埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 837|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
$ O& T! [# l0 V2 B9 m) z& y white: how control? 6 y* ^) e2 x; K  f
hackers: white with a Trojan , y0 D1 W3 ^1 \4 j% s% ?
:. . . . . . Where? I did not see
2 n) F0 e* p: n; Y: U& o- r hackers: Open your Task Manager
. j+ A% F* W4 \( Y* ]1 {/ ? white:. . . . . . . Task Manager, where? 5 Z: L; |  ^0 c( W
hackers:. . . . . Your computer below! !
# e; W9 b$ c) t& l white: \; * o) F  }/ c0 f8 t1 q
Hacker: I have control of your computer
, |* o$ ~1 S, A white: Oh
3 s' n' F. @; I( c3 d$ g6 @ hackers: a funk? ! Hey & a6 B! N4 E1 F
white: for the just, help me kill the virus it, many of the recent problems my Lord # {& J! T7 J/ N" p) Z; i
machine hackers:. . . . . .
2 z3 a" y, X- u6 w4 c3 d5 b , F. R0 i4 A' Y+ [( {
white: how do you always in my computer and out of $ [0 w) |- G. j+ P% M& v
casual hackers: You can install a firewall
  e) K. U2 n& z" G5 O  x7 d white: install a firewall, you can not access it? " p# u; y4 N2 a
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ) J4 Q7 y5 ]% p
8 e) S  L2 _, {, I9 ]6 g  F) p1 e
small White: I heard that you will create a \! 8 L, x9 d0 X; X
hackers: ah
4 t3 X/ m: y0 e  @ white: you can control someone else's computer? !
; M+ m  k3 s" L8 O' R2 R" N$ q/ @; n hackers: General is the
) u! Y1 c& ?/ U white: you can black out those sites?
" E2 N$ q, k. z  h! h7 L0 M6 q hackers: of course, did not hear people call me a \& e$ R2 ^: {  l: k
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . " ^4 v8 X( D( G
\!
3 ^" T% r' t7 K: \8 d  B white: every day you come in, do not feel tired of it? ) F4 I4 f* |$ _) \3 U6 C) m
hacker: is a pain, your machine is the worst I've ever seen in one of the * X0 e( \  o# I8 _& O' p
white: is not it, this is Brand
2 S% Y2 u0 X7 `, |: L Hackers: I was mentally retarded in addition to your yard game machine only virus a
" V9 X2 D. _2 n5 [5 u& d' Y white: Oh ~ ~ that you see me The \. . . . Goodbye % |. `5 t' }, K7 h5 [0 D

3 ~+ }! S9 K$ u1 H# K$ V hacker: Hey ~ ~ ~ I come! 4 L' D8 n3 {  a& w- n
white: not seen you for days, was my firewall blocking you?
4 z. K" w9 @! f3 O% ~! z8 ~ hackers: Haha, jokes, on your machine is easier than my own, not you miss me ) E. {& w& L6 U# F
white: I want to Please help a busy & m& |7 s$ G8 ^3 P+ R6 D+ |
hacker: What?
' x+ P9 H2 N: I" h8 w8 L0 C8 |# P7 s white: you can not modify the point into the power system data
! _( q. K( m# L hackers:. . . . . . Why do you want to! !
! ]6 N9 E% p* q/ u: R9 ^# K: _ white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . & [! X- [0 N8 W' Y
hackers: die! !
0 Y) I9 x$ n9 S
6 Y# e. T7 V. D8 k- q3 z hacker: you die Where is? ! ! !
# \9 k5 u4 ^, X+ ~/ `6 ?: ]* p9 M& X white:. . . . Go out and play for a few days, ah, come to me why
* m  i3 d/ c- C+ p9 ^# R4 } Hacker: I'm looking for something ' T( R& Q- `" K3 P
white: what I find here?
+ r8 i3 {9 D7 S" p hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights " |6 B3 C. J+ A) l

0 r( ~! Z9 v! Y4 d; P, s- t) N6 m most hackers : I come! ! % q/ L6 Y/ v' u. Q, ]6 g
. . . . . .
: M( K. C) g- w& N hacker: how not to speak?
$ M2 g2 P) U! T" ^7 a) @ white: a bad mood
% s- l5 D0 \! W8 { hackers: Who bullied you? / V6 ]( @7 B7 Q( X( v
white: a Q No. I have not lost inside of my first love
! ]! N/ d5 n/ ?# v2 K Internet hackers: this simple, I get it for you * H" _0 j' d7 p' t
white: do not get back 4 O9 V5 T2 S; @- c8 G  D
hackers: No, tell me what number? ! p! v) u- `- w
white: Woo ~ ~ ~ ~ just do not remember
0 T" X, {$ }( y
: N% ]/ C2 Y. q4 y, S- l, l white: you gave me out! ! ! ! 9 b8 l" v5 k5 d
hacker: how wrong? !
0 O6 @. o6 C7 ~1 o7 X white: You are not the forum to use my ID to play it? ! ! ( h6 a' _) M' {1 ?
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the , ~) M3 e# u4 O* q' ?9 y
white: it does not work! ! !   f; \& d# K3 i% E# G
hacker: how should you like?
; W, `6 C2 L  g' _# [+ ~* k  G white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
$ i  p+ j3 _5 Y3 P3 i 9 H2 H$ W5 X" t3 ^, r
hacker: Hey,ralph lauren pas cher, I did a lot of fun
, A3 z8 r' {" { white: what 0 R! w: u* x$ E4 s  f
hackers: I go to the forums posted the top ( [$ ]( k( t( `' T/ ]
white: This very common ah
1 t: v0 Q9 L! i5 q1 C7 ~! F1 G Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
+ T. a* D! V1 w; p white: Wow, very enjoyable, and I can never dare, will be blocked! + l0 F; T' }4 @5 ^1 v& N+ C, l
Hackers: Yes, has been banned.
1 s7 \4 C4 S: V7 ?! Z white: this is also fun? ! 9 ^+ j0 s& ?6 F# `7 W- S' D, N* i
Hackers: Yes, ah, because I use your ID
% F( b% d# D3 w9 } white: you are pro?
! |2 y5 j0 z% R1 \ hackers: You can say it.
5 o. ^/ \4 |- g" s8 _' i white: to what extent high?
$ e, Q) a  ]- X2 x hackers: ah, I am bored when their own
& H: E) A! o: o# r+ h$ [: h7 o: s white black: Ah, this I will!
+ k! Y4 ]1 J% i0 W0 v( p, ?7 @9 g hacker :#?%! You can? !
: A- e! P' f; H1 ~8 O white: Yes, ah, a black off it. . . . .
3 l2 s3 _8 t9 n) w hackers: Go! 3 R, c/ d# F- _
white: Ask your question 6 U/ [. j" J+ k$ M# r8 c
hacker: says
0 s. ~6 {( J* I- `0 i white: Besides me, you can also control other people's computers do ? 3 i2 P& Z- m2 z* {7 ^+ h: T1 q
Hackers: Yes you can. . . . 0 |& Z! J9 P+ q/ l
white: no networking is also OK? , {+ L8 s6 N; I6 W2 |4 z) \
hackers:. . . . . . .
  f$ o$ x( r8 P# I' M white: You can remote control to open someone else's machine it? ; E6 N6 O$ D* l
hackers:. . . . . . . .
+ n: {. C9 v8 |/ X( S( I white: You can steal top-secret file it! ! !
1 v+ c; @0 I; {& D hackers: I think you see more movies, go to sleep & S' w  Z- n# v. j& G
white wash: my computer is broken
, e, k& }/ W& N( L% y/ W hackers:. . . . . . . Just checked, your computer no problem 9 ]" {% P1 I: O% j/ D1 d  T
white: that is, you bully me 7 }, F7 F( o4 n
hackers: No ah + s! s2 ]# M8 X3 l$ L. v& V' d: k
white: You are! MP3 files are passed to my no images!
- h) [; c3 a$ T2 ]6 W" R hackers: help ah ~~~~~~~ 8 {6 `- m4 e& g" O4 _! e
white: Ask a computer problems can you answer? : \) c6 W: X# h7 q
Hackers: should be able to
$ Y' a- \+ ?$ s, L' ?7 \( N5 l white: Which key on the keyboard the most handsome?
4 ^& h% z9 O) r0 Q% g/ ` hackers:. . . . . . . Do not know   v/ p5 k* b. W" t2 F/ P( m0 k8 `
white: of course, \! : s! d* D! a3 s' O( ?2 E, O
hackers: halo ~ ~ ~ This is a computer problem? ! ! 5 F; ?4 B+ }/ i

. k$ ^; B  w# v5 Y8 } white: ask you a computer problems you can answer?
7 `, C$ f6 G+ ]. {. A; W" C; g; Q# | hackers: If the problem is not your idiot " _8 R( ~' v# x$ c9 _" l
white: I am serious! ! You can operate my computer?
2 R0 _/ T$ q8 s9 b  x" A, E) O hackers: ah,juicy couture shop, yes # j; t8 \! N$ q8 |1 i
white: that problem, you can solve it ' Z: {) [7 g$ Y: ~( k2 x1 V
hackers: Your question is, should not be difficult ;
1 w+ J, C) x6 c0 h1 U% Y% q white: Great, my fans do not seem to turn up,nike air jordan, help me change it
& y* o, b! V/ Y: I a hacker:. . . . I excused
$ l! I% ^+ o' ^& G white: we see meet you?
- u6 F. S; u5 w$ y hackers:. . . . This, not so good, why should we see
) R% {, M6 K  d8 p: s: d white: I want to see you are not the same and I would like to ; b" P1 T+ |& H# b8 H0 y1 w
Hacker: Oh, what you think? % `! O* A% K3 @( r- d) m
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ) y& z; @. m2 J1 P- x* G
hackers:. . . . You say that Spider-Man, boss! ! B$ s/ m$ z' o: G  l& e, R# B4 D$ W
hackers: Kazakhstan woven ~ ~ ~ " @' z- F8 a  G0 q5 o" ~
white: You called every day, is not very curious about me?
4 s, G& n" L; |3 T/ D hackers: not curious, is the habit, easily came in
. M1 k" ^( W/ t! _ white: Well, I have a good way to change your habit # R( _7 f+ i; H/ v* L3 y
hacker :. . . . Oh? ! Any way - ~( c1 [+ A# U% `
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 4 I. X+ c6 I1 k7 `: P
hackers: Genius ah! . . . . . You can also connect to it?
1 x; p2 N4 ?8 [- p4 x# b& Q white: to ah, and slowly the hymns!
$ N7 W& f  i& t) t4 b6 S white: you every day into my computer, is not very curious about me? + |" Y% q! s: l5 Q% F! T" d
hackers: No wonder, only used
" E7 n* I! R, |# f6 b* Z white: no you're curious about the place?
+ h& o2 m3 v& l) K hackers: a ah, I always wanted to know your machine so much as when the virus crashes
# n. I/ g1 a! b: @2 c* O" i
9 Y% B8 i3 r7 u" i2 ?" q/ @ white: I would like to control your computer
7 y1 r. k5 [+ K6 x( z  e5 z/ c Hackers: I will not have other people access my computer I will be mad
1 G. l4 {# ~7 } white: This is not fair! ! 1 I" l( D; O0 J5 l* i: K! w: f
hackers: ah, well, you control the good of the
* o/ h1 @- ]* a8 T3 D/ U- H white:. . . . But I will not. . . .
1 _' ^- j, N/ }8 {( T2 G5 t hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
' x/ Q5 l  Y% E! P4 p6 t Hacker: I'm white 6 ^! ?/ x* j/ w6 P- Q& r
us again: This is probably the last time we met the 1 n* c* u3 L# r% L2 ~' I' h! P- z
Hacker: Oh? What happened?
0 k7 ~1 n9 n0 U0 p5 I. W7 t white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! 6 C% f8 Q( ?& z, U
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
+ S2 x4 P, c2 \' T& } white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! . y9 [8 Q1 e6 ^: u7 S- |
hackers:. . . . . . . . . . 6 B9 ]9 F# X: h. |, c
hackers: so late, and how not offline?
3 [% r( J2 @3 v# M. | white: Oh, is the next, and I went to pull the power
* Y+ r5 i4 k1 D+ [9 H2 B5 U9 ` hackers: Slow! You will not shut down?
$ s: ^8 R- L$ C3 u. |; e white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
  T- C: [3 v6 i hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
/ j* b% q8 I" L+ `( J9 ~ white:. . . . . . I press the power to the hackers call it
, S4 w# {2 b8 ?+ H2 o white: You are not really powerful
* s9 A+ F; N- `5 t hackers: so-so friends   k4 Z9 m# H9 K& G- o
white: bragging! You have the ability to shut down my machine in the horse. 1 D% R$ s2 B: h1 n" ~
hackers: this place is difficult! You wait 9 e1 T) V% b6 J, z
hackers: Haha, buttoned regret it
) q' E2 Q& [: ^; Q white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
& f6 t5 E" u: X! F) w$ X9 j hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-5-11 01:57 , Processed in 0.196682 second(s), 9 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表