 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer - \; @' J6 s+ t5 G
white: how control?
! \' q; s4 v' y$ } hackers: white with a Trojan ) P& r* @9 h2 \( s; u% A, j0 Y
:. . . . . . Where? I did not see
7 ^' k+ s- ?7 w: e) s9 e4 {: H9 f hackers: Open your Task Manager $ d9 l: z, D1 w! y1 z# `" O- J% m
white:. . . . . . . Task Manager, where?
7 I! i# E9 ~% [" \! ~% [' q hackers:. . . . . Your computer below! ! ! u* S9 j" s, K5 |. q
white: \;
. J" ^6 X, p, } Hacker: I have control of your computer ' u$ S# s) \% ?; o' `0 w) _- }4 x
white: Oh
- o" L. t! {1 `5 O& P! g hackers: a funk? ! Hey
# R: H+ t6 w7 ~; M/ @' s white: for the just, help me kill the virus it, many of the recent problems my Lord 9 g* N: d0 Q5 p+ m4 o
machine hackers:. . . . . .
7 J) g2 m2 i9 I2 m0 [
] f" p7 A) B; H+ O white: how do you always in my computer and out of 3 n" E+ p" m0 z
casual hackers: You can install a firewall . u1 A9 @2 O5 k8 C5 X$ m
white: install a firewall, you can not access it? - ^; {: B& a' ~3 l
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
7 r6 L" A2 U) \& ~8 v
% O4 D. q) a7 p" a1 z& r small White: I heard that you will create a \! ; a2 X; g9 e8 R3 b9 k$ \
hackers: ah
6 u( P8 _8 y, G white: you can control someone else's computer? !
. Z) f% p3 _+ R, w1 I; h hackers: General is the ! Y! Y+ ?) Z [# i
white: you can black out those sites?
* A2 ?9 ?, L9 Y- K- g$ d2 k hackers: of course, did not hear people call me a \
6 C0 X- B2 D3 x+ p white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
" O! l, o/ e1 j1 G' { \!
+ |$ C; m! L7 X6 o( P0 v3 _ white: every day you come in, do not feel tired of it? ; b$ [: q& Y7 V6 Q3 y
hacker: is a pain, your machine is the worst I've ever seen in one of the
; E' B2 N4 _, {- m5 O+ h9 p white: is not it, this is Brand - j0 z& ^4 H% R
Hackers: I was mentally retarded in addition to your yard game machine only virus a 6 v1 } D; M- s! [" R
white: Oh ~ ~ that you see me The \. . . . Goodbye 2 I; W( E( a, u) @+ x5 l7 t8 n3 Y+ @
) a% Q* z l: L( P hacker: Hey ~ ~ ~ I come! * t6 d) n3 P7 P7 N6 I6 j
white: not seen you for days, was my firewall blocking you?
4 {% ]8 {. u9 ]8 n hackers: Haha, jokes, on your machine is easier than my own, not you miss me
8 C+ a* S5 k+ g, B* b/ f4 ~9 i" q white: I want to Please help a busy
$ x( L, j5 D9 q4 T hacker: What?
' m* R0 o5 j, T+ @" I white: you can not modify the point into the power system data 3 v1 }, Y: @( R$ k- A
hackers:. . . . . . Why do you want to! !
; P- A' t% `5 G1 I, c white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
% h3 y" h! a% F& J" @: g hackers: die! !
' m0 Q. v9 | u2 B% I2 l, Z7 T! A % L: [* _$ m& d9 B% E G3 d9 f
hacker: you die Where is? ! ! ! , L" a4 z6 W- h1 F5 e% ]. _& Z
white:. . . . Go out and play for a few days, ah, come to me why . _/ [% z8 p/ x1 W+ h+ o
Hacker: I'm looking for something 6 I0 `3 p' B# n7 X: j
white: what I find here?
" F5 u+ W# D# [+ w hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
/ c z8 w$ g4 X1 H1 U; e& H
# h6 x* T3 K1 B* m+ k7 ]1 h$ e: G most hackers : I come! !
7 \, A( r# T$ H& c6 N" |" I3 w. . . . . . ' o) V0 |% z, \- P
hacker: how not to speak?
, p. v+ m0 Q9 W8 l white: a bad mood $ @& |4 H, K0 i5 g: N8 w
hackers: Who bullied you?
u1 s* `; ]3 R' y1 S white: a Q No. I have not lost inside of my first love
; C. m- m9 d6 S Internet hackers: this simple, I get it for you 1 i8 W6 |% o6 j% r9 _6 E+ p
white: do not get back E7 j2 K# L) Z4 c6 \; r6 V0 e
hackers: No, tell me what number?
- d! E4 C( m1 H0 ^2 l" @, \ white: Woo ~ ~ ~ ~ just do not remember
6 M5 q* y9 N. {: J! s! b
+ f4 G9 W! y/ ~6 \* L white: you gave me out! ! ! ! ; _' u# u4 J5 v
hacker: how wrong? ! ' K! T a9 L- f
white: You are not the forum to use my ID to play it? ! !
. ]" W% d7 u( C, x0 E; K1 S: J hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
2 v3 m2 I7 g" D& h white: it does not work! ! !
; Z' N8 K! S* N9 X4 b9 ` hacker: how should you like? . U0 A- j4 A6 j t3 A* _6 s" {
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
, f1 |# Y; ?, V( @+ [/ b% _ c # H7 D8 ]! O/ i u
hacker: Hey,ralph lauren pas cher, I did a lot of fun / h8 V% T* V9 _
white: what 2 {, e! \- T: A' T4 L
hackers: I go to the forums posted the top ! D; G; I L, h& C$ H/ s' D3 g0 @2 E
white: This very common ah ' X3 J% q$ r$ K3 J% [
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent " Z* J# c1 f! T/ m/ o6 A7 j
white: Wow, very enjoyable, and I can never dare, will be blocked!
/ i/ H0 F- i& T- W7 s Hackers: Yes, has been banned.
& v$ g# E5 Z" u( ]# r @/ k( z white: this is also fun? ! ' [; X2 \( A( F; @0 H/ k9 T6 P" {8 e
Hackers: Yes, ah, because I use your ID
9 w* ?: c# [+ F# ]: n white: you are pro? ; Q; L% z' R, E* z8 T# D+ d
hackers: You can say it.
+ c* z# Q4 o! z- r white: to what extent high?
2 \0 g" z$ J( T1 y# _) u hackers: ah, I am bored when their own . S: ~' w# g2 k6 R# t7 X
white black: Ah, this I will! % M1 o S& `) W/ F3 o: j. Q
hacker :#?%! You can? !
9 J$ F A1 m) ^# P white: Yes, ah, a black off it. . . . .
3 e r2 \& y9 W6 q% R3 k hackers: Go!
* Q$ N2 F3 `8 o: n; [ Q$ f8 { white: Ask your question
) f( b0 E. z& `8 c hacker: says - j5 N5 r* |. w# o) t2 I% E' a& e+ B x
white: Besides me, you can also control other people's computers do ? ; O1 B% _4 h' X$ E/ N g" }
Hackers: Yes you can. . . . 2 B4 C6 y2 Q' V) A
white: no networking is also OK? / Q, T U& O0 Y: Y
hackers:. . . . . . . % X5 {9 p. ~8 T8 R" v) d
white: You can remote control to open someone else's machine it? ) c) ?; J5 N0 D$ D
hackers:. . . . . . . . ; ?6 i9 g' q" v1 F! [: J
white: You can steal top-secret file it! ! ! 3 T% V( h% Q- Z# s. s5 m7 h
hackers: I think you see more movies, go to sleep ' W1 \ E5 c( Q, l a3 V( \
white wash: my computer is broken
+ p2 z; x3 ~1 C9 I hackers:. . . . . . . Just checked, your computer no problem
+ U5 i* b5 w$ y white: that is, you bully me : L, s0 R! }; b3 P# ~6 r
hackers: No ah
' b# @: B1 l: r9 a" \2 s9 } white: You are! MP3 files are passed to my no images!
. z: [0 y H& o hackers: help ah ~~~~~~~ * {5 q! ^9 P H! e
white: Ask a computer problems can you answer?
" A" i* r5 G& R1 G Hackers: should be able to ) v/ \8 y5 l! n4 q+ \8 q
white: Which key on the keyboard the most handsome? # x5 u- _9 R- A. e$ L* i
hackers:. . . . . . . Do not know 2 \& ?6 N I( ^0 n# M0 y
white: of course, \! 3 |3 M. b7 W, T3 Z/ m
hackers: halo ~ ~ ~ This is a computer problem? ! ! - h+ m4 U! t0 ]2 t
* c/ n- T( o( e
white: ask you a computer problems you can answer? $ R7 S$ Q( G0 ^4 K9 G
hackers: If the problem is not your idiot
) c1 o7 m& _( C w5 e# i white: I am serious! ! You can operate my computer? ! I+ X* d1 ?" s' T7 }
hackers: ah,juicy couture shop, yes 8 D( C- o I! i; ^6 R/ v/ Q m
white: that problem, you can solve it 6 }/ r! B4 D7 [. ]6 U# |0 _0 w6 A$ I5 A
hackers: Your question is, should not be difficult ;
5 @: P) ?$ C0 m" u' \1 J( q white: Great, my fans do not seem to turn up,nike air jordan, help me change it * n b/ s; L6 \6 W
a hacker:. . . . I excused
# a+ Y$ z; u8 T white: we see meet you?
3 j, u; P/ T R hackers:. . . . This, not so good, why should we see / I, N( |8 l) I: T( c- E
white: I want to see you are not the same and I would like to
2 X2 P4 s1 ?( z7 M# p! E1 ^! u Hacker: Oh, what you think? ( {; N5 ?. \9 O* q
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights & m. i* e3 [. f. N& w! s+ c
hackers:. . . . You say that Spider-Man, boss!
+ b- \/ Y: g) M# }0 `- I; R hackers: Kazakhstan woven ~ ~ ~
" D# y7 U& B1 b$ R white: You called every day, is not very curious about me? |. T, W4 ^% i2 S) `" E7 @& Z
hackers: not curious, is the habit, easily came in
2 |* ^ }( a2 G4 j% F white: Well, I have a good way to change your habit , C% ?* c( X+ E5 u: B4 Z8 e
hacker :. . . . Oh? ! Any way
* ~! \! M6 \; [0 L! l8 F, y white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ . J( @. q: U1 |9 [! P+ Q) c- z
hackers: Genius ah! . . . . . You can also connect to it?
8 S- H, B0 l9 r0 S+ s! z white: to ah, and slowly the hymns!
9 f3 M$ I1 [$ s white: you every day into my computer, is not very curious about me? - N+ D4 F' ?9 r/ S, |! h
hackers: No wonder, only used ; _0 ~9 P6 l* j, \' Q6 B! b
white: no you're curious about the place?
) s1 c2 M( C) M" R8 G5 ~) F$ D hackers: a ah, I always wanted to know your machine so much as when the virus crashes & r* t3 F& y$ L1 G0 N& p% C7 p
7 @. G# J! B" m0 }8 f5 V white: I would like to control your computer
8 {+ r4 k9 n. ^ D) a/ Q) } Hackers: I will not have other people access my computer I will be mad
* I+ d! H6 ?- b* s' X) u6 m white: This is not fair! ! , `, Y7 x* h) v) @, o& ? A4 m' D4 [
hackers: ah, well, you control the good of the
8 b4 K3 T5 Z' T; ^* n' R white:. . . . But I will not. . . .
, s4 x! \' |& s; c m1 E( S hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
( }2 t( [7 J0 z$ ?1 p Hacker: I'm white
( ^( Q" m* D- f us again: This is probably the last time we met the
$ x, ^5 @4 N4 w Hacker: Oh? What happened?
6 N, T9 f; u ^9 t white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
6 o: e8 G" d+ p$ f hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 6 J# T) z; V0 M: f1 Y
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! # `* D* h3 g4 T4 {; T8 U8 l# U
hackers:. . . . . . . . . .
& R. o) d( v6 ~( y0 o9 g hackers: so late, and how not offline?
0 x* E/ v; s0 q- O, x. B/ B% w: [0 U white: Oh, is the next, and I went to pull the power ; a3 V8 A' M) i
hackers: Slow! You will not shut down?
6 V; c, k5 h, O) O% |! r4 C7 C9 } white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power . G# Y4 L7 w2 `2 I- o5 [% v
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \" X. P5 c9 _: r6 t, e1 G5 m
white:. . . . . . I press the power to the hackers call it + x7 W! y5 L5 e3 ?+ M! G9 }
white: You are not really powerful
% `7 p+ i7 ?! ^ ^6 e hackers: so-so friends
( e. Z# D; G- L4 N& F white: bragging! You have the ability to shut down my machine in the horse.
7 I& t' A- D8 ~2 B% W6 | hackers: this place is difficult! You wait ; f* A9 Q& {. r/ ~7 u& G5 K8 f
hackers: Haha, buttoned regret it $ f2 V0 Y% t0 C! W D
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . * W0 T J5 F u, \; ^& ^
hackers: halo ~ ~ ~ ~ |
|