2 M- L" A4 i white: to ah, and slowly the hymns!
6 v$ l- v# t7 ]4 c% d/ t, z+ a3 N white: you every day into my computer, is not very curious about me?
. q( X/ u8 ~0 v; z9 ?: k% R5 `0 [ hackers: No wonder, only used , u4 C* C6 ^# T, I0 P. |$ M) b3 g2 J
white: no you're curious about the place? . r( k7 g% M/ U4 `* Y! M
hackers: a ah, I always wanted to know your machine so much as when the virus crashes " j. h0 _/ s6 e4 x. W0 L
- _8 m) t: ~& q! ~! P
white: I would like to control your computer
, N8 b; {$ j! {$ r- Q0 l Hackers: I will not have other people access my computer I will be mad
8 w( a! k1 J  Z# @: e9 H white: This is not fair! !
0 L+ o6 H* B7 i5 J, d hackers: ah, well, you control the good of the ' g5 g! q' y* Y( w  l5 h$ S
white:. . . . But I will not. . . .
  I/ Q8 p& m" F( L- x hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! , X# }* d- E  b
Hacker: I'm white 9 J% M' O5 I& r/ N. V8 v' q
us again: This is probably the last time we met the 9 K. R7 C+ ~/ e5 p. L" g
Hacker: Oh? What happened?
1 O# w( u/ K; h2 u% A white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 3 d. }5 M7 n6 C
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye $ [2 W% r' h2 M3 Y4 w
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! & w' a: p6 C5 G0 e8 [) l
hackers:. . . . . . . . . . & E9 O! D" N0 Z. Z; a4 h
hackers: so late, and how not offline? 1 k+ j+ {+ w, i% k. }6 {
white: Oh, is the next, and I went to pull the power
' Y6 }# I, f; D6 C hackers: Slow! You will not shut down? 6 s. Q3 v" \3 e- n5 |% @9 e2 i( a
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power . R' v* a$ v+ j0 T4 K
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
: E  f7 x2 A  ? white:. . . . . . I press the power to the hackers call it
, E5 @: B0 s  y6 F, D4 l. A. Y white: You are not really powerful 1 `% ?; U# a$ K; k0 v, p
hackers: so-so friends
: H# r. F' W  [ white: bragging! You have the ability to shut down my machine in the horse.
9 ?1 f- q( I/ Z: b& p5 L! Q+ k hackers: this place is difficult! You wait 2 h( x' H! q% S) }5 R" ]% ]1 ~
hackers: Haha, buttoned regret it
7 g: t/ x* q! o- c& n white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
- t2 V4 H& r6 F% H3 e hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-4-24 05:06 , Processed in 0.171789 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表