埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 839|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
. e  }0 l+ o" ?$ b" @7 R. u5 Q white: how control?
* J- ]0 Q5 B# ?! _- l# p& M hackers: white with a Trojan % Y9 \9 C- G* h0 r1 d4 n8 |
:. . . . . . Where? I did not see
0 l3 ?8 L. m* O; l! O1 }3 |3 h9 V0 K hackers: Open your Task Manager
6 ~7 v, J. [% w1 k( C white:. . . . . . . Task Manager, where?
/ j# v$ P; I8 W hackers:. . . . . Your computer below! ! # L+ d/ X0 [3 F. ^6 f5 x
white: \; % L' k$ O+ k7 ?3 {& z
Hacker: I have control of your computer 7 H1 Y. \: L9 Y1 `7 g3 S
white: Oh / S6 u% _% ~( X6 B* q2 H3 B
hackers: a funk? ! Hey
! @1 }' x* I* V  a, v1 O$ \( K% O0 s/ x white: for the just, help me kill the virus it, many of the recent problems my Lord ( i" C/ J. @) @
machine hackers:. . . . . . " U' E- o( V( `

* L, Y! {& w& [2 v white: how do you always in my computer and out of
5 A, Z- `: R9 o) n/ C" _ casual hackers: You can install a firewall
$ q1 h$ a  m2 J, x( J; h2 _  b white: install a firewall, you can not access it? ' i. P$ L9 U  H  o* e, \
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
' a0 C0 s( ?3 W% k) e6 R2 ?9 \; J
( i5 i6 ^" L+ Y small White: I heard that you will create a \! 3 ^% e+ c. A$ b* C. h0 ~4 X" ?# L
hackers: ah
' R$ L  q/ ^' n8 |7 Y9 v; s white: you can control someone else's computer? ! # _& ^1 O3 i0 [3 n, L  Z9 ]$ S- _
hackers: General is the
- A! q( g( Q8 J) j6 i5 ^  _ white: you can black out those sites?   u, k, K: e" s$ M
hackers: of course, did not hear people call me a \# g* B9 s  Y0 d" H6 [4 J# U
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . % U) |9 z' [: p
\! " S2 ?; o3 N  [: E( z# M
white: every day you come in, do not feel tired of it? 9 u$ ^3 ~5 o' E7 y2 ~5 j3 e2 e
hacker: is a pain, your machine is the worst I've ever seen in one of the
7 T( w  i& r. n& n white: is not it, this is Brand
/ @7 n3 G) u" s( ]% i; p1 D Hackers: I was mentally retarded in addition to your yard game machine only virus a 2 w1 |+ B+ E: R% B$ K$ F5 T4 \% ?% Z. f+ q
white: Oh ~ ~ that you see me The \. . . . Goodbye
7 C5 q5 T1 Z9 b& [* r2 [) R
1 t; ~" g1 i* K; X% h hacker: Hey ~ ~ ~ I come!
* [% Z$ B" I8 q. N$ R6 d white: not seen you for days, was my firewall blocking you?
/ A5 T* e! {) h8 Y hackers: Haha, jokes, on your machine is easier than my own, not you miss me * P2 J7 u, n. ]& x0 y( U
white: I want to Please help a busy
5 O( V) ^, l$ s" _- m9 h$ { hacker: What?
' l% C0 I+ d4 {* l. ] white: you can not modify the point into the power system data
$ G2 F# e1 y, r) {' o% w; y hackers:. . . . . . Why do you want to! !
/ d( v+ _* Q4 g( k; l/ o white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 6 k- G) s% h* j, ^0 D9 Z% T
hackers: die! ! $ @( T% r% k! R- S
! e, d" g+ g; v; T0 V1 U, b
hacker: you die Where is? ! ! ! 2 z; X) g; h7 o+ h# G: ]+ A; H5 N
white:. . . . Go out and play for a few days, ah, come to me why 7 A" ^8 o% R- K2 d3 e& k0 ?% ?: I
Hacker: I'm looking for something
1 S' r3 b$ t" E8 S4 M3 h white: what I find here?
* ]  f) V1 b8 z4 H  v hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
3 r! l& C2 t% I% J6 m
$ O! [$ ]% X+ ], q) r' n: ?( {$ B most hackers : I come! !
( }1 ]3 a7 Q% I& I# F- \. . . . . .
) I5 ]. G% o/ u hacker: how not to speak? 3 f4 }, y; O  |
white: a bad mood 5 b9 |& p0 I) D5 ^# t" ?
hackers: Who bullied you?
; F, h9 `) ~/ w$ |4 G% b  b white: a Q No. I have not lost inside of my first love
$ v0 k2 u( Q( B3 @ Internet hackers: this simple, I get it for you ) q, g* |5 i# Z7 h- d9 j* m
white: do not get back 7 W- r0 ?7 W, n! j8 q# d1 _1 x* n
hackers: No, tell me what number?
3 l: \! N7 d" t. F, ?1 c white: Woo ~ ~ ~ ~ just do not remember
0 x( d; {$ o; C1 U% g( j 6 N9 i4 ]8 b; M5 J1 \4 T; x
white: you gave me out! ! ! ! 9 @8 K) v$ `. a3 \) G- u( `
hacker: how wrong? !
. v  H+ g3 A$ Z white: You are not the forum to use my ID to play it? ! !   z+ m9 `, Z' r' W5 q9 K3 c
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the " B1 Y* O9 c! k: z. x
white: it does not work! ! ! $ _8 b/ J9 Q' U+ p4 h5 D8 G( V
hacker: how should you like?
; }  r2 x" a+ @5 @' Y) [- } white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! , v0 O5 Z3 n  ^3 [8 t" }/ {

5 `+ G1 B3 L. `( P  l1 ? hacker: Hey,ralph lauren pas cher, I did a lot of fun
- r* e9 t7 |! S white: what
" K. Z) h# N: f/ z6 U hackers: I go to the forums posted the top 6 u: V! M+ U/ \" y2 S( O- n
white: This very common ah
! B% \9 T5 W  I1 C- {+ z7 B Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
3 t& q8 t& ?% i white: Wow, very enjoyable, and I can never dare, will be blocked!
$ r' h& s9 v- H7 H- M Hackers: Yes, has been banned.
! h2 _8 A7 e4 ]$ H white: this is also fun? ! ) @0 B2 w! R; u- \/ k
Hackers: Yes, ah, because I use your ID
- [! q" b6 z( h; x0 p6 ` white: you are pro?
  h  J2 |0 H6 Y2 x8 s+ r( [- B( A. i& A hackers: You can say it. / C( R) _  ]5 u' V- E; q0 q
white: to what extent high? 9 z% o; `# Y+ s1 g. `
hackers: ah, I am bored when their own
1 {! ^+ a, h) c0 W7 E8 v white black: Ah, this I will! % G, z3 r! v( I: {
hacker :#?%! You can? ! 5 x# Z6 P" A6 A9 e" }$ p8 r6 C9 L
white: Yes, ah, a black off it. . . . .
+ [, X0 Y  a3 x# ]( f3 w9 ?0 N hackers: Go!
+ p: h/ J; D8 |8 C) U  ~% K white: Ask your question 4 F+ _$ a( m# d! L( p
hacker: says ( a2 ^( q7 Q5 x' y0 }
white: Besides me, you can also control other people's computers do ?
; f7 v. {2 ~; L$ K) X" y0 `& M Hackers: Yes you can. . . .
; S* j1 G1 j, C2 I! f) Z  [0 a white: no networking is also OK? 8 f7 c- Q& G  N- c( M
hackers:. . . . . . . 5 p8 F% l4 {5 {( V, E, J( ~
white: You can remote control to open someone else's machine it? ! J( H5 F. d8 _# H* D- |
hackers:. . . . . . . . 4 `3 K0 F' k: S
white: You can steal top-secret file it! ! !
- a4 Y2 z. ]; e# W: |2 ]4 K5 S2 [ hackers: I think you see more movies, go to sleep
" ~& m4 @! J4 h+ X2 B white wash: my computer is broken 6 S7 t. j% V5 a
hackers:. . . . . . . Just checked, your computer no problem
0 }) P: N; U: i, R# N/ T# }+ M white: that is, you bully me # \6 E- T; e4 ~3 `, {
hackers: No ah
) l6 I/ U; i" o* G, R white: You are! MP3 files are passed to my no images! 0 k4 N+ |0 J! j1 L! y
hackers: help ah ~~~~~~~ $ |- V) K$ q9 P/ S: {% J5 ~
white: Ask a computer problems can you answer? ! D8 W. x6 E7 X
Hackers: should be able to , t0 b' {# r6 i
white: Which key on the keyboard the most handsome?
6 U# b. t  k" @2 U8 y) l+ f) { hackers:. . . . . . . Do not know
; X# z' c2 j5 w$ ~- w white: of course, \! , |+ _. V. [! g# g. z
hackers: halo ~ ~ ~ This is a computer problem? ! !
! h: W0 K  v7 O! R " D& N7 D6 ~/ K: ?2 K4 q1 ^
white: ask you a computer problems you can answer?
: ^) X) K! H- T' Y7 i9 }) N hackers: If the problem is not your idiot # Q8 G+ G" M" W& `8 l
white: I am serious! ! You can operate my computer? ) b+ w6 B% C! R8 o7 l# s: C
hackers: ah,juicy couture shop, yes 2 @/ g0 w( b& p/ C2 [. p
white: that problem, you can solve it
. x9 |/ I4 k+ l hackers: Your question is, should not be difficult ;
3 c" ]2 K* o' ^4 x white: Great, my fans do not seem to turn up,nike air jordan, help me change it & L" b) _* S% P- A
a hacker:. . . . I excused 9 b+ M0 i. m8 ^+ s
white: we see meet you? % y% t0 `. Y2 h5 F, g
hackers:. . . . This, not so good, why should we see . j- S" M, D+ G, b6 h: D
white: I want to see you are not the same and I would like to
) |2 @' @0 \1 ` Hacker: Oh, what you think?
# T" g7 K6 R1 Z8 C white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights 7 n8 v9 s  K5 x" g
hackers:. . . . You say that Spider-Man, boss!
3 M+ b( j/ g5 S4 |+ y hackers: Kazakhstan woven ~ ~ ~ 7 w) [+ N# o1 E! R/ ]) f, t
white: You called every day, is not very curious about me? 0 z9 v3 q  K3 C* |2 J  D
hackers: not curious, is the habit, easily came in 6 z+ e: X8 [1 g1 V; q" J% i" n2 @
white: Well, I have a good way to change your habit 9 w, b% l3 P2 t
hacker :. . . . Oh? ! Any way
9 p, h$ g' g1 z3 h white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ ( P2 F3 g# Y3 F* P# R
hackers: Genius ah! . . . . . You can also connect to it?
* X7 R2 j) Y: l& \6 t: O* t white: to ah, and slowly the hymns! 9 M" w/ ~. k$ V
white: you every day into my computer, is not very curious about me?
. q1 H$ O2 ~$ I/ b hackers: No wonder, only used ) K1 Q# Z3 A. B* o5 e& S# l
white: no you're curious about the place? 7 O; R+ q9 ?! \
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
( A1 M/ C) P4 P3 u3 [+ ^- ]$ Y 6 w/ F2 ^& p4 d; L
white: I would like to control your computer
; ~. \% z# u  }" W Hackers: I will not have other people access my computer I will be mad , X: K( v2 f! _5 Q
white: This is not fair! ! . V; m) n3 ?7 P& l; a
hackers: ah, well, you control the good of the ) `* A: [: i: V& d5 a
white:. . . . But I will not. . . .
, S; P6 S4 f' z9 e hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! : T/ g5 x7 Z5 G; N4 X
Hacker: I'm white
. Q; P- a- U8 V, k; I! d6 N& N us again: This is probably the last time we met the : Z. `0 {1 d5 @; a4 W: G* g2 b4 o# v
Hacker: Oh? What happened? 6 r2 g) K* d: O. K) A# H
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
, L  S+ x- F' r6 u$ m/ j$ O: k hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
; s6 M5 j' S# O white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
6 _; g2 X) R% ?: q! V hackers:. . . . . . . . . .
, E! F: ^) Y. X% \9 Y hackers: so late, and how not offline? : N- X2 `8 ^7 |7 n+ c
white: Oh, is the next, and I went to pull the power
; R9 A6 W0 a* D7 H hackers: Slow! You will not shut down? ' R% ]' [( `8 W) f
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power   o+ T7 Q( j$ s' o+ R4 _
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \6 @! M/ ~2 F/ p: j
white:. . . . . . I press the power to the hackers call it
8 G$ `7 O7 E' c) ? white: You are not really powerful 6 {, A7 ?6 A; D5 p$ \
hackers: so-so friends
# y" Q( g& Q4 Z; \2 k white: bragging! You have the ability to shut down my machine in the horse.
9 q; S2 j% K2 { hackers: this place is difficult! You wait   y/ w0 a7 Q* r: ~, q8 }7 M' z6 A
hackers: Haha, buttoned regret it
% O* P2 ^( r5 @7 W; s) u% F white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
4 j2 h  }+ T( J6 F3 | hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2026-5-11 03:19 , Processed in 0.537017 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表