埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 712|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer ' r* ^. ]' y# T: b! [1 I
white: how control? 6 Y2 a5 b0 N- z' {( x
hackers: white with a Trojan
& Y6 H* [  a- b: L3 K:. . . . . . Where? I did not see ( q4 a5 Z, j. }6 S) r; E
hackers: Open your Task Manager
8 V' Q8 B: B" M5 ]( l2 y white:. . . . . . . Task Manager, where?
+ q' y, f2 P. i& s5 d- K hackers:. . . . . Your computer below! ! 5 d+ O+ M: p9 W8 }
white: \;
3 [% ~( [* P- \. h- P8 a2 M5 o9 O Hacker: I have control of your computer   t  \! ^7 |8 u1 n4 \% b: ]
white: Oh 6 Z7 q- n. Y% w0 u( W/ P, e; o6 t
hackers: a funk? ! Hey ' }( H7 q" P0 @& D) |# r6 @+ i
white: for the just, help me kill the virus it, many of the recent problems my Lord
) B7 D0 t2 ~5 j machine hackers:. . . . . . , L; A, V0 C' w+ B
- I6 M/ a2 q5 z
white: how do you always in my computer and out of
9 m- D9 u. o, H( N0 D4 @+ z8 D casual hackers: You can install a firewall ; ]' D3 n8 Y; ^* f
white: install a firewall, you can not access it? ! w$ _/ k7 [7 W  f) x% x
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
: n/ D/ R2 L: {5 b! ~# V
# G% x; c4 k2 I  J' @2 }' e small White: I heard that you will create a \!
8 `7 H3 S4 ]6 a6 r" x; @4 M hackers: ah
( b2 g# i0 u1 U' K4 n+ K/ { white: you can control someone else's computer? !
  Y% j# l* r1 H/ o, J: V hackers: General is the : @. H( O; k7 p3 W4 x$ z9 q
white: you can black out those sites? 9 L" r4 [3 H! a- g
hackers: of course, did not hear people call me a \0 f& p# m$ I0 j  J/ t
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
( e, ]- ?8 K- X  U% d: P \!
0 w- _1 w" n, K) |$ [1 i9 p white: every day you come in, do not feel tired of it?
$ i) l% d, e$ Y- a' N hacker: is a pain, your machine is the worst I've ever seen in one of the
" A" S  Y' F. X; u. C/ f2 k white: is not it, this is Brand + a+ @  f) J( I& `# E
Hackers: I was mentally retarded in addition to your yard game machine only virus a
4 h& p7 m0 r- }4 C; j& Q  N white: Oh ~ ~ that you see me The \. . . . Goodbye 5 g6 ]( J2 H- q: a

" A/ y- N9 f/ { hacker: Hey ~ ~ ~ I come!
  S: C- w. t# u% t white: not seen you for days, was my firewall blocking you? 1 n# T1 E* e' i- A
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
+ N2 Q" Q, g' ]  ^3 y white: I want to Please help a busy ) v6 d2 P' ?) f
hacker: What? : R4 X6 |% |" j% k2 e4 P
white: you can not modify the point into the power system data
" q# y' s) K* `/ i+ ^# M7 g hackers:. . . . . . Why do you want to! ! $ o/ P1 {# v+ J, @# m, E5 h  u
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
0 V2 V- _9 v+ `3 z: D hackers: die! !
' g5 N# p8 l4 W7 |8 v 8 l) k. a- @; {' {4 G) }+ h% w
hacker: you die Where is? ! ! !
- e* q3 a/ `! {/ E" x0 e white:. . . . Go out and play for a few days, ah, come to me why 5 j9 \0 T& v7 o" `+ j# ^. M& g
Hacker: I'm looking for something 6 l; E- `4 u% [  t  B$ ]
white: what I find here? # J, A3 }8 C" ]; N8 D! ^
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 9 G4 Q' M" S8 z7 }# j6 l, O

0 a2 L; l3 q& a2 R, L most hackers : I come! ! ( l$ u, M* G5 @: ~. U0 v  O& X6 d
. . . . . . 7 _/ Y/ ?& }8 X/ z  y) o+ \0 }
hacker: how not to speak?
# i; i2 }. a4 h; o/ J0 E5 `' e white: a bad mood - C6 r$ f9 P- F3 x  f2 b
hackers: Who bullied you? 7 z4 s, l+ D! T3 N
white: a Q No. I have not lost inside of my first love 2 V& m. Q8 D' [5 |% j& @, y/ o
Internet hackers: this simple, I get it for you
2 A" ^% b/ |! x+ e2 s" E! k white: do not get back
6 K9 h. y& f  q' U hackers: No, tell me what number?
! ^$ n$ v, l' P. ~& u white: Woo ~ ~ ~ ~ just do not remember , W6 V6 y0 j; W1 n/ a

' j) I7 M7 {6 X6 l white: you gave me out! ! ! !
, L  P3 A4 J9 y0 \: t( O0 w2 W5 q- L hacker: how wrong? ! 3 `+ R- C) o% W! ^: h3 a: |
white: You are not the forum to use my ID to play it? ! !
2 f# w+ [' f% p8 R# ]5 O0 A hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
1 O+ J; \  {- L% M4 {1 k# u& e white: it does not work! ! !
1 ]& y! o8 e: ~( U+ P9 H) x3 w9 y hacker: how should you like?
' ]: s+ }1 d  F( b white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
( r7 y5 i9 ]& Q! O5 K& Q 0 ]& ^! l1 c! I. T) z4 h
hacker: Hey,ralph lauren pas cher, I did a lot of fun ; v! |! ?! ?2 }! @- S
white: what * V( K" r. \% V& v8 O
hackers: I go to the forums posted the top
* _- r$ d8 b  B9 s8 L4 b* W white: This very common ah
4 K8 @% l. A! F4 _ Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent # D' k5 X) Z4 V
white: Wow, very enjoyable, and I can never dare, will be blocked! 8 I1 U/ ]2 r$ ~  i! y+ S" t1 V
Hackers: Yes, has been banned. + D' ~- A; P1 ?' u
white: this is also fun? !
0 q! V" M/ F- O+ M( J, N% s& t Hackers: Yes, ah, because I use your ID
' k& w6 V. i4 d. \& t. K, l1 m6 x& X white: you are pro? 4 x2 {6 S7 ]5 F4 `/ Y, f" E
hackers: You can say it.
7 U& u2 s1 e2 `- N; |6 ] white: to what extent high? + [" Z0 i0 t+ c
hackers: ah, I am bored when their own
5 q, G* c* g. U) f6 v$ } white black: Ah, this I will! . h( S' d6 I9 p0 g
hacker :#?%! You can? ! $ L. F; M& M7 g0 E
white: Yes, ah, a black off it. . . . .
# r' D# A( d( q% a hackers: Go! 5 d- g6 U" x6 r  e' ^5 E
white: Ask your question ' G) i0 Y2 O& J2 ?  t4 g
hacker: says
& I; X, g) k! e( a# f4 R' O white: Besides me, you can also control other people's computers do ?
3 X; x1 U- X' X8 @( ]: I5 U2 J Hackers: Yes you can. . . . / A4 U$ C- J' Z4 z9 ~/ {
white: no networking is also OK? 7 s" A3 d) y1 `6 B' q7 u* g: C
hackers:. . . . . . .
  R: q  Y: I; G2 q white: You can remote control to open someone else's machine it? - Y% C' X8 S: ^0 @" ?
hackers:. . . . . . . . & Z9 V# L; I- N: V3 J$ w
white: You can steal top-secret file it! ! ! 1 w7 n5 N2 h( [$ a" `: n
hackers: I think you see more movies, go to sleep # W5 U: @  j7 b8 n: _
white wash: my computer is broken
0 U: t& r8 g% ?7 i  A* K hackers:. . . . . . . Just checked, your computer no problem
8 \1 Z; A% |. y9 Y4 ` white: that is, you bully me
( Z$ p! ~! ^+ I% ~6 w hackers: No ah
0 X8 o2 F1 S9 U8 n) z white: You are! MP3 files are passed to my no images!
; @4 k, q' S7 ^* }) a* f# G hackers: help ah ~~~~~~~
6 q. a. D  L4 K' g1 Q2 M2 u" d white: Ask a computer problems can you answer? - P& w- [) Q9 V" r$ B6 m% r/ N( U0 S4 f
Hackers: should be able to 3 C- @; E; s0 l; j7 [4 h! ]6 o
white: Which key on the keyboard the most handsome? $ }& y4 U, L2 O' I2 ]
hackers:. . . . . . . Do not know ) U* b5 O' D  k* B3 F. ?
white: of course, \!
  V4 ?" E4 G" ~" R3 a+ K hackers: halo ~ ~ ~ This is a computer problem? ! ! 3 M  [  d1 B. r  x' l
7 _  d$ \- \" w  H# a/ O! K: X
white: ask you a computer problems you can answer?
( y* n2 e$ B- Q' S hackers: If the problem is not your idiot
% N3 W. [! R7 M& S, g white: I am serious! ! You can operate my computer?
' G& H7 E- R/ T3 Y1 k, c. @" W hackers: ah,juicy couture shop, yes
/ |4 d2 I5 {2 Y- y, H. w white: that problem, you can solve it 5 G0 P; y) I! D1 i$ @4 g) |
hackers: Your question is, should not be difficult ;
' y; P9 m! p. U) R white: Great, my fans do not seem to turn up,nike air jordan, help me change it
# D# z8 j  n4 M% i5 h5 ~9 L6 X* e a hacker:. . . . I excused
* k! A+ f) L; ]% ^6 R7 q white: we see meet you? ( h7 e% r  ^( d5 {
hackers:. . . . This, not so good, why should we see
/ b3 C9 C, N$ q- ]' g6 k& D% {0 @* E white: I want to see you are not the same and I would like to
' n- F7 k! ^2 G8 |; N- k Hacker: Oh, what you think? ! H6 K+ ~2 u( j% h1 K
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights * C" c+ i$ M* t$ l( r( W9 n, G
hackers:. . . . You say that Spider-Man, boss! , d5 \/ E. F6 ]4 }1 x5 D1 c* m
hackers: Kazakhstan woven ~ ~ ~ * U+ w  N& ?* q8 r2 }' v7 @! ~/ E
white: You called every day, is not very curious about me?
+ O! F+ [2 d' K2 e! ~% ~ hackers: not curious, is the habit, easily came in " R& f7 t9 x! Y& J
white: Well, I have a good way to change your habit ' B* L* }" b# J8 n
hacker :. . . . Oh? ! Any way
$ r2 {5 x8 {; N2 I white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 9 U& M% Z' F  T7 l4 d
hackers: Genius ah! . . . . . You can also connect to it?
: i6 d9 A$ m& g0 B! Q5 W white: to ah, and slowly the hymns!
# \, y# r% m: p3 W/ }  }3 H' q white: you every day into my computer, is not very curious about me?
' v. G: }" Z9 b7 P+ m8 Y hackers: No wonder, only used " `+ B& |% o) q( O: B
white: no you're curious about the place? / `; S9 X" v5 R, u) o) a
hackers: a ah, I always wanted to know your machine so much as when the virus crashes ) J! J/ n* [& [. n. V
# _9 Q& ]. \. ?  z" E( e* ]
white: I would like to control your computer
* X# I" [7 ^3 Z, k" G Hackers: I will not have other people access my computer I will be mad
, |( \/ S! [5 \; e' N  [5 E white: This is not fair! ! % {$ R  o3 L. ^4 u0 S& g
hackers: ah, well, you control the good of the
( B  u& q0 y1 N: Q  m; @ white:. . . . But I will not. . . .
  z9 P* r* P8 r4 u) r$ M* J3 w hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
3 I9 O6 T! S" @1 t1 b Hacker: I'm white 3 p( f8 f/ k9 k! G' i9 P! v
us again: This is probably the last time we met the
! K- J' }% e8 @ Hacker: Oh? What happened? ) C: C& @- t* Y& |. D3 T+ P9 \
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 8 B8 w% S3 \' J/ m. l
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
+ f, ^4 P( F, n0 `: U* t white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
8 m$ K/ L: [4 U hackers:. . . . . . . . . .
6 _: m- ^! o1 I5 f% H$ P hackers: so late, and how not offline?
" s  X7 o, w! q6 E) i white: Oh, is the next, and I went to pull the power & U: o  q: I/ w' z0 X3 k5 l- ~4 m
hackers: Slow! You will not shut down?   P% X2 G9 @  |7 w' p; D7 H
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ) ?; `7 I4 N) `! Y
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \7 w, d  j$ G) q' W* _% y* R- z
white:. . . . . . I press the power to the hackers call it - `3 J& q5 s2 i: z  |
white: You are not really powerful * P: u5 |- j$ D+ t2 d, z$ u# ]. J
hackers: so-so friends 6 ?4 L& t8 i8 `: A
white: bragging! You have the ability to shut down my machine in the horse.
) D- ]  h; s, s  M hackers: this place is difficult! You wait
/ a* N6 I9 e9 t/ |. a hackers: Haha, buttoned regret it 1 O) g2 F7 }0 m4 e
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 4 a2 V9 {3 z- K, z1 p' E
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-12-31 14:50 , Processed in 0.184476 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表