埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 762|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer ; D; r# r1 P9 ]1 t0 q
white: how control?
' @( G% Y3 O& d5 N hackers: white with a Trojan 0 K6 _8 a, l( I* h( e
:. . . . . . Where? I did not see
9 r3 k/ t3 w! J hackers: Open your Task Manager
4 K& h( D! s3 k( B: T; z( x white:. . . . . . . Task Manager, where? " s3 h; W' c; H& N, e4 m  n
hackers:. . . . . Your computer below! ! 5 j0 U- d" n' i$ E0 R, S1 b; M
white: \; 1 _) N9 d$ q( ?
Hacker: I have control of your computer
5 S6 U: D; o6 c white: Oh & j( o( y: F4 o; m! R+ k6 M
hackers: a funk? ! Hey ; G5 d  l$ U) h1 M: v
white: for the just, help me kill the virus it, many of the recent problems my Lord , [) r1 i) ]/ Z9 v+ I
machine hackers:. . . . . .
; p5 J. M7 }- S9 z: k
. r" w: v% I8 ] white: how do you always in my computer and out of 3 M  ~2 s4 n; Y% b9 g7 X& `& U
casual hackers: You can install a firewall
: Y" x3 E  y6 G( } white: install a firewall, you can not access it?
$ z9 B. }! Q; f+ M$ z) w hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
/ P0 ?( A! Y& H5 ^% a" H! W. s0 J
" _9 e4 b) [# [; i small White: I heard that you will create a \!
" M! c1 G$ K0 u* R hackers: ah , ]! C5 v/ ~* H
white: you can control someone else's computer? !
. b8 }" N- S' c2 @ hackers: General is the
! _4 N5 ~  E7 y: I6 n white: you can black out those sites?
/ T. v' K" {( }& h; m1 A3 n* J% R hackers: of course, did not hear people call me a \
) {% [3 t% t- F% _2 r white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . + ~+ E/ Y, \- n
\! , O0 O- {* e# V5 k  m
white: every day you come in, do not feel tired of it?
8 A1 ~3 M# K! D5 a& Y6 N% R1 p9 U hacker: is a pain, your machine is the worst I've ever seen in one of the : j) r( o) s+ ?( o3 ^
white: is not it, this is Brand
) \1 e! k, G! S& c1 _& ^. z! p Hackers: I was mentally retarded in addition to your yard game machine only virus a
( C+ y$ W; f" x8 ?1 @* ~8 n; d' g white: Oh ~ ~ that you see me The \. . . . Goodbye
( P! y2 V) U( m4 U/ G5 K* y. Y 6 l( T% z& z% y/ V8 T  f
hacker: Hey ~ ~ ~ I come!
& |+ T5 `) x9 q% @1 F0 i white: not seen you for days, was my firewall blocking you?
) Z) ?# @* |  k hackers: Haha, jokes, on your machine is easier than my own, not you miss me
: x; H4 j/ I0 O* r7 U5 v white: I want to Please help a busy ; E  [  f- i! G+ k$ `8 o3 c" |2 d
hacker: What? ; E* C  E8 c$ V
white: you can not modify the point into the power system data 5 [5 \! S  ?$ w6 n# \5 s1 q5 w
hackers:. . . . . . Why do you want to! ! 4 K) w, p/ y2 v  L" f
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
% I5 z" g  f! [6 ~# m: b+ z hackers: die! !
( Q) o: n. Q7 ]1 y6 d9 g  f  q
: `. u5 R8 ?; Q) S8 n9 X( b hacker: you die Where is? ! ! !
9 h5 K5 L. q$ |1 X# z, T& S" d1 O8 s white:. . . . Go out and play for a few days, ah, come to me why
) U) _% ~1 }8 |+ @2 _) k+ f Hacker: I'm looking for something - }8 {$ T( U  e. C" a1 s
white: what I find here?
& a0 L$ n. ~8 x hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
" Q# @* ?# [. v! O# s9 |
: `5 U3 x7 P9 Z9 b  M" a' d most hackers : I come! ! 7 _/ E5 i7 S2 e" }. i$ X, S7 W
. . . . . .
, h6 T5 H% k7 {* C9 U: | hacker: how not to speak?
3 O; t! M9 F& c% R0 h white: a bad mood
- ~. z8 N# i3 |: m; n/ Z( k. v$ J6 V hackers: Who bullied you?
1 E% I" Y: {# _: w3 d white: a Q No. I have not lost inside of my first love
3 T/ X4 i% u6 F# Q9 {7 n Internet hackers: this simple, I get it for you
9 U  f" U$ F! e& I9 M( B5 i$ p2 K$ ^ white: do not get back
3 q2 V& @) Z) I8 l$ q5 k  n0 } hackers: No, tell me what number? 0 |4 W% p4 t. q4 o1 \: B
white: Woo ~ ~ ~ ~ just do not remember
" y/ b' i. |, @( s! x6 c1 d
" @5 D8 W1 K, \2 ]$ w& p white: you gave me out! ! ! !
% b% a; _) d- W3 d2 [" }2 @ hacker: how wrong? !
3 o) ~! H2 ~6 [0 @; j! h/ K( J white: You are not the forum to use my ID to play it? ! ! # i3 |$ q1 b& m4 L2 ?$ K3 R' w  {4 A
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
; x' }2 q$ o- S! Q  W: n  F; I% D white: it does not work! ! ! % l  f9 S6 a. _- B7 ?- E5 e
hacker: how should you like?
2 ?. C" @- I8 E! ] white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
: M! o# O& C! [2 W
  T! Z; g/ A8 _ hacker: Hey,ralph lauren pas cher, I did a lot of fun
; ~3 |- L+ j+ H5 s white: what
+ b; _' H/ H* P( ]/ f0 J' |9 U. S hackers: I go to the forums posted the top
2 C# {1 e! Z4 {# {" O+ Q white: This very common ah
' ?. U6 K- F/ J" B Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent % Y, Y" U- H$ k0 m4 b4 d
white: Wow, very enjoyable, and I can never dare, will be blocked!
- {, W  b* J; Y- o8 m Hackers: Yes, has been banned. & E$ m+ X# r& Z1 f7 [- u7 e
white: this is also fun? !
8 L4 D7 \# e& M8 M* w$ W* h Hackers: Yes, ah, because I use your ID - P9 ?% D0 y1 `& `
white: you are pro?
. J- h* G2 Z% b0 q. L! { hackers: You can say it.
  k; `0 K. d2 Z white: to what extent high?
6 C% z/ m' @: h* W7 {5 a hackers: ah, I am bored when their own
6 C) B6 }$ `9 B% |4 ?; H6 j white black: Ah, this I will! . t5 _; \0 q7 `. v
hacker :#?%! You can? !
- F! ?5 K& V; a/ x5 A3 j white: Yes, ah, a black off it. . . . . 4 M% @+ M" U% H) J% @; s! C
hackers: Go!
  }) `. [" @# C7 k$ l1 i white: Ask your question % ^6 l* P) G+ j# \) w( x
hacker: says
: K9 @1 S' y3 p' i# n) f; ~5 N white: Besides me, you can also control other people's computers do ?
) z3 B, ^$ @. s# ~: U! d& ? Hackers: Yes you can. . . .
8 S) v8 K8 i1 }( }5 [& m white: no networking is also OK?
9 G# Z  m4 q$ q+ f" v hackers:. . . . . . . , {/ K8 g- y+ g
white: You can remote control to open someone else's machine it? 2 Q( W8 V8 [- k" b; O
hackers:. . . . . . . .
4 X) b& @: H& B" a3 |- p white: You can steal top-secret file it! ! !
) x5 F- q. X/ P- ` hackers: I think you see more movies, go to sleep : n, M1 y( x5 ~) V5 E1 C
white wash: my computer is broken
2 t, Q# ]7 [. B/ L- M1 e. j2 ] hackers:. . . . . . . Just checked, your computer no problem
4 h% h$ a+ E9 \: P: @! h white: that is, you bully me
! W) q8 p& T! D$ B( `. U  a hackers: No ah % O# \  H& O3 c* p5 |2 G
white: You are! MP3 files are passed to my no images!
$ [+ c" z& `2 t/ ~% q1 j% D hackers: help ah ~~~~~~~ 7 ^, ?' G- @. R* o- }
white: Ask a computer problems can you answer? 1 B: t3 }: H9 e$ ~% H
Hackers: should be able to
1 t" ]: p" Z: X! w! S+ J white: Which key on the keyboard the most handsome?
, y, D2 \  p2 J9 K5 b9 | hackers:. . . . . . . Do not know 7 r- L6 f- Y- Q! f- x" J
white: of course, \!
- N0 p6 C+ |5 _' m# R3 L' G% P hackers: halo ~ ~ ~ This is a computer problem? ! !
- c/ M0 ]1 s8 i9 w4 o
5 r6 {+ v- e- Q9 W white: ask you a computer problems you can answer? ' x& X  _% R. I" w. q
hackers: If the problem is not your idiot
- F5 {) v9 b4 }, D( B! \4 m" U white: I am serious! ! You can operate my computer?
! g: t5 `0 y$ E% F1 V" X hackers: ah,juicy couture shop, yes
% e- ~5 P! @9 o. X; m- n/ C white: that problem, you can solve it
! d; C! m" p8 `9 Y- d- X4 {9 ^9 j hackers: Your question is, should not be difficult ; ' J8 l+ ~  Q: O# F  u. b
white: Great, my fans do not seem to turn up,nike air jordan, help me change it . f2 |$ h$ a% u; I1 p
a hacker:. . . . I excused
, H$ T1 E6 L. a$ n5 o! W! {  Y7 i& D white: we see meet you?
% K! B1 A2 l7 w# Q8 d hackers:. . . . This, not so good, why should we see 5 }. R- g0 \# l, Q' e1 V' `* X4 Q
white: I want to see you are not the same and I would like to 9 I. M3 I; e4 L8 t1 _" h; U* D" O
Hacker: Oh, what you think?
- P* h, t# o  z2 B% w white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
9 n7 U5 w$ N8 K9 ^8 x' J* ~ hackers:. . . . You say that Spider-Man, boss!
8 _+ R$ w+ b3 v  `3 F hackers: Kazakhstan woven ~ ~ ~
, J8 I( Z% z1 g9 ` white: You called every day, is not very curious about me? ) O" z# U! `; m. [) Q
hackers: not curious, is the habit, easily came in
, p2 M; Y* }6 `# g  u7 ?# r) y8 U white: Well, I have a good way to change your habit
. O- ?1 O' ?* `" Y hacker :. . . . Oh? ! Any way
) g. f; h- h$ q* e white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 6 _. E5 z2 e3 o) q5 n' q
hackers: Genius ah! . . . . . You can also connect to it?
1 a5 k$ y* g' n9 ^  F; ]8 ? white: to ah, and slowly the hymns!
  w( ]8 j/ g* I' m: N+ y white: you every day into my computer, is not very curious about me?
1 j2 P+ Q5 {& k! J  e0 q4 P hackers: No wonder, only used
7 x6 y* Z2 c. n+ { white: no you're curious about the place? ( O( c. v; k4 q7 a' W7 [
hackers: a ah, I always wanted to know your machine so much as when the virus crashes   g2 X) R/ [# v, Y6 P

3 P7 `1 b# X- q: y5 j white: I would like to control your computer
% b! ?9 Q: W9 w* j Hackers: I will not have other people access my computer I will be mad * G1 f: F) F1 z" `
white: This is not fair! ! ' s6 m( `, A0 B
hackers: ah, well, you control the good of the 4 b4 t) r3 c; |( ~" o
white:. . . . But I will not. . . .
( ~* q* z6 K( w' w hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 4 u) y, i9 o0 n
Hacker: I'm white 9 D4 k  z+ F" @0 h! U9 r+ B5 m
us again: This is probably the last time we met the 7 c- j" z* q, @) @! c: G
Hacker: Oh? What happened? ) X+ y* g4 {9 E- ^0 F( b/ d8 i
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! # v: h# G+ p4 ]1 S1 L* j* q
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye , A! U  X7 F" x2 i" n- C( E( D
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 7 t6 U: B( O( ]" f) Q
hackers:. . . . . . . . . . 1 y0 q1 L% o- Q; |2 R; J
hackers: so late, and how not offline? " C* P- @- Q/ \! H9 e
white: Oh, is the next, and I went to pull the power
& k" U: {6 c0 n hackers: Slow! You will not shut down? 6 t( z. o  L1 ]; O  w# |: c5 k! y
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
$ L& y- X3 ^1 h, `8 Q4 W2 }3 W8 d hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
/ l+ j4 _$ M; W5 w0 g white:. . . . . . I press the power to the hackers call it 2 ]4 [) k6 s* ]# C8 s  ?
white: You are not really powerful $ n( {& x! o. p  V  b+ C
hackers: so-so friends * |% P" `4 c4 k& |
white: bragging! You have the ability to shut down my machine in the horse. 6 \; c6 [0 W. {1 u0 W
hackers: this place is difficult! You wait 5 P* S8 c$ T+ S3 a( ]8 m
hackers: Haha, buttoned regret it % @8 W7 e$ C" ~4 T4 q: |% c& |
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 6 X1 R8 o$ o) H- y  h
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-3-23 15:49 , Processed in 0.109205 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表