埃德蒙顿华人社区-Edmonton China

 找回密码
 注册
查看: 682|回复: 0

A computer hacker and idiotic dialogue

[复制链接]
鲜花(0) 鸡蛋(0)
发表于 2010-8-1 02:34 | 显示全部楼层 |阅读模式
老杨团队,追求完美;客户至上,服务到位!
Hacker: I have control of your computer
7 D) t) T( I: o- T3 s white: how control?
3 L4 G/ V( e$ F0 k6 y hackers: white with a Trojan
9 p$ e* N' u" E1 A6 b; K:. . . . . . Where? I did not see . i  Y3 K2 b8 k! L$ Q! y
hackers: Open your Task Manager
3 Y' r# Y$ g# n! y; ]% I white:. . . . . . . Task Manager, where?
' N5 F$ U! k/ Q4 W- g hackers:. . . . . Your computer below! !
3 q" p% C: e/ t6 _: p9 m white: \;
1 j) c' A. z2 b, Y  t9 u& x Hacker: I have control of your computer
9 I$ m& K9 x* R" @4 \( [5 v, {1 P white: Oh
' n8 E% A$ ~/ x+ ^7 V, E! x  L+ s hackers: a funk? ! Hey 6 s+ N% j/ E+ o& Y* u3 E
white: for the just, help me kill the virus it, many of the recent problems my Lord 1 P" ~4 d: v' T8 n/ ]3 V# f
machine hackers:. . . . . .
2 D- B8 A& Q& ~% a2 v4 t3 y
4 j2 v: ?: g/ m$ b: c# r0 e white: how do you always in my computer and out of
6 a/ G# T' z3 T  L; N) Y) s casual hackers: You can install a firewall : B& ~; j" D9 \0 F$ D  V
white: install a firewall, you can not access it?
0 D4 k( E& r; P( p$ }$ U hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ) W  o" l  F9 Y# v* I
- X# a5 N) E% N- N& |) j9 I
small White: I heard that you will create a \!
! y4 F: Y) r3 ~2 Y hackers: ah
/ C; X* V' N0 Z1 g. \ white: you can control someone else's computer? !
% ]8 E5 n/ S+ [9 J$ N* F+ \- i hackers: General is the " |3 F( }. c& w1 u+ k
white: you can black out those sites? ! G, S( U  q5 i- ~$ y' B
hackers: of course, did not hear people call me a \. G7 }& f- t7 Y2 m. s
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
2 N! F2 y) h. v2 J6 v- ?5 P5 L+ R \!
/ [, m; T9 J! I5 T  } white: every day you come in, do not feel tired of it? 0 B1 h5 h6 N& e- [7 \
hacker: is a pain, your machine is the worst I've ever seen in one of the ) J7 |+ E) {/ S1 D8 p
white: is not it, this is Brand 2 U& _; o+ i3 g2 x# O
Hackers: I was mentally retarded in addition to your yard game machine only virus a ; O4 f5 ^4 B# S* k# b
white: Oh ~ ~ that you see me The \. . . . Goodbye " A6 _1 b' U6 B! K  t" s

4 l7 Q: y+ j* b+ B5 i( a hacker: Hey ~ ~ ~ I come! ( ^/ X9 |( E6 d7 q
white: not seen you for days, was my firewall blocking you?
# n- p) T" @8 w+ M3 y hackers: Haha, jokes, on your machine is easier than my own, not you miss me
7 p0 A: x- m/ k$ N( K0 e; U white: I want to Please help a busy
% a; G  |2 \- b! G/ T, K* z hacker: What?
( y1 O) `9 K# _ white: you can not modify the point into the power system data
, r% E  I8 B4 Y5 u: a hackers:. . . . . . Why do you want to! ! 6 ~! v9 S& U/ A3 P4 h& ]
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
' r3 x/ w5 m# Z# J) a; B hackers: die! ! 3 K. U- Q4 {0 o% v  s
# O) `; v0 j* o( S
hacker: you die Where is? ! ! !
0 B: k9 p. U! F7 e2 q white:. . . . Go out and play for a few days, ah, come to me why ' T/ y. T- t5 K" P( h2 w/ k
Hacker: I'm looking for something 5 b7 Y, C1 Y, r
white: what I find here?
: O* ^2 \2 s8 a4 ^8 X- o hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 6 b. }7 z8 G# _: a
- ~1 Z/ g9 }/ I+ R2 v
most hackers : I come! ! . b: D. U" G% q% b
. . . . . .
3 i) ^2 W7 J: Y+ m+ ]1 @- h7 p hacker: how not to speak?
6 i8 P3 R1 l8 g: l9 z# R white: a bad mood
6 p  l* M- E: h! g/ l5 s0 _ hackers: Who bullied you? . B: [: ~& T% R! x8 h
white: a Q No. I have not lost inside of my first love $ y! @* v+ @$ `" u: Z4 N
Internet hackers: this simple, I get it for you
0 p7 Z  F7 h; E# u2 X7 H white: do not get back
+ n2 C; g' t8 Q! G$ T0 r1 ^  K. [ hackers: No, tell me what number?
  \7 v% L6 g5 M" B$ v white: Woo ~ ~ ~ ~ just do not remember " A8 T; _0 a/ c- Z6 B& g

& [$ e* \2 `6 l9 u" w white: you gave me out! ! ! ! 6 j- f7 W% H7 e- {
hacker: how wrong? ! - c3 J8 g9 ]7 Y2 J, X( P
white: You are not the forum to use my ID to play it? ! !
3 O- c9 c" h/ N6 J; ?" `3 w hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the + I, m/ m8 g6 z5 g% u& Q' ]8 u* a& d
white: it does not work! ! ! $ ?7 `4 z' A4 v- T0 N% {+ s0 f2 n
hacker: how should you like? 4 ~+ S) ?% h2 c6 T" a+ K4 X
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 4 k: G' k2 j4 H$ _% a: k" |9 M$ K$ b

+ p3 V/ J3 ^. ^! c8 U hacker: Hey,ralph lauren pas cher, I did a lot of fun , X+ k& ?! r: w
white: what
5 a' S- ]( q0 l8 v" `4 E( C hackers: I go to the forums posted the top ' P! A. L, s0 M% _/ {  V
white: This very common ah   K6 v4 L+ J  i/ j5 G
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
* b( \1 j/ ~$ R' I white: Wow, very enjoyable, and I can never dare, will be blocked!
" t# Y5 R$ s% |. N; G/ o Hackers: Yes, has been banned.
2 r. e0 d8 B# N white: this is also fun? !
% f; D7 w; I: A$ H Hackers: Yes, ah, because I use your ID
  b' c8 F# P- S white: you are pro?
$ A; N% _8 D) I% s2 ]. b! \5 d, a hackers: You can say it. % b3 A) [, F( M2 z% `: P) ~% o. f# v
white: to what extent high?
. F" g4 v) N9 Y5 z: B2 D hackers: ah, I am bored when their own
0 D( X# `) H1 O2 h- W6 x" [ white black: Ah, this I will!
5 T( i+ ^, v1 S: w hacker :#?%! You can? ! 7 v% }8 ^" ]5 q
white: Yes, ah, a black off it. . . . . ! ?2 J' W* [$ Q; z& N3 w
hackers: Go!
0 @* o0 W- O, }, Q white: Ask your question # T9 H/ a6 G% ?; p( s6 n
hacker: says ( A6 R# v/ Q7 ~# y# R* b$ b
white: Besides me, you can also control other people's computers do ?
( G9 B5 ]7 o$ x/ i Hackers: Yes you can. . . .
+ e. [( u+ p2 q4 D; k  y white: no networking is also OK? ' m' E" |5 b4 ]! c) x8 K
hackers:. . . . . . . + G7 d* h8 E3 R3 b4 r% c' @, [
white: You can remote control to open someone else's machine it? 8 D( H2 \$ n! `/ H# @* j
hackers:. . . . . . . .
/ c! \! [" @  |3 ?: U white: You can steal top-secret file it! ! ! # a. v' k( \( P- H$ O: x" t
hackers: I think you see more movies, go to sleep " `6 G' @/ U" b+ R4 r
white wash: my computer is broken
) x8 \+ n1 o6 e/ m- ?( H; j$ i hackers:. . . . . . . Just checked, your computer no problem
: T: F" Q/ z  w1 X+ p' H3 D white: that is, you bully me 7 S1 }' B0 v3 L( B
hackers: No ah
$ N$ [; v  l6 \% v4 _$ z; U. Z' p white: You are! MP3 files are passed to my no images! ; p& @* q# u1 S2 O' }* n
hackers: help ah ~~~~~~~ # E- g0 [7 L0 G! @! U* D
white: Ask a computer problems can you answer? & Z  l5 I" n/ t' v8 c; \
Hackers: should be able to 5 }3 H& L0 Y6 L+ L
white: Which key on the keyboard the most handsome? , [' X* V" K  ~  A; e
hackers:. . . . . . . Do not know
0 R$ F0 x0 g: Y& ]2 a5 ]: P* M% z white: of course, \!
, I! q* [; ?1 U3 r# o8 N hackers: halo ~ ~ ~ This is a computer problem? ! !
7 K! M3 o, f9 G; v; t) X , T* U6 l  ^3 K
white: ask you a computer problems you can answer?
. ^. q8 m1 W) J hackers: If the problem is not your idiot
9 `( a& K: {  c4 D$ }8 Z# I white: I am serious! ! You can operate my computer?
/ h8 r# @3 e; g$ j0 L& x" u hackers: ah,juicy couture shop, yes
, H  m( }) e0 x! x+ a3 u white: that problem, you can solve it ; c) C0 m3 w: k) ^
hackers: Your question is, should not be difficult ; ) M+ k3 g6 K5 m5 l3 i& @. f
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 2 l, x# Q1 F. c- N2 ~
a hacker:. . . . I excused - `/ v. ^+ k5 Q' x1 L1 e
white: we see meet you?
1 B9 s' `  B/ h) u: C+ } hackers:. . . . This, not so good, why should we see   q6 v" z8 N4 a- h& U) C
white: I want to see you are not the same and I would like to / ]: [& E# B2 u- w7 j
Hacker: Oh, what you think? 9 V* F! @) \# i8 o
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
9 E& ?1 h8 n5 L4 x- Q7 K3 [ hackers:. . . . You say that Spider-Man, boss!
, i% b+ B, _1 {2 U" l5 q hackers: Kazakhstan woven ~ ~ ~ 0 x( r/ ]4 o- T. [& e" ]
white: You called every day, is not very curious about me?
. C% N" \  t9 V hackers: not curious, is the habit, easily came in * g0 x8 H8 O$ r6 ]
white: Well, I have a good way to change your habit 6 o" F" P3 ^# U8 j& }
hacker :. . . . Oh? ! Any way
) ]7 n' r; l- c1 a# ^4 c white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
* g& ]) a4 o2 J hackers: Genius ah! . . . . . You can also connect to it?
0 v) K, [9 _. K, \ white: to ah, and slowly the hymns!
( @) [% {3 v( j white: you every day into my computer, is not very curious about me? 3 M9 a9 \% K$ ^4 U% j8 `
hackers: No wonder, only used $ i7 g  K- y. N$ K  y7 l
white: no you're curious about the place? 1 S( |9 A1 ?5 @2 L5 U/ ]  E
hackers: a ah, I always wanted to know your machine so much as when the virus crashes 9 E4 u- `& ]( h' Z0 {

  a* y3 a7 h8 E5 d white: I would like to control your computer
. z) \: C0 `% ^4 o: D' D Hackers: I will not have other people access my computer I will be mad , G! F2 i4 a% L2 `% u) [! Z/ Y$ e5 C
white: This is not fair! !
+ U- d& n' D  b/ e; u- M hackers: ah, well, you control the good of the ' Q7 ?% R# c  d7 Q
white:. . . . But I will not. . . . 0 l$ @/ C3 z/ v- |4 n  t
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ! f# v8 U( i* r, `
Hacker: I'm white
: a3 n2 V4 u' T1 ?  b/ N us again: This is probably the last time we met the
2 ~5 ], n& k6 z. H/ i7 h Hacker: Oh? What happened? 3 T# k2 n! |8 ?6 |. d0 s/ b4 b
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! , S7 ~$ m% n. `/ U! I
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye " Y% O5 [. r/ D  F% T& ]  o9 V9 e
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
4 q2 ?2 c/ F+ F) s& o) A4 F hackers:. . . . . . . . . .
( c$ }3 H2 N% d8 X( A( @ hackers: so late, and how not offline?
/ ~' S" r, u) Z8 J& m! ~7 Y) M white: Oh, is the next, and I went to pull the power
* V3 G2 Q! k* v- Q2 f hackers: Slow! You will not shut down? 3 t: ]2 T" w4 B  g, P8 X
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power   e- u4 z. j) P; |- S% L
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \; j* Y5 C- v1 S
white:. . . . . . I press the power to the hackers call it - p, J7 {5 Q2 J: P
white: You are not really powerful 7 R( d0 P; }& Y1 D3 h2 u' H- J
hackers: so-so friends
  u5 h8 u& W% B8 X7 ]4 h) t% f white: bragging! You have the ability to shut down my machine in the horse. & x+ K( e# k  F1 z8 [" M
hackers: this place is difficult! You wait
) p; q3 r/ t2 z0 u hackers: Haha, buttoned regret it # R% q* Y& I3 Y( z0 G1 L9 ]7 z
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 4 k" R% X$ U  I9 j+ ]% q& }
hackers: halo ~ ~ ~ ~
您需要登录后才可以回帖 登录 | 注册

本版积分规则

联系我们|小黑屋|手机版|Archiver|埃德蒙顿中文网

GMT-7, 2025-11-12 19:46 , Processed in 0.215242 second(s), 10 queries , Gzip On, APC On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表