 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
/ |5 ]$ p- v8 O# c white: how control?
& r5 e* n+ w1 A6 T0 g! v hackers: white with a Trojan # t0 F7 k/ ~2 w) {, i
:. . . . . . Where? I did not see 6 M8 Y$ @! r! ]1 B* k- P
hackers: Open your Task Manager 8 Q& U! ?. x$ U2 F
white:. . . . . . . Task Manager, where?
. F0 j- s# e4 z. b% @# D hackers:. . . . . Your computer below! !
. q9 u R. [6 X4 B4 s white: \;
6 \5 Q& g) g+ ?& f Hacker: I have control of your computer ' \/ W, f) c, `
white: Oh
( z/ Z0 Y* Y% S( p' M hackers: a funk? ! Hey
$ a0 v" n+ I; F. W5 X& Y7 T7 K white: for the just, help me kill the virus it, many of the recent problems my Lord
, H2 w+ U; x T, o8 v7 C& P, @' H8 p1 Y machine hackers:. . . . . .
3 i& X# t2 L& O2 r6 U6 H( N * m& D* Z0 v2 n, t2 B
white: how do you always in my computer and out of
; L7 @: b/ }) u" Y casual hackers: You can install a firewall , |, G/ u! D$ q" z- A
white: install a firewall, you can not access it?
2 F; p9 [7 ?4 U0 m* I hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 2 B' V0 u, L% {! i( r. V
$ z, X/ c( o2 b; x/ |$ y4 D
small White: I heard that you will create a \! 8 N$ x( f0 C, H0 i( g/ w( p
hackers: ah
6 d9 K+ ]7 @0 p E; r! Z/ f white: you can control someone else's computer? ! # W+ |- L' S' M6 W. ~- B# x' Q; u
hackers: General is the
- v4 F) O5 o% y# y# u) U white: you can black out those sites?
5 G S" F9 k4 x8 Y" L% S hackers: of course, did not hear people call me a \
* @9 ~" J! v6 T+ ^9 h4 n white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
9 t2 i% i+ w$ Q! Z \!
$ B, k. Z! ~& @$ j* b white: every day you come in, do not feel tired of it? % z7 r: T4 ~3 D, @. x) Y9 U
hacker: is a pain, your machine is the worst I've ever seen in one of the
6 ^ B$ w F; N+ M white: is not it, this is Brand
7 y9 o" r" o9 w4 e Hackers: I was mentally retarded in addition to your yard game machine only virus a * S T" v+ m" S. e; _
white: Oh ~ ~ that you see me The \. . . . Goodbye
/ o/ j( a( M0 j! f: x3 Q5 D r! f
$ u! \# V( n) E# a hacker: Hey ~ ~ ~ I come! 0 ]7 N6 F, W' Q* T3 {% K
white: not seen you for days, was my firewall blocking you?
" Y% N4 K; k3 O0 w: l! y9 K hackers: Haha, jokes, on your machine is easier than my own, not you miss me 0 \, F: q' U' l3 H0 H
white: I want to Please help a busy
p" Q' g+ k# b6 v8 z hacker: What? 2 [6 @9 X- L2 Z; O& ]" w5 b' [3 ^1 B
white: you can not modify the point into the power system data
7 K) x- S" f' J8 U7 U% {. t( Z hackers:. . . . . . Why do you want to! !
1 ?# H8 Q+ e# d8 C white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . : d0 `4 g# t/ z7 B Q
hackers: die! ! # K$ C1 ]5 P6 N2 T# h
$ u' \! |+ H, ?( a2 q; i/ i! c* \
hacker: you die Where is? ! ! ! 0 @4 M* x0 I$ Z) B8 l
white:. . . . Go out and play for a few days, ah, come to me why ( Q* w9 t2 J4 N
Hacker: I'm looking for something 6 _& B9 d$ s; m7 Q
white: what I find here?
- U5 n, z$ Y8 j+ L; ~ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
5 ]& N+ ~5 O0 Z4 o* d; c w
* r& Q6 i2 T& e3 B# X most hackers : I come! ! 0 g! |- U- }3 [$ Q/ C1 n
. . . . . .
3 s; D1 W+ E* C3 Q; u hacker: how not to speak?
$ u' Q) l7 s: Q# W8 d V white: a bad mood 4 \4 P" t; U% `
hackers: Who bullied you?
5 T8 u. ]+ s5 {+ n! J- D4 M: O white: a Q No. I have not lost inside of my first love ; ~# B$ {# E5 Y& @6 r; t
Internet hackers: this simple, I get it for you " B5 S& H$ E. |9 j1 @7 Z
white: do not get back . B% E" Q, E! Q/ E
hackers: No, tell me what number? * }( U: s2 R( ^! ~
white: Woo ~ ~ ~ ~ just do not remember ) n: a0 `' W6 S/ J9 l3 r& e* |) J
3 x1 ]( ~+ x$ i4 z- t
white: you gave me out! ! ! ! ! W" o! C1 g' O4 R! S6 Z
hacker: how wrong? !
! y4 A' F2 R0 `6 X' T0 T' o) A white: You are not the forum to use my ID to play it? ! ! % }! b2 n8 v. H' `( X
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 8 \3 r: l$ m0 H$ p
white: it does not work! ! !
: @/ K1 M. Y7 R% ~( S# @ @$ ^ hacker: how should you like?
( K) k8 c- x) [: A: C white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! + [, T# s- w0 f5 S" t
/ L( M7 V" M4 _0 Y$ a Y hacker: Hey,ralph lauren pas cher, I did a lot of fun
( l$ G; c X |& E4 d( W2 p( Y; j white: what * h9 l% H: Y8 |- i
hackers: I go to the forums posted the top 2 a( W8 S$ g, D3 e, V1 H" `! K8 ~
white: This very common ah
" h: r. V' C4 P1 P2 N Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
& ~8 S5 {- A2 H& S3 g. x white: Wow, very enjoyable, and I can never dare, will be blocked!
% q1 o2 ~; ?( z Hackers: Yes, has been banned. ' E: a6 y f: V' F- K o
white: this is also fun? ! + e. }1 P O! U- _4 J/ t2 W
Hackers: Yes, ah, because I use your ID
3 ?6 ^& y' I* u6 z2 n0 t9 ?, P white: you are pro? ) _0 o! h; t1 m
hackers: You can say it. & v5 R: p: y( M+ B4 m" h. e6 ~
white: to what extent high?
: J$ _; C. K4 @+ ?, x8 E hackers: ah, I am bored when their own
: d/ O2 W7 Z5 S: Q9 l& U' z white black: Ah, this I will! }5 a2 h+ M a' T& N
hacker :#?%! You can? ! ; @2 r$ K; [( C$ S+ G
white: Yes, ah, a black off it. . . . .
. n4 |. K0 W: p$ T3 { H3 Z. p/ j hackers: Go! ! c2 ?7 f3 T C6 w
white: Ask your question
, D- I; k2 N* M) m2 H1 ^( Y hacker: says - B' s2 Q6 A2 [8 K; B7 r* E
white: Besides me, you can also control other people's computers do ?
# y1 q& r: X& m+ X8 Z Hackers: Yes you can. . . .
- a& T: ~3 Q5 t white: no networking is also OK?
0 o. R: D1 Y+ B( D hackers:. . . . . . .
( v; e: O2 J* Y4 }) q" ? @ white: You can remote control to open someone else's machine it?
. `$ E% {) S b/ a8 y8 t" b0 d hackers:. . . . . . . . 9 f n9 U/ P( q: q7 M8 p Y
white: You can steal top-secret file it! ! !
. a* a$ U! i8 j4 z' p hackers: I think you see more movies, go to sleep $ z/ d& w, _: |/ H7 }: G
white wash: my computer is broken
! j3 C" s; I( B! \- y; ]" }. b9 e hackers:. . . . . . . Just checked, your computer no problem 3 G& j6 z6 k! q0 Q6 T
white: that is, you bully me 0 h& g$ P0 y9 o0 I1 p# Q
hackers: No ah 7 l, x6 E i* s* R# F
white: You are! MP3 files are passed to my no images! 1 `% y1 ^3 H/ t' `) ?" A
hackers: help ah ~~~~~~~ 1 @* R. o% `3 {) }! S9 n, Y* i- U8 b5 j
white: Ask a computer problems can you answer?
9 S- k$ x: D2 p X; \" \ |$ m Hackers: should be able to . B7 }1 O j0 k0 { u. [
white: Which key on the keyboard the most handsome? ' w! m" b, S4 X+ a8 V
hackers:. . . . . . . Do not know $ A- P8 i! C. I4 V3 `+ b( |
white: of course, \!
$ x$ F8 T! G# E/ W% Q hackers: halo ~ ~ ~ This is a computer problem? ! !
* K. F& {7 ^3 c/ Q" x
( Q+ d+ ?+ B1 }8 }2 v white: ask you a computer problems you can answer? 1 \9 c& U. l3 _5 s/ _- T
hackers: If the problem is not your idiot % Y3 d5 z& O' u* F
white: I am serious! ! You can operate my computer? ' V4 K. Z" Z' ]0 x/ s: c
hackers: ah,juicy couture shop, yes : ]# E [- Z& N
white: that problem, you can solve it , `& h5 F( R0 @4 T& I$ g
hackers: Your question is, should not be difficult ; 1 D) D# B) y5 s* z6 w# v
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
7 G. n" O: [: g: {: l& `8 S$ x a hacker:. . . . I excused
6 G4 n3 K$ h4 t% z6 Z0 V white: we see meet you? ( |8 }- Q; |1 q6 \# j
hackers:. . . . This, not so good, why should we see
0 ?2 ~- a- U' }) u: A; z8 { white: I want to see you are not the same and I would like to
8 G X3 ~5 l. X/ ^ Hacker: Oh, what you think?
" ]+ d2 z0 S( C4 n: E# J- @ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
; W3 t! c5 |9 G' y hackers:. . . . You say that Spider-Man, boss!
( q7 N& a+ I' F8 l, g; o hackers: Kazakhstan woven ~ ~ ~ $ T. V0 N$ A4 h* y+ w
white: You called every day, is not very curious about me?
' y3 T8 h* h6 [8 u- J* c hackers: not curious, is the habit, easily came in ( j) s: ]+ v. |0 [- W, J) Q2 H5 u
white: Well, I have a good way to change your habit
7 i q; S* O: C5 n8 a9 _ hacker :. . . . Oh? ! Any way
# U6 N# t" L* K9 ?$ G2 a8 y white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 9 m2 I; J* M4 Q* f, M1 V- _
hackers: Genius ah! . . . . . You can also connect to it? ) }4 W/ v5 j7 I% z0 b
white: to ah, and slowly the hymns!
( n9 N' f# U6 x( h8 y) K white: you every day into my computer, is not very curious about me?
6 }) l, |% O. x0 u! Z4 u1 Y hackers: No wonder, only used
* o$ x8 J7 T: ^9 w: t k white: no you're curious about the place? 5 h: e; g( g |# f- P/ l. u9 M
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 7 x. H: z4 j0 ]
, A$ H" s; d$ {
white: I would like to control your computer
4 z" i ]3 _ i* X Hackers: I will not have other people access my computer I will be mad : Q+ @' h' J$ f0 u, Q' K5 }
white: This is not fair! ! 8 v" q0 g4 m5 t5 b( M, K# x
hackers: ah, well, you control the good of the $ |2 y" ~' c. s+ |
white:. . . . But I will not. . . .
# C, ~* O) ?7 m, N- F' }+ H( t+ { hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
2 B( K5 N% P! w/ w; F% g9 } Hacker: I'm white
+ e) U( V4 X# J' S0 C us again: This is probably the last time we met the
6 v8 D/ J* w1 M: Q- U" [ Hacker: Oh? What happened? - @1 h7 r: _8 m1 H n
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
% N9 B+ M( I% s; N- }. k hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 9 B" b$ s4 E& D' j5 }5 S& q
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! : _2 U3 c9 U5 g1 ^) O
hackers:. . . . . . . . . . % R+ f7 q3 E) g" @
hackers: so late, and how not offline? 9 J1 n# F$ j0 ^( P2 u
white: Oh, is the next, and I went to pull the power 2 F8 f( [. E; W+ a0 z
hackers: Slow! You will not shut down? 3 D1 t+ J# L. B* m7 ?& u7 Q
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ) F: H* B$ Y k I% f2 \
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
* r# ?7 A1 x) e( c8 U+ K white:. . . . . . I press the power to the hackers call it 2 L5 _. g( q! f# G
white: You are not really powerful
- P. V, Y* ^3 z0 t1 A3 w hackers: so-so friends , @* s- M7 K& {: D! ~; b3 A4 z
white: bragging! You have the ability to shut down my machine in the horse. 1 Y$ b# r' @" a! c
hackers: this place is difficult! You wait 3 l% _& s9 g' o- C1 ~/ \
hackers: Haha, buttoned regret it ! u& g5 F7 E' K7 @
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
7 {$ ]" ^) K4 d, E: J hackers: halo ~ ~ ~ ~ |
|