 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer $ d+ W" u9 R/ I% E
white: how control? 4 l4 X9 g, a5 g6 a# x* {
hackers: white with a Trojan
+ O) Z# o; v0 G) Q4 M" f0 r:. . . . . . Where? I did not see
) ]& q" h f/ U! W$ B hackers: Open your Task Manager 0 P% n- I* l" a0 n, d2 _' a
white:. . . . . . . Task Manager, where?
) R7 J' i% F/ J hackers:. . . . . Your computer below! ! 5 _, Z* U5 W3 n" h# J; W! x) E c- Z
white: \; 1 Q4 O2 O8 q, Y6 v# _
Hacker: I have control of your computer ! o- A( V( K I: F9 T" J
white: Oh
% N6 r+ }$ ]8 k% ` hackers: a funk? ! Hey
1 O% F; a7 F/ c! Q white: for the just, help me kill the virus it, many of the recent problems my Lord
8 U8 Q1 y, a; Q3 X' S, T( \/ _ machine hackers:. . . . . . h0 U* Y: H- Y5 Y! N2 V6 s* `9 e
! @: Y9 r9 B6 g0 i3 X) n5 y- V
white: how do you always in my computer and out of
& M( K" j1 ?/ D, N casual hackers: You can install a firewall $ g, r3 U/ c# `7 z0 ^& h# T7 q8 B
white: install a firewall, you can not access it?
+ F# o9 c- Y* G" y1 S5 W- @7 y hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
* S! Y- i2 N7 K. C
# C$ M* ~; P% u. u! [5 O7 }8 i small White: I heard that you will create a \! # ^9 A3 Z1 ?* |- i* d4 Q
hackers: ah
9 ]6 T1 C; m: t0 k: \ white: you can control someone else's computer? ! . p' {7 W* Q4 r' L& i
hackers: General is the
4 i! ^5 O: n3 S% D2 i) ?4 y8 h- M white: you can black out those sites? $ W' ^! L* ]- K: j \
hackers: of course, did not hear people call me a \
) Z A0 L( K+ y6 f( f C white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 1 J; I/ z/ h) c$ I
\! % A6 u# t/ E2 X& q
white: every day you come in, do not feel tired of it?
$ {% y- q, y: D! G- o9 P! [5 T1 P hacker: is a pain, your machine is the worst I've ever seen in one of the % U6 @2 j4 D' [4 g# h' \9 Q
white: is not it, this is Brand
# s5 [' k: E, \ Hackers: I was mentally retarded in addition to your yard game machine only virus a
, W9 |- K, j, Z& T white: Oh ~ ~ that you see me The \. . . . Goodbye
8 ?" w* c: \# e" }7 z! P ! _' N! j! P4 w/ M
hacker: Hey ~ ~ ~ I come! , K3 V3 Y4 ]0 o) G- e$ h$ ^' F3 c
white: not seen you for days, was my firewall blocking you?
& e0 C, t- T+ h hackers: Haha, jokes, on your machine is easier than my own, not you miss me
5 r. i( J8 u0 T. ? white: I want to Please help a busy
& B& s! ]# [$ v6 ]$ S7 q& H hacker: What? 9 C; W4 `; \$ {% Y
white: you can not modify the point into the power system data ; F6 I% e' Q% Y# d# h( w( T2 L- p
hackers:. . . . . . Why do you want to! ! 4 `' D, j! M {, a0 e
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 0 W6 {* r4 S8 U ?: }
hackers: die! ! : M$ d4 s! ` F2 V3 s* y
7 p- O/ Q+ c4 M3 F9 w ]7 {
hacker: you die Where is? ! ! ! , X9 w+ o' U6 V
white:. . . . Go out and play for a few days, ah, come to me why $ m" I: p- Q8 O+ C! ]4 ~2 O
Hacker: I'm looking for something # A: J- Z1 k: t0 A0 J x3 w
white: what I find here?
4 o9 z5 k* S/ A! f7 }0 i5 U hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
, x; e; C4 }9 T* q- ?( O( v
9 q- R! G& [; D most hackers : I come! !
/ o% r# ~- h9 m% t5 p7 q( _* k. . . . . .
. C, Y( z5 G( g7 l6 _0 s hacker: how not to speak? u. U4 ^9 p- A( k
white: a bad mood
. k+ z) d d/ W* x A2 R2 d5 @$ v$ } hackers: Who bullied you? ! Z8 z. v; z9 D' i7 S5 R
white: a Q No. I have not lost inside of my first love
1 O; A! y( X* l& q7 U Internet hackers: this simple, I get it for you
" N% ?" J- U; j white: do not get back
1 v) \+ G" |7 _0 s, I* k$ N# ` hackers: No, tell me what number?
+ H3 B) P3 V6 y8 X white: Woo ~ ~ ~ ~ just do not remember
9 C- b2 F- i$ T# O
# _+ {$ ^2 B& a% `3 v F) c white: you gave me out! ! ! ! ! S, a/ f% \" x: E
hacker: how wrong? ! # F5 n: L2 M3 m
white: You are not the forum to use my ID to play it? ! ! ) K% u- S- g* P% s4 u
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
( s3 J- x% v$ v3 I( ~" o1 `! V) L white: it does not work! ! ! 7 o2 F! E* c$ `- i& @9 I8 w3 s
hacker: how should you like?
! w1 R( ]4 ]$ F9 h$ E- V z white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! , c4 V/ J( r5 A5 v
' d3 Q. g' g) \0 R% H
hacker: Hey,ralph lauren pas cher, I did a lot of fun 4 a/ k7 M, ^8 s! ?2 a
white: what
7 d4 D. A3 o! H1 A* J+ G hackers: I go to the forums posted the top
# c$ S8 |, V& k- \1 P& c white: This very common ah . L0 x: b, S( V+ l( l
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
/ B3 ?" G- w' q* p9 A0 z white: Wow, very enjoyable, and I can never dare, will be blocked!
1 Z( y8 h/ M! i Hackers: Yes, has been banned. 0 p7 M! r: K# o# x
white: this is also fun? !
5 ?# w6 ~+ v# c) s, P; C5 { Hackers: Yes, ah, because I use your ID . U" ~ t! A& M2 H" w/ W
white: you are pro?
" `( o$ k: S& s0 m/ c hackers: You can say it.
1 p' N9 ]( m0 p# O! w) [ white: to what extent high? 8 ?9 d) Q$ z& a3 |
hackers: ah, I am bored when their own 0 A) ^0 M9 y; k+ e5 O
white black: Ah, this I will!
+ d1 P" U6 s3 J1 h hacker :#?%! You can? !
; t" \; {, i4 M/ j* d' p! ? white: Yes, ah, a black off it. . . . . " U1 c* ]* b" Z6 \2 v
hackers: Go! 9 v, g5 w0 d+ p) ^7 R3 Z
white: Ask your question
/ q) w2 ]7 L% E hacker: says
& {" F1 k: E$ Y/ L3 W/ I white: Besides me, you can also control other people's computers do ?
0 \; Q) x$ J6 l7 N Hackers: Yes you can. . . . 5 `* r" p3 W, a% {- b) y
white: no networking is also OK? . X' J) `# Y- ]: W* d$ O1 ~
hackers:. . . . . . .
8 }1 W( f; n8 E% j white: You can remote control to open someone else's machine it? / a- D3 V$ }& l% C
hackers:. . . . . . . . 7 i1 M5 M+ p! G
white: You can steal top-secret file it! ! !
D% ]$ C: ?% c hackers: I think you see more movies, go to sleep
/ h; O; U* W: |; n4 ~# r white wash: my computer is broken
9 Q1 c. r. v/ h" e9 v, z6 { hackers:. . . . . . . Just checked, your computer no problem / m9 {1 h/ Q7 ?4 V0 f: u( n+ ^; a
white: that is, you bully me ) I( h) J+ B9 Z3 o5 q# P' g
hackers: No ah . Z$ m6 \( y# o- J- h+ w
white: You are! MP3 files are passed to my no images!
+ S, V5 s7 c" O) W1 ]: h hackers: help ah ~~~~~~~ ' R! e3 R1 W. r7 K3 E
white: Ask a computer problems can you answer? * x* s- Y$ ^1 s; O
Hackers: should be able to
) i( @- R; g9 ~# Y white: Which key on the keyboard the most handsome?
6 t0 s7 J* |) O( T3 y8 K hackers:. . . . . . . Do not know
. U E* e: ?& v( b2 J white: of course, \! - Q9 f* K5 S8 X" c
hackers: halo ~ ~ ~ This is a computer problem? ! !
7 P: n- G# A6 q8 o, b ) x% a; j# I6 l% }6 L
white: ask you a computer problems you can answer?
. ?! B* S% V9 c: z; J$ v2 q7 x hackers: If the problem is not your idiot
$ x& z5 i* D- b- z+ P6 ^ white: I am serious! ! You can operate my computer? * v' W* r1 X( B4 d h
hackers: ah,juicy couture shop, yes ' i1 F: r1 ? k! C
white: that problem, you can solve it
1 J$ K4 A! |! p8 m hackers: Your question is, should not be difficult ; 4 m9 U% a7 `& ~! N7 }
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 Z1 S1 H$ h8 c a hacker:. . . . I excused / r: s5 ^4 S% W" I
white: we see meet you?
! k7 R& ]& g+ D5 ?* }7 h hackers:. . . . This, not so good, why should we see 3 y, Z+ b( Q. y& ~: w7 p/ C5 L
white: I want to see you are not the same and I would like to ! A) n% g/ B' @
Hacker: Oh, what you think? $ h0 c' x" @1 a
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights : C9 E* c% \, ~* l" G' [2 B( n& e
hackers:. . . . You say that Spider-Man, boss!
7 }+ p$ {% W, f! \; u( ^! m hackers: Kazakhstan woven ~ ~ ~
( |5 t& d; y6 C6 a3 l) {3 g9 z white: You called every day, is not very curious about me? 5 f/ e* z* _( l- ]4 \
hackers: not curious, is the habit, easily came in 5 c- E0 ]6 c% t b0 B% r
white: Well, I have a good way to change your habit # ?- z5 s1 v7 t4 I1 a2 \$ B
hacker :. . . . Oh? ! Any way ) b- P( X0 c4 a, \; k( y' R
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
! m" w; T& Q, Z8 _/ i6 ?" g hackers: Genius ah! . . . . . You can also connect to it? 2 G5 C, V) P6 m8 v o- n
white: to ah, and slowly the hymns!
# H' [, ?, T; z2 Z white: you every day into my computer, is not very curious about me? $ Z V" _/ i4 L n
hackers: No wonder, only used 8 Y3 `( x- M$ M1 J
white: no you're curious about the place? 6 ~) p' ]% k$ H3 |4 c
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 5 K0 {# I) }' ^) F$ F0 X# K* O
) n9 m5 x7 G9 ]0 P
white: I would like to control your computer - a- o1 j: R, s$ }( L! P! U: q1 u$ b U6 q
Hackers: I will not have other people access my computer I will be mad : g4 w" g( I2 S0 j
white: This is not fair! ! . c" p" {2 @4 E3 h
hackers: ah, well, you control the good of the
+ i* \) M+ `" u o5 m8 u/ \4 f3 V+ R white:. . . . But I will not. . . . 8 [+ y3 R4 `. g
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
$ `6 t0 P+ v O8 ? Hacker: I'm white
$ a& I2 s/ f, R! r7 } us again: This is probably the last time we met the
, N; W$ @) y8 K8 K# K+ N Hacker: Oh? What happened? + T( n2 d, G6 b; m2 a/ a% v, F
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! / \, d5 a C, {: S3 m
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
+ E; J ~% v' F( a, M6 V white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
0 J9 h) z) E. w' D; A! g0 g hackers:. . . . . . . . . . / Z4 o8 `: r* b" r
hackers: so late, and how not offline?
) o! O9 t/ l; f1 F white: Oh, is the next, and I went to pull the power
, t. s! u3 g4 y( L; P+ H hackers: Slow! You will not shut down?
% }) @* x! U9 p- \ white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
0 L; d2 K8 C/ }* |- f/ c6 O& U hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \8 ?1 _3 f2 |% J8 h( x/ \
white:. . . . . . I press the power to the hackers call it
6 [% C' Q/ T+ H; H white: You are not really powerful
9 B. D9 [: S' s/ w! D# y hackers: so-so friends + z0 B% n; ^# @ A! g
white: bragging! You have the ability to shut down my machine in the horse. ( J. d4 e& H! S8 o( ~
hackers: this place is difficult! You wait
; L, M1 n* _- [8 |4 u hackers: Haha, buttoned regret it
+ I# }! h% s' \6 V9 F- _ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . . o3 W4 J6 W5 S) T7 C9 b& ]- w
hackers: halo ~ ~ ~ ~ |
|