 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
5 B1 X# @! V0 p0 r1 O& x white: how control? 4 n) o2 b- e" q7 H7 ]0 { @& S" y4 n
hackers: white with a Trojan & C2 x- K3 y2 c6 F8 Q" G B
:. . . . . . Where? I did not see
/ D& E. I& v% t2 v hackers: Open your Task Manager - w, ~6 d; r* C1 N& }
white:. . . . . . . Task Manager, where? & [3 f. `- g* x# H% K2 C) y) i
hackers:. . . . . Your computer below! !
# e: a& R8 X0 }& l white: \;
: z' B- N) I! R Hacker: I have control of your computer / k+ r4 s0 h: x( `+ u* n8 z
white: Oh / V( r" u! Z3 y/ K
hackers: a funk? ! Hey - m. }9 |5 ~8 ?0 \& A3 d3 A0 X
white: for the just, help me kill the virus it, many of the recent problems my Lord
8 A$ p3 i$ X! p7 G machine hackers:. . . . . . 6 H T3 W5 l8 W. _
. T- c8 k% S) @8 H3 P6 W
white: how do you always in my computer and out of 7 X' Y9 g( o' C* a& a2 _
casual hackers: You can install a firewall
: \1 _' P$ @4 ~( s+ l3 K white: install a firewall, you can not access it? 2 H6 q# G* f' v# |5 t2 A
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
) V2 h( g* }$ H+ }) p! i$ @
- E6 j( O! z; f+ h8 d) _ \7 n small White: I heard that you will create a \!
' s- m6 D' t/ K0 q+ p hackers: ah
$ W+ @- i9 r# W( f: c, n3 { white: you can control someone else's computer? !
( [( k2 v5 H7 @* m2 _& z) r, d hackers: General is the - i1 f! o8 |, e" t9 i4 v; z- m l% E7 q( ~
white: you can black out those sites? - v2 d6 A3 G# I# z
hackers: of course, did not hear people call me a \
; y- d$ l# Q! A3 n white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
" e0 g2 V7 p5 z) }+ J \! 5 P. n3 k4 ?1 _/ v- ] i
white: every day you come in, do not feel tired of it?
3 U a. \2 \! }3 u6 Q& \2 G hacker: is a pain, your machine is the worst I've ever seen in one of the
. p6 z2 ]+ h; K) Y) x# k' z white: is not it, this is Brand
0 ]6 q8 T8 K/ m: X Hackers: I was mentally retarded in addition to your yard game machine only virus a
7 s& g8 d2 P$ X- l6 g) k/ S white: Oh ~ ~ that you see me The \. . . . Goodbye
7 \2 F% V- |/ r/ h6 W 3 d3 U* _( l6 y6 t+ j: S8 k
hacker: Hey ~ ~ ~ I come!
" j- x- C/ B+ `9 E# \4 z white: not seen you for days, was my firewall blocking you? ( P1 w6 ]9 T% v* o6 l
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
& s% Y. `% g, y2 c white: I want to Please help a busy
/ \3 z4 |: `% X: ~ hacker: What? 2 Q5 g% U& B N3 `! ]4 t
white: you can not modify the point into the power system data
6 P. ]$ K# v, P1 h hackers:. . . . . . Why do you want to! ! 7 W+ o% C& U( d3 j3 q i4 m
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
, O3 i' }$ b; a4 y+ l7 ~: n% j hackers: die! ! N, r: ` E0 u- F3 Q7 D, ~1 a
5 l5 Z# l% U6 Z2 a9 i
hacker: you die Where is? ! ! ! 5 G! A! ?5 {. g; i; n
white:. . . . Go out and play for a few days, ah, come to me why
9 R4 Y5 N. C" }* s) R) g Hacker: I'm looking for something 9 j/ A1 z/ P" w# B2 \: P3 h
white: what I find here? . l! W( K. T& f3 ]
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights - T y0 R; ?: g% S5 q
$ `; G4 y8 a$ C z4 n7 J) I- ~ most hackers : I come! !
" ]6 @' r' y! y( i2 }. . . . . . ' C9 {0 Q! _# r2 L/ Q2 K3 [0 N
hacker: how not to speak?
/ W3 W# j; ^$ Y- H; ?/ V+ X white: a bad mood
7 K; J1 p3 k: b$ H- H hackers: Who bullied you?
# J8 z1 i# @* T" i& h white: a Q No. I have not lost inside of my first love
3 }) ^$ `! j! G9 ?. N) a. @: M Internet hackers: this simple, I get it for you 4 ^; w7 E/ N. ]* I
white: do not get back ) J9 G2 I" h7 _3 g; U: G9 |
hackers: No, tell me what number?
7 U) G. u3 L: c9 L4 { white: Woo ~ ~ ~ ~ just do not remember 2 Z1 K, C( T. }, e9 Z( M' ]
0 q. o7 o% W, } Q3 y
white: you gave me out! ! ! ! , E; `) N# o3 ^8 C! Y
hacker: how wrong? !
; {0 x6 q$ A; L3 j$ O1 e white: You are not the forum to use my ID to play it? ! !
6 N8 X7 D8 `0 H, B* g4 n. z. D hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
" x5 ^3 U* q8 r7 A white: it does not work! ! !
, q4 ]& q7 Y/ a+ J& g! s5 C7 ]2 t( V hacker: how should you like?
, U9 x; y8 p8 L6 C1 Y) `* Z, W white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
6 n5 I9 _ u/ ?5 G ' u' ~9 y# B1 P- U8 l2 h4 b+ Y
hacker: Hey,ralph lauren pas cher, I did a lot of fun
P7 F0 Y6 e4 z, v) ]1 ] white: what # |6 d5 f( E6 F
hackers: I go to the forums posted the top ! H2 W& j1 L% Z! z+ ^' c" V) y
white: This very common ah ( R! C* K5 ]' T6 S E% ^- y3 R- E
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
% i0 X& v. e0 Z white: Wow, very enjoyable, and I can never dare, will be blocked! d! B, r% ~$ z2 T* e. t
Hackers: Yes, has been banned.
% ~: R* \! z0 h W white: this is also fun? !
4 _* \) p) s0 U( L/ [ Hackers: Yes, ah, because I use your ID
5 V0 F6 o8 q6 ^9 o0 w6 S" a white: you are pro? , A4 y" c4 V" |3 b7 e4 K
hackers: You can say it.
8 e k# K# c# i! X6 U white: to what extent high?
/ I+ A6 h7 g! d) T$ s' I hackers: ah, I am bored when their own
5 c+ b7 E+ W" d! Z white black: Ah, this I will! : m9 Y- v: Z/ Z! Y; W
hacker :#?%! You can? !
+ {4 x" ]8 ^. t+ c white: Yes, ah, a black off it. . . . . : ]* ~. t0 {: D3 x, h% D
hackers: Go!
8 A$ u. G3 p5 L white: Ask your question
9 ^$ N* U# p2 t. N) n) R1 V! ] hacker: says
0 l: {. X: o- U. f) h' ^* N white: Besides me, you can also control other people's computers do ?
- V1 I D4 I+ @ Hackers: Yes you can. . . . 9 I+ i, B% ^3 L1 q% u3 J! _3 P3 P6 E9 z: e
white: no networking is also OK? ; d) n) p7 \2 d6 }, ]5 e$ A! _2 P
hackers:. . . . . . .
: R8 X2 C: q( ^; _ white: You can remote control to open someone else's machine it? 1 ]) u# K& K+ L/ K) `6 @$ T
hackers:. . . . . . . . 0 `3 h9 o- C: o+ k0 L; |4 H Z5 |8 }3 u8 N
white: You can steal top-secret file it! ! !
! _& V9 G6 H- _ _- Q hackers: I think you see more movies, go to sleep # ?* {' Y) t- k2 q4 f/ U. M+ X+ J8 r
white wash: my computer is broken
( K9 w& F( m/ u5 T9 p# | hackers:. . . . . . . Just checked, your computer no problem 5 ]# s- H; A6 j3 S9 Y
white: that is, you bully me
+ C) u S+ i- S1 ?, _- N hackers: No ah ( z3 h6 U! G s: V0 Q# t
white: You are! MP3 files are passed to my no images!
* D& c$ p; N6 f hackers: help ah ~~~~~~~ & T( _7 J4 q8 ?8 Z) Q* v" C I
white: Ask a computer problems can you answer?
/ W4 @/ T/ x6 o2 x9 g) [* G; |4 H Hackers: should be able to
6 ^' D! {& j7 R$ y1 ]4 [% } white: Which key on the keyboard the most handsome?
H$ ` Z' ^# b% k$ c, r7 e hackers:. . . . . . . Do not know ( z3 L8 p& \2 t3 p# N8 a: Z8 l
white: of course, \!
: [ W. a: Q$ Y6 b; K hackers: halo ~ ~ ~ This is a computer problem? ! ! * P/ P& G5 C: t, Q4 v7 n
4 s6 S6 ~! y% v9 M- E& E. ?
white: ask you a computer problems you can answer? + L( k" }! J+ t" ]2 {
hackers: If the problem is not your idiot
6 j& o- ~3 V( d( x white: I am serious! ! You can operate my computer? 3 b* x2 [: l$ R
hackers: ah,juicy couture shop, yes 5 |8 Y! c# E1 y5 }$ P" m- v
white: that problem, you can solve it
9 ?: L8 j) P5 _ hackers: Your question is, should not be difficult ; 0 |: Z) H$ R" ?1 W5 v! {
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
% u* u( u; G7 x P' G; ^0 r" R a hacker:. . . . I excused g4 f* d: k5 I6 w9 z
white: we see meet you?
) ?/ d: u- R. l' T: T: _4 X# P$ x* v$ k hackers:. . . . This, not so good, why should we see * m& }: x' i \, b+ l0 i5 ?! m
white: I want to see you are not the same and I would like to 4 b7 A$ l7 w! P* ]
Hacker: Oh, what you think?
; B4 w( }9 N6 u! {* D: t: U& I' S white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights / N! r `' s) ]9 L! r
hackers:. . . . You say that Spider-Man, boss!
; W5 j. Z# e I" k3 Q hackers: Kazakhstan woven ~ ~ ~
+ W1 h* H! P3 {$ L2 e0 b( o1 r1 `# A white: You called every day, is not very curious about me? ' t- j% q: v5 q5 {" @$ B7 ]
hackers: not curious, is the habit, easily came in
; o9 ~7 q6 |+ v+ y white: Well, I have a good way to change your habit
- W( T j" C# E/ R$ d6 Y hacker :. . . . Oh? ! Any way ) h1 F' E! X( `( O. t. l- y$ Q+ d
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ % y7 A3 ~# `0 O8 v
hackers: Genius ah! . . . . . You can also connect to it? " M, a9 h3 \; u( C5 Y
white: to ah, and slowly the hymns!
6 ?; T: ^ G/ `1 K: P1 d% q1 K6 o white: you every day into my computer, is not very curious about me? . V! ^5 S% S1 X+ D+ s% V! _9 M* o
hackers: No wonder, only used 3 s: ~7 X; ~8 I2 [( l; j
white: no you're curious about the place? 0 z k, e5 h% s" q* M
hackers: a ah, I always wanted to know your machine so much as when the virus crashes , L, S- ^; i- N& M9 d; r) ?
* P u3 ^3 r( W8 a white: I would like to control your computer ! \- F d. M1 M4 `8 g* c
Hackers: I will not have other people access my computer I will be mad + q5 r; R( W3 S& V- r% x8 n2 A/ w7 m
white: This is not fair! !
( k) S: ~5 I% B/ R, U hackers: ah, well, you control the good of the
! a# s' O" f" O3 ~ white:. . . . But I will not. . . .
3 f) b7 \/ }) V) w hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
3 m6 p& X8 y: \. D% H3 X# O# V Hacker: I'm white
# j' b* q$ ?* x3 Y us again: This is probably the last time we met the 1 |2 a" J. p( Y8 K& o% I4 z
Hacker: Oh? What happened? }$ C8 S7 l+ N, S# |9 L* k8 D
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! & p9 l5 G2 R6 ?5 P1 b0 p
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye ; _# c. C, y" U+ L/ Z
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! , U9 ?/ i7 Y: A- U' A
hackers:. . . . . . . . . .
% A# d& D% f( p+ l$ f hackers: so late, and how not offline? * K8 M3 z8 [; \( c6 |4 n
white: Oh, is the next, and I went to pull the power ' S8 @5 n- d! a6 e- e/ _5 ^
hackers: Slow! You will not shut down?
, `1 G5 N; k, P+ P: I; |/ c white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
! m( V& N* T8 O5 b; a+ Y* e# f9 F I hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
a! S$ M7 K$ l0 j& l, m white:. . . . . . I press the power to the hackers call it / U; c' p4 e) n4 P6 A
white: You are not really powerful ; x: b* @+ K2 e2 P! k- ]; X
hackers: so-so friends & y( L# \ u9 b& \8 G
white: bragging! You have the ability to shut down my machine in the horse.
. F. Y, L5 P, f3 j8 f hackers: this place is difficult! You wait 2 L0 I; F% l& i+ @2 k% u
hackers: Haha, buttoned regret it
/ `) G- n/ Z' b white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . - L% b' R! C0 m- z& Q5 N, c( F
hackers: halo ~ ~ ~ ~ |
|