 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
# s; P' d6 m) B- ~( q white: how control? - h. A' [& g3 ` b* D
hackers: white with a Trojan
+ W' `5 X! a+ c* H: y:. . . . . . Where? I did not see
- {( I0 y* q4 ^, _0 p3 _3 z hackers: Open your Task Manager
8 n0 `! p1 D4 e, Y* \" d white:. . . . . . . Task Manager, where? ^! x, g. j4 n2 l: G" G9 e ~
hackers:. . . . . Your computer below! !
. w( ^* W4 W% G1 ?, { white: \;
3 ^$ N- T( M$ ^# X7 { Hacker: I have control of your computer : g0 }# @1 v: k& W T( v
white: Oh & z) n& e3 _0 `; X5 {
hackers: a funk? ! Hey
5 o( |, p9 v2 I white: for the just, help me kill the virus it, many of the recent problems my Lord : q5 L6 ^& M! j
machine hackers:. . . . . . 0 o( s& T0 r3 X9 H% X. D
* p J) |! J8 | r! O0 ? white: how do you always in my computer and out of & P5 f' T4 y% z! U8 k7 m; [
casual hackers: You can install a firewall E) l0 D b: \2 F
white: install a firewall, you can not access it?
& h0 K1 J' G4 l3 I+ Z hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah # W% ?9 p- H7 ^& d+ K
. q4 N% N- n8 p& f( [ small White: I heard that you will create a \! 6 E1 v6 q) U; y. L/ U- ` j
hackers: ah 4 e% B+ t# t, u0 d
white: you can control someone else's computer? !
! T) L& Z3 W8 S- r3 J. D& F hackers: General is the
4 m8 ^4 ?& T; Y& ?8 l+ @ white: you can black out those sites?
: B4 c7 F3 N# A( C2 ? hackers: of course, did not hear people call me a \
5 c7 R& ~) ]. b white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . . Y2 B5 c, n7 n; Q
\! . Z7 L! V( o% M% c# c5 y8 d- l
white: every day you come in, do not feel tired of it?
3 J: V& Y7 m8 a% G* @ hacker: is a pain, your machine is the worst I've ever seen in one of the
3 ?$ E! ?, x0 O8 j+ o white: is not it, this is Brand
: V! I: E* O- M% Y7 [ Hackers: I was mentally retarded in addition to your yard game machine only virus a 2 s) g4 A" C; r7 F) Z
white: Oh ~ ~ that you see me The \. . . . Goodbye - [2 w- n9 Y# E7 [! j
w& ?# j7 P3 K* ~( n$ i
hacker: Hey ~ ~ ~ I come!
9 u6 n, t, A5 E) h5 H7 `5 _* [2 d white: not seen you for days, was my firewall blocking you? + @6 H" `/ P' u+ y, ^& j1 z8 ?( J
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
" }9 G5 }+ @; L. u5 O( _1 ]8 X9 K white: I want to Please help a busy ' H' U6 {& t+ d$ g) O
hacker: What? - z' G3 e0 j) K" x1 n" s, K
white: you can not modify the point into the power system data
! S7 A: X! L- P. G. {3 y hackers:. . . . . . Why do you want to! ! 8 s+ D; G( j9 [
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
! b, f& W0 S& K; r# W. B hackers: die! !
( d. J7 u2 {# K$ l6 ^0 F % i) @! I+ S0 c9 h
hacker: you die Where is? ! ! !
( W/ Q& s/ ^7 p+ P% A3 X: O# n white:. . . . Go out and play for a few days, ah, come to me why
9 B K8 ?- g# W( \8 o Hacker: I'm looking for something ; s' q I* c% M* Q% K9 Z
white: what I find here?
$ B( t2 M# P. }7 V hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights + G: b x" N0 z& R9 F3 l' S
1 O3 a `# S- g0 z1 ` most hackers : I come! !
9 Q; s4 O. i6 F. [& N. . . . . . $ [5 `3 J) P8 K; [ T
hacker: how not to speak?
+ X7 u( `# X" y4 w: ] white: a bad mood / s( T! i5 I5 U) x' T1 d
hackers: Who bullied you? % O z6 G: k ^; Z
white: a Q No. I have not lost inside of my first love
. g( P) D5 k9 m" Z Internet hackers: this simple, I get it for you ! T+ s- B n- g: o: ?
white: do not get back
' o9 z! H3 v5 _( J/ g( ]" X% [* K hackers: No, tell me what number? ( Y; H! @8 N! s) L% D. |
white: Woo ~ ~ ~ ~ just do not remember
: l8 B v% l" g/ q , B' X, F5 j/ ^) A* v( j
white: you gave me out! ! ! ! 1 |6 x* m+ Z; K& D5 e
hacker: how wrong? ! 1 @9 v% [/ Z* C& b6 Q) {3 h
white: You are not the forum to use my ID to play it? ! ! 3 V9 _ w0 i% H9 s
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
# x& j- |) W- Z. F white: it does not work! ! ! & O% L4 K K! J
hacker: how should you like? ( ~4 A* ^/ t9 R2 a
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! : m/ y0 A: n2 h3 O5 r
; }) z; V/ t# [; c hacker: Hey,ralph lauren pas cher, I did a lot of fun ) l4 y: ?! U7 _7 ?2 m' d& Y
white: what
4 V6 q& T7 D3 F" g: o hackers: I go to the forums posted the top
6 q6 G, D( C& q/ Z& X: E7 J& T8 s white: This very common ah
. G1 @7 I X& X* X: q( @8 @% o H Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent ! w& A, X, W/ c# r4 Y6 ?
white: Wow, very enjoyable, and I can never dare, will be blocked! 8 Y D* n; }+ K) V" {' g
Hackers: Yes, has been banned. 6 n3 f; t2 P5 C2 ~6 C' a
white: this is also fun? ! 0 c0 L0 h9 U* ], M/ |! P" L
Hackers: Yes, ah, because I use your ID ) T& n5 P% b( c
white: you are pro? . g9 Z) o! y! O' Z! I& H# Q& n- E
hackers: You can say it. $ F" H. V M/ R4 z! H
white: to what extent high?
* A U1 s7 I3 |1 Q hackers: ah, I am bored when their own + x. R( D! z/ |: b
white black: Ah, this I will!
% u: L. F' N/ d- }9 D hacker :#?%! You can? !
. a8 p: H4 R; l8 C white: Yes, ah, a black off it. . . . . / F! C1 k' |" j/ ^: Z
hackers: Go!
7 ~1 M( E' e9 X& E' A- y white: Ask your question 2 y9 I. Z: u: J7 r: h P
hacker: says 6 ?; ]; J7 l- M1 l9 Z J
white: Besides me, you can also control other people's computers do ? # K a9 I* p" ~2 T7 R
Hackers: Yes you can. . . . ( ?% v, D/ N" q0 d3 e/ J
white: no networking is also OK? 6 s. z3 r$ e% M Y. R. |
hackers:. . . . . . . ; ?/ }9 n' D" N( I/ q
white: You can remote control to open someone else's machine it?
3 Z6 H* i5 s. o: E; S$ F hackers:. . . . . . . .
8 \, K3 s$ @8 `5 B: R white: You can steal top-secret file it! ! !
- O j f$ n9 g. \ hackers: I think you see more movies, go to sleep
% O E2 O* U% d2 y4 @) B* t white wash: my computer is broken
& k( n" q0 f8 H* K% @1 o1 H( o hackers:. . . . . . . Just checked, your computer no problem $ Y1 A' @1 [, g6 B. M' m _, @3 L
white: that is, you bully me
+ v; x8 @! ?6 `: y6 q6 z hackers: No ah ' F! V- L$ u" S; {8 k
white: You are! MP3 files are passed to my no images! * t( }4 l# r8 R# |/ D v
hackers: help ah ~~~~~~~ ) s4 A9 [' Q& L" [; K
white: Ask a computer problems can you answer?
) \3 o& I `, ^& r" |! W Hackers: should be able to
, U# S+ v. Y1 |9 j! A6 M1 F white: Which key on the keyboard the most handsome? ( y9 k T3 D! N' M; y
hackers:. . . . . . . Do not know 9 @, Q8 K& Y) D9 j
white: of course, \! " g% c3 u1 V3 |' m
hackers: halo ~ ~ ~ This is a computer problem? ! ! * q; l+ u& c, E2 m7 O
! L- {" S" X" e5 R: v. _ white: ask you a computer problems you can answer? * e( G$ [9 Q+ F* d' f
hackers: If the problem is not your idiot
4 O' w8 w' q2 W; m0 ?$ G white: I am serious! ! You can operate my computer? / E# x8 O7 i( d, r, e! V5 f1 K
hackers: ah,juicy couture shop, yes
# H: w* N, ^5 Y! Y; G white: that problem, you can solve it % y0 Q6 g( J2 _/ V# [8 k' ^
hackers: Your question is, should not be difficult ; / J4 {3 `( z# E) _% @8 a# b- a
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
5 z. d6 ]) n3 K Z8 [ a hacker:. . . . I excused
1 g# `& s5 C' @% Z& L( t white: we see meet you?
% `6 k) o( f1 ^& \ hackers:. . . . This, not so good, why should we see 5 d* u3 z0 F2 w! ^; J5 @
white: I want to see you are not the same and I would like to
* W8 W- [& t4 `& o3 Z Hacker: Oh, what you think?
- ]( i* u+ p9 c white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
6 l/ m' ]/ Y# a% _' r6 \0 w% N hackers:. . . . You say that Spider-Man, boss!
/ ?1 n5 h0 O1 }. f9 q( p4 T hackers: Kazakhstan woven ~ ~ ~ 7 B4 B X) T2 b2 Y i
white: You called every day, is not very curious about me? 6 ?, o# `5 L4 X( X
hackers: not curious, is the habit, easily came in
9 [0 |& J) b* W1 s8 q5 `6 m/ B5 a white: Well, I have a good way to change your habit 4 _4 e; o3 D. R I
hacker :. . . . Oh? ! Any way
" t9 c6 f9 A! A, A/ W/ G' \ white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
1 @: [& m5 u1 Y0 G0 N' M hackers: Genius ah! . . . . . You can also connect to it?
8 C7 K) v( T* `1 b white: to ah, and slowly the hymns!
/ M4 |9 O, h/ [. V- ?! S white: you every day into my computer, is not very curious about me?
. n) Y2 u3 Z' x; |1 L3 p/ I hackers: No wonder, only used 3 V' u' g# {: k6 y: L$ b9 f
white: no you're curious about the place? ( W1 l% X4 ?0 p" c. f" ]- a
hackers: a ah, I always wanted to know your machine so much as when the virus crashes * s$ L1 O- H& U" f! t7 G
3 m! ]1 T# J6 _& b! d3 S: n! n white: I would like to control your computer
7 H& B B9 A/ h/ u Hackers: I will not have other people access my computer I will be mad
2 r/ X1 E! S: O: O white: This is not fair! !
% M4 n2 X3 V2 s$ O hackers: ah, well, you control the good of the
, o8 @9 J1 K' {8 u9 C% r white:. . . . But I will not. . . . 1 T; `: b' F; |0 A$ C; B+ U! ~
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
/ p% C# o h. h. X) F* @" j O5 \ Hacker: I'm white
/ F3 [' h) N! H I) \ us again: This is probably the last time we met the 3 p/ k- J; J9 |' e" B
Hacker: Oh? What happened? ; d7 H9 B/ T6 H' x' B4 g
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
& W% u5 H* B7 I( [; ^ hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
1 \1 R$ ^) f l* K5 @ white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! - C; z ^; q' d# U
hackers:. . . . . . . . . . / g1 y9 i B) c) q) A
hackers: so late, and how not offline?
( |4 M/ s0 i @0 y( I; T! e$ g white: Oh, is the next, and I went to pull the power
1 [* J7 o; N; Q7 O& _5 N hackers: Slow! You will not shut down?
. k% L/ m/ q# {. m# `: n" y) w white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power r! T4 R6 Q7 U# U% D
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& [( K# j0 b& G* B; G; Q
white:. . . . . . I press the power to the hackers call it $ h0 U) M& ^% {( F9 c
white: You are not really powerful
3 a& v+ L) r+ V hackers: so-so friends * @6 \3 K; ?' H7 g! M
white: bragging! You have the ability to shut down my machine in the horse. 7 _9 O j9 j0 C3 l6 J4 e; Z' o
hackers: this place is difficult! You wait 6 W* V/ D7 @2 Z7 [
hackers: Haha, buttoned regret it
; o' h$ i" g) f$ r white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . ' y% \3 d, G4 M& A
hackers: halo ~ ~ ~ ~ |
|