 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
7 ^' M9 V: D2 K: o5 q6 F white: how control?
3 N0 }0 R# y* t hackers: white with a Trojan
- t' Z" z( q; L( X1 b# {:. . . . . . Where? I did not see
0 \. Y! @1 @" p' u9 d0 L hackers: Open your Task Manager % X- k- u* D' \( L9 |3 m
white:. . . . . . . Task Manager, where?
K5 y9 C7 \0 O* y! C hackers:. . . . . Your computer below! ! 0 K; x) k8 d7 _
white: \;
. s9 ^/ R( b9 ~ Hacker: I have control of your computer ) @ s6 \3 _$ z
white: Oh / b* Z* _9 b' |. l: r7 T0 C
hackers: a funk? ! Hey
! e* B! T# V$ a) E+ u" ^0 V- ` white: for the just, help me kill the virus it, many of the recent problems my Lord
( c3 I) g T& k: A machine hackers:. . . . . . & v0 |7 W9 K5 [* `4 I1 P+ p/ ?. Q
! V7 ]) p1 s* c white: how do you always in my computer and out of
' I3 t& \3 i5 X# |& d casual hackers: You can install a firewall 6 y" I7 Y+ ^, P+ Q x
white: install a firewall, you can not access it?
. @6 p8 j4 x# k/ t hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah % d5 W$ a. t' O8 d; [
2 K. I( _5 w- y/ ]5 e2 h0 P D small White: I heard that you will create a \!
7 |2 c; E( M( @# Q0 o hackers: ah # M. J& v) h; b# M: N. T/ B
white: you can control someone else's computer? ! c! ?, o& j/ V' A" p+ M
hackers: General is the
" k; p! G$ ]4 L# ` white: you can black out those sites? $ B2 A2 |4 G# K$ ^6 k- n/ R5 {
hackers: of course, did not hear people call me a \
3 ~& K' F6 u: f5 `% ]7 C white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 3 D9 T( g9 c/ k5 m2 Y4 k
\!
' R* h* z M+ b white: every day you come in, do not feel tired of it?
$ f, m$ h/ w# f/ v$ E! G' e9 h hacker: is a pain, your machine is the worst I've ever seen in one of the
" T9 T8 z8 I2 U* ? white: is not it, this is Brand ) G$ D8 V5 L2 Z& @
Hackers: I was mentally retarded in addition to your yard game machine only virus a
' ]: q; l$ h# W' M1 Y white: Oh ~ ~ that you see me The \. . . . Goodbye 8 G+ p1 ^+ X# i: F: T6 O1 x
/ G) p7 t% |5 O% W! Z
hacker: Hey ~ ~ ~ I come! # G; p6 j1 F1 Y. B$ @
white: not seen you for days, was my firewall blocking you?
( J9 g$ s+ E* }9 Z/ [4 G3 N hackers: Haha, jokes, on your machine is easier than my own, not you miss me : s! A6 N" W, t& N o
white: I want to Please help a busy
8 l% Z$ w6 d( \1 f' w4 B+ b4 Y+ ` hacker: What? Z9 b" g' e5 c9 j! D* H
white: you can not modify the point into the power system data
h/ S. h t" `, v hackers:. . . . . . Why do you want to! !
' ^4 S' z8 ?4 O+ ?' h J white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . ; i, w9 o8 O ` U, H
hackers: die! !
0 O- r6 }* D5 ]6 O4 z; n$ c 3 {: g; }7 h4 J8 U& z/ L, ^
hacker: you die Where is? ! ! !
?6 s3 x* _1 H; C5 y& a white:. . . . Go out and play for a few days, ah, come to me why
% i4 @7 x$ y0 W6 O) a3 q( X5 n Hacker: I'm looking for something 6 X: R4 Y: D" K) N1 b' ]
white: what I find here?
) ^; j' v* c# p hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
, Q9 m) b: W: T, ~% a O: A
9 } p1 y- Y+ l' p! T# p5 W most hackers : I come! ! ' ~' o$ D9 ]$ i L; k q
. . . . . .
0 M0 {3 I. y" o. \5 _! J hacker: how not to speak? & G, J4 I& c8 A
white: a bad mood
' E7 g @$ B8 Z& w4 z/ G8 X; k% e3 k2 } hackers: Who bullied you?
1 e6 D. s! {" F9 v white: a Q No. I have not lost inside of my first love 7 s* A, T" n2 F+ \
Internet hackers: this simple, I get it for you 2 L1 w8 t# i6 G, r1 j
white: do not get back 8 J o j: A! U9 u
hackers: No, tell me what number? ( w. P5 L: ]! i/ f
white: Woo ~ ~ ~ ~ just do not remember * c& ^; e$ o2 w! q0 s6 ^! B2 z8 j7 M
1 [# _( i6 T3 ^# U# w
white: you gave me out! ! ! !
9 C* R; w l" p6 [ hacker: how wrong? ! ; c6 L& D' S1 v1 a3 @7 U
white: You are not the forum to use my ID to play it? ! ! + ^/ x; p7 M6 Z3 l5 J
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ( O3 Z$ m' H/ E- I8 H% L, z
white: it does not work! ! !
6 ~3 m9 N% c2 b6 l. L hacker: how should you like?
6 w% A3 e" o6 I* Y2 T3 |; t2 \ white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
, T8 _: Q v7 H* g6 \: b ' \" T' `2 h0 U) P+ }( d+ U
hacker: Hey,ralph lauren pas cher, I did a lot of fun + H W0 |( j. R& P% h$ f: \4 j( R
white: what " _2 t9 I# S' ~' b( e
hackers: I go to the forums posted the top " M; l# t# s' N7 L
white: This very common ah
: @6 g0 L# B5 |1 D Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent , ^/ h' _' @6 C
white: Wow, very enjoyable, and I can never dare, will be blocked! ; [+ W0 K9 m0 o8 B
Hackers: Yes, has been banned.
2 k9 a( J( y5 ]; `, j: L" H white: this is also fun? !
: L4 J% b0 z* Y Hackers: Yes, ah, because I use your ID % @4 k7 d0 Y4 u' J4 |
white: you are pro? ) u2 L# j% @6 B" H3 p1 t
hackers: You can say it.
$ s/ l) T0 j+ V- B1 v ` v1 O white: to what extent high? # r# |; W* g. p& y2 f E
hackers: ah, I am bored when their own
, w8 r7 f, z; a4 ]' P [4 L. w white black: Ah, this I will!
9 M1 G7 r3 o% s& Q; v# I hacker :#?%! You can? ! " ]+ P( Q/ E! R/ W6 f
white: Yes, ah, a black off it. . . . .
7 ?( @0 a% a, l) @% F. h) h hackers: Go!
6 l( X& A; m6 y; c: P* q white: Ask your question ~( K5 a0 {0 R, B
hacker: says
8 e6 W. [* D( u I white: Besides me, you can also control other people's computers do ? 9 s2 N. L( k* p3 J9 J* |5 i
Hackers: Yes you can. . . .
# f# s# J4 J+ y7 a) }& } white: no networking is also OK?
& p: T/ c- a9 E" l9 W6 E hackers:. . . . . . . $ T" K+ Z i% v: w
white: You can remote control to open someone else's machine it? ; m2 G1 ?( h2 x- r M9 @6 v) h1 n# A
hackers:. . . . . . . .
5 Q: a9 c6 H! `4 r4 v R white: You can steal top-secret file it! ! ! 1 H+ N6 R. c2 Q z
hackers: I think you see more movies, go to sleep
4 u* u0 d2 p2 Y0 G white wash: my computer is broken * c3 q5 e) ?. Z3 b
hackers:. . . . . . . Just checked, your computer no problem $ n* u: @7 s: Q; K- K+ V+ E: L
white: that is, you bully me
7 v' o2 F4 E- }$ }" d hackers: No ah ) P9 L; E3 V6 o& Z; N/ H& ]
white: You are! MP3 files are passed to my no images!
( t/ ^ ?, B( D5 d0 [( P U! Q hackers: help ah ~~~~~~~ 3 h. p2 y* V$ s4 F
white: Ask a computer problems can you answer? 6 L) ^9 G2 T. Z+ n
Hackers: should be able to
8 x- L4 \( @+ a+ w- x5 H: k white: Which key on the keyboard the most handsome?
+ n1 H6 F- I; L hackers:. . . . . . . Do not know ( a; F8 c9 w0 O' e8 @
white: of course, \! - G+ c3 x' B D
hackers: halo ~ ~ ~ This is a computer problem? ! ! : h' y: b- _2 P B1 U& ]& h
/ k& ?) i" H/ m1 f3 b. x
white: ask you a computer problems you can answer? # V+ X/ \ t2 H+ V
hackers: If the problem is not your idiot
) G+ ?; e% g" X' f" e1 L- A white: I am serious! ! You can operate my computer?
+ Q B5 L; |+ C& D) E, s hackers: ah,juicy couture shop, yes
$ V: u0 f5 o0 r8 S' U D( l& o white: that problem, you can solve it
% t0 [/ K" ~* [* ~8 \ hackers: Your question is, should not be difficult ; % s; ]; o- d+ _2 {( V
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
' j8 R2 [ L# `0 q n) O) z a hacker:. . . . I excused
3 n8 \) z' I+ p* L( `4 ]. Q' { white: we see meet you? + v( U! {" W2 e8 [
hackers:. . . . This, not so good, why should we see 6 V# h' v' _& R9 [
white: I want to see you are not the same and I would like to 7 o8 \8 X+ m) Q
Hacker: Oh, what you think? 7 v0 L( j7 B, {
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
- O0 |8 \: u6 s hackers:. . . . You say that Spider-Man, boss! $ D$ r! U3 g5 ?
hackers: Kazakhstan woven ~ ~ ~ . T3 o! ?4 P; M2 [4 J/ }2 T0 c: {
white: You called every day, is not very curious about me?
% S. }; t5 y! P6 g7 c5 C5 C( G hackers: not curious, is the habit, easily came in
G' h2 J% i" J- P; c white: Well, I have a good way to change your habit 2 k4 ?) T+ x Y( W8 s. `
hacker :. . . . Oh? ! Any way
+ f7 h$ Q C2 G: r% e* e white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
: R# ^' d. O! G2 ^7 a hackers: Genius ah! . . . . . You can also connect to it?
- _( B6 _3 k7 K, G9 H o6 C, s white: to ah, and slowly the hymns!
, Y6 j" |- v$ L: v/ i/ ^! T white: you every day into my computer, is not very curious about me? E" D) i; ?4 N/ e8 r; F% {
hackers: No wonder, only used
$ u% h% R3 \9 I/ Y. d, P white: no you're curious about the place? ' F& O2 t$ i* d; y! Y4 X
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
% L: [0 o8 P& ?0 p3 T$ @6 S( n2 g; S 5 h$ g6 O8 O1 q$ ^
white: I would like to control your computer
9 E6 f( h) ]7 _+ M Hackers: I will not have other people access my computer I will be mad
" ?- W2 r. C8 ] v1 ^ white: This is not fair! !
- E# g& D {# F- K5 F A hackers: ah, well, you control the good of the 3 `" u1 d: s E: y+ V
white:. . . . But I will not. . . .
- V& p( ^( _; ]3 B8 N0 ] hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! & T: K9 e8 ^ N+ o
Hacker: I'm white $ g9 y, j, K: i( z6 G! B4 K. B
us again: This is probably the last time we met the + M5 \$ J+ ^; H# a3 k% |& I
Hacker: Oh? What happened? 9 u! Y' G0 E: u% N, o4 F5 u C
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
8 M; X! W% P% ]0 ]9 b9 H3 o+ H hackers: You are so tired of me. . . . . Well, since I do not come, goodbye ( x5 a( Q8 p6 D
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! , [& v% e v& \2 I5 v; k( q& b
hackers:. . . . . . . . . .
7 T2 i! |: K* A" c3 [' _, t hackers: so late, and how not offline? p, c( S! Z- j; i, S
white: Oh, is the next, and I went to pull the power / Z- e7 y `/ o9 u; e8 i( U
hackers: Slow! You will not shut down?
. {% r+ l3 B0 s# [0 X white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 9 r% t. o/ J8 ^+ H6 j# S
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \9 ~2 Z# k/ n7 Z3 l: e4 T
white:. . . . . . I press the power to the hackers call it
! ~' k& q# Q2 s* @ white: You are not really powerful
# T7 W) [ o! a) D hackers: so-so friends ! m1 D0 p7 o4 N/ G4 k3 x
white: bragging! You have the ability to shut down my machine in the horse.
( `2 d( ], v/ P& ~( H: G- c2 n hackers: this place is difficult! You wait
9 |& F6 i$ } g$ I3 e" \ hackers: Haha, buttoned regret it " S( k" i3 v6 D
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . % T9 ?4 |( D/ ]& ^
hackers: halo ~ ~ ~ ~ |
|