 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer % L( R% @& m, Z& o% S% c! J
white: how control?
1 J8 C4 b( {7 x2 _/ ] hackers: white with a Trojan
; E5 p2 Z _! ~ {1 p( n:. . . . . . Where? I did not see
( _. |; C4 H, }: B" Q/ l* ?# j hackers: Open your Task Manager
% ~' ~0 ]& C# y. ]6 e white:. . . . . . . Task Manager, where?
0 J+ l6 C" \% p" h- G4 p hackers:. . . . . Your computer below! !
$ O! m/ C# O1 h4 O \: g7 s4 x white: \; . K5 ?$ ~5 `" J% l
Hacker: I have control of your computer , j% |6 H8 q+ H$ o* Q: R
white: Oh
+ W2 X6 A8 @) w hackers: a funk? ! Hey
/ T- F- D( ^, o3 ^5 r1 g white: for the just, help me kill the virus it, many of the recent problems my Lord
" V! L+ ~: N u# u Y machine hackers:. . . . . . + L p. D' w& E1 m4 d* l& y7 n
: S$ F& W; N- {& z3 g! N% { white: how do you always in my computer and out of
& y) a1 f' v! M) j8 I casual hackers: You can install a firewall
0 L0 _+ [- T5 S0 F1 r: D5 J white: install a firewall, you can not access it?
4 m: G% Q4 p) r/ ?8 {" W hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
* T' P/ R7 m, P
; \7 G2 H% O' u! I small White: I heard that you will create a \!
/ p f5 U) _5 f- l G) P hackers: ah * ? L0 |9 \# F: w- J3 Y# l
white: you can control someone else's computer? !
' V, q" C3 M: ?, F" j+ I d hackers: General is the
. K3 v- A% p( f" _ white: you can black out those sites? # M9 [' Z0 {" h r2 ?
hackers: of course, did not hear people call me a \
( M) d0 E( h$ I4 c white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . ; j* p0 S* C/ z8 p1 ^0 n
\!
( C/ {' [, ], v u1 I2 U white: every day you come in, do not feel tired of it? $ [* h$ ?' [4 x; J
hacker: is a pain, your machine is the worst I've ever seen in one of the
" k+ H3 _/ X# {7 O( c white: is not it, this is Brand
, ]& x0 `, [& a' I5 i0 i" e7 Z Hackers: I was mentally retarded in addition to your yard game machine only virus a
7 X( N2 U6 L1 N2 G+ d i white: Oh ~ ~ that you see me The \. . . . Goodbye ! t2 r- D: z* f5 x" m
* S/ ?5 f$ Y! @0 k5 e% o' N
hacker: Hey ~ ~ ~ I come!
* z0 Z! q9 L. m# |; D white: not seen you for days, was my firewall blocking you?
( I3 H6 `8 B+ w0 H, _8 [ hackers: Haha, jokes, on your machine is easier than my own, not you miss me
3 Y) X2 `& _) a: c W, A white: I want to Please help a busy
) N3 H3 X/ M" \' m hacker: What?
. F1 z) E" `$ S' }4 ~2 a2 ] white: you can not modify the point into the power system data
* B0 F/ B2 R3 W1 b3 A% b hackers:. . . . . . Why do you want to! !
# g8 _: e# k9 X+ n) j) G/ l white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
9 p: Y- a8 e& S- q hackers: die! !
! J2 W& ]% @* T) s3 q8 x
3 y& f2 `+ E" ?+ c) f hacker: you die Where is? ! ! ! * c/ I& J9 `- I2 z& r2 L! n4 R! w
white:. . . . Go out and play for a few days, ah, come to me why 9 |8 u/ b( H, g4 h" L0 M" F% D& U
Hacker: I'm looking for something
5 R8 W! W! W% S8 S1 i white: what I find here?
7 n' i* X* ]$ N& |* u* ]5 c: ] hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 9 }* o+ T) P- L% t# Q2 C
3 m- j8 U9 {0 T. ?* H8 T most hackers : I come! !
% ^7 G: M t% ^! K) h0 {. . . . . . 6 ]( |5 T$ z. _
hacker: how not to speak? ( e; a6 z- n1 C
white: a bad mood
7 _9 l" Y r& v. c7 p2 b, b; G; A5 V) | hackers: Who bullied you? 2 F8 ^ I/ B' i6 l
white: a Q No. I have not lost inside of my first love
. ?2 w3 ?+ q# n# H% v- P Internet hackers: this simple, I get it for you
( b5 H) p0 P( S- P; D white: do not get back
: o& N$ A3 L, h( H6 t$ L hackers: No, tell me what number?
- p$ e! K# F+ O- l! x! I5 ^ white: Woo ~ ~ ~ ~ just do not remember ; D) {7 I$ I5 B% ~* z) V5 g
& f, C+ l1 T, x5 b. h
white: you gave me out! ! ! ! 4 L$ q" d, y( ^" E Q( ^3 {
hacker: how wrong? ! ' x* h5 A# |& p$ ]* e6 A0 A5 X. K
white: You are not the forum to use my ID to play it? ! ! - w5 O: \/ Z$ C( E3 z, A
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
* Q* n! e/ {, z/ g white: it does not work! ! ! 5 [! j" T% c( Q7 A% v. X' N* k( f: K
hacker: how should you like? , N5 E. R* I, r7 ]( r2 U* `. y
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! . a4 ~, A4 A& K3 k' M
* f! A: V* A. y0 c% P hacker: Hey,ralph lauren pas cher, I did a lot of fun
; n1 p! f# ~ r: V" j4 b2 b white: what $ l- }6 `5 m6 Y* X8 ^
hackers: I go to the forums posted the top - R2 ?6 H4 i3 g; e7 j) d
white: This very common ah 2 |, Q$ a5 v, y2 ^. ?. A
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
. K; @; P. A8 D0 e white: Wow, very enjoyable, and I can never dare, will be blocked!
$ |- Q8 \ u; d9 W2 h. d Hackers: Yes, has been banned.
" R' \$ c) e; r% g white: this is also fun? !
0 f6 x1 k% v5 n7 t! W+ S* [ Hackers: Yes, ah, because I use your ID
4 C/ W: y# s W white: you are pro?
# ]% h4 U( i7 O0 }" c+ n$ F* V hackers: You can say it. 6 F$ _' y" L' }" r+ ~
white: to what extent high?
! b& U8 j# P+ G% C. M; O+ C! ^ hackers: ah, I am bored when their own & k, V) j( c( v
white black: Ah, this I will! 4 T9 q( T& V, w; C
hacker :#?%! You can? ! 8 O- F& h- Y4 K
white: Yes, ah, a black off it. . . . . 7 K5 ~% d$ u* E- K: z& A* i
hackers: Go!
# J1 k% Z; V0 i/ z& J white: Ask your question
/ T$ h ^) u( ]7 Z# O hacker: says 3 ?9 d* y0 [" p3 n
white: Besides me, you can also control other people's computers do ? 4 i: u$ ]2 l/ C+ R1 h# e
Hackers: Yes you can. . . . & y) l6 ~0 f% B4 d% ]
white: no networking is also OK?
# E4 ^1 p8 \$ q hackers:. . . . . . . 1 @& D6 C1 G+ e, k$ ]7 Y
white: You can remote control to open someone else's machine it?
# w7 v7 G3 k* E5 c$ r. { hackers:. . . . . . . .
' G1 E8 F0 v! B9 ]# }, f5 J white: You can steal top-secret file it! ! ! & ~$ {4 n- H9 N0 I1 w' t/ a+ n
hackers: I think you see more movies, go to sleep & n/ m% s. V0 w0 M. B: H O C1 I
white wash: my computer is broken / L! q) a: a, I0 Q3 _& w
hackers:. . . . . . . Just checked, your computer no problem 4 ^6 H d6 t/ T9 Q- _2 o8 E
white: that is, you bully me
& M& x3 ]3 g$ |1 U! G hackers: No ah
9 ^( j: W: U# k+ {5 a: L" o white: You are! MP3 files are passed to my no images!
) g( M5 I% b2 B2 b) B1 ^ hackers: help ah ~~~~~~~
: I* Q) r! P D x white: Ask a computer problems can you answer? . F# L f# b5 H" r1 n8 H
Hackers: should be able to - r( Y0 w9 l3 h# S' r
white: Which key on the keyboard the most handsome? 5 h% l0 b3 v6 |6 i
hackers:. . . . . . . Do not know
/ o p; F$ [( C$ y4 y white: of course, \!
: x2 T0 Y' l6 f& i5 c; o hackers: halo ~ ~ ~ This is a computer problem? ! ! ' c0 @ E& ]7 H
9 ~9 d) F J+ s8 t8 k
white: ask you a computer problems you can answer? 4 u7 T5 l; [; f' Y) u3 z- [
hackers: If the problem is not your idiot 4 m$ r( `6 J8 y* ^, R$ g; I, M
white: I am serious! ! You can operate my computer?
3 j7 l. E; h, R1 z |3 Z: x hackers: ah,juicy couture shop, yes 1 ]7 r% E" X- ^1 v- m
white: that problem, you can solve it
4 ^* K2 A% p1 z' o. l8 D hackers: Your question is, should not be difficult ;
0 J; b4 L. H% x8 S6 X8 @5 j" f white: Great, my fans do not seem to turn up,nike air jordan, help me change it 0 k: M* S7 o9 D' Q" L( |' p. c
a hacker:. . . . I excused 8 k1 d: Y0 T9 B0 F A
white: we see meet you?
3 }, ^3 T, }/ g5 N3 c% M hackers:. . . . This, not so good, why should we see
! h; J2 E. A0 Z2 _ white: I want to see you are not the same and I would like to * @8 Y( r7 q2 z" O8 A# T- l {
Hacker: Oh, what you think?
/ o2 ~- X( `1 o white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
( n# R% b# L& b hackers:. . . . You say that Spider-Man, boss! ' |7 Q' T5 s% Q# [
hackers: Kazakhstan woven ~ ~ ~ $ A7 i8 e8 m5 u6 P0 v
white: You called every day, is not very curious about me?
0 C- y& x! E' V/ z- A; w; D hackers: not curious, is the habit, easily came in
- w. U: @- `" I white: Well, I have a good way to change your habit & ~1 F/ z$ r7 H
hacker :. . . . Oh? ! Any way 4 g5 X; v' P* I! l, F( ~# A4 P
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ ' n7 N1 }* q! ~ G8 C
hackers: Genius ah! . . . . . You can also connect to it? 2 m: S2 f/ [, K! i
white: to ah, and slowly the hymns!
7 l" N# S9 N! ~ T$ o0 @: X& p. J white: you every day into my computer, is not very curious about me?
- }& {" w- b# `/ x hackers: No wonder, only used
8 R$ M! n- P& z- Q/ U* G white: no you're curious about the place? 5 u/ E; K; U$ i& w9 \. R3 p0 v2 ~
hackers: a ah, I always wanted to know your machine so much as when the virus crashes i6 j/ x/ l" n5 P& k* e) ~
D! B! A4 p* `" a9 k" A white: I would like to control your computer * f6 e, I9 Y3 r! F6 D t9 C
Hackers: I will not have other people access my computer I will be mad 7 h0 Y0 }# r$ X, K7 ?4 ]
white: This is not fair! ! : n# \1 K5 a# a1 J
hackers: ah, well, you control the good of the " w% K. y* ^ D$ e, D5 \4 I
white:. . . . But I will not. . . . ; U; P9 ?2 h+ M& c$ M: ]* `+ F
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
% a, `: w5 R. \$ k Hacker: I'm white
- W; f: q7 ~/ f/ Y us again: This is probably the last time we met the & n+ K: M; @: v5 `" r0 P/ {
Hacker: Oh? What happened? & o5 T6 o9 x, P8 f, z; g; U+ @( |2 O
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
1 }% q' k% V: l$ Y3 V hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
; d, y# ]7 U, j- j& i# p white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
# S2 o5 [! \; y hackers:. . . . . . . . . . + p" X% g0 }3 I0 v9 G J
hackers: so late, and how not offline? ; J* E! ^/ F( m+ L& ^' S) f$ x
white: Oh, is the next, and I went to pull the power
1 y8 @+ J$ O7 f# o" x# Y- y hackers: Slow! You will not shut down? 1 m l$ |: d' i* _1 J
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power ' c! Q" R; a3 q t! x& O# h R' f$ o
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \$ V( Y5 K" u2 B6 m
white:. . . . . . I press the power to the hackers call it ; f+ S" R# z% N( x4 K
white: You are not really powerful 0 a* Q) {# d' Q9 N7 X& s4 x
hackers: so-so friends ( k, j3 O/ p3 n7 R' e4 r
white: bragging! You have the ability to shut down my machine in the horse. * v7 y8 q) `! L5 s0 |2 E, O) @$ C
hackers: this place is difficult! You wait
+ I0 a9 E/ S+ n7 U% {7 r2 t hackers: Haha, buttoned regret it
7 W$ p8 x6 K% V) ~3 }/ } r; k white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . M' f, L3 K; i
hackers: halo ~ ~ ~ ~ |
|