 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
* W) y2 K& y" g0 T! T6 [2 S white: how control? : B* o3 n! x. {8 u L" J1 [# ^/ V
hackers: white with a Trojan , l( A0 U( P n- Z2 _4 m& l
:. . . . . . Where? I did not see 6 Q3 U' A! Z6 g8 y' _: |3 S/ f+ g
hackers: Open your Task Manager / V0 h- g/ A2 V7 F5 ?) R1 c) V; n
white:. . . . . . . Task Manager, where?
4 }& U+ |; @1 l6 L* n hackers:. . . . . Your computer below! !
4 v- ?9 T) S6 v& w white: \;
+ p" r, }! w ^8 p Hacker: I have control of your computer / Z- j7 i# b% q) L, T: d4 s7 c6 C
white: Oh / w9 H6 n, `6 h5 g9 E5 k
hackers: a funk? ! Hey
" `; F5 P; e+ [; }, v. _- S& J- i white: for the just, help me kill the virus it, many of the recent problems my Lord
9 D5 x4 S h/ a: i; W( z machine hackers:. . . . . . " h, X6 P3 d0 p9 t( p
% Z% J+ u" X( k! w white: how do you always in my computer and out of
0 T. e9 | n% J3 L+ u4 ~ casual hackers: You can install a firewall
3 g2 H) E0 L/ I) h7 Q white: install a firewall, you can not access it? " s( E! R [3 Z0 ]+ Y% d. G
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah * j% d r E; @ {
' q0 w0 H3 T6 F* a
small White: I heard that you will create a \! ) y/ n1 v6 P5 S( J7 X$ n. F0 I+ p
hackers: ah 6 B$ A0 S+ {# `+ E9 S }
white: you can control someone else's computer? !
|! b, x( H1 F& o" W hackers: General is the
7 P3 S) z3 @' c, `$ O white: you can black out those sites? , z0 i# C: p+ b# Z9 ?
hackers: of course, did not hear people call me a \- D2 R( c3 J9 L4 O
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . & I5 I7 ^$ F. Q- s7 e
\!
$ C& E1 G; I/ j white: every day you come in, do not feel tired of it?
! k2 M. v4 i) _2 j5 K7 e* E hacker: is a pain, your machine is the worst I've ever seen in one of the
f4 K( ]; c. d1 C2 B3 T white: is not it, this is Brand
6 u2 g% D. q. E: _2 D Hackers: I was mentally retarded in addition to your yard game machine only virus a
1 c; c% x4 m9 D) A( L& l* x white: Oh ~ ~ that you see me The \. . . . Goodbye : n# ?9 H6 {! ?8 \
0 {: J, ]' I; C7 h, I% U hacker: Hey ~ ~ ~ I come!
/ E' z* k& e- o) ~! `3 w white: not seen you for days, was my firewall blocking you?
" r: c) g( R7 o0 a7 a9 n& a hackers: Haha, jokes, on your machine is easier than my own, not you miss me
# V# u( c0 _' }, G% o& `1 X) q4 p white: I want to Please help a busy
, y+ [9 c, c( m, X* E: D hacker: What? ( Q7 K. Z1 K4 r/ w2 S
white: you can not modify the point into the power system data
" O8 l9 e: N$ g* ` hackers:. . . . . . Why do you want to! !
- U9 {0 F7 y: R' O& w white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . & F+ U9 P. f2 E$ D0 R9 }
hackers: die! ! * A* t" [6 J$ j/ U% @3 Y
! b' {9 m+ T' A* v& `2 T
hacker: you die Where is? ! ! !
9 l. i+ p, m4 X2 v& W9 T' T white:. . . . Go out and play for a few days, ah, come to me why / L2 j% K: V( @! D+ t6 }: O$ T
Hacker: I'm looking for something : j% l( q7 k# @/ p* ^
white: what I find here? . U2 p# R- f+ J) D" y5 K
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
* Q& S/ f; H1 Y2 R Z/ K7 R
) k) U' m! |; u; L* `+ A7 b most hackers : I come! !
9 q& j& ~$ H+ r, m2 {' C9 }$ w& E0 a4 n0 d. . . . . .
( i& s1 T8 l1 t9 r, ~4 J6 S hacker: how not to speak? 3 `7 r0 d( k- ]7 k3 w
white: a bad mood & ^, j8 H* O* j0 a
hackers: Who bullied you?
# ]$ x# j' l$ P" N5 Y' B& ? white: a Q No. I have not lost inside of my first love 0 G5 O, _2 S, E- H
Internet hackers: this simple, I get it for you
# ~# f& p0 Q) {3 Z4 _% }8 y4 ]: ~: [ white: do not get back
, s+ O) I+ ^2 d9 |5 h1 { hackers: No, tell me what number?
$ V9 T0 Q) w7 `: o# d% S: @ white: Woo ~ ~ ~ ~ just do not remember " z6 z0 w2 i% J; B
* r. s0 A; E- ?! ^9 m& `6 I5 e white: you gave me out! ! ! !
- _8 l4 f# J1 ]# y hacker: how wrong? !
# r) N) {: C$ ` q2 e white: You are not the forum to use my ID to play it? ! !
2 `) l: O3 F% w# V* U( }; q hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 0 r4 {, G: g. s2 O) L8 Y( D+ ?( }, W
white: it does not work! ! !
. e$ u- C" D0 K8 X. J$ C" r4 g4 _ hacker: how should you like?
B( W& y: J, f* a white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
0 o* n. I* y+ E R. \ & p8 A% H+ C. b# {1 `' n; u
hacker: Hey,ralph lauren pas cher, I did a lot of fun 3 A9 z# b! q% H. ^7 M- |+ r3 Y- Q9 Z
white: what
1 \: B! v* B. h, h# s3 q# r hackers: I go to the forums posted the top
) v7 @* R9 h8 @ white: This very common ah
0 m3 }5 o3 }& \, V% S, z1 H Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
: R9 Q$ U0 Q! |- e# a white: Wow, very enjoyable, and I can never dare, will be blocked! 1 ^4 T. X6 J* ^" ~0 T- w$ }, m' [
Hackers: Yes, has been banned.
! m7 |7 c- u/ M! V( c- P white: this is also fun? !
3 Z0 ^. E4 U* ^/ @* x Hackers: Yes, ah, because I use your ID
9 X1 f+ s, ]; S# K0 @ b# N$ S& |! e6 X white: you are pro?
+ F( U4 t2 d, m' A% o' ^ hackers: You can say it. 6 D/ g$ M+ J+ T+ C. y& m3 I% p, i( b4 ~
white: to what extent high?
) Z3 r1 |: H: q2 H$ e- E0 T# [9 _0 p hackers: ah, I am bored when their own
) l+ k3 ]' D# A C% S! n& H. N white black: Ah, this I will! 0 ?9 ^7 D6 O+ G5 Y2 A6 H" T
hacker :#?%! You can? ! : J+ n1 r; @9 i/ f5 b6 [4 _
white: Yes, ah, a black off it. . . . .
! S- ?$ m8 X9 k( E8 ]7 E hackers: Go! X Z, V. G. q9 A3 X9 R7 v9 `
white: Ask your question
" d( |- i* `/ u1 \. l) T2 l) a hacker: says
* U6 O0 m( p2 B0 x M7 o! { white: Besides me, you can also control other people's computers do ? + s, q2 l) y# E r
Hackers: Yes you can. . . .
3 |0 ]2 X( F( L white: no networking is also OK? 8 C" j+ I5 W6 g& D/ N% ~
hackers:. . . . . . .
1 X# S7 j: m' e2 E" }+ j- m white: You can remote control to open someone else's machine it? 2 K; r8 T3 |* n" K8 ?
hackers:. . . . . . . .
+ A o$ d' t( l white: You can steal top-secret file it! ! !
2 n; f D) R! p1 `5 A6 j% z hackers: I think you see more movies, go to sleep
. S. Y6 l& O+ c! }4 C- ` I! R" o white wash: my computer is broken + L6 Z6 S3 y5 w
hackers:. . . . . . . Just checked, your computer no problem 3 ^' j4 s, N6 ~' C
white: that is, you bully me
9 |0 ], Q/ H6 C) o$ _ hackers: No ah
- m0 a0 p7 j1 |+ n. o `: d white: You are! MP3 files are passed to my no images!
4 A! V8 U3 I5 p! |2 Z" Z hackers: help ah ~~~~~~~ % ~# ]! T6 F6 F( f$ C2 w
white: Ask a computer problems can you answer? - @7 c9 B" E6 q [
Hackers: should be able to . [+ x9 z) Y4 g' y
white: Which key on the keyboard the most handsome?
, O2 F6 ?! f7 D0 X hackers:. . . . . . . Do not know
$ l ?% g' D$ j. k& i; o* k) n white: of course, \! / J' Q2 e' _* v+ G/ w
hackers: halo ~ ~ ~ This is a computer problem? ! !
3 ~/ ~& g$ t2 Z- F
6 q9 l/ m! N Z$ ]* A3 } white: ask you a computer problems you can answer?
8 @9 D4 r6 E; \- } hackers: If the problem is not your idiot
3 w; @6 c; Z3 Q5 U! |( ?6 ^. U white: I am serious! ! You can operate my computer? : |. A- S6 Y! \7 D: s( \
hackers: ah,juicy couture shop, yes 9 f: t# o- m, C
white: that problem, you can solve it 5 q5 y& E# k9 l! Z
hackers: Your question is, should not be difficult ;
F: e& p0 M# y; h/ ] white: Great, my fans do not seem to turn up,nike air jordan, help me change it
8 \: o1 D) q Q1 O. E: A7 O* Z) m a hacker:. . . . I excused . J7 D5 e4 A: r
white: we see meet you?
1 X3 v! ~/ @" i9 t' D; ~ hackers:. . . . This, not so good, why should we see
6 k3 J4 x2 }2 |. A* Z white: I want to see you are not the same and I would like to ( [6 q# n1 q5 R* f- }+ f
Hacker: Oh, what you think? Z1 e. ?. o* S9 e# y& O
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 5 e/ }* G8 A1 D7 z* R
hackers:. . . . You say that Spider-Man, boss! c# w0 i' m! k, d) S; w1 w
hackers: Kazakhstan woven ~ ~ ~ ' o! Z4 J; T! p: ^/ w6 B- t$ @
white: You called every day, is not very curious about me? 2 n* R p1 O# C& R- u0 k3 u
hackers: not curious, is the habit, easily came in 6 S, L$ u' p0 z {, |7 S
white: Well, I have a good way to change your habit # ^- s/ {1 j( M/ O3 I/ h0 G" Z. ^% K5 m
hacker :. . . . Oh? ! Any way
4 h, w: N$ G7 L; p white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ % F' Q4 O6 X( d Z; S, e
hackers: Genius ah! . . . . . You can also connect to it?
4 G# t' s! w' L9 y white: to ah, and slowly the hymns!
- e) c+ ^3 v" F' y; `( j. E white: you every day into my computer, is not very curious about me?
, g! z' e8 I y$ _" y+ u6 y, f hackers: No wonder, only used ) O/ b3 E. v" L: u
white: no you're curious about the place?
: K% f% h. B5 l" C3 z hackers: a ah, I always wanted to know your machine so much as when the virus crashes + I/ F+ q8 e* l1 {& V& o
9 l r. ~. b. K- x: ]7 H
white: I would like to control your computer 5 ~# M5 {* D5 h1 {8 B
Hackers: I will not have other people access my computer I will be mad
- Y2 X* K; z- D7 w) o" { white: This is not fair! ! 3 ]( }/ |$ |7 ^) n
hackers: ah, well, you control the good of the
: h* u9 y& a$ W; j white:. . . . But I will not. . . .
F9 f" V* x) \8 t. r hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! " W( M( p: s: z ~: U
Hacker: I'm white : S- q4 C) H! U) `
us again: This is probably the last time we met the
9 O1 O) ? u$ e/ k Hacker: Oh? What happened?
% a+ y0 X+ |( @1 L) d0 K4 D white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 6 Z3 q! g9 h5 [
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
* s# G+ y& v, ? white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
# u. D6 S5 M6 u- o* d7 v hackers:. . . . . . . . . .
/ S9 F! i/ C, M. H0 I& h hackers: so late, and how not offline?
" S' {% a0 E) S3 l white: Oh, is the next, and I went to pull the power 3 m9 @( w+ Z# C& O1 v! l
hackers: Slow! You will not shut down?
; o9 s& k" ?6 g. M7 E3 H- Z white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power * I7 F' D4 b4 G. Y8 |# B
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \6 B( ]/ ?% _" u- U
white:. . . . . . I press the power to the hackers call it
7 e/ P# ?( Y9 X# m white: You are not really powerful 9 `7 ~8 i6 B& h& o* T7 }( W
hackers: so-so friends 2 ^' N0 K" f, i$ b! G0 T) A9 c
white: bragging! You have the ability to shut down my machine in the horse. + S- z+ k5 W' V" J/ i# _, ~
hackers: this place is difficult! You wait ' h) g6 i1 T0 |- R' b
hackers: Haha, buttoned regret it 1 \, T( @2 S3 X+ T B" ^
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
: J- f! I1 {+ l+ | hackers: halo ~ ~ ~ ~ |
|