 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
. R' V$ j, e7 w+ t' I9 F white: how control? - u+ O9 \( }* t0 w7 d& l6 C
hackers: white with a Trojan % w0 V' ]; `- h% \: D
:. . . . . . Where? I did not see * G% j3 O$ q; N1 e, L8 I4 }
hackers: Open your Task Manager
( }4 z1 {1 n& o! B; V$ v$ l7 {. A white:. . . . . . . Task Manager, where? " _9 [3 g) e8 {# G1 \. a( q
hackers:. . . . . Your computer below! ! ) [1 U$ k$ g, c
white: \; $ M! c0 q0 `0 O( c W
Hacker: I have control of your computer , t' N. Y( R5 f3 f0 |: v7 m
white: Oh * R7 }3 [; A8 P4 M- s$ Z
hackers: a funk? ! Hey @; w6 G; O! P9 K1 @8 j& S) W
white: for the just, help me kill the virus it, many of the recent problems my Lord + i' E7 A5 D2 [/ |
machine hackers:. . . . . . . y& I* h* V0 H/ ^/ n
. Y7 z7 [3 @$ D* y. q- R
white: how do you always in my computer and out of
/ R- I2 f i! F: I- X; I casual hackers: You can install a firewall 4 G, s9 z" ^7 B' \ k7 K- z" g; O
white: install a firewall, you can not access it? * W. g. D0 s5 m0 o7 |' e+ _3 z
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah , b$ ?3 M# [3 F
0 L# D( K6 t5 N
small White: I heard that you will create a \! * T( N% z+ b1 L+ m. G% ]
hackers: ah + U. R2 S; {( c* o; ]
white: you can control someone else's computer? !
# E5 B! @2 Q' t9 X hackers: General is the
3 b( Q. R/ X2 R& ?9 ]) h9 y9 \$ I white: you can black out those sites?
7 B( D2 L. K/ ?! y# a hackers: of course, did not hear people call me a \* {% k$ h. `5 O( r% g
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
, M* G( \$ c- F- C2 H% d \! 6 O, k& r" J. F1 x9 V
white: every day you come in, do not feel tired of it? $ V8 E/ U2 u4 @, O" O: ?
hacker: is a pain, your machine is the worst I've ever seen in one of the
% y% g1 z7 M1 c- O/ c/ _' ~ white: is not it, this is Brand
! }$ y. Q3 ?% U8 G/ _* F Hackers: I was mentally retarded in addition to your yard game machine only virus a 8 o( X& [$ h7 G
white: Oh ~ ~ that you see me The \. . . . Goodbye
# `* Z+ j ~. T+ Y" w+ v ( K" \4 h9 A5 R v
hacker: Hey ~ ~ ~ I come!
; K0 X$ ]* r4 g3 U1 ` white: not seen you for days, was my firewall blocking you? * K8 @, i# o" i5 D; V( W. h
hackers: Haha, jokes, on your machine is easier than my own, not you miss me # e: p, l( Y+ A$ ^( l' v
white: I want to Please help a busy
' C& X& S& u# w/ J4 l% h! r A* M hacker: What? " W- p j& G- Y# k' N3 I* {
white: you can not modify the point into the power system data ! i# t7 U- e& `4 W& P* _
hackers:. . . . . . Why do you want to! ! , I$ r# y {0 y( U( _3 r4 Y
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . # q( m2 o& N, n. Z
hackers: die! ! - {' I% J3 {& ?" H" s# f
" q: m/ O0 L$ I! _% G8 F8 a hacker: you die Where is? ! ! ! - e" l6 T7 M% U m N5 c6 }
white:. . . . Go out and play for a few days, ah, come to me why # S0 w8 S% \* k
Hacker: I'm looking for something
" P, ]7 Z/ \% p& V" S8 h# X* R white: what I find here? - w& Q' x1 f, Q! X+ a3 _
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ' c6 ~7 Z+ q* G" u! a+ l! C
( V3 x4 K4 t* ^# `5 C+ o/ a
most hackers : I come! ! : D6 {, b$ M. t
. . . . . .
4 F1 V& s0 x! Y" \" n9 g hacker: how not to speak? ! T- ?/ T7 g. ?! H" q
white: a bad mood
. `* o6 T# D& ~ hackers: Who bullied you? ' I1 ?% s9 A' V; j
white: a Q No. I have not lost inside of my first love - f+ T7 B7 t" i7 @
Internet hackers: this simple, I get it for you
5 N/ K* F. ~$ a; G6 ? white: do not get back ' e, `# t0 T; Z, U5 K* p) _( }( B
hackers: No, tell me what number?
$ {6 u6 H1 W; t white: Woo ~ ~ ~ ~ just do not remember
6 d7 t5 p+ I' X3 _
* r- t9 a6 j* ]6 L" W white: you gave me out! ! ! ! + X4 ]* l5 Q7 A6 l5 ?. ?0 K& G
hacker: how wrong? !
' |) R6 q" ~: P- w2 [ white: You are not the forum to use my ID to play it? ! !
0 {. U5 W2 D& H- C4 e" R1 G hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the - ~ i2 ?! V, C& \. J
white: it does not work! ! ! 4 p$ J: h7 x$ _- E5 y
hacker: how should you like? # i2 E/ M1 e% `$ k# {: f& z; K
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
: P% r8 i8 e9 {+ ?, m0 I" M+ {; q
# p0 O. }6 Y7 M X$ r; _( r hacker: Hey,ralph lauren pas cher, I did a lot of fun
! X' G# R( ^9 a S1 A6 D white: what 7 h. a$ c+ b+ @2 f6 d/ C- J
hackers: I go to the forums posted the top & f) S# t0 m0 }& Q
white: This very common ah
4 S" ^8 D+ z7 x# h' @, n5 z0 M2 D Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent + H B4 F7 g, L# f1 z6 S
white: Wow, very enjoyable, and I can never dare, will be blocked! ) r3 H# P" ~' Y1 q$ d* `1 Y& e
Hackers: Yes, has been banned. ) G$ i0 E9 \. Y) Y$ A% I
white: this is also fun? !
) q5 _# v% N! T( W. x, f Hackers: Yes, ah, because I use your ID ) R0 x9 ?/ C/ |& E' ^, T* N
white: you are pro? 3 D l1 l7 ~; |$ w7 ?% u1 ]: T
hackers: You can say it. $ u& `( v+ d+ g8 c
white: to what extent high?
0 P$ W `5 T3 J% X hackers: ah, I am bored when their own ; p; E' A# o8 T8 e. V0 n
white black: Ah, this I will!
2 K& t+ c/ H/ j ` hacker :#?%! You can? !
2 w T N! O* X7 `) U2 X+ M; Q/ f white: Yes, ah, a black off it. . . . .
0 z0 x6 m: g/ K8 R; M9 z hackers: Go! ; `1 @; x1 O9 r# O, N
white: Ask your question
1 m7 k8 ^0 Y3 g hacker: says I# m" c; m6 C4 b2 n
white: Besides me, you can also control other people's computers do ? ! S+ C3 T; |3 v: V2 }3 V9 M% o
Hackers: Yes you can. . . . * g) l4 C0 R5 }; K5 N% P
white: no networking is also OK? $ V$ S' y9 y1 M' f2 ~/ x
hackers:. . . . . . .
; {/ t }$ D& j: ?' ] white: You can remote control to open someone else's machine it?
3 T9 b4 ?) ?/ x S hackers:. . . . . . . . ) [0 X( w: `" X, ^7 i2 m
white: You can steal top-secret file it! ! ! + i, u7 n6 ]2 x; y9 M$ e( M
hackers: I think you see more movies, go to sleep 9 a( k) ~7 t1 Y0 i& R" B& d9 q, A+ d
white wash: my computer is broken
2 d( h0 O# {7 m" [+ w6 P hackers:. . . . . . . Just checked, your computer no problem
" g* I6 b2 E, g4 s2 t. x white: that is, you bully me 7 X- e8 w! X; X* o' D/ w7 s k/ c) F
hackers: No ah 8 {4 j. w- j+ y4 H& c9 K. l9 G
white: You are! MP3 files are passed to my no images! ' r4 m6 Q$ @7 v' `: L
hackers: help ah ~~~~~~~
4 t0 a# e2 P Y+ k5 O5 h white: Ask a computer problems can you answer? , ?% ^- e; m6 D4 N2 `/ R _
Hackers: should be able to
( t8 z. B ]% i' T6 P9 V white: Which key on the keyboard the most handsome?
# \" t' B' E4 G. _' H hackers:. . . . . . . Do not know
" ]6 M; [+ r- s5 m1 z0 _ white: of course, \!
+ K# A# o, }# n" x# O, c hackers: halo ~ ~ ~ This is a computer problem? ! !
, v6 z2 O$ u" Q1 r a ; L; S, [& v6 y# [
white: ask you a computer problems you can answer?
. z( S1 B" ~, y8 H6 ~ hackers: If the problem is not your idiot
8 e' ]8 t" H1 L0 n white: I am serious! ! You can operate my computer? y. [. Q# N1 N
hackers: ah,juicy couture shop, yes
) _- R0 y5 l( @: ?, x) V& b white: that problem, you can solve it
! g; X) `1 h- F) j( y2 r8 P$ w) ` hackers: Your question is, should not be difficult ;
1 r3 J% l. c" V6 Q. V: M) m white: Great, my fans do not seem to turn up,nike air jordan, help me change it ) r7 _/ H5 @% `- G J
a hacker:. . . . I excused ; {* V/ x B, V5 r' y9 N0 h5 V
white: we see meet you? 0 @# J) B7 T# [9 B4 l
hackers:. . . . This, not so good, why should we see
) A6 ~" }# {- C+ a% ` white: I want to see you are not the same and I would like to 5 g9 H) o1 t2 ?# D$ O1 ^
Hacker: Oh, what you think?
) `& g2 b( Y! k" z# |8 ^ white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ! d% M1 H% P! z5 ?5 n
hackers:. . . . You say that Spider-Man, boss!
& F. T' f0 E* L1 _% J B7 D7 e hackers: Kazakhstan woven ~ ~ ~
5 a+ {! ^" ?3 [. k: s7 Q white: You called every day, is not very curious about me?
8 ]! w4 J2 L4 @ hackers: not curious, is the habit, easily came in
1 ^' I/ @$ r6 ]. Q7 K: I white: Well, I have a good way to change your habit
$ D0 x" {4 V8 @7 y4 q& i: \ hacker :. . . . Oh? ! Any way
2 z) M$ d7 R3 @( p white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ " u! M% |$ L4 s O4 ]3 Y" e! N
hackers: Genius ah! . . . . . You can also connect to it? . a( L) U5 _! S
white: to ah, and slowly the hymns!
+ J4 n6 [* v5 B0 q white: you every day into my computer, is not very curious about me?
+ X$ ^ M* o8 h" R/ W' ] hackers: No wonder, only used ~5 V3 G! v" I n6 }
white: no you're curious about the place? ; Y4 G7 g- C/ s) y
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
4 F0 s3 ^. Y% r `% _ 8 M& G U/ Y3 Q
white: I would like to control your computer
8 ?& ?* O4 v* z" X9 q% L! l- F Hackers: I will not have other people access my computer I will be mad ; `0 o8 x( i ` Y0 \3 h
white: This is not fair! !
# q$ R- a. P* f hackers: ah, well, you control the good of the
8 H Q; H; c6 M' p& v, H7 Z white:. . . . But I will not. . . . ( t8 g: C2 S, I Z
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
) a+ d; C: R, @! l Hacker: I'm white
) H6 V# I) n1 c0 J W4 _ us again: This is probably the last time we met the
- u2 S5 R5 c3 L+ {1 k Hacker: Oh? What happened?
, q2 U+ V$ O v5 g white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! : C* j+ J; g. B6 g4 n) k Y
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
; ~6 ^4 p/ r8 Y# e6 t white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
: a; b. |5 ?0 ^7 K2 u8 y$ F hackers:. . . . . . . . . .
5 u8 U5 H5 k! {* a6 b" u hackers: so late, and how not offline?
& _6 J+ f w: Z0 W white: Oh, is the next, and I went to pull the power
) F( O* g3 h( j hackers: Slow! You will not shut down?
0 T& ]: p1 I% S white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power - {% @4 A) N* P1 R; F8 y4 R* d
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
. ~: q; w' |& J white:. . . . . . I press the power to the hackers call it
* B: u+ z6 ] @8 A' W! I% F$ ` white: You are not really powerful
2 w+ J! X+ t2 X3 T8 v) z hackers: so-so friends ) x% l" p6 |' V b
white: bragging! You have the ability to shut down my machine in the horse. 4 [' G; f& [4 y, R0 e
hackers: this place is difficult! You wait
9 J6 ^. _/ _' n# I8 @$ v v hackers: Haha, buttoned regret it / ^( U% l, _ P
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
7 d4 r! n' Z9 u0 n1 s* Q; { n5 D hackers: halo ~ ~ ~ ~ |
|