埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 749|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer 4 N' D: j$ V" g
white: how control? + P* j8 Q/ Y1 e% T* ?
hackers: white with a Trojan ! f# X1 }  m; Y/ V" i
:. . . . . . Where? I did not see 0 U6 \, `8 J: r0 y( d: Z
hackers: Open your Task Manager * v; I* [  t7 {4 d9 q$ j) w  e3 S! b
white:. . . . . . . Task Manager, where?
& f) _: A4 k0 n hackers:. . . . . Your computer below! !
) e, s: v# L1 [1 _; X2 c white: \;
: J8 v" }6 h+ R Hacker: I have control of your computer ) S0 N0 w+ @; J  z; Q7 T* C8 q
white: Oh 5 X* X$ z( G8 K- u  S9 B! U
hackers: a funk? ! Hey
5 b; I8 @& Y+ ?+ |# ?4 @ white: for the just, help me kill the virus it, many of the recent problems my Lord   E1 I* B5 B! u
machine hackers:. . . . . . - k( A' s1 S  Y

* K5 g, L' u, c6 }4 q0 R white: how do you always in my computer and out of
/ O0 F! G, L- Y0 ^$ Z2 Z! o casual hackers: You can install a firewall + ~+ p6 O9 j: s; O& i# \
white: install a firewall, you can not access it?
3 f8 J* O5 c$ L3 E. K hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
% ]% ]& W0 {9 R8 U: p- X) _* d . H3 |  ~  P+ q, E
small White: I heard that you will create a \!
! K* u1 a8 U# O hackers: ah # X" }( l3 x$ o9 H& \2 l' w+ \
white: you can control someone else's computer? !
  n. u+ F! u* N/ J( o* P) R hackers: General is the 8 I2 Z) W" i' D  j
white: you can black out those sites?
7 {) }3 m$ g) Z$ R6 m hackers: of course, did not hear people call me a \" F2 C& H" J; H  S4 \& I
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
- I3 Q( P& T( C& j( B  U \! 9 C0 |9 X$ W% |; W; Y+ E3 }
white: every day you come in, do not feel tired of it?
7 \6 e. o/ g& V) D2 k5 d hacker: is a pain, your machine is the worst I've ever seen in one of the
! b* r( p3 d, [! [6 j white: is not it, this is Brand
! J4 f+ I& X6 u( x0 C; [ Hackers: I was mentally retarded in addition to your yard game machine only virus a ; J5 Y" o) b% b! H7 T+ Q
white: Oh ~ ~ that you see me The \. . . . Goodbye
7 N( s2 C  X7 }& ]  ?, O $ m; O9 O7 A& t$ h, {+ f" N3 V7 a1 m
hacker: Hey ~ ~ ~ I come!
3 V2 k( Z7 Z" m3 A white: not seen you for days, was my firewall blocking you? 2 O# U* A% w3 a! W
hackers: Haha, jokes, on your machine is easier than my own, not you miss me 0 h( k7 w5 z( D' v4 y! _  ?
white: I want to Please help a busy / [3 t+ G3 E$ r: c9 c; r
hacker: What?
: ^/ ?& `& w2 N8 b: J white: you can not modify the point into the power system data 8 I6 W; E2 R; _7 M
hackers:. . . . . . Why do you want to! !
$ Z% A  a$ f" c* U white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
# ^7 b  N0 H: e) d2 L hackers: die! !
4 W  D( J5 y, e/ q, R
& A1 o! `1 ]* \: s6 S% A2 k# p hacker: you die Where is? ! ! ! / R' B8 g# j; M2 X, R
white:. . . . Go out and play for a few days, ah, come to me why
6 W) D& }% G. A2 h  u Hacker: I'm looking for something 9 h- G+ G( i, a. v0 C  ~: G1 Z
white: what I find here?
2 y, x! `- U) `7 N" R. e5 | hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights + f5 r' ?* O$ _8 t: F- F
7 l* Z# P* G# A+ w+ |9 |
most hackers : I come! !
$ W3 S2 t# s& m, q. . . . . .
. ~- T7 d# A: J, w hacker: how not to speak?
9 a# r3 U5 c# n3 F7 N2 I white: a bad mood 1 ~5 q1 ~( V4 T9 R4 B& R  ]( R
hackers: Who bullied you?
5 \" Y. p9 [4 ]3 Y  A white: a Q No. I have not lost inside of my first love
: e8 _& H- T, n) R Internet hackers: this simple, I get it for you , U/ E7 g* X4 y! }+ V, D
white: do not get back
' W( |0 D9 ]# `- ^ hackers: No, tell me what number? 6 e: d2 I9 \1 H$ \
white: Woo ~ ~ ~ ~ just do not remember " P3 I1 r, v1 P) z2 E; P. }3 |! M
7 |  E6 I$ y7 V9 K9 _. F8 a
white: you gave me out! ! ! ! - c/ O! l% r& k( n8 N% n( u" I
hacker: how wrong? !
2 F: j+ @) j7 O4 f/ n+ H, `: N/ p white: You are not the forum to use my ID to play it? ! !
2 e( @& Z/ y+ q2 W; b9 X& p# ~" b hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
* ^+ f- {  S: W9 H. h! J. } white: it does not work! ! !
  x, ?4 L5 _3 n9 U# _ hacker: how should you like? " w  g3 I) u- V/ E6 g- D
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 5 i6 O' j& ^! U7 ^

3 Y2 U+ \( h6 J$ @ hacker: Hey,ralph lauren pas cher, I did a lot of fun ! C$ h/ j. Y8 h' Y' U
white: what
7 u3 b$ {* \: |( ] hackers: I go to the forums posted the top
6 p% W2 D; S( B( J5 z8 v, a white: This very common ah ' D' c3 _4 i  s+ s* e
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent " b5 A/ _  w8 d" I4 a
white: Wow, very enjoyable, and I can never dare, will be blocked! 8 |) f4 e; [& Z8 n1 g" l" _
Hackers: Yes, has been banned.
. l2 x. c) D$ v white: this is also fun? !
6 e3 f* z  O/ w+ Y! \ Hackers: Yes, ah, because I use your ID % r0 R; G2 P# ^6 F
white: you are pro? , }  ^( B6 L& ^
hackers: You can say it.
' S& a1 w/ ~3 r# ^ white: to what extent high?
* v3 p: l1 \# D& ` hackers: ah, I am bored when their own $ w, y6 `! W' i7 ]' D" ?
white black: Ah, this I will! . A/ O) R: q7 J" T0 b
hacker :#?%! You can? ! : b/ s4 ~. C* Y5 O
white: Yes, ah, a black off it. . . . .
) a' _; x9 `7 F% W hackers: Go! - V) |* S0 j0 Z/ s3 d
white: Ask your question ; _/ G7 Y6 X2 K8 l
hacker: says 7 V+ O8 w/ S5 `/ _, U- e
white: Besides me, you can also control other people's computers do ?
# X1 M( y& R5 K# d% w' N1 v& B Hackers: Yes you can. . . .
: @1 d7 Q4 C9 j- Y1 {* s white: no networking is also OK? ) Z! {+ }! g8 K2 h( U
hackers:. . . . . . .
/ M" \. o) k2 H$ L2 B' e' B white: You can remote control to open someone else's machine it? ) j" M0 Z+ Z2 a9 E
hackers:. . . . . . . . 4 @; K  F, s3 M' t! G9 q: c
white: You can steal top-secret file it! ! ! ' |  H; M" O8 v/ M% i
hackers: I think you see more movies, go to sleep , O& \. e6 H0 m# q$ ^) Q
white wash: my computer is broken
. @. ^* I8 E! @9 l) U hackers:. . . . . . . Just checked, your computer no problem
! {: A! c# j8 M5 M( H white: that is, you bully me
& Z9 |& y9 P3 ?# x hackers: No ah & u' _4 T- @$ C) @1 y2 [2 i
white: You are! MP3 files are passed to my no images!
# D( D; {% X! }& K2 B hackers: help ah ~~~~~~~
1 u0 f/ z+ f1 H( x7 D& c white: Ask a computer problems can you answer? 1 D- O! A0 {0 S9 H3 u  K$ P
Hackers: should be able to ( o. T* V$ ^: y% l
white: Which key on the keyboard the most handsome? ( z% R3 M1 Q: y9 Y5 Y
hackers:. . . . . . . Do not know
6 d8 ~* g/ V; F# _$ A8 t white: of course, \!
. h" u0 U4 E0 Z, m hackers: halo ~ ~ ~ This is a computer problem? ! !
) |, [. s% y0 T4 {- w/ N
) h4 S2 _1 K4 s0 | white: ask you a computer problems you can answer?
6 w7 @0 P# Z# u0 Y hackers: If the problem is not your idiot 1 g* W" m/ p- J* B% A
white: I am serious! ! You can operate my computer? ; c$ E3 q; Y/ V
hackers: ah,juicy couture shop, yes
7 _+ s$ n6 Z, a white: that problem, you can solve it 4 Y. r- q( @4 G* b
hackers: Your question is, should not be difficult ;
" D, a1 p. B" M5 Y  r% b8 V+ ^5 a1 X white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 J+ l6 `" Y- U, }, j3 {( q& m a hacker:. . . . I excused
# O' B2 ~" ~" R; y& Q white: we see meet you?
6 {& Y$ s% Q! B1 L7 m& S hackers:. . . . This, not so good, why should we see " e$ O( m! Z( Y- s1 G0 H# r
white: I want to see you are not the same and I would like to
; E; J7 C( |) \! K* V- E  F Hacker: Oh, what you think? + f/ ]! |( Z, y, t
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ; h/ a) f* R, b5 S0 [6 M
hackers:. . . . You say that Spider-Man, boss!
0 F/ h9 Z1 f" i  E hackers: Kazakhstan woven ~ ~ ~
; r# m4 V# b; C5 d6 f. J* ?. u white: You called every day, is not very curious about me? 4 i: K( I/ P- B9 t/ H7 \
hackers: not curious, is the habit, easily came in
# M3 t; V/ t# L white: Well, I have a good way to change your habit
6 L6 S) ?9 Z+ R4 s. S- k hacker :. . . . Oh? ! Any way - H( v& h& i1 y5 x; I3 M2 v! d
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 9 P4 d: b6 @% T
hackers: Genius ah! . . . . . You can also connect to it? - C" {8 Y$ J! `3 U$ r
white: to ah, and slowly the hymns! 2 B0 |. y+ B9 I- H  f# Y
white: you every day into my computer, is not very curious about me?
; O. k7 ]3 l6 f  N- Z& T9 m( X9 y  | hackers: No wonder, only used
' r0 g+ J9 j' n" Q1 P7 |: z white: no you're curious about the place? 0 W, o8 K/ ]- T4 u, o  u
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
; E3 w. h4 o6 |3 }   l- Z2 ~+ S) I: D" O
white: I would like to control your computer
9 M3 `: O; r$ L2 e2 K1 p+ J Hackers: I will not have other people access my computer I will be mad
+ H! ]0 q8 W3 v6 A  { white: This is not fair! !
& \9 e. r; g9 m( C- o hackers: ah, well, you control the good of the   Y" _. p4 F& g' R8 s
white:. . . . But I will not. . . .
1 L& c. U- s" H# d3 x hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! " i; Y8 N. o% t+ L
Hacker: I'm white 0 l- S1 l* F1 x
us again: This is probably the last time we met the
" f5 R) C. p0 D3 T1 _% o$ d Hacker: Oh? What happened?
+ w* L$ i% Y, q. S4 o! f9 h white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
( L$ p7 @# h! R9 o" h8 g0 S hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
. B5 j# R3 H0 M! ~, n! ]7 o; K white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! " s* U1 I( u3 k: a! l
hackers:. . . . . . . . . . 8 E0 A9 x7 K; z* _9 a3 Y
hackers: so late, and how not offline? 4 P4 z  t% {, `, k. x) R$ _
white: Oh, is the next, and I went to pull the power
0 s2 j  o' y* h. N- C) u hackers: Slow! You will not shut down?
! C! U8 @+ F0 [8 ]- ] white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ' j$ ?+ B9 ^& n
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
% R/ D' i2 D5 {5 `6 v7 w' d, L9 F+ Z white:. . . . . . I press the power to the hackers call it 2 }; S1 n1 Z8 b0 T% T& f; ?7 b
white: You are not really powerful % p( d) p, Q+ ^# A5 b# i5 r, E
hackers: so-so friends % ~, t5 o: M. y% g; X2 C" V* P
white: bragging! You have the ability to shut down my machine in the horse. 5 G% }" Q' v: \, T
hackers: this place is difficult! You wait
3 o1 v9 e; U1 P2 n+ P hackers: Haha, buttoned regret it 9 w4 p* \& U+ U% g" ^6 W
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 2 X2 g4 i0 v; V+ w
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-2-25 11:51 , Processed in 0.130999 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表