 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer , ?# w, p5 O' N
white: how control?
( D( q7 |/ l0 ?- }. j% Z7 n/ G hackers: white with a Trojan : @; ~/ U L/ c) W( B! b2 j
:. . . . . . Where? I did not see & B3 E7 K5 x) ?0 v4 ?5 Z2 W! W
hackers: Open your Task Manager
2 k4 U0 `- G; N+ S' X white:. . . . . . . Task Manager, where?
6 ]2 ?: N5 j& }7 C$ j! m4 l" E) W hackers:. . . . . Your computer below! !
9 S! q/ X" ?( `& ^ white: \;
: T! N$ }- F! H$ h( B Hacker: I have control of your computer + W3 j) q! \" a7 X6 Q7 o" I
white: Oh 0 {4 M3 r! I& P* D1 c- ~! j, ^+ M
hackers: a funk? ! Hey
: ?: b7 u2 A% y5 n+ I% n white: for the just, help me kill the virus it, many of the recent problems my Lord
0 k( j( A1 q4 h6 { machine hackers:. . . . . .
4 u/ X' s) B) M3 ~
6 B' X- I, ^3 D6 @. }$ L ^ white: how do you always in my computer and out of
! R' Q5 p7 C# |& M& y casual hackers: You can install a firewall ' P% a* S/ H8 L5 B7 \4 a
white: install a firewall, you can not access it?
. A$ _/ H1 d+ Q3 u* g hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
7 A% D2 z1 y! w' o$ U. Y
9 J( l: ~7 P# P) ~ small White: I heard that you will create a \!
: x" E0 K9 d8 @6 v hackers: ah . U% {* u) a7 O' ~9 O& V% O% Q
white: you can control someone else's computer? ! / H. K, j* l! _( a
hackers: General is the
5 s: Z# b, q7 }6 ?8 C white: you can black out those sites? 3 G3 B+ {8 L4 [9 ~6 Y5 r; f# y) t
hackers: of course, did not hear people call me a \
; c$ w* Y% I! ~3 S' ^8 z white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . * k! d$ C7 \3 t5 e
\!
" M: U# H# z3 }( v4 S) A white: every day you come in, do not feel tired of it?
, P, U; i$ w& ?9 V' l+ U1 A hacker: is a pain, your machine is the worst I've ever seen in one of the 2 j, C% M. X0 f, G O( @$ D6 u
white: is not it, this is Brand
6 b4 [( {( [$ h ] Hackers: I was mentally retarded in addition to your yard game machine only virus a 3 u+ V" Z! _6 D$ \, _) d, d
white: Oh ~ ~ that you see me The \. . . . Goodbye 6 G6 T6 J# L G$ U! I d; R# W
7 S) V7 W# n b& D' i% e% `2 e hacker: Hey ~ ~ ~ I come!
2 R* S% X% V( A; Q white: not seen you for days, was my firewall blocking you? + I( a. b2 p7 i8 L/ r# {! d" x
hackers: Haha, jokes, on your machine is easier than my own, not you miss me S$ v' Z* D' _6 P- h
white: I want to Please help a busy
@' v+ u& r2 @% C$ ]# S hacker: What? ; l" Z! e0 l9 n* A+ w
white: you can not modify the point into the power system data 0 Z& A( R1 E* J' `4 i7 O4 a5 F
hackers:. . . . . . Why do you want to! ! - a b$ X! f6 B# N4 t, h
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
$ [3 d6 X. Y1 F) c- R6 J& u hackers: die! !
+ \9 {+ {6 n' u! H% j4 ]& F5 ~
- B8 A9 u2 Y3 k# K hacker: you die Where is? ! ! !
8 G" W% Q! U$ |6 t F white:. . . . Go out and play for a few days, ah, come to me why $ p! Y( \: X! n3 n& I6 b
Hacker: I'm looking for something . x$ e# b' G- T/ k8 @9 r8 l
white: what I find here?
7 k. ?3 [, W) K8 \ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
- i% k4 P! T5 Q# F1 e * p2 A, ]( a r p6 {& I, C
most hackers : I come! !
7 u5 T* O4 k- F. . . . . . 3 G* Y. I4 [6 f# c, R8 X, W
hacker: how not to speak?
# ^& r& k( N' z5 b, g. b* D6 ^ white: a bad mood
# F. `5 |2 M* l! X$ ]% R hackers: Who bullied you? / y! K! j/ \1 N" F6 x
white: a Q No. I have not lost inside of my first love # u- i! [4 V' a! w |
Internet hackers: this simple, I get it for you + ]9 ~7 G. V2 @' P
white: do not get back , q1 ~, V0 _( w
hackers: No, tell me what number?
& d# a9 u( ^# ^ f9 F- Y( @ white: Woo ~ ~ ~ ~ just do not remember / z2 K) B+ w h, v& R. ]
( l$ Q: r4 C" E$ I' ^
white: you gave me out! ! ! ! 9 Q% i7 S. L* z X
hacker: how wrong? !
+ ~+ q$ h4 K5 a$ L white: You are not the forum to use my ID to play it? ! !
: b) _8 ~3 h& }' @* e# y9 l hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
) O y3 ]+ r0 D5 L3 L# S white: it does not work! ! ! 5 i$ \# _: d4 C# ~
hacker: how should you like? 6 [: Q( s7 s0 r8 ^" w$ K
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
: b& V. s2 m& b( o) V. [% q5 T1 [
4 }' K: t, D6 m3 `, ~/ j# d0 a hacker: Hey,ralph lauren pas cher, I did a lot of fun 6 A" P3 l0 C/ J9 h& [- U
white: what * T t0 \# c* t
hackers: I go to the forums posted the top
/ G* V! q2 |0 q$ f( k white: This very common ah
: g" C4 y& L' W7 k Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent & y! c) c) n, O4 [7 ?$ C" A: f& _. g
white: Wow, very enjoyable, and I can never dare, will be blocked!
5 v1 p/ I2 q; ]$ g) d8 e Q5 _ Hackers: Yes, has been banned. : |( j/ N. A6 D v8 j
white: this is also fun? !
' ~. H: B- E8 ^ Hackers: Yes, ah, because I use your ID & i- n# t- }' B* |
white: you are pro?
: F5 r: }+ f- e ?" F. T hackers: You can say it.
1 c' s/ h' I# b) y2 l" d6 N2 r+ k. n white: to what extent high? 3 h: J3 r( |/ g2 Z$ ^
hackers: ah, I am bored when their own 6 g5 |3 Z7 e$ s2 j* e! E
white black: Ah, this I will!
2 R, G1 ~( T, k" {% w- u/ j C hacker :#?%! You can? !
# Y' k8 D# d8 l7 ` white: Yes, ah, a black off it. . . . . 7 z' a- K% L& p$ y, {6 A
hackers: Go!
: M8 w0 o" H. M& h white: Ask your question
# N4 j; ?2 d( F1 P+ L6 T. ~- |. z hacker: says
$ s% X. }! C3 C* X9 f, ~# l white: Besides me, you can also control other people's computers do ?
: i# J6 U* A! Y- B6 C Hackers: Yes you can. . . . 9 |2 \6 M. u& |5 r/ L
white: no networking is also OK? ! D0 j- c( i4 x9 J
hackers:. . . . . . . 6 F2 W! x. w& Y* ~* O6 p- u) i
white: You can remote control to open someone else's machine it? - O; g5 g) F: w" |
hackers:. . . . . . . . O0 s/ z" @$ K5 i! f5 ~/ k* r) p
white: You can steal top-secret file it! ! !
/ a0 v; u" x- { hackers: I think you see more movies, go to sleep
) s1 s6 X* Y1 W* ^9 t( ` white wash: my computer is broken ; _& B) j0 o7 @ J; w. q: O. {
hackers:. . . . . . . Just checked, your computer no problem * a" n* B1 W( l3 v8 d
white: that is, you bully me
9 r2 Y$ _7 V8 h4 X- J hackers: No ah
; k6 M/ P" k* @9 X) S white: You are! MP3 files are passed to my no images! ! c! J5 J8 t) ^; x' h. O
hackers: help ah ~~~~~~~
~# d4 Y* M# v6 P" \ white: Ask a computer problems can you answer?
1 M+ y* l! w- b Hackers: should be able to
8 \$ @) L; s H" c+ [6 B6 f white: Which key on the keyboard the most handsome?
0 F' t( v, S; b2 b, V2 ?8 G hackers:. . . . . . . Do not know
& h" W j# q, [7 b5 k$ Z white: of course, \!
' E0 [. u, o6 }( e+ |" a hackers: halo ~ ~ ~ This is a computer problem? ! ! : P3 Q, X( I8 b8 r3 ]6 ]
. P/ K8 D7 @; m white: ask you a computer problems you can answer? 2 C' A& w1 s7 }2 g& {
hackers: If the problem is not your idiot " S2 k1 M6 B- t, Z% I) s
white: I am serious! ! You can operate my computer? ) N0 `5 O- b0 q; p5 P
hackers: ah,juicy couture shop, yes
+ r: |' t1 B/ |' \' s' s white: that problem, you can solve it + E. c! p; X5 @) l6 P
hackers: Your question is, should not be difficult ; 6 `! b" @5 I7 s5 s
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 z- [* Q: b- |1 e2 ?' D1 D a hacker:. . . . I excused
4 d" W( C- `# a white: we see meet you?
^ c2 U6 Y& U5 ~9 y# p* g' O2 G+ H hackers:. . . . This, not so good, why should we see
# Y) E, [1 W3 n9 _) L white: I want to see you are not the same and I would like to ( c4 ?3 t, `6 K
Hacker: Oh, what you think? 7 O) M& B' u: {4 Z' }
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
+ z" G( J, c; O3 v" n: Z1 t hackers:. . . . You say that Spider-Man, boss! $ b, j9 D) f9 Z7 L3 f$ h8 X
hackers: Kazakhstan woven ~ ~ ~
" f# u" w; F& n white: You called every day, is not very curious about me? ; d4 h1 f* y& J
hackers: not curious, is the habit, easily came in
# f' \( O1 J J3 s6 s white: Well, I have a good way to change your habit / Z+ y. v" ~8 p5 S. H
hacker :. . . . Oh? ! Any way
2 ]6 p; F t0 Z, _/ I, y& e white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
* F# n; X* i5 O5 r" Z3 Z ? hackers: Genius ah! . . . . . You can also connect to it?
6 y4 X3 D7 l) g7 o& F white: to ah, and slowly the hymns! / a' ]) }- M1 n4 h8 u
white: you every day into my computer, is not very curious about me? 7 G, @0 A9 \ t
hackers: No wonder, only used
8 F& ?7 v) }' V8 |7 U) X0 F white: no you're curious about the place? 9 M2 U4 H, x* I1 d# W0 S
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
! F3 A4 X% p+ u2 U4 l% x- |9 p
, ]0 f, i2 B; ~3 L, O% i white: I would like to control your computer + `/ F8 Z. Q' p! P
Hackers: I will not have other people access my computer I will be mad & Y/ c" J! r8 I% [! |% c. b
white: This is not fair! ! " _7 @1 R7 n# J" N
hackers: ah, well, you control the good of the $ }1 C8 s) z5 p7 l2 _# M/ ]
white:. . . . But I will not. . . .
' l& j V5 V6 p3 Q. E0 N hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 9 b5 j: w6 o" O9 I- [
Hacker: I'm white 4 m! ?# o- | D6 `7 ^
us again: This is probably the last time we met the $ R- l7 z0 X$ J3 X- D" c: Z! U/ }
Hacker: Oh? What happened?
) ` O+ `6 a1 e) C; k7 C$ T white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! # f# h( y2 @- J; p7 Q6 ^ ^
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye ! l6 z! ^% E4 T
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 6 M& Q6 n: g; Z' Z8 o
hackers:. . . . . . . . . .
" h7 r0 n7 o7 A1 V5 h$ e hackers: so late, and how not offline? ( S. w3 {% J: Q% f0 c6 y
white: Oh, is the next, and I went to pull the power : L+ d* M3 i0 u; x
hackers: Slow! You will not shut down? 0 K' u: x: f" E* Z g' K9 \
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 3 S1 N3 r6 Y4 T- v
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \! H# ^! G* X3 c4 b( b# @+ e, Q- G
white:. . . . . . I press the power to the hackers call it
2 ^' X8 n6 X6 [* e; p6 N2 V white: You are not really powerful
. D, e7 J- L; R; C, K, Y, j hackers: so-so friends
' I' D1 U- o, E* b9 N" a white: bragging! You have the ability to shut down my machine in the horse. 6 c1 T4 Z* M% h4 D$ W1 G* [# X
hackers: this place is difficult! You wait 5 p$ K5 Y7 y0 [0 Q4 d6 T& l
hackers: Haha, buttoned regret it , z! W, s3 q( {2 M( U6 S9 j
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
8 Q3 T, |& q, h: H7 F# p/ d/ S hackers: halo ~ ~ ~ ~ |
|