 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
: k4 C: e& o x+ A( B/ | G5 K& f8 X6 ? white: how control? & s6 w% w" W+ n9 R4 Q0 P
hackers: white with a Trojan + q$ z/ H3 {' ~: Z1 U0 \3 Z
:. . . . . . Where? I did not see
" R5 v8 N+ U9 l1 j1 F2 z3 T hackers: Open your Task Manager
- ]$ s2 o( r! S3 u2 V8 X white:. . . . . . . Task Manager, where? ! \/ i. a% f+ ~/ X' w4 C( g
hackers:. . . . . Your computer below! ! ' u/ x6 |( W) E% k: j f$ y/ L
white: \;
7 Z$ k! Z5 l0 P. l Hacker: I have control of your computer
; f, Z% S% [: u8 H2 x0 ?8 i white: Oh - t3 M+ }! y& x9 ^, P9 i7 d2 _
hackers: a funk? ! Hey
3 T$ N: g1 F0 ^ h6 h, X- x white: for the just, help me kill the virus it, many of the recent problems my Lord 0 v; x( S+ F4 t A9 Z2 c* s5 f
machine hackers:. . . . . .
7 Q2 V1 M) W* E }7 @% `6 \& C" w
3 M" W) C, x" A% A6 v- w; s white: how do you always in my computer and out of + k' t+ }$ Y* C7 d
casual hackers: You can install a firewall
6 X9 `) H+ J$ r0 ~4 p. p white: install a firewall, you can not access it?
2 R3 v! e5 j8 n2 G( C hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 8 S( i$ H! a. H A H9 e/ j7 n$ q) s, K
+ N% [# V& z: y( K( C2 I0 i/ d3 M small White: I heard that you will create a \!
% f. D3 d+ w. c% j: [' w' H( a hackers: ah
2 M+ b2 I2 S% O# ~. d& Y/ E white: you can control someone else's computer? ! ( z6 Y, Z& l1 W' d4 z, K( Z: c) W8 E
hackers: General is the
- G. w/ e7 n; v: E. @: W' g white: you can black out those sites? - t4 Z& }$ b" p# S
hackers: of course, did not hear people call me a \6 ~' K* W5 B/ Z, b9 p- G
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
6 w8 |8 l/ T; ^ \!
$ I8 I3 e! T% @& R0 I white: every day you come in, do not feel tired of it? & o1 ?8 z0 [% N9 l* u. z5 C
hacker: is a pain, your machine is the worst I've ever seen in one of the
7 ~, j3 O" M3 P* T: \5 l white: is not it, this is Brand
5 z6 A7 p5 b' c& v4 v! }; l Hackers: I was mentally retarded in addition to your yard game machine only virus a , i: z, n- G5 t; T
white: Oh ~ ~ that you see me The \. . . . Goodbye
1 c h( C: n* O, |. k
' U6 k" t, k% B% ] hacker: Hey ~ ~ ~ I come! . k7 ]- Z; g6 g% N$ A
white: not seen you for days, was my firewall blocking you? 5 n5 T4 g' d0 G1 M! P
hackers: Haha, jokes, on your machine is easier than my own, not you miss me ( r1 w6 z7 x# Z( Y; g" u O& e
white: I want to Please help a busy
5 v' q- _: F& K! H# J3 O hacker: What? 6 m$ D! R, n5 E1 a+ p. u; i
white: you can not modify the point into the power system data ; o3 {& Z; }3 x
hackers:. . . . . . Why do you want to! !
" S) [; k2 E2 Q: ?) e- M8 w3 q: \. @ white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
; \7 B0 Q# ?$ w2 h: M" O hackers: die! !
7 m6 X- E4 ~; R. d- b9 \ 3 J B% g/ r8 Q+ s7 p) p! [/ Q
hacker: you die Where is? ! ! !
; h4 G, p7 p2 I white:. . . . Go out and play for a few days, ah, come to me why
4 R B& g# [! P& C Hacker: I'm looking for something 0 f8 U9 Y# Y3 d. s$ j# ^! T
white: what I find here? . i3 I f. ^ W6 `, V3 l
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
( e6 J: A, b; B* n9 k V5 X+ V
" _. {& H4 d0 L% q+ h9 | most hackers : I come! !
, |0 J. S* w6 g/ w1 d$ b4 Q. . . . . .
/ u: r7 C5 l4 y: f0 y5 e9 c/ O hacker: how not to speak? 3 ?, S3 z$ B9 n7 j
white: a bad mood
8 I, U9 s' ^0 m( P hackers: Who bullied you? ) c0 L: j) A" |
white: a Q No. I have not lost inside of my first love
! }' L9 ]/ |0 J' {! q9 o% ? Internet hackers: this simple, I get it for you
; Z+ y! `! w! H1 e white: do not get back * [' D" W' ]/ G; J* T) ^6 K
hackers: No, tell me what number? % h* a* X( d! n
white: Woo ~ ~ ~ ~ just do not remember
# H$ I; N+ _5 @8 G
1 j3 @1 [" a2 \4 @. k+ x. F& U) c: q white: you gave me out! ! ! ! % z* a% T0 D. ?, ?/ t
hacker: how wrong? !
5 @# C& N' X. M$ x2 ]4 k% Y; `4 k$ ~ white: You are not the forum to use my ID to play it? ! !
' e8 k+ e# {+ V& P4 m% y hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 7 l/ ~& C( e" B9 C% l4 l3 D
white: it does not work! ! ! " a" R: ], K( |: K! Q0 E
hacker: how should you like?
* \4 S2 t+ S' A0 G, t white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
d6 w) q+ \, H! z# L0 f5 ~" o. Z
7 \; Q, K6 {2 t N hacker: Hey,ralph lauren pas cher, I did a lot of fun
( m# W9 B/ Q: r) d! D2 c white: what
3 k% u* F0 b# B hackers: I go to the forums posted the top 9 k1 T$ r! P" y1 u$ s
white: This very common ah
4 v+ P5 g* e* N8 b D! F1 ~ Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
( U& e H4 Z; _& Q5 f white: Wow, very enjoyable, and I can never dare, will be blocked!
; b2 [; G; v% Z; h+ |* T Hackers: Yes, has been banned.
5 u9 g$ d0 |$ C; s: [. C) d white: this is also fun? !
2 q6 N" w2 s! s" r Hackers: Yes, ah, because I use your ID
1 A; N8 C. U9 V ` white: you are pro?
6 Y$ {4 \- B$ i; L. G4 L: \. l hackers: You can say it.
' ~' _0 D6 r5 O D0 L, z: L, K white: to what extent high?
7 T. O- g3 H- G/ f1 u. i6 k hackers: ah, I am bored when their own 6 t( Y) C2 O W- K: k/ ^
white black: Ah, this I will! 5 |, S/ C6 m e# ]1 j, E: `
hacker :#?%! You can? ! + V7 P+ E. M* m8 b) W4 F: `- [
white: Yes, ah, a black off it. . . . . - a$ X/ s6 z# [7 P
hackers: Go!
5 k) ~ Y! c2 f' K# ? ^' x white: Ask your question
* P- I, z# H/ X d- r5 q7 y4 l hacker: says + z3 R% R; Z& k) u2 S( s4 }: V
white: Besides me, you can also control other people's computers do ?
6 L% j- G/ S S Hackers: Yes you can. . . .
! Q& J% T. R9 r2 H white: no networking is also OK? 5 F3 T5 i0 E8 O4 Z
hackers:. . . . . . . 8 E, M0 a! C" k, R0 i& P$ ]
white: You can remote control to open someone else's machine it?
2 Q. r, g( s e: ?$ s7 M7 y2 ?6 n hackers:. . . . . . . . ' ?! i, S$ h' O* h) @6 u. N" X, B
white: You can steal top-secret file it! ! !
/ v+ j& |% `( P2 L# o l& B) y hackers: I think you see more movies, go to sleep
% d+ K, {, t) r# ?; c white wash: my computer is broken
& c. c* ^% F' U! ?, J0 P6 k5 f hackers:. . . . . . . Just checked, your computer no problem
# Y. ^0 Q |8 k. K1 \2 M# y+ Q white: that is, you bully me
; m5 y* u2 o& H) o3 @6 N$ o hackers: No ah % p# q) I# F% Q
white: You are! MP3 files are passed to my no images! . f$ ?- Q. p1 O
hackers: help ah ~~~~~~~
- y8 r. b& E% b# s& g white: Ask a computer problems can you answer?
+ S0 o' H. y0 `- p Hackers: should be able to
! u# e4 F; N9 D! B, ?) m white: Which key on the keyboard the most handsome?
+ M, ~- A, M# P& e. X- Q2 k) k" I hackers:. . . . . . . Do not know & r" U2 u+ R) Q
white: of course, \! 2 y/ `6 z" }: `9 `# y
hackers: halo ~ ~ ~ This is a computer problem? ! !
- k9 A6 v: x! ~5 M5 Q* b % H/ Y) k6 Z% H: R _, [. H; F* K
white: ask you a computer problems you can answer?
( k; s, U5 m5 Z& P8 M) H( z hackers: If the problem is not your idiot
- ~0 @( d% n1 [8 `7 b white: I am serious! ! You can operate my computer? % w- N. n8 U4 W! I7 Q7 S
hackers: ah,juicy couture shop, yes # a0 T6 [1 u/ [( d
white: that problem, you can solve it
. F8 a f s, V0 g4 d1 C7 W hackers: Your question is, should not be difficult ; ; N9 r" {1 L: ~5 a' Y# P
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 0 [( j; H- R3 t* n0 p; O; h$ k0 k
a hacker:. . . . I excused ! m3 ?7 q8 c3 Y' E
white: we see meet you? 2 l, }7 X& P8 [* f, _# j- b
hackers:. . . . This, not so good, why should we see
6 I& u4 d" l. |6 o1 e white: I want to see you are not the same and I would like to * N+ [; `3 g$ D4 |& }6 y* P Y
Hacker: Oh, what you think? U y# J1 ^, X* l" v
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
* |8 U; q& q ^5 V \+ J& P hackers:. . . . You say that Spider-Man, boss! 4 j0 m) l# B: i" _ E
hackers: Kazakhstan woven ~ ~ ~ : k7 X4 o5 a# S- m
white: You called every day, is not very curious about me? $ @4 ]; p6 J. \, y/ l6 k) g
hackers: not curious, is the habit, easily came in " \! z4 K% F! f
white: Well, I have a good way to change your habit
: H" ~8 v- E) T" d* H: x hacker :. . . . Oh? ! Any way + p% b* `/ u* K; r9 [0 t& L2 o
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 0 N- N4 ]* G1 p7 E. |% g: E
hackers: Genius ah! . . . . . You can also connect to it? ; B1 r- B/ G! J+ w/ H5 y, H4 x2 G2 j6 J
white: to ah, and slowly the hymns! 2 q. w) q" J9 F/ N1 q" i4 E/ \
white: you every day into my computer, is not very curious about me?
~7 n" A" m, P7 l- l hackers: No wonder, only used
- ?9 G8 `6 X( Z white: no you're curious about the place? 7 b5 R# Z# X) W9 ]: P! `* r8 z4 X* y
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 0 j) y- e3 @$ ^
; |2 x- |# P! t, f( h. y* R
white: I would like to control your computer & M' ^2 G5 v7 o: u, V
Hackers: I will not have other people access my computer I will be mad 2 p3 u: g% n0 G: U% I
white: This is not fair! ! G5 l1 @6 r3 q/ d: [; b
hackers: ah, well, you control the good of the
% ?- q- v) E, k1 P9 n. B white:. . . . But I will not. . . . 0 ]) G+ G/ n4 o
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! . E, j. H: C- Z- @3 c7 W+ I9 X
Hacker: I'm white
. g' f( M& m" }6 U us again: This is probably the last time we met the b! M+ v6 j$ h( Q4 t1 V
Hacker: Oh? What happened? 8 `3 O# D" q( h" a% J9 C0 X& }
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
+ ~, H+ G1 P" K! f# ~0 ~ hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
2 J, k$ O% r; s1 H3 I+ C" P white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! & T6 N5 P0 `% A- _* T
hackers:. . . . . . . . . .
9 d5 F4 W% T; \2 [3 g hackers: so late, and how not offline?
! S* _; f* j! j: u( w' | white: Oh, is the next, and I went to pull the power
9 N( y9 N! E" M. h$ I5 | hackers: Slow! You will not shut down? " ~; j9 L2 T7 y( @4 H5 }6 [( ^
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 1 }% I1 P, x& ~! ? O
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \3 m4 V! {) l, V0 E9 ]
white:. . . . . . I press the power to the hackers call it
: }; }0 f3 ]0 Y( ^ p) V white: You are not really powerful
0 l; d) C( `& O hackers: so-so friends ; Z# W! H* e/ E' a7 ^- m8 P- ]
white: bragging! You have the ability to shut down my machine in the horse. ) e L% D+ L; c% t; e- p; o
hackers: this place is difficult! You wait
, t# O: r# y7 f9 j hackers: Haha, buttoned regret it 1 t Q7 g) C1 [* @" S& N4 v
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ! t( t/ o. N/ s, _! |0 |
hackers: halo ~ ~ ~ ~ |
|