 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
+ v |1 J, a$ H! J4 f; D white: how control?
/ `/ w; m1 y1 m hackers: white with a Trojan
/ q; K8 U; o g/ r- O/ m% s:. . . . . . Where? I did not see
8 s8 c6 h9 y/ s hackers: Open your Task Manager , k6 K. N: A- e: d3 W9 [1 O
white:. . . . . . . Task Manager, where? ! d0 d! _! k- A! p
hackers:. . . . . Your computer below! ! % t' s7 z" }; r9 f: ]+ ~
white: \; & D% W5 i+ X/ d2 i
Hacker: I have control of your computer
. a" x, D. Q2 @; f( o# P. E white: Oh 0 o6 ^7 B3 R+ E
hackers: a funk? ! Hey
* }! d; N5 V& _9 S4 m5 T, ] white: for the just, help me kill the virus it, many of the recent problems my Lord 1 k" I' Z g) }- v3 s( H
machine hackers:. . . . . . ! Z' ]& W' V( E' k/ I% ~
! g/ D1 C( q+ U; X0 u; L
white: how do you always in my computer and out of $ I: C- H! L& \* |$ E. ~
casual hackers: You can install a firewall
/ k* k3 Y; W2 F$ b( e7 S( U. x white: install a firewall, you can not access it? $ Y- W" I5 x1 _! a
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah " f' o+ }- Z2 I0 i
}( ^: X+ l: w0 V* R0 C1 ~4 ~ small White: I heard that you will create a \!
; _- @0 m) y9 y. r9 b2 e+ r8 z% {/ E$ e hackers: ah ' h8 P1 N }# \
white: you can control someone else's computer? ! 8 _* q& I- j6 o6 R) O T; g; }& n
hackers: General is the * {* P; c9 P( n/ ~7 V
white: you can black out those sites? 7 [. A& a0 A" F2 f7 L& _6 }
hackers: of course, did not hear people call me a \
0 f3 Y5 m. f- S. K white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
/ ]* e' X) E: @& c8 W \!
2 j- a2 A4 Q- n! d I& Y white: every day you come in, do not feel tired of it?
! X3 r7 W! F" h hacker: is a pain, your machine is the worst I've ever seen in one of the
) f! A! K& r* k2 t. V& P8 M0 k white: is not it, this is Brand 4 \6 c1 }& J; H
Hackers: I was mentally retarded in addition to your yard game machine only virus a
2 }- `8 z8 H7 U* X* P | white: Oh ~ ~ that you see me The \. . . . Goodbye ( |' [$ l) ]' r) o2 ?/ I+ m
4 t) a3 G7 M) O1 t w hacker: Hey ~ ~ ~ I come!
; W: N6 s2 I' k' I9 [$ ]% H white: not seen you for days, was my firewall blocking you?
$ B( R, c' ^7 x hackers: Haha, jokes, on your machine is easier than my own, not you miss me 5 D( c: q9 s! S& m( i7 W' ]
white: I want to Please help a busy
0 F/ V# m. R1 w' @ hacker: What?
8 j: D3 X8 C& Y; g white: you can not modify the point into the power system data
0 J. l6 Y' i9 c0 B3 o; D hackers:. . . . . . Why do you want to! ! . h ~1 z$ |2 ~( }! `
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
4 T# i' q" Q2 s& X: f hackers: die! ! b% l5 T/ z( K5 P7 Y
4 \+ Q% H, q [) e) U
hacker: you die Where is? ! ! ! , h% _. P- n# A7 d8 ]2 L
white:. . . . Go out and play for a few days, ah, come to me why
! y; Z& y, M& a. ^, h* V Hacker: I'm looking for something
9 ]7 m: U7 @3 t: _, d- ?* k white: what I find here? / X# ?4 \1 O" j# B- [# k
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
( }5 Z$ X+ S, M' ~# x" l
: F! s2 F* W, R( Q! v. p& H most hackers : I come! ! ! m3 D4 K/ r7 f, s% ^4 t
. . . . . .
O8 E# U9 e; K hacker: how not to speak?
/ @$ @3 E! R7 v/ W; f3 P white: a bad mood
' M+ B- N( F0 ^9 _! T( J hackers: Who bullied you?
" p; U* J; U' C1 J3 E$ ]- s0 n white: a Q No. I have not lost inside of my first love
5 n4 G4 L$ }9 v1 c+ M1 J2 e3 |7 ] Internet hackers: this simple, I get it for you . q7 b7 Y( P- _/ F9 Y6 ~' J4 \ b9 H
white: do not get back 7 @' D6 J+ J9 _2 I3 O
hackers: No, tell me what number?
: c/ M. B0 Z* _6 X7 t white: Woo ~ ~ ~ ~ just do not remember
3 s# c0 \/ z( e, w4 ]
: Q* [% ]+ n& b8 q white: you gave me out! ! ! !
: ?7 b% g9 p' B Y8 ^5 C' C hacker: how wrong? !
; K5 f/ l+ I- O white: You are not the forum to use my ID to play it? ! ! 4 S$ \1 [3 W+ }
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
! [8 E! ^3 ]0 L. Y K6 w white: it does not work! ! ! 1 t- O+ F# L( ^* }
hacker: how should you like?
" E, G) e4 ]0 L% Z$ |% Y* e& D+ P white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
+ ]: p3 z1 [( L
+ b* h% Q8 ~2 {; _ hacker: Hey,ralph lauren pas cher, I did a lot of fun
1 [' v& ~ _& u& Q7 ? M, T white: what d% K8 V5 Q$ E" N" L! k8 \
hackers: I go to the forums posted the top 5 Y; y* {, A' `2 x" L1 e) i# N2 M
white: This very common ah ' Y5 ^0 @$ c6 F8 J! V+ r
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
3 ^8 s0 N' e8 G4 ?* W& ?9 {7 y white: Wow, very enjoyable, and I can never dare, will be blocked! % Z4 N7 N; {/ E! s6 `
Hackers: Yes, has been banned.
* ?1 |! b7 k+ F Q% u white: this is also fun? !
' m' o& x1 o+ G$ ]3 R Hackers: Yes, ah, because I use your ID
0 l) F9 j' f& G, ?4 P& [% c* f white: you are pro? 5 Y; f& }" k) z2 \( X+ x
hackers: You can say it. * n3 L4 \4 k& y8 Y
white: to what extent high? + q1 h( }0 g7 }( K& n' B
hackers: ah, I am bored when their own
8 U: ]: B3 s4 c. W: B* C/ F2 \- p& s, u white black: Ah, this I will!
5 H1 _% k0 F/ A, c* S! f hacker :#?%! You can? !
. o0 N* V) f6 V U9 y" v& t9 R white: Yes, ah, a black off it. . . . . & D' ]* Y/ ~/ w$ h. ?( n" g
hackers: Go!
( i7 \% Q1 N4 R( H6 w0 w) S white: Ask your question ( l. O; M; \6 l4 x2 [, o. @
hacker: says
1 ~' u; {3 p" M2 `5 x: [ white: Besides me, you can also control other people's computers do ? ) Z- }: n" v( h( I! n
Hackers: Yes you can. . . . 0 e E; f2 ~3 k! C$ J p
white: no networking is also OK?
+ _% X& E3 F0 g, _9 [8 H; d5 K hackers:. . . . . . . ; \; ? K1 l, A. e! o" C* O
white: You can remote control to open someone else's machine it?
6 E. R7 Y1 @/ C/ M hackers:. . . . . . . .
) d( A- s' R& E+ Z# } white: You can steal top-secret file it! ! ! " X; c, g0 I% w: }/ S
hackers: I think you see more movies, go to sleep
1 Z9 O7 x) B) y7 m+ M, \ white wash: my computer is broken # ^$ Y" f# y: x2 F, V8 S+ H
hackers:. . . . . . . Just checked, your computer no problem ; r: _& j1 i- w$ {& w9 W0 b5 Q
white: that is, you bully me
1 X# @% r% k4 l hackers: No ah
- ~# ^/ F: I2 a0 o4 x* o' w white: You are! MP3 files are passed to my no images!
; p& p5 f! \1 K1 A: g hackers: help ah ~~~~~~~ 4 @3 i5 Q, x! w* l T
white: Ask a computer problems can you answer?
1 V0 _9 F# [$ ^* V. X @# J2 c Hackers: should be able to
; [9 L: _) j$ M+ o7 k% E ?% J% G; @ white: Which key on the keyboard the most handsome?
6 v# G7 q6 z! q5 a+ e hackers:. . . . . . . Do not know . `9 d7 @; t5 I1 Y
white: of course, \!
1 g, a* _0 n8 U, q hackers: halo ~ ~ ~ This is a computer problem? ! ! , U$ S8 t% ~# H* s, U8 p; J
4 h; x; x7 X7 d) ^7 _
white: ask you a computer problems you can answer? / ~1 N! R( c2 U4 Y$ N
hackers: If the problem is not your idiot 5 L; G9 v0 S- P5 h/ ~6 d
white: I am serious! ! You can operate my computer?
- `7 g% P6 g' c( }* u hackers: ah,juicy couture shop, yes ' \; a: h& k- d! a% @$ r
white: that problem, you can solve it # X! P3 M6 O$ F! Q2 U
hackers: Your question is, should not be difficult ;
$ V( j+ o6 G# C4 L white: Great, my fans do not seem to turn up,nike air jordan, help me change it 1 F" S$ r$ T% `( N
a hacker:. . . . I excused 5 T" L2 U9 g" i
white: we see meet you? 5 |) z$ b% T' H+ U
hackers:. . . . This, not so good, why should we see
8 o/ J% o9 _7 d0 i white: I want to see you are not the same and I would like to 1 P$ ?) q/ Q1 d! {& Z0 C( g2 m
Hacker: Oh, what you think? 0 n4 S4 }7 s% O6 Y. {: B" X3 L
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
+ c' o% y4 o& M2 |) }2 n$ E) w3 u hackers:. . . . You say that Spider-Man, boss! # k$ ~2 R5 J6 v
hackers: Kazakhstan woven ~ ~ ~
! F' L, T8 ?( m! m0 ] ^ white: You called every day, is not very curious about me? + D2 K3 X) x! i1 X0 p/ j
hackers: not curious, is the habit, easily came in
9 e3 j; G% D8 e3 ~* M white: Well, I have a good way to change your habit 9 y; I4 j$ z, i! K% R) u4 m: f
hacker :. . . . Oh? ! Any way 1 D' `6 u1 S' k$ M9 A& I& y
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 5 C0 Q+ \' W( V7 q% b$ t4 { P
hackers: Genius ah! . . . . . You can also connect to it?
4 Q/ c9 r. k% [: x4 a1 } white: to ah, and slowly the hymns!
9 }) l8 P6 o8 u# H; v! } white: you every day into my computer, is not very curious about me? 4 E; x0 d7 l# a
hackers: No wonder, only used
; x/ ?7 `+ I. @% q( g- _$ Z) }+ F. U white: no you're curious about the place?
2 L! S. O# @) g: Y5 I hackers: a ah, I always wanted to know your machine so much as when the virus crashes . `7 @2 t' R9 y7 J* o
4 j d* `. A7 J, ]1 z3 z9 c white: I would like to control your computer
* C7 V; a% ^ L: o* n+ q Hackers: I will not have other people access my computer I will be mad
# U* ]$ \; f, K o# ^ white: This is not fair! ! # d6 G+ E' t" s0 d
hackers: ah, well, you control the good of the # \& [* H5 N; D( {5 `+ P
white:. . . . But I will not. . . .
; e, g0 M8 ?' e% p) Q( G& L hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ) @/ c( n9 \& S2 @9 ^* w" G0 G9 Q
Hacker: I'm white ; p- t. Z1 ^& Y+ j
us again: This is probably the last time we met the
, y- v) d" f+ l# Z" i6 r Hacker: Oh? What happened? # h4 Z9 |! W3 c& h) g( k
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
6 v9 H8 R% g1 @) k9 S. k) @" X0 o7 ~( b hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
! J; b- D' |" C# `# E2 T9 ^ white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
1 ?( }7 P. T S/ v0 O" l hackers:. . . . . . . . . .
8 \0 ]: B: R* \1 Q- l5 R& T hackers: so late, and how not offline? ) _1 L7 L. \4 l
white: Oh, is the next, and I went to pull the power
& }; Q* }/ Q+ K0 m hackers: Slow! You will not shut down? }' n3 M! h! F0 L: M1 V( V
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
$ l U* D3 Z) _; S" R, I& a+ N/ l hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
' z- D$ T7 Z C- M9 e7 j/ O white:. . . . . . I press the power to the hackers call it
+ a; ]& j, C2 t) ~ white: You are not really powerful
1 u) U/ z: J8 r, W6 I4 v hackers: so-so friends 8 G$ i( i/ }8 q; w
white: bragging! You have the ability to shut down my machine in the horse.
0 u( T# u1 j7 q9 v hackers: this place is difficult! You wait
) F6 L3 R* E- _& i hackers: Haha, buttoned regret it
% _8 ^2 ]7 K2 w9 ^ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
3 p, Z' T- r U6 T9 B" } a9 W hackers: halo ~ ~ ~ ~ |
|