埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 624|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
/ ^! Y0 c& D  y& \2 p white: how control?
# b/ o+ l. j4 d hackers: white with a Trojan 1 D' u% A5 v7 a- t7 O* W% O
:. . . . . . Where? I did not see ( P3 `) D( ]( D1 W
hackers: Open your Task Manager ) G- z' r' Q8 z9 d! G
white:. . . . . . . Task Manager, where?
, T# f2 n' [6 Q1 Y& b9 V6 a hackers:. . . . . Your computer below! ! + p, E' X$ g6 Z2 L( T$ F
white: \;
1 P; G& U6 p$ o4 b( w7 N* b Hacker: I have control of your computer 2 ]7 x- A" f( ]* k8 S3 y0 M
white: Oh   m7 t& d5 J: I- w- L3 o' X
hackers: a funk? ! Hey
; V  @$ Z0 j% C% p# h white: for the just, help me kill the virus it, many of the recent problems my Lord
6 ]* z% z+ ^" d machine hackers:. . . . . . " J. M* f, `: ]: }, C" W
9 ~  S3 J  q' _+ ?, b$ |
white: how do you always in my computer and out of
. R: Z. o# G- _% H6 u/ ~5 w casual hackers: You can install a firewall
8 {& ]/ e% f& Q' {% b white: install a firewall, you can not access it?   f  {& l& o. q  e0 q
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
! w& J+ r/ _3 w; r
- f4 u" I/ n3 F) P" p! m$ l* t small White: I heard that you will create a \! 5 q. p: y- b) S
hackers: ah
3 }, e1 S0 a7 I- Q- B% C, f white: you can control someone else's computer? !
0 a2 y4 Y2 \& |" p: u+ r  ]  @/ G hackers: General is the
2 U) J2 [% B: h8 P# m/ d4 e& U white: you can black out those sites?
) ?/ {+ |- ]7 Z8 r. H: P4 \+ A hackers: of course, did not hear people call me a \
3 R& r) G: L/ Y4 N2 j/ h: [1 r white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . , f; A" q& m5 ?" I  E3 V( a: s6 R7 W& Q
\! 4 [. z, h& p1 {! g% M  \
white: every day you come in, do not feel tired of it?
6 K" m7 @; y' j% f& X' U6 W hacker: is a pain, your machine is the worst I've ever seen in one of the , ^7 h& m* y) N5 z$ g& z1 _4 G
white: is not it, this is Brand
% l: Q7 W+ m9 O; {, F" `- J/ u Hackers: I was mentally retarded in addition to your yard game machine only virus a 9 T& V- t- q; g4 w' R
white: Oh ~ ~ that you see me The \. . . . Goodbye
7 j  G# o( O( \( [ 4 [. {) x. m; ]$ G# q1 O- o: B
hacker: Hey ~ ~ ~ I come!
' ~7 w# j0 e9 K! K' D4 S0 y white: not seen you for days, was my firewall blocking you?
% e, i6 l: |" [! F* C' r5 b hackers: Haha, jokes, on your machine is easier than my own, not you miss me
# E( Q, V! W/ c5 \" x8 f white: I want to Please help a busy
" o9 h3 \' D, t( v  D/ J- W6 \ hacker: What?
3 L8 Y! M0 X7 B white: you can not modify the point into the power system data   b  y0 j' c2 Y8 U8 V" D
hackers:. . . . . . Why do you want to! !
, O( W# @* v& O8 q! Z" C8 k white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
" x- E7 {. U: U! K$ E" M7 C hackers: die! ! , n& U0 w) p8 Y' e/ g' G$ z$ [7 t
3 g+ n- o0 D, M/ u( d
hacker: you die Where is? ! ! ! $ c" z  L0 m0 l& w' {, j0 _
white:. . . . Go out and play for a few days, ah, come to me why % i2 q0 v4 a+ p" T7 I
Hacker: I'm looking for something 8 H9 e; y2 O2 R9 |9 N
white: what I find here?
; r) b/ `$ X8 K; `, C! T. V) z hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
! D6 H9 ^2 z1 ?: z " `/ t4 k8 S3 Z3 g" ]/ _
most hackers : I come! !
8 {. t3 o( \: q- e) B. Q! Q' _. . . . . . 2 [2 ^4 I4 S2 d& q  ?
hacker: how not to speak? - M2 u8 X1 K) U4 o5 N. e1 a
white: a bad mood
9 N" x+ R5 c: i2 w" n: ] hackers: Who bullied you?
/ A  l+ d. h1 S3 H% t- }6 n white: a Q No. I have not lost inside of my first love
% T) I- {; ^% p& P$ u1 Q Internet hackers: this simple, I get it for you
3 d  @  V" u* U2 I white: do not get back / o& o! \: h, `/ S# O
hackers: No, tell me what number? 6 ?2 o  B+ M+ h5 b
white: Woo ~ ~ ~ ~ just do not remember $ o) v' O' R2 w) G) Q4 z/ h, }1 r
4 T1 ?1 d4 ]& c4 ]% j! Q
white: you gave me out! ! ! ! ' ^2 \6 X& ]2 |  _/ n* R# q
hacker: how wrong? !
0 `+ D: i$ l0 I: b5 R( F6 h white: You are not the forum to use my ID to play it? ! ! 4 B3 ]6 w7 g2 h+ N: n9 w' N9 Z1 V, c4 v
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 3 g; t1 E7 n2 C; N- w
white: it does not work! ! !
% `) d' x* o4 m hacker: how should you like?
$ L( O. b' {. \, F% u2 P2 d1 c  E' m white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
; e: Y# y) H8 O 6 N! V5 V" N  v4 J2 E$ O
hacker: Hey,ralph lauren pas cher, I did a lot of fun
3 @$ v4 [' Q6 w" U7 e  r+ @8 R* E white: what
& _: V# N5 z4 ?7 }+ S) Z hackers: I go to the forums posted the top . K5 j, c- f5 R! g
white: This very common ah
, \1 ]* b( U* q) P- I Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent # ]) k' I# Q8 z/ [% J
white: Wow, very enjoyable, and I can never dare, will be blocked!
" r* n% P! C! ~3 z7 O Hackers: Yes, has been banned. : i3 c- u* C( O5 o- a
white: this is also fun? !
! g; `7 ^& G% U$ j8 D6 b: q Hackers: Yes, ah, because I use your ID
( c2 V; I5 y+ A& @% K$ @+ I white: you are pro? ' J$ h6 [+ r- @$ R
hackers: You can say it.
3 [! N. C6 g7 M) B1 P( B# Z% M  g white: to what extent high? 3 X, Q7 `" w* X( k. a2 \% j) R
hackers: ah, I am bored when their own
2 N& A! h* W/ d) l8 c* ] white black: Ah, this I will!
3 F& J# W3 @/ g/ t hacker :#?%! You can? ! * u* c* F- Q' ]- S# \) l
white: Yes, ah, a black off it. . . . .   }) R/ \$ x. x$ u5 {
hackers: Go! ( X4 @" V! K$ u7 [) x9 X5 s# M( _
white: Ask your question
7 [+ |( ]# c/ g hacker: says ( i; G" b, H# I" a7 t
white: Besides me, you can also control other people's computers do ? 1 |, E, w( O9 p: Y
Hackers: Yes you can. . . .
6 o5 p5 L/ N. j6 R: R6 P white: no networking is also OK?
) ?0 r% N. K8 ?+ F: k  s* _( ^ hackers:. . . . . . .
' D- G" Y$ |( P2 _# I white: You can remote control to open someone else's machine it?
7 C' h$ E8 t. ?% t! A& P hackers:. . . . . . . .
/ d6 t2 V, A! k0 `/ Q  G white: You can steal top-secret file it! ! !
  b/ ?( r0 o( v2 x0 t9 T' s/ G: s) q hackers: I think you see more movies, go to sleep   I5 H; Q! c' |) a
white wash: my computer is broken
: p$ H& k7 L+ A, X' {2 J hackers:. . . . . . . Just checked, your computer no problem
7 Z! ?% y! M7 D8 [ white: that is, you bully me ) W# t* j. i" w. p
hackers: No ah
+ T6 e2 k$ ^8 s: y white: You are! MP3 files are passed to my no images!
0 J6 b# D+ {8 Z. R( u hackers: help ah ~~~~~~~
- g' v& f) k$ @5 Y# M& R8 q3 m white: Ask a computer problems can you answer?
4 X- V. J* T) C& t9 x5 A) l# P Hackers: should be able to # l! B: M4 v: D9 E) b& d
white: Which key on the keyboard the most handsome?
0 f; T: ]. t/ g$ ^  H+ t* t$ B hackers:. . . . . . . Do not know
( c3 L7 b  ?5 j9 w white: of course, \! " @" r0 K( U8 p4 J  N2 D
hackers: halo ~ ~ ~ This is a computer problem? ! ! 3 c7 R. ^- P+ E% `
- V& Q7 I) a* o6 c/ ], V# @  p$ w
white: ask you a computer problems you can answer? 3 ]# l0 P9 K) [5 E* |# ]3 j
hackers: If the problem is not your idiot
# a2 x: D% B  F( n. |! ~ white: I am serious! ! You can operate my computer? + k) H9 f7 ^' p0 |/ T8 o
hackers: ah,juicy couture shop, yes & V3 N) E( q* O& t. Z7 H$ S6 y
white: that problem, you can solve it
, I- w& V8 _4 ~* |1 g' a& b hackers: Your question is, should not be difficult ; ! T, r* @7 g8 g; O
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
3 I0 K  `& ?2 S  N8 O+ Y6 | a hacker:. . . . I excused
# t/ ?  s& `0 w& ?1 n# f1 j white: we see meet you?
% H# E/ z9 q/ E7 u3 Q/ w hackers:. . . . This, not so good, why should we see ' O8 k- {9 x0 Z% W8 {6 A& A
white: I want to see you are not the same and I would like to + V1 f; ?& d3 D4 g; [8 ~8 g
Hacker: Oh, what you think?
  f4 {5 o0 A2 U# U' j white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
2 I0 K, a5 \7 b. Z5 |3 S hackers:. . . . You say that Spider-Man, boss!
$ A4 O* A* ]9 D, }/ X hackers: Kazakhstan woven ~ ~ ~
( L" C( k0 P1 _, C% B white: You called every day, is not very curious about me?
/ f. i+ Z- Y/ g hackers: not curious, is the habit, easily came in 3 C' ~9 S8 z0 ]1 T
white: Well, I have a good way to change your habit / c  @2 x) `: G4 z+ n! Z
hacker :. . . . Oh? ! Any way & z9 a1 }  z* u% r
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
' ^1 Q- F8 _' [5 K! T3 U hackers: Genius ah! . . . . . You can also connect to it?
$ K/ v( w  w' Q3 O- a/ C white: to ah, and slowly the hymns! ! |2 y* j' m" g  |3 `
white: you every day into my computer, is not very curious about me? ! S7 g, c3 \" a6 w6 N0 b( P" S
hackers: No wonder, only used % ^% ~+ Q  U' G! ^' K0 S
white: no you're curious about the place?   ]$ ?& h0 w* T( m
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 4 Z2 ~# j7 c. V- H# q) Z/ W

1 K8 R- }& P2 }4 s9 J white: I would like to control your computer
: ~" q. [$ A6 T% o4 G Hackers: I will not have other people access my computer I will be mad * S% D, l1 @" i( {- O# F
white: This is not fair! !   R/ r6 A- a4 l2 d; o
hackers: ah, well, you control the good of the
- E) `+ _% R* I: ^0 | white:. . . . But I will not. . . . 0 ~  ^/ `5 _! s. u
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
5 h; m- |8 {1 m! ~  O Hacker: I'm white # `6 s* f) f/ ~* l: X3 u; W. V3 w- ~# n
us again: This is probably the last time we met the ; Y; h& `: }/ R6 {2 r# x
Hacker: Oh? What happened? 9 K4 ?8 ~& i. o: I/ e. m
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 8 r1 A7 x) U5 s. s) }# S' V! D
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
7 i& D# O- ]+ u8 I/ T2 S  l0 ?3 L white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
; o8 M" A5 e, D( S6 U( s; J hackers:. . . . . . . . . .
  }& E7 p  n% Y$ z) E! l hackers: so late, and how not offline?
2 n! K, f8 w& s4 g- M9 ~6 G' M white: Oh, is the next, and I went to pull the power 8 T# M1 ^3 D; P$ G7 N0 c$ B
hackers: Slow! You will not shut down?
' T2 ?/ |# x9 `( ^7 u white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 6 |9 A) {' M: U/ l) y# U8 }$ t
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \4 W& M0 J5 |4 _! p2 ~1 o
white:. . . . . . I press the power to the hackers call it 5 f, a6 ]9 }3 N  O5 ]
white: You are not really powerful ' i; d$ q: b( j
hackers: so-so friends ( e! ?# g5 P) i) m* a5 y8 k
white: bragging! You have the ability to shut down my machine in the horse.
+ z5 }5 e0 M/ Z2 O hackers: this place is difficult! You wait
  b- w+ z( a3 ]4 s, l% z hackers: Haha, buttoned regret it : Y! T2 N/ H) E1 z. K: `( n, ~4 l' W
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 0 |3 |) d2 ?+ P" Y7 E& f3 Z
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-8-19 09:42 , Processed in 0.147215 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表