 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
' o, U4 K1 v" K7 g* b white: how control?
1 b: n( ]" E" |1 B) N; S9 f( p hackers: white with a Trojan 3 [" I" P9 X* J' i% H& i
:. . . . . . Where? I did not see ) B; J; w, Y+ D
hackers: Open your Task Manager " ?" @) Q O% ^' v s5 O
white:. . . . . . . Task Manager, where? 0 _- ?: q9 q7 V2 {4 u
hackers:. . . . . Your computer below! !
1 X+ Q! `; Z5 l4 i$ W: E4 e# B# F white: \; 6 A/ D' N; a; {5 | }; X% E M/ a
Hacker: I have control of your computer
+ T. O2 H) T( N* W! }1 T white: Oh ; j' n3 C0 K( n; i0 O
hackers: a funk? ! Hey 7 X" F* p1 k7 {
white: for the just, help me kill the virus it, many of the recent problems my Lord
\5 j. d. V4 ]: X- Z machine hackers:. . . . . .
3 ]5 i# E+ R. F
# @( l% ]' d) ~' H5 T white: how do you always in my computer and out of 1 l2 g: z$ G' A4 H
casual hackers: You can install a firewall
5 |; e/ s; c3 x/ _ white: install a firewall, you can not access it?
8 M( I' x* S7 ~# ]7 m. Q: ^ hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ( u& M8 v ]0 |9 ?+ z, ^
2 g# I; w, w: t
small White: I heard that you will create a \! 6 s9 K, u6 M, y1 W0 p7 |- ^
hackers: ah
7 u, N& E0 x7 c. O c white: you can control someone else's computer? !
; }" q5 W6 Z: R6 \3 J) ~7 o hackers: General is the
6 r2 Z: R4 n$ _; V9 B' y white: you can black out those sites? & _1 a/ v, w7 B* L
hackers: of course, did not hear people call me a \4 P. l/ Y6 |( V. \. A
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
/ j8 P" w0 u/ z K5 l. J, W+ g \!
6 N P T" |! j3 u5 Q2 Q( K4 ?. _4 r white: every day you come in, do not feel tired of it?
& A" q: p- c4 s! b( M hacker: is a pain, your machine is the worst I've ever seen in one of the # w1 n, Y6 X8 N( g4 S
white: is not it, this is Brand
l# D7 x0 V' p! U% k% l8 j2 A+ R Hackers: I was mentally retarded in addition to your yard game machine only virus a
0 D7 n5 [* k& V white: Oh ~ ~ that you see me The \. . . . Goodbye 7 P/ p: q. C1 u$ g
& A* ?8 O; {* v) F0 u" J
hacker: Hey ~ ~ ~ I come! 3 l3 Z9 q7 p9 `
white: not seen you for days, was my firewall blocking you?
; Y# E; H- ]1 ]) P hackers: Haha, jokes, on your machine is easier than my own, not you miss me 8 O4 M0 Z( o4 R! D K: a- y& J
white: I want to Please help a busy * E" m: B$ }) F& W9 ~% h/ S
hacker: What?
+ w0 `$ s6 X+ l4 L white: you can not modify the point into the power system data
* K( _5 Q' j3 k hackers:. . . . . . Why do you want to! ! . K# U3 L6 V9 E
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 9 v9 E! {$ `9 H* ~
hackers: die! !
1 o$ F) O" z0 b- Q8 T
7 y! A: b; e7 U1 A+ U8 z$ i hacker: you die Where is? ! ! ! 7 ~- g: x3 J7 V
white:. . . . Go out and play for a few days, ah, come to me why " R" c- _# ]1 v0 L2 [1 Y
Hacker: I'm looking for something
& H5 O3 {# _+ T8 V3 M5 g/ E white: what I find here?
2 S2 ~/ E; |9 M8 Z' m! z+ l/ H1 ]/ Z; v hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
) o% F! ?" H( ]- [9 Z% o
3 [! A8 \2 r1 l* C9 o0 _ most hackers : I come! !
! G* a5 j, ~$ C3 R; ?- V/ l. . . . . .
5 q) B+ r; W. @- B6 | hacker: how not to speak? 6 f `2 Z4 q1 _
white: a bad mood 3 a& F- \4 Z7 D: r+ [- J2 {
hackers: Who bullied you?
' O+ |6 N4 t. u Z: K; W white: a Q No. I have not lost inside of my first love 5 U3 \& h; w$ R) f8 a) Y
Internet hackers: this simple, I get it for you ; N5 ^5 }! q# a2 B* `- |
white: do not get back
. Y! Z* H6 ?( k6 M, w4 y hackers: No, tell me what number?
$ }5 u0 e/ @7 Z white: Woo ~ ~ ~ ~ just do not remember
9 ?" O) ]) }; k5 o1 N5 A2 e
+ t/ k+ Y% {5 n' b- k: I white: you gave me out! ! ! !
) r: \$ ?# e% G0 c& w4 R hacker: how wrong? ! " x) S. {( }6 Z: [
white: You are not the forum to use my ID to play it? ! ! 7 [! n9 \, E- J+ f& W
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the & o1 s1 N1 p5 W, a
white: it does not work! ! ! 9 s) q' C; o( ~2 @0 D- Q
hacker: how should you like?
9 q- Q4 e0 f! c/ t white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
0 n8 G( @# p/ ^ 6 z. b' c' U+ V/ i( n
hacker: Hey,ralph lauren pas cher, I did a lot of fun
) R; _' A" s7 D white: what 2 G4 r. n( s7 C4 D
hackers: I go to the forums posted the top 4 W* @+ u. S' E: S1 v3 p( Z" d4 I
white: This very common ah
% }& v$ E& e. v$ n9 G) S Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent & c. p* j8 {( R8 j( i# Y8 G+ A
white: Wow, very enjoyable, and I can never dare, will be blocked!
4 B! i. h: r8 {' d7 k Hackers: Yes, has been banned.
G+ m O4 G! `) q7 z7 l# B4 U* v white: this is also fun? !
p! |9 R8 i+ Q3 p6 D. r# j3 c* B Hackers: Yes, ah, because I use your ID ! V4 l& p; ^ n: r
white: you are pro?
; D$ c! \5 T2 x- c+ @, r! `; Q hackers: You can say it. 1 j/ B: X" y1 i/ d
white: to what extent high?
: [% Q2 a- ^$ r# Y8 s& Y hackers: ah, I am bored when their own
. X( K% z9 E% N# F white black: Ah, this I will! / K+ D, F4 _) }2 f3 u) H- }
hacker :#?%! You can? !
& R! F2 ], @: T0 c, Y# ^; K: ]8 ~ white: Yes, ah, a black off it. . . . .
9 V8 I: J2 x. R# q7 ^! P hackers: Go! / b1 {! u4 ^5 o- t: p# o! m
white: Ask your question
5 R2 ]# w- z6 L hacker: says
& r' y7 P( O ]0 I& j. X white: Besides me, you can also control other people's computers do ? 8 R+ E% K( G! D" A
Hackers: Yes you can. . . . # r7 p9 y) P1 V/ T% s
white: no networking is also OK? * G9 B5 x0 N D4 x) r
hackers:. . . . . . . , x* i }- B" D4 Q
white: You can remote control to open someone else's machine it?
8 ~3 u1 M8 Z6 s% q( s6 \ hackers:. . . . . . . . ) O8 Q7 r W; o. G
white: You can steal top-secret file it! ! ! 0 M; U2 |: \3 @
hackers: I think you see more movies, go to sleep
( F. A, i- ^# ^. V white wash: my computer is broken ; ^( N/ L4 v3 L& Y
hackers:. . . . . . . Just checked, your computer no problem 4 j# o8 @/ }$ P6 p& M, o
white: that is, you bully me
& l: L! R* {6 `' O7 `) L hackers: No ah 7 {5 _! j' N# _
white: You are! MP3 files are passed to my no images! . c8 P4 `: K8 e
hackers: help ah ~~~~~~~
2 Q0 `1 ^5 m, Y9 x& e L# |. w white: Ask a computer problems can you answer? . V; G1 G, x: U2 Y1 d$ s
Hackers: should be able to
" m. O4 f9 d; H+ n0 X1 | white: Which key on the keyboard the most handsome?
1 L0 s+ Q' O" a0 [) i hackers:. . . . . . . Do not know : Z* b# F: {7 p. U% L- |
white: of course, \!
. D X+ F. z6 R; W- W; n3 J$ z hackers: halo ~ ~ ~ This is a computer problem? ! !
( I' k- J' @5 ? 9 \4 l5 L# N6 Q" W1 z
white: ask you a computer problems you can answer? 6 L4 V% j& V1 i- r' `; E7 q
hackers: If the problem is not your idiot 7 s# i# ~/ a$ [* S* U8 P1 u
white: I am serious! ! You can operate my computer?
+ Q' k$ t& F" i x: M. e0 r$ c hackers: ah,juicy couture shop, yes % p: _$ W2 ]: S! ]) a
white: that problem, you can solve it * R. P1 M! @4 r! v! H1 K
hackers: Your question is, should not be difficult ; 2 g8 b1 c4 U! u8 O4 ]: ]8 y& a* S
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 I3 Z. U/ ?5 r3 F( f3 [ a hacker:. . . . I excused 4 S$ a6 ~3 x3 I
white: we see meet you? / X0 o6 y B9 x
hackers:. . . . This, not so good, why should we see
% e+ y4 S0 [" N9 a, n white: I want to see you are not the same and I would like to ( ]( f: ^, G6 e1 M5 b. W+ e
Hacker: Oh, what you think?
9 S8 B9 Y# t7 \ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
; f! Y* l+ [7 H0 w/ g$ I hackers:. . . . You say that Spider-Man, boss! $ o0 n# m# v/ N j- Z
hackers: Kazakhstan woven ~ ~ ~
2 f2 H$ X# b* T7 X4 t& K white: You called every day, is not very curious about me?
+ T$ n1 y: W' w0 }; G hackers: not curious, is the habit, easily came in
L5 |% F% O `" d. `/ s5 ] white: Well, I have a good way to change your habit
) `% K' D0 n- A2 m9 t( o% ` hacker :. . . . Oh? ! Any way
4 b* B; r A1 A1 S4 k white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ & \3 S* ]! Y9 t+ u: N5 B
hackers: Genius ah! . . . . . You can also connect to it?
# |2 D# ^5 G, m# q: G7 S/ J8 _ white: to ah, and slowly the hymns!
6 A+ a# r8 B& q4 L9 a2 E4 [, \ white: you every day into my computer, is not very curious about me? + ?8 z4 O4 Y' ?, }* r4 y/ A6 e
hackers: No wonder, only used - F8 g; V8 A- ]+ s4 Z
white: no you're curious about the place?
0 o2 s6 r1 c4 T! K# p' y! Z hackers: a ah, I always wanted to know your machine so much as when the virus crashes , R! p5 ^: i9 j% R' a$ p
: b" I! _+ ]6 @( q* K
white: I would like to control your computer
% O0 W1 i# p4 }5 z" w1 v, q Hackers: I will not have other people access my computer I will be mad " x X" V$ e' W4 b$ Z0 ~( L
white: This is not fair! !
0 ^( m+ }9 D! d8 G* Z hackers: ah, well, you control the good of the
0 k) c+ m4 ]/ S white:. . . . But I will not. . . . # `& v. `( Q3 ]4 B) c
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! : B8 X. E1 d, e* S1 ?
Hacker: I'm white
8 O2 d5 R: N. F, N us again: This is probably the last time we met the
0 P+ j) y V* i Hacker: Oh? What happened?
; M9 _0 Q2 m3 e8 y% [ white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 2 i5 j! M: V( j$ X/ M. Q6 d) B
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
* [* L. K9 D6 u2 N: _" D, N- ? white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
* d3 D0 _5 Z V hackers:. . . . . . . . . . ; Z& c/ `0 c/ M) c* e$ b* L
hackers: so late, and how not offline?
! e* M% F: `2 E" Q* S6 W white: Oh, is the next, and I went to pull the power
) i- V" c! C5 P* O! R- U$ n, p hackers: Slow! You will not shut down? 3 e& @9 O6 l$ F$ P8 o- Y
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 0 o2 V k+ S# y8 w
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
0 ~0 L8 b7 w+ I- y0 u6 @ white:. . . . . . I press the power to the hackers call it " R! x# D$ R5 j; m6 z( \2 N
white: You are not really powerful ) ]% Y" K$ @, x
hackers: so-so friends
2 {7 G) g4 p Q3 H6 \ white: bragging! You have the ability to shut down my machine in the horse. : I) t/ m4 y1 N0 w8 Z
hackers: this place is difficult! You wait 6 N/ v# I& r7 V7 `; Y
hackers: Haha, buttoned regret it $ g0 b5 v( Q- N$ z) ~
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 3 K6 b t \( F3 {6 z2 z
hackers: halo ~ ~ ~ ~ |
|