 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer " h1 `) W& S2 b6 B! G1 H- v
white: how control? 5 F2 @5 }; T% J& m
hackers: white with a Trojan ) o: }9 Q2 z& X" |! s
:. . . . . . Where? I did not see ; {' W, |1 v' W( G! g: Z
hackers: Open your Task Manager 5 I& d2 U5 Y6 @* f F( ^& N& k
white:. . . . . . . Task Manager, where? $ }+ E2 I' L4 A& `4 N5 b! V
hackers:. . . . . Your computer below! !
5 i8 L! W. C& W3 i1 X white: \; 7 L% k5 E& f4 T
Hacker: I have control of your computer " ~7 k1 p1 X% g) r! B
white: Oh ' P4 \+ k. c# F0 N4 q: |" i
hackers: a funk? ! Hey " f9 W* s) I' q m, G2 e1 s
white: for the just, help me kill the virus it, many of the recent problems my Lord
$ i( `! g. `% G; K8 m* _ machine hackers:. . . . . . ( [( Z# `$ w _8 _0 v/ [$ U% C
) t0 E" h k. O6 u! F' |1 M% ?$ h
white: how do you always in my computer and out of 5 [9 r) w* h' D% g, F
casual hackers: You can install a firewall - K3 [. ~% C+ ]
white: install a firewall, you can not access it?
( ~! {& Z) F6 p0 o$ V hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
1 H1 r+ L y/ @$ g8 J1 d" `
D1 @" T" p; _0 y4 P small White: I heard that you will create a \! * N a+ G; ^: F+ _0 T, T
hackers: ah : `$ j7 Q+ x- K) |8 o( {- [
white: you can control someone else's computer? !
3 [% ^. V4 {# U3 p o hackers: General is the ) P. b/ E7 A6 ~1 z5 A3 n
white: you can black out those sites? 1 s# h. B' f9 b1 L9 W
hackers: of course, did not hear people call me a \
) \4 E. I& e% b white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
7 e; E) D/ o' t- g! e0 Z \! & ?4 M K. `% _! P$ a- w" u
white: every day you come in, do not feel tired of it?
0 c( _8 |4 B2 a8 o' d! n hacker: is a pain, your machine is the worst I've ever seen in one of the
: W$ x: Z- h: d1 U white: is not it, this is Brand
& ?& F, N3 N% _8 a& O+ a! I Hackers: I was mentally retarded in addition to your yard game machine only virus a 0 ~- d9 [% @3 J+ s9 R+ l
white: Oh ~ ~ that you see me The \. . . . Goodbye
. ]* C9 p! z% j$ d; _ * ]# U; C9 l6 t! S# G0 S
hacker: Hey ~ ~ ~ I come! 8 |4 Q5 w3 u8 d& ^& m
white: not seen you for days, was my firewall blocking you?
$ ]: f$ q2 L; R% S. x hackers: Haha, jokes, on your machine is easier than my own, not you miss me 0 k- l: I% r# N$ i) E
white: I want to Please help a busy * }* `: b- Y3 K. q- E ^
hacker: What?
* [+ L+ N7 V# x' A* C white: you can not modify the point into the power system data
) K) y4 i/ _$ O8 o$ c hackers:. . . . . . Why do you want to! ! 1 e. A k) d, D4 {
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 4 \4 q0 ~- `% O7 Q4 T
hackers: die! !
2 f' c3 Y6 Z9 u8 Q4 d7 T5 k% J
- p- m; L b" f hacker: you die Where is? ! ! !
6 }" ^. I% M3 ^( {* H" y: e1 X& ?3 ` white:. . . . Go out and play for a few days, ah, come to me why , P+ e0 c G1 o) T' M
Hacker: I'm looking for something / Z' Q+ C3 ^, s# M2 ?" K
white: what I find here?
L# _2 d# E: E! c1 h" g6 P hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
/ N& Q) Z( W* I/ G8 @ 0 W7 P; F+ e4 C* |
most hackers : I come! ! 1 x- s2 ` c& u
. . . . . . 1 O3 v8 f; f9 {! u7 L0 a
hacker: how not to speak? D7 e4 q4 F7 x* N
white: a bad mood 7 a- C1 G' V4 k4 [/ p- ]
hackers: Who bullied you?
% o: h x" B6 {' I' W white: a Q No. I have not lost inside of my first love
$ m( H% h. F3 `: ` Internet hackers: this simple, I get it for you
5 Y0 R- ~5 C" t4 e5 @ b1 y white: do not get back
. [, g+ L w& Y1 d hackers: No, tell me what number? % c v) s5 q9 H
white: Woo ~ ~ ~ ~ just do not remember 1 d: }2 T3 N1 G" w- w
. |9 t. E' V% q) `/ y white: you gave me out! ! ! ! " N4 p1 D* I% [8 O( S# O w
hacker: how wrong? !
" d% I4 ?$ u& I8 D7 X) N white: You are not the forum to use my ID to play it? ! ! 0 c3 G- M2 ~; p2 a4 Q: {4 v! M' t- J
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
3 E3 e4 g1 u" p- M, W# P* R white: it does not work! ! ! 0 o, k! D' n9 Z8 Y, J& l9 p. W
hacker: how should you like?
( I+ ~. S M5 n, { white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! / a$ s* [" e" o8 L& ~4 j, j& V3 z4 u
5 h' k: y4 K' `' O3 b hacker: Hey,ralph lauren pas cher, I did a lot of fun % O) }; T/ U- e W) r& _$ f
white: what ) x8 M& P- H3 d* _
hackers: I go to the forums posted the top
1 t$ V @1 ^) ]3 p2 W, b3 o" E* a white: This very common ah : _% w3 ?. w8 \) l) E
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent . i: W8 x, J9 @' M. N2 f% q
white: Wow, very enjoyable, and I can never dare, will be blocked! 6 E4 q8 B2 v# W% t; R
Hackers: Yes, has been banned. 9 G8 b# c. k! f( h; f
white: this is also fun? !
0 G( g7 x. T- m6 T Hackers: Yes, ah, because I use your ID . v2 \6 E* }4 C& ?- _# p
white: you are pro? G5 ^2 A2 c2 e! n( U, {; m* }% n
hackers: You can say it.
9 h# \) X9 U& N* _& z; E8 i white: to what extent high? 1 B+ n; r9 e- J( ?
hackers: ah, I am bored when their own $ N) ~3 i9 h0 \" D3 b
white black: Ah, this I will! , u, v, F0 z7 h8 X+ e
hacker :#?%! You can? !
+ M5 M8 b8 m% k0 U" j3 ^ white: Yes, ah, a black off it. . . . . 7 R8 c7 M+ Y' W" x! `2 A0 G
hackers: Go!
0 t& p l: B8 D7 ? white: Ask your question
) N- _: ~; j% S+ e- y hacker: says
# L Q. u5 K P A+ ^ white: Besides me, you can also control other people's computers do ?
% N' M6 F# B% N- Q Hackers: Yes you can. . . . % c8 D9 |9 f1 `+ m
white: no networking is also OK?
. K9 f. a7 E- K3 \% `$ p& {' U hackers:. . . . . . . & g5 m( z1 r7 d% r! m/ s x; l
white: You can remote control to open someone else's machine it?
5 M a/ c- z2 y( H/ {. _2 c' I hackers:. . . . . . . . - h$ E. C$ O% }" }- Q+ ?4 u/ O
white: You can steal top-secret file it! ! !
6 |0 h3 q, R$ j9 Y; [ hackers: I think you see more movies, go to sleep
; i' \8 V* j. z7 P white wash: my computer is broken
4 O. p4 s9 S9 K6 C4 ^9 p% y' ?2 W hackers:. . . . . . . Just checked, your computer no problem
* i6 n! R' ~( ~* m* @# G white: that is, you bully me
( w/ R$ p1 x8 O4 S3 F" }( U" E hackers: No ah : ^9 c$ `6 k. G
white: You are! MP3 files are passed to my no images!
6 w0 l5 Z7 v8 T' I3 M- T hackers: help ah ~~~~~~~ & P6 E0 D, `$ w3 {) O
white: Ask a computer problems can you answer? 6 O+ i3 v5 }) L2 R# ]. ^
Hackers: should be able to * o) W6 h4 }% F. f w
white: Which key on the keyboard the most handsome?
8 N0 S1 A( j' {* O3 R6 o hackers:. . . . . . . Do not know
+ ?/ u3 C) \+ P4 s white: of course, \!
/ k0 ?& e" e/ i1 V4 [# \/ `' s hackers: halo ~ ~ ~ This is a computer problem? ! !
0 q- c, _8 \/ x . q* z! U- t( R3 @+ r, x
white: ask you a computer problems you can answer?
- q. H$ \( v+ j hackers: If the problem is not your idiot
# A, j& f. o) n q white: I am serious! ! You can operate my computer? * j7 ]/ U* T8 E! M. ~
hackers: ah,juicy couture shop, yes " i: T. F% F: C5 y% ~! R' h9 ^6 U
white: that problem, you can solve it 9 |9 g& V/ h4 J1 {# w( c
hackers: Your question is, should not be difficult ;
% L4 s W+ ?2 T white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 b7 {0 d! R$ a' y4 H1 D a hacker:. . . . I excused
+ {# ~. p5 x" ~, p white: we see meet you?
U p$ x r$ |$ Y+ h" m" S hackers:. . . . This, not so good, why should we see
! k9 B% i( E4 _ white: I want to see you are not the same and I would like to ( u# o9 {3 Z$ x9 H
Hacker: Oh, what you think?
$ ]+ l% A O# s6 v; k' z7 {' D. _ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
6 c7 T7 t2 ]% Q hackers:. . . . You say that Spider-Man, boss!
9 Y/ W$ P( p3 C4 ]- \* H hackers: Kazakhstan woven ~ ~ ~ # y. ?: B9 ]! T- S4 y
white: You called every day, is not very curious about me? & M9 \3 c0 G* E$ L
hackers: not curious, is the habit, easily came in
/ I$ n1 ]# H& W; B" E+ b white: Well, I have a good way to change your habit / l$ s* M2 c: P& L5 j4 `% m# A% ~
hacker :. . . . Oh? ! Any way 1 G; e% }3 |) X3 A$ E
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
7 S( B f, [; j* x+ s: G8 E hackers: Genius ah! . . . . . You can also connect to it?
1 j; P ~- y9 N white: to ah, and slowly the hymns!
2 D) ~8 H5 [/ \* o3 U white: you every day into my computer, is not very curious about me?
7 k5 x) g- B; ?3 t. h& [2 h3 Y hackers: No wonder, only used 9 \1 N& m% X7 f5 c
white: no you're curious about the place?
9 { T% u: b# k/ R& J! [ r hackers: a ah, I always wanted to know your machine so much as when the virus crashes 9 _3 Y9 m) Q& x% K: m0 c
7 d: n* R& p: i L; u
white: I would like to control your computer
5 w! j' U7 S- d. c Z8 Y& r$ r9 S Hackers: I will not have other people access my computer I will be mad
1 Q2 B6 \6 k# C8 i white: This is not fair! !
+ @6 {9 X8 C) v* U" F. ?" d hackers: ah, well, you control the good of the
9 w. S0 U n7 | e+ r0 _ white:. . . . But I will not. . . .
. m8 b6 S( }( d/ c* f% X0 u: \2 k hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
( ~* U" X) k8 H" j' `0 v# ] Hacker: I'm white " V: i h) G& e4 O2 \# b
us again: This is probably the last time we met the
' u i6 ]1 F8 F9 Y' k# T6 G Hacker: Oh? What happened? 6 o* O1 Z& ?6 b! p
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 9 r r# F6 s& `; a/ e( V" o
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
7 l! ^+ s& H/ L* `# W' ~1 `' [ white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 2 T6 X, ^& [, q# w5 M
hackers:. . . . . . . . . .
% `3 e5 u- s) V. Y2 G$ D# a hackers: so late, and how not offline? ' p Q4 W U' H7 i- _: q9 k
white: Oh, is the next, and I went to pull the power : V1 l z5 E4 L' L) `( `& i
hackers: Slow! You will not shut down? 4 @4 W& s3 w$ {4 M1 {& U% P
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
+ @, E" i; {- q1 Y6 K, ? \" s# V hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \ F( w5 L, b3 }4 x" V9 d( H/ G
white:. . . . . . I press the power to the hackers call it , l; j1 A% b+ c! t
white: You are not really powerful 2 [) G/ E' f7 r P3 Y+ G) u6 B5 z
hackers: so-so friends 9 U6 u6 E& @0 N6 _ d6 w' |+ O+ e
white: bragging! You have the ability to shut down my machine in the horse.
- n. z0 t0 R& X7 Q- V$ c$ [! d hackers: this place is difficult! You wait ! _( E; @9 l( G% ^
hackers: Haha, buttoned regret it
0 V9 k0 J, S; P$ r; [) ^. k3 V9 U white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . & e8 {2 T0 [1 {1 v' u
hackers: halo ~ ~ ~ ~ |
|