 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 4 W1 r7 v" _6 `- w
white: how control?
i+ Z' I9 O C. g hackers: white with a Trojan
9 U2 o& p& c, A" p6 Y0 {! t5 o/ q:. . . . . . Where? I did not see
Q- j2 W9 ?7 y) q1 B4 m( Y hackers: Open your Task Manager ) j. L& c+ n P' a9 g6 j
white:. . . . . . . Task Manager, where? 2 s4 j& \1 }8 F, |8 L
hackers:. . . . . Your computer below! !
- u4 f7 T/ I; m- _0 N$ T white: \;
6 z: d& H5 t( @ Hacker: I have control of your computer 1 ?4 E9 h; c M" Z
white: Oh
* X* q. T8 `3 j7 ~$ c/ r; A hackers: a funk? ! Hey
/ Z8 O4 Y; n: }1 g white: for the just, help me kill the virus it, many of the recent problems my Lord ' e( p& C* |+ I
machine hackers:. . . . . .
/ g u" e% B; ]- t o ! J5 D0 M4 D3 k& c& E) S4 r7 @& @2 `
white: how do you always in my computer and out of
/ k2 Y' v* E/ r9 j& v casual hackers: You can install a firewall
# }5 F3 a1 _% X. N white: install a firewall, you can not access it? 6 ^0 ~( \* E' X( Y" k2 j6 i
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah : S( z% c' [5 S m
) e$ C% H5 h4 y+ S small White: I heard that you will create a \!
; F" l: u% f' l! W6 Q1 O hackers: ah ' N) o& ]# s8 ]4 G( S
white: you can control someone else's computer? ! % F& D4 s( N+ T x
hackers: General is the ! A( u, _$ e6 M$ O: m
white: you can black out those sites? $ \7 V: x! L* R1 T6 X! p( Z
hackers: of course, did not hear people call me a \
7 m4 r7 F# {, A/ s0 C% h$ K white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 2 J/ a! w' h- ?6 K. A% o2 i
\!
1 z8 Q$ b; Y- V8 X& o3 V white: every day you come in, do not feel tired of it? ( V: O# T( e6 O
hacker: is a pain, your machine is the worst I've ever seen in one of the 3 A8 e! j% [- ]& I/ O+ t9 u1 N+ g' k
white: is not it, this is Brand ' d, N6 V7 I$ I9 \
Hackers: I was mentally retarded in addition to your yard game machine only virus a , |7 S3 V$ w9 f C
white: Oh ~ ~ that you see me The \. . . . Goodbye
6 d4 M: [0 R: P2 F1 o% C
/ [. b$ t. o+ P hacker: Hey ~ ~ ~ I come! 0 x3 Q" J. K: ^" m
white: not seen you for days, was my firewall blocking you? 7 ] w( o8 y! `; o
hackers: Haha, jokes, on your machine is easier than my own, not you miss me ! p. Q# U; U9 _3 X0 q1 g
white: I want to Please help a busy 2 x+ G0 T2 r& g3 C- ~: u' q
hacker: What?
2 ?; u9 s/ X: k" D/ {( e+ B* r4 W white: you can not modify the point into the power system data
! Q' l; M+ D4 d, p/ W" d3 c' a hackers:. . . . . . Why do you want to! ! $ Y0 E' m Q& N7 w
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
9 g, a$ R. b I$ Y: m hackers: die! !
7 w9 _+ \% o2 ]: t& H# t) v1 D
: P' E; L$ @4 w hacker: you die Where is? ! ! !
, \) I5 Y4 X% n white:. . . . Go out and play for a few days, ah, come to me why
0 h3 B4 S# l' F: f Hacker: I'm looking for something ) t, z6 G6 u* V( @) @# m
white: what I find here? " U# j9 b& {7 s7 M7 S
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights ' Y9 V- s0 D8 D" b/ [
# x1 A- K" ^/ C most hackers : I come! !
' N8 W: Z$ t( } Q2 A: G. . . . . .
- |, x, W- D0 N0 Y/ z+ e hacker: how not to speak?
1 K* }3 t. L# t& r white: a bad mood N2 z: {8 d' e2 u, n4 I+ |3 Q
hackers: Who bullied you?
( k7 L9 s2 v7 _9 L white: a Q No. I have not lost inside of my first love 8 K1 ^* E" E* J" X# R" ~' u
Internet hackers: this simple, I get it for you ) ?6 S. n" A" s; O" Q4 X
white: do not get back $ ?: x( v4 T9 E6 Z+ u" J0 T
hackers: No, tell me what number? 4 A# @( Y9 I" p( Q3 }
white: Woo ~ ~ ~ ~ just do not remember 4 J% H& i) a# S" D& g( B# K& `
' X* i3 ?, @3 B* r$ o r' V, Z& m3 y
white: you gave me out! ! ! ! : S5 t9 P6 q+ l! j
hacker: how wrong? !
) }" ]4 B H* ~1 ]' f1 @ white: You are not the forum to use my ID to play it? ! ! ( z( W/ ~5 P* u: x4 o+ p5 x+ I, Y0 W
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the * }: C- X' S: N
white: it does not work! ! !
. B$ l& c- |. q8 a& M9 g hacker: how should you like? , j4 h% u1 Z( g2 `% R& m
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
& X4 H: Z& h: B- [ ( V" d5 f* U4 ?& `8 n
hacker: Hey,ralph lauren pas cher, I did a lot of fun 4 _0 m/ ~' o( ]) B9 t0 z" h
white: what
8 g" a' `9 |, @- r* I hackers: I go to the forums posted the top
; q( i- u n! N5 j: Y9 q8 e- e white: This very common ah
; w1 D, d, T. n. H Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent $ u8 g; o7 ~1 W1 R7 t4 W
white: Wow, very enjoyable, and I can never dare, will be blocked! + d8 P; U- O i" a; t! T) D4 ^
Hackers: Yes, has been banned.
" a+ F6 X6 s, m9 y4 v$ R4 R white: this is also fun? ! 6 n8 q5 C+ K. F) v: e* i; _2 W
Hackers: Yes, ah, because I use your ID - Y# m2 F* F! g/ d x( z
white: you are pro? ; J# M! y2 w) q( u1 c3 [) c- ]
hackers: You can say it. 6 y \& N- r3 G' C s X# d# o
white: to what extent high? $ h% Z. u/ m5 T% t: h" d9 o' J, i# h
hackers: ah, I am bored when their own
6 J6 }: c7 g! | white black: Ah, this I will! * c0 ~! n* M+ Q: y+ |
hacker :#?%! You can? ! - f" r$ z* \' H4 B' B5 n
white: Yes, ah, a black off it. . . . . ( W& w2 N: K! U3 G8 {
hackers: Go!
$ n1 P- w, e7 h$ V white: Ask your question * s f _& D5 k
hacker: says
: D3 @) M0 {# O, e, L white: Besides me, you can also control other people's computers do ? 7 h5 b/ `9 l5 I3 F) ^& D# X& R7 d
Hackers: Yes you can. . . .
. C; B) s6 ]' z" [# u7 P- {7 B white: no networking is also OK?
1 ?2 F; B* d% D hackers:. . . . . . .
u$ n: M) S7 d( g0 ? white: You can remote control to open someone else's machine it? ( ]6 D5 @) Y0 v/ w& T' I
hackers:. . . . . . . . - ~1 d6 u/ u5 v2 v% j- t6 A @' C
white: You can steal top-secret file it! ! ! x. ?! ?1 w" J1 u
hackers: I think you see more movies, go to sleep 4 N0 C& a7 E0 n3 d. m k: r
white wash: my computer is broken
- J2 \- V1 C* X8 j/ a0 N, H hackers:. . . . . . . Just checked, your computer no problem ! v. k6 e3 P9 v$ s+ w
white: that is, you bully me : v3 s3 x. k- t1 ?! _+ @0 y8 H! P I
hackers: No ah
3 Q; R) J. C- Z! L' y& T3 _ white: You are! MP3 files are passed to my no images!
! g3 Z) W4 `- y3 M7 I# Q hackers: help ah ~~~~~~~
/ g. | L, [" [3 \ white: Ask a computer problems can you answer? . @4 ?" N$ ?6 J' b& c; e% |9 e
Hackers: should be able to 0 [1 \# z* {1 W; s2 R, W/ X$ U
white: Which key on the keyboard the most handsome? 3 `& |2 i" u* M/ X, u
hackers:. . . . . . . Do not know
6 b5 H* H& o7 p0 O& o& W" ^6 T white: of course, \!
0 V7 T$ P0 o3 Q6 r hackers: halo ~ ~ ~ This is a computer problem? ! !
$ s3 H! o! m% B " N5 L) l! q& M' ]0 O
white: ask you a computer problems you can answer? / ^, C: C! |. p/ Z
hackers: If the problem is not your idiot
8 d- ~ g+ @0 O+ S! C N white: I am serious! ! You can operate my computer? 1 P3 F8 D$ [: \0 j- M/ K) k
hackers: ah,juicy couture shop, yes
& m% z4 L! x0 n* L0 O5 p6 X3 Z$ t white: that problem, you can solve it ' G+ W& m: o- n2 y$ n" k
hackers: Your question is, should not be difficult ; 8 P* O; h7 \) G% D4 L' e- v
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
9 e+ t) N6 d* A* W2 J a hacker:. . . . I excused 0 Q% z& P- C3 v+ A' o
white: we see meet you? . m% J* e; x4 x; d; p @
hackers:. . . . This, not so good, why should we see . t7 d+ C- Q& F2 C" L2 Z
white: I want to see you are not the same and I would like to
, A. {1 l3 B0 ]7 _! q# f. X, H Hacker: Oh, what you think? , t. X. Z, k; W7 h. n. @4 T1 }
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 9 J& M; Q3 [, Z
hackers:. . . . You say that Spider-Man, boss!
' e" ^8 q7 h7 @6 n: L hackers: Kazakhstan woven ~ ~ ~ 2 O+ D$ Z8 a1 ^5 C; r2 P' B9 D
white: You called every day, is not very curious about me?
! @# v- K0 ~) _' s hackers: not curious, is the habit, easily came in 5 S7 i1 m3 |4 ? n: N9 I% X- [. M
white: Well, I have a good way to change your habit * c4 ~/ J0 F9 Q) {$ A
hacker :. . . . Oh? ! Any way , Y, B7 g* Y- a! D( h$ O# o
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
9 q( V1 A1 m' U hackers: Genius ah! . . . . . You can also connect to it? ! M6 V ^: x5 o0 g5 ~& w
white: to ah, and slowly the hymns!
2 _1 b& z7 X( R: |8 ^ white: you every day into my computer, is not very curious about me? : T" d" D( p, l* Q" M) {
hackers: No wonder, only used
5 G& _' }3 b/ N+ U f2 i0 C white: no you're curious about the place? 4 q9 r6 _4 `7 P* R) Q
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 1 s7 F Y" u" k5 W7 ^( E
D2 K' c* d5 T, I
white: I would like to control your computer
# h8 `0 Z: r5 ] Hackers: I will not have other people access my computer I will be mad
5 z! u5 J, C+ G9 R, @! b white: This is not fair! !
9 D1 b- ^/ Y# q3 V& R& Q hackers: ah, well, you control the good of the : |2 J3 F g( C. o; i: M
white:. . . . But I will not. . . . + N! Y/ k/ n3 w* e
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
O8 u" D0 \7 i4 b: Z Hacker: I'm white + N2 t' R, g6 ~% A9 i
us again: This is probably the last time we met the ' w* a: p2 [. ~. v/ m" \
Hacker: Oh? What happened?
0 Z% y5 X0 q# i7 f white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 4 @' L! E+ c2 Y
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye * N4 e4 `+ e$ j0 [0 i
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! # @5 t. m1 ]4 o( r
hackers:. . . . . . . . . .
6 L9 H- J' z0 v& f1 y hackers: so late, and how not offline? 4 L8 c) M) P$ g, W, m' Q3 _
white: Oh, is the next, and I went to pull the power - a# R; p0 z3 `1 b7 a2 M( A3 v
hackers: Slow! You will not shut down?
6 f3 [8 K" g/ h7 p white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
% G1 x& e5 C$ i* P hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \$ h; r6 w" b& r6 k$ I- j" {
white:. . . . . . I press the power to the hackers call it . s' }% _. |+ M# s4 H3 U
white: You are not really powerful
E. R; X( A/ n) T+ m0 Q" i hackers: so-so friends 1 Y4 N/ S, L! [5 t* k9 w
white: bragging! You have the ability to shut down my machine in the horse.
4 m4 x+ n* u# O- h0 [/ C2 z6 G* u hackers: this place is difficult! You wait
5 H2 y' O1 `5 @7 {% { hackers: Haha, buttoned regret it 7 `' o8 b6 @( t: f) \& n
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
7 @4 r7 B T( r: k. I' u. P( J8 t+ d hackers: halo ~ ~ ~ ~ |
|