 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 0 \# ~9 I5 X5 D9 V I
white: how control? 9 J) E4 C6 T& Q+ O0 x0 z( t- L
hackers: white with a Trojan & ]: E; K [8 k( Y. c' U/ k+ A8 {
:. . . . . . Where? I did not see ! [3 l3 V% ` w
hackers: Open your Task Manager
' T7 d2 R7 P+ a8 Q white:. . . . . . . Task Manager, where? 5 g1 |4 I# t* a% x
hackers:. . . . . Your computer below! ! 7 r! b0 L) u$ L) S' F
white: \; 0 o4 s% ]; X0 z# ]) E) q5 |, |5 |
Hacker: I have control of your computer
- Y0 R/ k2 R, y white: Oh
% J( _: s0 d6 G$ S$ e' t% O3 P hackers: a funk? ! Hey
* z+ ?/ f5 k8 A2 n; w" ^2 s6 R white: for the just, help me kill the virus it, many of the recent problems my Lord
6 g4 O( [( w; B$ n/ R# I* C( Q machine hackers:. . . . . . * R) U, l2 A+ e5 b6 ?; X1 u
0 b' j) Z2 M# f" c/ @
white: how do you always in my computer and out of 9 o1 n1 O5 ]4 H' j& x
casual hackers: You can install a firewall
# [) B! }. T' _' b2 b2 Y2 J/ E white: install a firewall, you can not access it?
) a+ F/ G7 r% z* y: f( F hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ; L4 c) }4 l# O* h$ z! @7 w& m
" D2 [* |9 w9 ]3 y: `; r
small White: I heard that you will create a \!
' k3 O s! j6 { o3 f hackers: ah " _: j, Z9 N8 ? ?# j0 j! O
white: you can control someone else's computer? !
# T4 d* b' ~3 T( C3 k0 q. R hackers: General is the @0 I4 ?; c8 J6 v7 c
white: you can black out those sites?
) _- o0 B; u+ a; Y! Q2 ?: Q hackers: of course, did not hear people call me a \& Y3 @; J& Z6 N5 B; [
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
3 }8 ]/ G( P( x. W( }" |) s) d \!
+ L9 A8 D# u6 Y }- ` white: every day you come in, do not feel tired of it?
; k9 A0 K% W6 o, p, k hacker: is a pain, your machine is the worst I've ever seen in one of the 0 Q* z9 C! K4 C/ j9 W( c
white: is not it, this is Brand ( \' |+ K* e9 |; y, N1 Y3 H; u; X
Hackers: I was mentally retarded in addition to your yard game machine only virus a
0 R/ a% r/ f. T white: Oh ~ ~ that you see me The \. . . . Goodbye 7 z, P- L. F) T/ i
& P" A0 M3 ?4 D hacker: Hey ~ ~ ~ I come! / j0 @$ b5 f! s+ J6 d+ g2 \1 R
white: not seen you for days, was my firewall blocking you? 2 @+ V' r3 \0 l: K+ J. Y
hackers: Haha, jokes, on your machine is easier than my own, not you miss me * \+ J% Q7 u+ G
white: I want to Please help a busy
( z8 g, C1 P- o- y/ J; Z hacker: What? % o$ Y* r8 i) S; C" }- m2 T5 E
white: you can not modify the point into the power system data
# u) U, A8 e$ { hackers:. . . . . . Why do you want to! ! 2 z5 A2 m8 ^: N5 }7 w4 R
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . # S2 L0 z/ ~( N# S+ P
hackers: die! !
6 l" [: [# B0 i) o& U% R# b
* j% H* u3 K/ C; ? hacker: you die Where is? ! ! ! 5 Z5 O1 K; p, i% _
white:. . . . Go out and play for a few days, ah, come to me why
. _; p* P1 \, W( X3 S Hacker: I'm looking for something
7 m) t9 @9 A% t white: what I find here?
a+ d7 J1 E$ p9 a D6 P/ o% ~ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights # a* p$ z. }9 Y! O4 n! |7 ^
; ]) r a$ g$ k8 I' t
most hackers : I come! ! - h0 K6 C: \& q+ n! m/ ~
. . . . . . 3 ^. I+ H: o0 l. h2 p
hacker: how not to speak? & Z9 s# c2 k9 ~+ z! B" ~* C
white: a bad mood 7 m; S% {. K' P. U+ r; O+ ?7 V
hackers: Who bullied you?
2 q+ p( ?3 ]8 Y7 J% I white: a Q No. I have not lost inside of my first love ; c" e, ?' b2 e; f, l
Internet hackers: this simple, I get it for you 2 Q' \% S# t% l$ M
white: do not get back
* ]* @. @. d6 u hackers: No, tell me what number?
: }' A; V" x7 w5 t; l$ P white: Woo ~ ~ ~ ~ just do not remember % J' q: J# \# E$ S2 I% F
) O- c7 ]2 W1 O6 m& N white: you gave me out! ! ! ! 1 A+ p! A5 v- V1 E, b
hacker: how wrong? !
' b; F4 O# }/ Q" V9 x* c white: You are not the forum to use my ID to play it? ! !
1 ] {7 ]# P7 i( P6 b, U2 E/ e hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the , s7 A& ?1 s' |
white: it does not work! ! !
4 t+ W8 Y2 @0 J6 i. G: Y' z hacker: how should you like?
8 r, A) C, h) s: P1 ] white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! $ i6 A8 ~5 Y; m& k/ p1 d
# }0 H# q _. n7 [4 F
hacker: Hey,ralph lauren pas cher, I did a lot of fun
( U, W; A X6 Q/ G white: what : [* R5 l( T# ~+ v
hackers: I go to the forums posted the top
2 B' u$ M9 M# G white: This very common ah
" H4 u Q, \; Q) V1 [# {; B Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 6 p. F8 ?1 @! H+ E
white: Wow, very enjoyable, and I can never dare, will be blocked!
; l. C' Z0 x$ q0 R y; A5 C: r; Y Hackers: Yes, has been banned.
" R. \2 B4 G( N7 p2 A- i# f white: this is also fun? !
" ?# Q& l+ u& L# X+ N3 C! }4 j Hackers: Yes, ah, because I use your ID # `5 D1 _) H9 x7 i9 ?' p! ]8 H
white: you are pro?
- s6 ?! i3 T, ^. e hackers: You can say it.
1 s7 c4 z ~: b# }$ ?2 v: c$ I white: to what extent high?
6 N# ?6 R- I* H! d3 R- I* h hackers: ah, I am bored when their own
& I5 v: j$ O$ L4 {% i* ]# c white black: Ah, this I will! * J8 J2 B# D% X% {" P; i& n* q1 G
hacker :#?%! You can? !
* G; `7 G. C% l. M1 G4 Z white: Yes, ah, a black off it. . . . .
0 c1 E3 i$ O3 R* A% ?; A hackers: Go! ! e, i/ t/ H& h0 _) S( L' a
white: Ask your question " p e$ _, X: }+ Z2 X5 h
hacker: says
2 g4 [) c3 u0 L: [; r; a white: Besides me, you can also control other people's computers do ? 9 O" ]$ l' t- Z# ], T0 I4 R& s p
Hackers: Yes you can. . . . ' [% v8 M/ d: o
white: no networking is also OK? ; S% ] s5 M. _" f& @" ~1 j2 e
hackers:. . . . . . .
, B. g$ `8 D& |2 F$ p% k+ t white: You can remote control to open someone else's machine it? $ S( |1 N' h, {6 V, V
hackers:. . . . . . . .
9 C5 |5 c1 j i: I; r white: You can steal top-secret file it! ! !
# b- H/ _# c( Y! O hackers: I think you see more movies, go to sleep
9 R3 Q; o" y& F8 [) k( Y a white wash: my computer is broken $ ` k0 p; n" q% t
hackers:. . . . . . . Just checked, your computer no problem % _! R4 S( j8 \3 U3 ]; X
white: that is, you bully me " Q- o( }$ Q \
hackers: No ah
. d* w! U8 a3 L* I white: You are! MP3 files are passed to my no images! - E! f( l7 n( e0 A, N
hackers: help ah ~~~~~~~
- K) t, B' y$ M9 O7 c+ t1 N white: Ask a computer problems can you answer? % m% h, O0 P( U; ~' A
Hackers: should be able to
) r8 H4 u: G o! b! M white: Which key on the keyboard the most handsome? " Q- ]1 A$ e, ^; F' g3 w
hackers:. . . . . . . Do not know : z& t: N- z- h! A% [, e0 I: z& y8 C
white: of course, \!
! N' H8 P: `1 r+ K hackers: halo ~ ~ ~ This is a computer problem? ! !
+ \& O/ C: j7 { / m4 G! y" Y: r0 M
white: ask you a computer problems you can answer? % I. b( K' f% }( {
hackers: If the problem is not your idiot ! Y& U9 T$ c9 W# S
white: I am serious! ! You can operate my computer? 4 q r8 ~) d" n
hackers: ah,juicy couture shop, yes
o9 {) F9 `2 u$ W/ S4 r white: that problem, you can solve it
4 }% y7 o+ ^/ i hackers: Your question is, should not be difficult ; 9 Z- k7 d( x& t- g5 o
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
$ x. x, T0 m, G$ m. C% L$ c/ S a hacker:. . . . I excused
0 E, ^0 w5 `% A9 d: U K white: we see meet you?
/ c. v1 ]! b" Q( H hackers:. . . . This, not so good, why should we see 2 Q7 p8 @# Y6 L6 ~0 F( p
white: I want to see you are not the same and I would like to
v6 ?7 t) r- w# p2 ~ Hacker: Oh, what you think? . F( B. S7 t t% H8 @
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ) d) R3 U7 g) D% f" W
hackers:. . . . You say that Spider-Man, boss!
; i" l, e9 z2 _. Q hackers: Kazakhstan woven ~ ~ ~
) b- t' b/ G# L) r# y white: You called every day, is not very curious about me?
3 T$ _6 f* V, }) t+ h hackers: not curious, is the habit, easily came in 5 N) _6 r/ D- C5 I7 I
white: Well, I have a good way to change your habit
/ L( p% R; w9 d, _' O1 F+ p hacker :. . . . Oh? ! Any way ; f5 J+ l% A u \
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
. M& c& z' s, q hackers: Genius ah! . . . . . You can also connect to it?
/ o- J* r! i; T5 P( [ white: to ah, and slowly the hymns! 9 w9 m3 W/ R; O# e$ ?) i% W
white: you every day into my computer, is not very curious about me? : B! T' a! r$ R& J' J
hackers: No wonder, only used 0 X0 ?3 P6 e9 j: ~" @4 _. e3 O
white: no you're curious about the place?
2 h; ~3 G: V! G5 ^% l5 w) z4 s hackers: a ah, I always wanted to know your machine so much as when the virus crashes + |$ j9 @7 Q$ Z
. s! {2 I w4 I4 {' u white: I would like to control your computer
- A0 t( }" X9 K! q+ V- ]. c Hackers: I will not have other people access my computer I will be mad
- b1 i" i/ K* X( O: a: o& G white: This is not fair! ! ' P) `, i; |, U" }" Z1 E
hackers: ah, well, you control the good of the
! m& \3 `5 F- u9 y9 T4 w% k4 P white:. . . . But I will not. . . . ; g- c: C3 j" z8 z1 R- q: j: c
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
- g. ~6 W1 y" X7 l k4 j$ E/ S Hacker: I'm white
. J( ~& j6 K w us again: This is probably the last time we met the
: E1 R- p1 [ \4 e8 l0 J: W! o7 {( S Hacker: Oh? What happened? 7 s( h2 X! K- |" w- A) B
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
- G& l( @2 R; q2 S$ | hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
1 ~: J/ d, _# E5 ~4 s white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
6 m& s) W7 X$ a% N hackers:. . . . . . . . . .
' N& K( @' o7 V1 B% _4 B hackers: so late, and how not offline?
. b4 R0 @# `; V/ |4 @ white: Oh, is the next, and I went to pull the power
- N: }" o/ u+ {! P5 M& l hackers: Slow! You will not shut down? $ k8 f+ T( [3 W6 b
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
( |( M( z2 G" U% Z hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
% G$ v' ?$ j7 c3 b white:. . . . . . I press the power to the hackers call it
* J. ]* ~1 }3 v2 E white: You are not really powerful
9 t; {. M |7 s p; V+ M/ \, e hackers: so-so friends
: n; s& W4 D1 \5 {6 e/ s% d white: bragging! You have the ability to shut down my machine in the horse. 8 w& z0 `7 w8 I
hackers: this place is difficult! You wait 6 b5 D: ^9 I8 c1 n
hackers: Haha, buttoned regret it 4 V1 M* u y, Z& x, k( c) J
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
2 Q p' r7 n* }7 q" j hackers: halo ~ ~ ~ ~ |
|