 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
n. ?7 J" s. m9 m white: how control?
4 j# I7 ^8 r) y: W0 _. } hackers: white with a Trojan ' ~) a$ X8 \6 {
:. . . . . . Where? I did not see ( h. B0 C/ I3 \1 i/ l
hackers: Open your Task Manager
2 Z) Q/ F9 y/ v5 p l) w7 K x white:. . . . . . . Task Manager, where?
d3 j& A& L% u1 p+ U; L7 W) N hackers:. . . . . Your computer below! ! # F/ r' J- P4 N
white: \; 7 V) q; U7 Q0 S7 l8 Q0 a
Hacker: I have control of your computer ]+ N+ l! Y$ p
white: Oh $ G# F2 A b- I' o \, R
hackers: a funk? ! Hey % V9 i# X/ k" j1 k5 H# ~# d
white: for the just, help me kill the virus it, many of the recent problems my Lord 3 [# t' S4 ]) ?( z
machine hackers:. . . . . . : q; Y/ o4 Z; b6 y! |
* A! @4 m4 x. R s1 U9 x
white: how do you always in my computer and out of
4 Q r; c6 \5 U0 n9 I4 q casual hackers: You can install a firewall
3 _; S1 m7 `, b) F white: install a firewall, you can not access it? . {, n; F* `% R. o
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 5 |+ ?8 Z p2 r! K W
A; P6 N+ |$ s7 o
small White: I heard that you will create a \! & \( F- s! I+ R w1 Q
hackers: ah
1 i7 {) k4 z! F+ E4 v) Q$ u white: you can control someone else's computer? !
( y1 N4 d W7 r& Z hackers: General is the 7 N# F0 m1 F, @( C6 t
white: you can black out those sites? / J% g, p8 o, G7 U0 ]
hackers: of course, did not hear people call me a \
, p+ x1 b N, M+ j( \- e white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . / [+ g5 H9 U3 @9 B
\!
6 W Z% A4 F3 r) A+ @) [ white: every day you come in, do not feel tired of it?
* D; Y' Q0 k3 @4 n3 q `8 t- p: j$ r hacker: is a pain, your machine is the worst I've ever seen in one of the 0 b6 g# \+ r. y" C& E
white: is not it, this is Brand
' z- p' _& K6 t6 U6 U0 b) r Hackers: I was mentally retarded in addition to your yard game machine only virus a - j6 W; }, ]! B* f, h3 K
white: Oh ~ ~ that you see me The \. . . . Goodbye ; M1 L6 h9 ?: Q) U, T3 B1 e; Z9 |
8 L* l) I' `' q& Z hacker: Hey ~ ~ ~ I come! 4 H% ]7 j; g. y; T3 O; i
white: not seen you for days, was my firewall blocking you?
# j: C p/ c( d hackers: Haha, jokes, on your machine is easier than my own, not you miss me 6 a3 C. e* U! _) s( D
white: I want to Please help a busy
! \4 J) T; F( T0 v4 y hacker: What?
6 X" d, i; \' j# W! L, [. G2 F white: you can not modify the point into the power system data
7 O+ L% o9 @" F5 B, G7 i hackers:. . . . . . Why do you want to! ! " Y8 D$ F$ {. \" D C* |, @% A
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 0 A4 F8 r( Y E% F
hackers: die! !
1 E$ i) Z6 \( H0 a1 b' g " |6 u5 u5 y$ w
hacker: you die Where is? ! ! ! " q- G* U" B" @& ~8 v( p4 x
white:. . . . Go out and play for a few days, ah, come to me why
3 b. S# y# e A3 ^! \. l- M* ` Hacker: I'm looking for something
' i2 A" |2 x8 Z, Y6 u white: what I find here? . Y# ]/ w" N- I: x c5 h
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights % u8 v$ f& r3 D
2 F% K2 a" h" w1 P/ G
most hackers : I come! !
4 ?$ k1 H: a! _! U5 V. . . . . .
& x% m% X! c! `8 _: I- \9 m hacker: how not to speak? # y& u7 O& p" ^( n
white: a bad mood * D0 X" e2 u& M/ q5 g. N
hackers: Who bullied you?
7 E' h2 q4 u) h9 f `9 R white: a Q No. I have not lost inside of my first love
/ H( j( U5 ]& y( X/ c0 e Internet hackers: this simple, I get it for you
/ c* d& H, Y; @8 Q" D white: do not get back 3 y4 h, T4 ~; X9 Q
hackers: No, tell me what number? " O$ ^4 S- _4 {/ v! \- G
white: Woo ~ ~ ~ ~ just do not remember
# i6 k4 m' S/ S0 z1 u* E
6 [/ h5 y8 z" ~$ B white: you gave me out! ! ! !
( q+ W; }, Y, [ M+ l2 a( w hacker: how wrong? ! 8 Y( d6 \$ W. ?3 e' l( K
white: You are not the forum to use my ID to play it? ! ! 7 B5 X6 P2 N1 {7 K, f8 t! Y
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ; P, V M# O* _) X
white: it does not work! ! !
4 C) p; _2 a+ m+ a" D! S8 R hacker: how should you like?
* y4 M* a. R0 E( @( c8 d2 @2 f white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
, |" `& G2 V. k6 {) K# o6 A. Z + W$ G) x6 U7 {1 c C
hacker: Hey,ralph lauren pas cher, I did a lot of fun
. q) [. p1 Y* c3 Q |3 s; r q white: what # Y4 T, U2 Y) w
hackers: I go to the forums posted the top
+ X1 _/ S- k, U8 Q4 D white: This very common ah 6 O$ I0 G" Y. y9 N3 E; R
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent & b/ O) y. ?! i
white: Wow, very enjoyable, and I can never dare, will be blocked!
# z; g( w, b- Q3 c# ~ Hackers: Yes, has been banned. . {8 [- ^6 ?$ K5 F$ ?! {
white: this is also fun? ! ; u0 f- Z7 }: [" L3 x5 \+ }
Hackers: Yes, ah, because I use your ID - e. T- \6 }. j( P" K
white: you are pro? ; Q; ~# H: W- D# G5 ^7 R; X5 k
hackers: You can say it.
$ H" D: {' E) q4 U. z white: to what extent high? ' r) K2 D5 |' U- z8 m' ?& u
hackers: ah, I am bored when their own 6 z \4 q4 _5 f, _
white black: Ah, this I will!
+ D/ _# D. H$ b9 D; Y* J( Y: ` hacker :#?%! You can? !
# M' U: T+ {( O7 y- t/ w white: Yes, ah, a black off it. . . . . 6 O; y+ h3 ~7 h) z3 |- s% G% w
hackers: Go! , t2 ^, O7 A# Q1 Q$ S, j$ Q# k
white: Ask your question , q" I8 `) `0 j2 T! k
hacker: says 3 g* S% F- G, d
white: Besides me, you can also control other people's computers do ? * j0 d9 D6 ?: B3 A( U# e
Hackers: Yes you can. . . . ' [+ L; J) f ?- v3 a5 V3 t
white: no networking is also OK? : M4 {2 \1 H6 s% K3 u
hackers:. . . . . . .
9 H$ o5 i+ I/ s" \6 A- X white: You can remote control to open someone else's machine it?
; V p2 p! v# }. c6 I hackers:. . . . . . . . . s* ~- J" {7 a6 O/ t( h. g
white: You can steal top-secret file it! ! !
* N1 @. n* ?7 {1 v hackers: I think you see more movies, go to sleep
# |( }) C* |& m, I% p" B white wash: my computer is broken ( w- M9 Y; m+ o
hackers:. . . . . . . Just checked, your computer no problem
9 O$ [& {: P7 H. \/ t) N white: that is, you bully me " `7 w' y8 ^$ d# W& E
hackers: No ah ! q, L, |5 d; G: D
white: You are! MP3 files are passed to my no images! 7 w0 z% T" R4 D' ^# o. f6 n$ B
hackers: help ah ~~~~~~~
# }+ B( F& e6 g& [ `2 o white: Ask a computer problems can you answer? , ^9 V9 `$ h0 y; e @( Q& l
Hackers: should be able to
, ?8 d0 b. r9 M. p6 A. |3 P white: Which key on the keyboard the most handsome?
6 Z5 c: d: ~* D% J7 x hackers:. . . . . . . Do not know
' l. o1 A" @ R9 i* a/ U white: of course, \!
' J s* ~6 x9 f% _ hackers: halo ~ ~ ~ This is a computer problem? ! ! % i1 x- h4 O0 y2 x
- W, S. \3 w5 M& z! A6 H4 X4 I9 X2 y% i
white: ask you a computer problems you can answer?
1 P6 l3 t5 e9 Q l: C8 c hackers: If the problem is not your idiot a& m9 r0 R. h- O) q
white: I am serious! ! You can operate my computer?
7 g# J! A& Y# m5 V) H; J: |1 ]: Y hackers: ah,juicy couture shop, yes
9 }" G& S, x; J/ Y k% A2 M white: that problem, you can solve it ! G: P4 ]% z+ @' Y
hackers: Your question is, should not be difficult ;
% ]6 s6 A2 W' V I) { a6 W- S white: Great, my fans do not seem to turn up,nike air jordan, help me change it * o8 m- R2 u0 u* I/ ~+ e, |# X
a hacker:. . . . I excused , k* y% Y+ g: k4 L( G
white: we see meet you?
1 {; B9 X3 m' I: C; m( T4 a$ ~; t hackers:. . . . This, not so good, why should we see # {* Z- A: p/ w. J& t- R
white: I want to see you are not the same and I would like to
/ d- L: s2 A6 U3 h! a( [# U6 k Hacker: Oh, what you think? 4 J7 S/ ~" z' [$ F6 f4 Z* |* R
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ! O& _4 Z1 V" I3 m8 Q* D, R3 \& e
hackers:. . . . You say that Spider-Man, boss!
4 {3 X4 Z( U. v7 e6 _ hackers: Kazakhstan woven ~ ~ ~
, q7 A3 ~7 D) t( H" s white: You called every day, is not very curious about me?
0 W/ `% B" P3 H" f0 Y4 L5 x hackers: not curious, is the habit, easily came in % I9 M7 S- q3 g3 K; w5 T3 ?
white: Well, I have a good way to change your habit
* R7 g( Y& T2 u# O+ d6 P- R hacker :. . . . Oh? ! Any way 0 |& Z2 g* e" c7 ~4 q
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ ; k2 P' P5 J# ^& h! n; k
hackers: Genius ah! . . . . . You can also connect to it? + Y: K5 l! D3 `8 R
white: to ah, and slowly the hymns! # _" Y' h/ W6 _4 b2 C
white: you every day into my computer, is not very curious about me? * M. `6 s2 G9 s$ {
hackers: No wonder, only used
1 O* l k9 q* T" u white: no you're curious about the place?
9 G( F# b9 N# {9 t! ? i hackers: a ah, I always wanted to know your machine so much as when the virus crashes
& ?! z5 b6 C6 Q n% S
# m$ `3 Q( m; u8 ]4 N; t- O9 d* A white: I would like to control your computer $ J2 h0 e7 Y; p/ V! \+ p, z
Hackers: I will not have other people access my computer I will be mad
* u7 ]$ p* t" q& Z white: This is not fair! ! # c& T8 k; ~3 A# m; l7 D- y7 ^) i$ a# N
hackers: ah, well, you control the good of the ! x( Y; e- m: v* y: s
white:. . . . But I will not. . . . x7 }# H9 Y0 W% N
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ) e f5 R2 a" V1 N. T2 O8 W" k
Hacker: I'm white
* \' w& _1 a. T9 U4 a/ Z us again: This is probably the last time we met the
0 s# u0 [7 {3 } Hacker: Oh? What happened?
6 G# F! v, n; Y white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 7 i# b; S+ I* [9 A9 M4 K
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye ' V5 f, W t' P/ M% Y8 P( O% j
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 0 ^ w( x7 p1 W4 T
hackers:. . . . . . . . . . 3 ~# K: w8 \4 k, T- \! H) x( X
hackers: so late, and how not offline?
9 u" J5 u/ J7 H$ w8 V white: Oh, is the next, and I went to pull the power $ X. v3 B* K4 V% d
hackers: Slow! You will not shut down?
$ M( Z8 O' p; G white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power : p2 {" H' O5 G+ |
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
6 h- `& O% }& w3 R: r9 F white:. . . . . . I press the power to the hackers call it + N% M- e- A# \% G
white: You are not really powerful 0 @) e) Q# n5 U6 C- f) a7 \
hackers: so-so friends # h0 }/ K9 o; y7 ~7 k6 H2 _; w7 D
white: bragging! You have the ability to shut down my machine in the horse.
" ^2 G3 R4 T% Z, b2 n, S( S hackers: this place is difficult! You wait
" I1 P" `) u4 a: c' ] hackers: Haha, buttoned regret it
- n6 {0 x( N* {+ J( i" R white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . . t: w$ x4 M1 w% h1 |1 z) V5 q/ v
hackers: halo ~ ~ ~ ~ |
|