 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer # e' U, e3 }$ G5 X/ l! X( ] X
white: how control?
5 y, N& o+ h3 |8 K9 m5 | hackers: white with a Trojan
9 ~+ ]: r+ Z) q0 Q:. . . . . . Where? I did not see
6 ^' G% [8 N, R9 ~8 f3 l hackers: Open your Task Manager
1 }& ]/ D6 }) k+ a3 }8 G7 r white:. . . . . . . Task Manager, where?
( j, R' R. w, Z4 H x: T0 m hackers:. . . . . Your computer below! !
( h- L8 j3 ?9 i white: \; & \ m3 J) q/ A6 b: a
Hacker: I have control of your computer 4 y2 | ^! Z) V$ ?0 H
white: Oh
" P) @+ [# F5 N* _, c! z hackers: a funk? ! Hey
2 X; z& B; F/ J: L white: for the just, help me kill the virus it, many of the recent problems my Lord d$ F) ?! N- b* T$ V! |' H
machine hackers:. . . . . .
) |) Y7 \" C0 B
) \; d) W5 `( h9 d/ B2 D white: how do you always in my computer and out of 4 Z& m" c7 v7 X
casual hackers: You can install a firewall 9 i8 Z- R U8 r5 L& }2 Q5 M& H3 F) Z
white: install a firewall, you can not access it? 2 t( R/ S; m1 X8 |+ u
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 1 z: P: R! ` o) ~5 b# O; M
; x$ K- X6 a9 z* ]" B0 g5 J
small White: I heard that you will create a \!
5 h5 w" ?" M) @5 c' M hackers: ah
8 j1 m3 d' ?, _! \9 W _ white: you can control someone else's computer? !
/ ~6 s8 L) W# l. n% \* U( S2 ] hackers: General is the
# C0 v8 J2 w; h* U8 r6 Z white: you can black out those sites? 2 A) X* Z1 t3 H# y) Q% |# \
hackers: of course, did not hear people call me a \/ j) Y+ e5 c* e
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 7 m& S2 W6 T. C8 y# w2 t
\! . y: a: i+ a$ E
white: every day you come in, do not feel tired of it? ! E7 j0 F) a/ M; P) l
hacker: is a pain, your machine is the worst I've ever seen in one of the 4 D' w- H; {6 w0 Y8 j. p( p$ y
white: is not it, this is Brand
6 d# D& F! R4 M+ k) K" z a; M Hackers: I was mentally retarded in addition to your yard game machine only virus a
" o/ X5 @* }& i white: Oh ~ ~ that you see me The \. . . . Goodbye ! B, O2 X) v3 a6 ~$ G" \' ]
! m3 A2 n# k( M
hacker: Hey ~ ~ ~ I come!
, t% r5 K/ o% J white: not seen you for days, was my firewall blocking you?
: B8 d7 g$ p M/ t* o hackers: Haha, jokes, on your machine is easier than my own, not you miss me - T- H* C6 \3 _" J
white: I want to Please help a busy , N7 V0 }& { d4 Y
hacker: What? - A, B3 y! Y+ |% x+ n
white: you can not modify the point into the power system data
& x+ V7 R! J, {4 l+ L+ v( ^/ L hackers:. . . . . . Why do you want to! ! ) q2 q- G* D6 p2 d7 m# E% C4 h
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . - ^0 z5 s* L- e W
hackers: die! !
! T/ }+ ?9 R. V7 S b4 Q/ G' I
; ^7 X4 {, B6 m6 { hacker: you die Where is? ! ! ! 6 f- z. }) A& _5 R, f3 B) v+ [" e
white:. . . . Go out and play for a few days, ah, come to me why
( k. N& N1 t2 Q$ N- I0 d: n Hacker: I'm looking for something . H: `9 l+ q0 s1 e5 x
white: what I find here?
% m3 ^2 }9 I' L9 ^ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 9 d0 [" x7 @1 l( o' J5 ^0 c J2 q( D4 U
" x2 G" u: S4 q+ \4 y* r
most hackers : I come! ! 5 b' e6 k5 [& _3 W5 w, j1 J) C
. . . . . .
: e; Q: l* B: R8 d hacker: how not to speak?
e" O" |+ D: z6 U4 ` white: a bad mood
" \/ h" b- T( a hackers: Who bullied you? 8 R; r! A; F' i9 u7 w9 S
white: a Q No. I have not lost inside of my first love ! y# E) q6 L& H5 \
Internet hackers: this simple, I get it for you ! K4 h7 I# v2 A9 c
white: do not get back 2 Z6 J. A4 M3 E7 W' u& x
hackers: No, tell me what number?
2 M# D/ d$ g& C/ e" t* P" Y white: Woo ~ ~ ~ ~ just do not remember 7 F: A+ Q; _: c$ y3 m& ?4 K
1 d' f8 D9 t7 B- i$ z! t
white: you gave me out! ! ! !
$ N3 X" m. C8 u, w7 a hacker: how wrong? !
, ]4 n0 E) a+ S* ?* a: k" X white: You are not the forum to use my ID to play it? ! !
5 v5 Q" X# K0 a8 |8 u/ h, W2 w hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
& m& S( J! r1 j$ w white: it does not work! ! ! 1 \! |4 \$ M6 \' N# _+ {8 f
hacker: how should you like?
; b E: [$ U- R7 s' B5 v2 X3 R white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! & P# y* b# ^4 q7 f! l- @% S
* B4 s7 n0 x, B7 G
hacker: Hey,ralph lauren pas cher, I did a lot of fun
1 |7 Y+ I5 ?6 m x# { white: what
% W6 D+ O/ L1 ]$ O hackers: I go to the forums posted the top
3 e( j/ Y% @. g* q' v8 p white: This very common ah
, T% t a6 y# r0 T, c9 q$ e% c Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
! O9 e, a) |1 }; g0 g+ T& N white: Wow, very enjoyable, and I can never dare, will be blocked! / `* R4 @1 t$ Y+ A
Hackers: Yes, has been banned.
! }% }0 Z' ~/ e+ W4 z8 \( t white: this is also fun? !
4 K6 ^; \/ b) p/ \" u- z% w Hackers: Yes, ah, because I use your ID
8 m) x' _& s) o! E. O3 t' ` white: you are pro?
, O/ D0 P6 z- c8 ]( [ hackers: You can say it.
& }- _$ J' O/ l2 {$ m, A white: to what extent high?
7 l# K Q% J3 Z* k% N hackers: ah, I am bored when their own
1 `. S2 I0 Y; [ I; t5 t white black: Ah, this I will!
- s; t/ n+ y4 i hacker :#?%! You can? ! ' b1 l/ J( M' T- O6 h4 @
white: Yes, ah, a black off it. . . . . ' o* M9 B8 E' x2 Z$ z, f/ T
hackers: Go! % \- l0 D& ?/ D0 y. a- O
white: Ask your question 9 D) y# l) `5 t3 q
hacker: says ; ?' `2 n/ A8 f* p$ w7 S
white: Besides me, you can also control other people's computers do ?
* I+ b ~6 u8 d1 ^ Hackers: Yes you can. . . .
% f8 A3 |; d/ r- b white: no networking is also OK?
" h, |! S# o# ~, j7 H' d# A hackers:. . . . . . . ' A7 D, ~" c( i" s. b
white: You can remote control to open someone else's machine it?
- M% \6 i- w# U; m& G hackers:. . . . . . . . . q& C, e, O7 M
white: You can steal top-secret file it! ! ! * T! ~$ B3 P- d; _6 w
hackers: I think you see more movies, go to sleep
4 T) F4 S0 P$ H5 T white wash: my computer is broken
- u! [9 s% i2 g0 R9 s+ Y hackers:. . . . . . . Just checked, your computer no problem $ [6 i0 u. I$ _0 r; v
white: that is, you bully me ' V- z# } p8 T
hackers: No ah
M7 G& O0 j' M+ p1 g7 i2 n. w1 _ white: You are! MP3 files are passed to my no images!
2 d6 E# |: n$ @8 W hackers: help ah ~~~~~~~ 2 s8 w. H" F2 w: a/ H
white: Ask a computer problems can you answer?
" Z$ b7 z' P7 A1 H* [2 S, J( n$ ^ Hackers: should be able to - n) |# D" n' c/ v
white: Which key on the keyboard the most handsome? . m! b9 f) m5 m* P
hackers:. . . . . . . Do not know # Z9 p- M6 L$ K) a; Q' m: ^
white: of course, \!
/ a: e7 {4 M) p hackers: halo ~ ~ ~ This is a computer problem? ! ! 4 j1 x. }) U/ w% Y; ?
9 g8 W3 \ p6 ?) A) B white: ask you a computer problems you can answer? . p/ J) k- j+ j- z
hackers: If the problem is not your idiot
3 V6 `5 n; [5 x. f' k white: I am serious! ! You can operate my computer?
@/ V& S$ L' a$ P z+ W hackers: ah,juicy couture shop, yes % o! s% I; M' }+ r# S
white: that problem, you can solve it
- Y% _) S! O6 ~# J hackers: Your question is, should not be difficult ;
) O( f9 U) R1 |) S, B white: Great, my fans do not seem to turn up,nike air jordan, help me change it 6 |3 \7 u, n+ q9 T, T& ~# p
a hacker:. . . . I excused ( a9 d/ `$ [" Q2 ~; _: t
white: we see meet you? " ^5 q [! Q: C* Q: n+ Y$ j
hackers:. . . . This, not so good, why should we see
+ i4 f5 N7 f5 y" p) o# z white: I want to see you are not the same and I would like to
2 f# G9 a( G) e( p1 u Hacker: Oh, what you think? + N+ M J9 S" f) v: A" a5 z
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ' T/ E2 v( T/ N( z
hackers:. . . . You say that Spider-Man, boss!
. `$ ?7 c% w( K$ a$ Y) `2 M2 t hackers: Kazakhstan woven ~ ~ ~
5 w+ m0 }2 U2 L( p white: You called every day, is not very curious about me?
7 Y9 d: h E8 U2 m; E9 i. f( w hackers: not curious, is the habit, easily came in - t: o6 ~, U% a0 }* y" y7 \" G
white: Well, I have a good way to change your habit
3 @! z- R0 W3 o9 |3 } hacker :. . . . Oh? ! Any way 2 C8 `* h* ~' Q2 o& V* b" P
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ % a- `' W4 I0 h2 C7 v. F
hackers: Genius ah! . . . . . You can also connect to it? 7 A5 {* K& O& y& X9 Q
white: to ah, and slowly the hymns!
+ y/ Q. k' F- N white: you every day into my computer, is not very curious about me? " ]' I, `* G `: E0 r
hackers: No wonder, only used
! |! W& a N0 L. |+ n9 S: ] white: no you're curious about the place? 8 \0 g9 c9 }# Z! K
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
2 [# t. w3 d, m7 U
5 C: e4 H8 l4 i1 j white: I would like to control your computer
4 x: V) b6 Z5 Y6 o# g Hackers: I will not have other people access my computer I will be mad 8 C- Q2 V. A: U3 T. v3 u
white: This is not fair! !
( A: C/ H) ]9 d3 p0 t1 z; ]7 ^1 Q hackers: ah, well, you control the good of the
$ x2 K, G: T5 |' @$ ?% @! _ white:. . . . But I will not. . . .
1 M H, c* d1 U" n$ n6 x hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
1 r5 g* ^0 ]* e0 h5 L1 V Hacker: I'm white 2 Z* F2 q; c4 n; h) q& C7 s) H
us again: This is probably the last time we met the ' \1 M' T6 `0 f
Hacker: Oh? What happened? * O& _. A# t0 V% U
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! # a; w- M& E# Z' M" `
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 7 C7 ~+ C/ V- t1 a) n4 h/ i
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
3 `; Q; L/ w4 `; a hackers:. . . . . . . . . .
1 G& X: t. i) m# R hackers: so late, and how not offline? 6 O: A" s' u" |( t5 P
white: Oh, is the next, and I went to pull the power " Q" Q! e/ u4 W
hackers: Slow! You will not shut down?
* D6 W1 b5 l+ d. w& R white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 5 K% E0 w" `! e0 q6 F) l! ?
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
6 \4 n/ a2 L* y. V white:. . . . . . I press the power to the hackers call it
# y9 s, R6 r* C1 `$ n white: You are not really powerful + @5 m8 k$ F7 B+ c
hackers: so-so friends " S5 N! a* l) w4 c% c
white: bragging! You have the ability to shut down my machine in the horse.
6 o3 I" Y' V2 w" I3 \% B hackers: this place is difficult! You wait 7 O: _' y) i9 ~
hackers: Haha, buttoned regret it ( M8 D4 b3 W; z+ Z8 T
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 2 J) `. v2 ` }7 S
hackers: halo ~ ~ ~ ~ |
|