 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 6 S7 Y6 |; U F; E: d L B3 T' z
white: how control?
1 T3 R# U( v: q3 e5 P, @5 C, [ hackers: white with a Trojan
7 D, f# P x; `8 m4 |- U+ [5 f:. . . . . . Where? I did not see 1 E, E& i0 p; _7 J/ m. K
hackers: Open your Task Manager % x% F3 @8 k: H/ p3 ?" W% Y
white:. . . . . . . Task Manager, where?
0 Q$ w' I. L8 g q hackers:. . . . . Your computer below! ! , _$ n. n; v) Y/ U$ ?
white: \;
. {/ j' X* I. j7 Y4 F4 ^ Hacker: I have control of your computer
0 s- B" j2 C- | U9 V6 Q; E0 |% n' t white: Oh
4 G( W# m! w# A; `3 g hackers: a funk? ! Hey
' g, h- l7 `3 X- g white: for the just, help me kill the virus it, many of the recent problems my Lord
9 o% T# h: V: Z0 E6 r* M( l q( ] machine hackers:. . . . . .
; c. C* T+ E! N r% ]/ u+ W 2 E) A& n4 s; p% V/ h
white: how do you always in my computer and out of
G, R9 ? `9 Z. _ casual hackers: You can install a firewall
0 g' i7 P, m) v white: install a firewall, you can not access it?
$ q9 o& H* ^' e hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
0 e1 Q# Y- T, f" N; s 8 s0 B; q2 Y0 \0 ~) r5 l
small White: I heard that you will create a \!
* g0 m2 H+ ]" B6 n$ V0 f2 K" B hackers: ah 8 W+ K* d6 Y# o8 Y; g6 h
white: you can control someone else's computer? !
: O& `8 ^% B3 j5 a hackers: General is the 1 @3 y" G* ]$ w- G* o
white: you can black out those sites? 3 V6 J1 x6 v. f% T5 y
hackers: of course, did not hear people call me a \7 ~* T" X: y" d( i3 `
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 t' M7 w: T9 c7 n; x q \! % Q5 |. e+ H9 m P" P
white: every day you come in, do not feel tired of it? . h) K2 \! R" ~+ s f8 Q. ~
hacker: is a pain, your machine is the worst I've ever seen in one of the
1 u, f+ |6 z( D white: is not it, this is Brand - r2 K8 [: ]; t: K% e! W. G
Hackers: I was mentally retarded in addition to your yard game machine only virus a
9 }, ? l( j1 [( O# o* Q) Z white: Oh ~ ~ that you see me The \. . . . Goodbye
( t) @0 H* @, }- T * ^+ u1 E# o5 E# k& ~1 e( ^
hacker: Hey ~ ~ ~ I come!
, A- U6 d7 h1 `% t: J. q9 a& Y white: not seen you for days, was my firewall blocking you? % `: Z# v6 Q8 q U3 b
hackers: Haha, jokes, on your machine is easier than my own, not you miss me 6 x7 k1 z/ q2 r" A$ O* W
white: I want to Please help a busy 6 j7 A# s& x, N% I
hacker: What?
5 U. y3 L$ v0 Q @; @. s# o1 C white: you can not modify the point into the power system data
+ u8 C3 R; S8 H. D3 ] hackers:. . . . . . Why do you want to! ! $ I3 h- y" i; i) S% u" d
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . : j6 K) K4 F! c7 J" I
hackers: die! ! 3 v! L+ M9 l( }6 Q! a
7 S9 a% G/ ^) w& ] hacker: you die Where is? ! ! !
. o. s7 l; t9 X7 W white:. . . . Go out and play for a few days, ah, come to me why
$ i9 E1 I$ E8 { Hacker: I'm looking for something - w* q4 X4 e" B7 J0 Y( j2 b
white: what I find here? # a" b' x* V* X7 t' K
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ; _2 R1 n+ r$ D, f' a
8 A! @ C6 K7 c+ O9 n
most hackers : I come! ! 7 m5 _- N1 l6 g0 G: j/ O+ E) |
. . . . . .
G6 }& O& l* z4 K hacker: how not to speak?
& d1 J6 ^: n. s. h white: a bad mood
. R- a: r p; c- V& D hackers: Who bullied you? + F& b5 g. c, D" N0 P4 N
white: a Q No. I have not lost inside of my first love
* e; i7 p9 _9 B Internet hackers: this simple, I get it for you
* e: b% ]: F8 ~- g- z4 [$ ?8 u( C; ? white: do not get back 5 \' ~: g+ i5 y, ]4 s
hackers: No, tell me what number?
+ j3 G6 f; _# U X white: Woo ~ ~ ~ ~ just do not remember 6 i9 h, v+ h) c
4 h" ?8 Y1 d. r: |& J* A! [ white: you gave me out! ! ! ! 8 T5 g H# d3 a) `& F' y/ [1 e/ d! K) _
hacker: how wrong? ! 9 M6 A% [% R7 E6 J
white: You are not the forum to use my ID to play it? ! !
$ {; S2 t* _! s; _# ?" s& W' V hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
0 g* Z0 ~* r4 m5 E* J2 k white: it does not work! ! !
/ D8 }& B) R3 k; f& g$ n hacker: how should you like? / E6 N: A5 E" V% d
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! . q e) [: A! f `
9 v9 K2 T3 b/ @0 G
hacker: Hey,ralph lauren pas cher, I did a lot of fun - t- J2 A0 N& ~" @& r
white: what
5 y8 {1 }# k4 Q; s& ? hackers: I go to the forums posted the top ) @! Z" a0 l+ J& z; u$ j& D( T
white: This very common ah ! {- t* N* U- E
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
- Y* O5 k$ R4 s+ X white: Wow, very enjoyable, and I can never dare, will be blocked!
% H# L: W" ~! U Hackers: Yes, has been banned.
. k* R7 n0 ~# j4 }/ { white: this is also fun? ! : ~# S/ O9 p" ]4 d6 \6 j
Hackers: Yes, ah, because I use your ID
5 e# i" a3 ]3 q H2 S: h white: you are pro? 7 N$ R/ G5 f3 U) p. _; O9 F
hackers: You can say it.
- V6 H& k; E* r; D4 D9 u white: to what extent high?
+ F6 y4 C; x% b1 c1 G hackers: ah, I am bored when their own
. J. L8 f$ X2 b0 [" d- W% j white black: Ah, this I will!
' e9 F) a' I2 s* B# i0 Y% ` hacker :#?%! You can? !
O/ K! T9 G! i+ X2 e3 W white: Yes, ah, a black off it. . . . .
4 [% e. Y0 [5 P6 v hackers: Go! 8 i" B0 K0 x7 ?3 a! _
white: Ask your question 9 ]$ U( }' v$ v9 P% q. ^6 I
hacker: says
, ^6 o0 K" x7 k! g0 Q+ s. _ white: Besides me, you can also control other people's computers do ? 9 M$ m+ m* j+ o* ?' |# Z- K
Hackers: Yes you can. . . .
$ o0 \2 I Z. T" x g white: no networking is also OK?
* _2 Q: |/ Y& h) k4 l hackers:. . . . . . .
% H C/ K( F; T white: You can remote control to open someone else's machine it? : o5 e7 [$ |% L2 J+ F
hackers:. . . . . . . .
5 o; }! n6 A& w; J white: You can steal top-secret file it! ! !
) k& r; l% p0 F3 t hackers: I think you see more movies, go to sleep
2 |# Y: _6 ~! K white wash: my computer is broken 1 P# y7 G( n9 J+ h6 a% C
hackers:. . . . . . . Just checked, your computer no problem ) w0 a5 B3 G# h, C1 ^
white: that is, you bully me
6 o* O$ k; Q# W: K. A) P hackers: No ah
2 ?! E! ]6 v* V/ z white: You are! MP3 files are passed to my no images! 0 k1 a) [. q" {9 Y3 K. K4 Z
hackers: help ah ~~~~~~~
' O4 z: G) t! x* C: i% e' A8 b white: Ask a computer problems can you answer?
- C! _% Z( c# l1 X: K" g3 D0 D Hackers: should be able to
- P- L) _, n- g6 i white: Which key on the keyboard the most handsome? ; U9 l) l- o' x1 Q
hackers:. . . . . . . Do not know
3 F5 V2 p8 S* e( Y white: of course, \! + I' ~9 A( E+ V
hackers: halo ~ ~ ~ This is a computer problem? ! !
^& ^3 M, v# o7 |; X4 r D. m, E* j& l9 r4 t
white: ask you a computer problems you can answer? 7 `2 k! S2 ]" W% r% c2 b: q: U
hackers: If the problem is not your idiot . K! ?) {7 ]8 R. s8 ^
white: I am serious! ! You can operate my computer? 3 ]6 B0 m# |* f. C$ F
hackers: ah,juicy couture shop, yes ; t9 Y8 t7 ]9 N& z; n- A) d" \
white: that problem, you can solve it
" t; @# e) ?, U% ]7 H2 ~$ i hackers: Your question is, should not be difficult ;
3 I( h( [0 s. }' y8 Y8 r8 [& m white: Great, my fans do not seem to turn up,nike air jordan, help me change it
7 ?' {1 C* C" p3 X a hacker:. . . . I excused 0 L' H/ M& C- w7 }. a
white: we see meet you? 9 u+ d2 j3 S/ c- d" ?8 K, \/ m
hackers:. . . . This, not so good, why should we see
" y! r' k- t2 q7 A white: I want to see you are not the same and I would like to 8 K4 n* u p+ [9 m R4 K/ Q/ j! ^
Hacker: Oh, what you think?
0 S5 ~0 m1 [0 p1 H' J white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 4 @3 r0 u3 X2 w0 y9 \1 c q- E
hackers:. . . . You say that Spider-Man, boss! & E9 {3 ^2 {& p: j, ~
hackers: Kazakhstan woven ~ ~ ~
; }+ k/ D( U8 `& C7 w% U white: You called every day, is not very curious about me? }6 ]: }1 }2 j4 X% ~/ |
hackers: not curious, is the habit, easily came in
0 ?' m( ^7 L2 U white: Well, I have a good way to change your habit 0 @- G* x7 w" i i
hacker :. . . . Oh? ! Any way
" i9 N3 S- a$ g( z white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ ( s, q- Q; }% l: Y* \
hackers: Genius ah! . . . . . You can also connect to it?
- ]/ ~, l. W* p white: to ah, and slowly the hymns! 7 {1 \4 Z8 v2 t# l9 c
white: you every day into my computer, is not very curious about me? 9 M! W3 E2 m$ x1 }! W- [) p
hackers: No wonder, only used
2 _* d. M, `$ R. y white: no you're curious about the place?
: q+ `, f. U: b- s$ B0 ~ hackers: a ah, I always wanted to know your machine so much as when the virus crashes
1 ?: O1 e% ]. G G2 O8 N( S 9 a( ?$ K& L) V4 F. m0 w- q5 A
white: I would like to control your computer
/ t% t& [* F9 e4 R' i4 s Hackers: I will not have other people access my computer I will be mad ! F6 t6 r; |4 C# S9 x! G
white: This is not fair! ! $ b2 d/ Y; M8 a4 j$ N9 |
hackers: ah, well, you control the good of the
0 H0 @# U5 `+ ~: C white:. . . . But I will not. . . . & ]( J1 b2 S- g- I. v& T
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 4 e2 d" u% d8 S J d/ @9 s3 a
Hacker: I'm white 8 Y! ^* h8 g! r4 h) ^, P
us again: This is probably the last time we met the
( d+ X8 O5 W6 ~9 ]0 i" P Hacker: Oh? What happened? ) S' Q# r4 w5 Y4 p; S) l0 ?+ V' g% P
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
* o$ Z& l# y/ _- d! f3 C: `( C hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
) Q( m3 I5 m0 N4 f, V9 \+ D9 V white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! ! Y$ R6 Z8 Z. V
hackers:. . . . . . . . . . ! ] {) b2 S3 ?1 y( B7 a
hackers: so late, and how not offline? # d& F0 W7 ^6 J8 Y+ o
white: Oh, is the next, and I went to pull the power
4 p0 R9 X, t& L hackers: Slow! You will not shut down? . d9 k0 G% T" m3 J+ W# I
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
4 u$ c3 b- ]7 } hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \2 X) e* T4 g7 r) v' r& [" S
white:. . . . . . I press the power to the hackers call it 6 c9 I/ @# Q* h
white: You are not really powerful & R3 P: k* z3 {& A8 _6 k+ y, @
hackers: so-so friends
/ G6 R" l+ J. M+ C white: bragging! You have the ability to shut down my machine in the horse.
* Y% S* I n) Q! r1 O hackers: this place is difficult! You wait
) E; o( t, A0 X/ k# ? hackers: Haha, buttoned regret it
! D% R( h2 K( B( l8 ~ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . & H" O4 n, a& g: c4 l
hackers: halo ~ ~ ~ ~ |
|