 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer ) A8 L- Z7 J* B3 ~- g
white: how control?
! D: p, z" E; {0 @ hackers: white with a Trojan
, S/ }8 V7 {$ I' L* A. u:. . . . . . Where? I did not see
4 V" a ^# G9 T; w hackers: Open your Task Manager
; C4 \4 S6 H& k8 O+ y" r white:. . . . . . . Task Manager, where?
2 B* C, ^, [" K5 Y1 y' q hackers:. . . . . Your computer below! !
9 k7 E7 F5 C" O white: \;
( J. e# k2 C; X: F) x$ Y) f f$ ] Hacker: I have control of your computer 5 S0 [4 o2 y% U9 X! U7 a- E
white: Oh - \; k. l, P# q; g; F. n& Y2 C
hackers: a funk? ! Hey
4 o* s4 e/ D- K" |! ?9 u* c white: for the just, help me kill the virus it, many of the recent problems my Lord
+ @, m" p. q* E9 @ machine hackers:. . . . . . * {( |" S4 s% J2 e: q
- P3 X: k3 A# D6 M! z
white: how do you always in my computer and out of & F( O+ }$ S0 V; u0 x# m" P
casual hackers: You can install a firewall
" c" p( W3 Q7 |- [6 d white: install a firewall, you can not access it? ( t$ i& C+ B5 b
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah ! z2 o8 [5 W7 U( X* a
& ?! T, e& J' q% Q5 _% t, x1 R/ b( l
small White: I heard that you will create a \! * e- G' ~: q) r% ?+ \" B
hackers: ah
9 R2 r5 b& o8 }* ~: H/ K, L white: you can control someone else's computer? ! ' I; n7 g; z5 K) O9 m: B5 X `5 x
hackers: General is the
! Z$ J% j& j7 h* Q white: you can black out those sites? 2 N; F1 g" h+ X. g2 j/ L: o
hackers: of course, did not hear people call me a \7 i/ i& u7 x9 V. h+ E" f( ]
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . % \4 W7 w# p6 M. X2 a# r2 q
\!
, Y- k6 }* A% v0 J! C( C% I% u white: every day you come in, do not feel tired of it? 1 a0 d# g! C! s" l& m% j/ y& y
hacker: is a pain, your machine is the worst I've ever seen in one of the + r( v/ |7 k6 V% X
white: is not it, this is Brand , t" B! \2 A, o7 a
Hackers: I was mentally retarded in addition to your yard game machine only virus a 9 ?: Z8 [. n3 _" w q( O5 E. q
white: Oh ~ ~ that you see me The \. . . . Goodbye $ [: g, I6 V' b/ `2 w. Y
* c8 i0 j" k2 t( r( |9 | hacker: Hey ~ ~ ~ I come!
; ~. j+ s- U. ]' |7 N white: not seen you for days, was my firewall blocking you?
. o A8 ^% S: u8 U/ ` hackers: Haha, jokes, on your machine is easier than my own, not you miss me 7 Y" m8 c! k1 R% E
white: I want to Please help a busy " K, a+ o7 g2 ^9 X5 S0 ^9 u+ {
hacker: What? % K4 l. X7 l. i& r
white: you can not modify the point into the power system data
/ I3 X& S- W' O8 n2 G$ O8 s hackers:. . . . . . Why do you want to! !
0 x1 N. {8 s2 s white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
7 k3 n6 p1 \' E7 ]( } hackers: die! ! : f8 |/ A* ~4 ]8 ?) R& g
0 o0 L# Z, j- e+ k hacker: you die Where is? ! ! ! ' @, |( H1 u! \/ c4 R( I- M+ \
white:. . . . Go out and play for a few days, ah, come to me why
* b* ]& N( b; Y$ z# M Hacker: I'm looking for something
! l3 V$ M" ~- q# _6 f: R white: what I find here?
h6 N s5 m0 L" _, W; K6 Z/ ^ hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights 7 S9 V& n/ z+ `. |) O- N% N' Q' y8 [6 ^
$ L) q7 {0 i. S; c) L
most hackers : I come! !
7 F1 v5 G$ n& N9 W( x- L, n. . . . . . $ s0 A& x# N" e, Z
hacker: how not to speak? * V+ A* I1 \9 J9 _, y" b6 K
white: a bad mood 1 G9 P) P0 N9 {( w; B: ~- R! q
hackers: Who bullied you? 5 A+ M( P( K1 @; r: X" L8 q
white: a Q No. I have not lost inside of my first love ( k( d" T/ ^6 Z" \9 s T
Internet hackers: this simple, I get it for you ( a3 i7 {$ b. D& C9 Z0 H4 {2 K
white: do not get back
) T- X1 R4 q1 v" v8 D2 v& j hackers: No, tell me what number?
; A; ?) }7 k9 w `; [% ^- I/ d white: Woo ~ ~ ~ ~ just do not remember ' ~4 F( [: J# d( ?
u) U0 b8 P. d: J9 C7 H( l3 { white: you gave me out! ! ! ! + j7 A, `/ Z | D% @+ a$ ?
hacker: how wrong? ! 1 y* T# @, d" I9 G( j6 ~! x
white: You are not the forum to use my ID to play it? ! ! 6 b3 X9 ]) x% y
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
- U {) N2 Q& K8 ^& C6 }& X5 ` white: it does not work! ! ! 4 i! b6 ~$ _0 E8 A! I
hacker: how should you like? % M# }3 g( Y: Y
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! 6 E$ p4 I, A& Y6 `" I
$ s/ B7 h& t |8 ^3 M
hacker: Hey,ralph lauren pas cher, I did a lot of fun / h7 }0 c, j& L- W/ ~2 s) B& V4 U
white: what
) `+ ]. d- r0 T- S5 q5 Q- V hackers: I go to the forums posted the top & y* y, n, L& z& G
white: This very common ah
: n# V. ?- R8 f, o Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent X: ^3 I2 T! D2 u
white: Wow, very enjoyable, and I can never dare, will be blocked! ' T# |9 s# t t' E1 P8 n8 [/ x6 o
Hackers: Yes, has been banned.
% o1 J9 o- y4 X9 i- \$ R( [/ g% D1 C white: this is also fun? !
3 k; y# k/ U0 W9 M; ^* |+ X- M Hackers: Yes, ah, because I use your ID
q' ?( P* Y9 @ white: you are pro? 8 j3 |- @! A. F
hackers: You can say it.
/ g9 j& E" O, L5 Z7 x U9 S white: to what extent high?
N& a) Y7 r, i( I0 n1 e; s: R" v hackers: ah, I am bored when their own
0 H2 R9 W& l2 H# A( i+ B8 G white black: Ah, this I will!
2 ?6 c, C5 H' k, u4 f2 L hacker :#?%! You can? ! 4 c4 k% l' d2 Q) @6 s% J+ }" h# o4 R
white: Yes, ah, a black off it. . . . .
9 F+ {' {+ T: F i1 {- k; C hackers: Go!
: i# Y% J+ c8 T' f3 Y- I: m white: Ask your question 6 A+ V# N7 {( Y" \$ N
hacker: says 3 q& d5 G0 T, l/ u6 D/ e
white: Besides me, you can also control other people's computers do ? - G* c' S3 w* C' ^. C
Hackers: Yes you can. . . . & p! R& E/ r" c2 ?
white: no networking is also OK? & ^, y4 b, R& l* A( q
hackers:. . . . . . . * ?2 g+ O( t: C6 U \3 j
white: You can remote control to open someone else's machine it? 5 }) `1 ?" ^! Q3 }8 ?2 h
hackers:. . . . . . . . $ @' y2 \( r$ b$ w& y0 D6 m5 I4 w I
white: You can steal top-secret file it! ! ! b1 j. h4 l4 Q3 n
hackers: I think you see more movies, go to sleep ; g( l' B: v- o% n: s+ z
white wash: my computer is broken / N; n6 i1 K" U" D
hackers:. . . . . . . Just checked, your computer no problem 0 V& D4 h2 `7 `( e+ s6 j
white: that is, you bully me + l$ ^% A3 C; @+ X Q
hackers: No ah 2 H5 [9 J8 h+ I6 u5 e
white: You are! MP3 files are passed to my no images! . r a$ ?8 L% a0 G, q4 c( {, V
hackers: help ah ~~~~~~~ ( e! K2 @# a' n& @; m1 x
white: Ask a computer problems can you answer?
* W# H% _, U5 M3 U% c$ W" {: N8 Z Hackers: should be able to
. g( D6 v# d" y% D; Y white: Which key on the keyboard the most handsome?
( N/ a/ t; z; K7 b hackers:. . . . . . . Do not know
3 Y' `# G) N2 r0 w" W7 ^ white: of course, \!
0 o: @* F8 l& s: R. P hackers: halo ~ ~ ~ This is a computer problem? ! ! / N2 u7 P% ~# P4 \
- y" c3 y( [( u( ~ white: ask you a computer problems you can answer? ! B5 Q( W0 D$ p$ p- s
hackers: If the problem is not your idiot
0 Q: [- M, }, ~. Z, q white: I am serious! ! You can operate my computer?
* h; f0 {" L2 A# b5 ]1 r. ^: i- B8 y+ S hackers: ah,juicy couture shop, yes - o! \& ?, W5 \' T$ B
white: that problem, you can solve it
1 ?' n( Q d0 m* @ V hackers: Your question is, should not be difficult ;
9 O# A" w( s$ e1 U8 ^ white: Great, my fans do not seem to turn up,nike air jordan, help me change it \8 {& j+ w/ _2 Q1 Y
a hacker:. . . . I excused
3 j2 h, a i) _- Z" F& e! {' z5 ? white: we see meet you? ( a' Z5 p" t9 p( h4 C
hackers:. . . . This, not so good, why should we see ) R: g% J M0 g. K
white: I want to see you are not the same and I would like to - m, r' C' `* Q
Hacker: Oh, what you think?
) Q0 J/ S- A( [ L, K. q white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
* Z8 P4 c( h% `. c hackers:. . . . You say that Spider-Man, boss! * K" [' m O# r6 Q
hackers: Kazakhstan woven ~ ~ ~ : ?6 v- R5 C: j
white: You called every day, is not very curious about me? ' t* U m# `4 C+ i
hackers: not curious, is the habit, easily came in
" ^7 `* L) }2 ?6 q8 z2 S% Q white: Well, I have a good way to change your habit
& V2 w4 q( V$ @5 @3 w" A; e) _; x hacker :. . . . Oh? ! Any way
/ M. C2 E7 `/ B' S6 L white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
* p' A) X; D4 F/ Y, s% Z hackers: Genius ah! . . . . . You can also connect to it?
- [% G, k7 w' {- @/ C, Z' Q white: to ah, and slowly the hymns!
& X) [0 S7 x1 j white: you every day into my computer, is not very curious about me?
! }4 y. I7 f5 Q3 J hackers: No wonder, only used % w( z; g& B9 e( z
white: no you're curious about the place? ) s4 H& f z& ?. d
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
1 f, z6 I2 i7 B+ l( d' ^9 e
8 W1 k Z5 Y L2 _* C white: I would like to control your computer
0 G5 P0 u% J* ~6 T: u! k Hackers: I will not have other people access my computer I will be mad & `( w7 v& x4 V" P/ L- y
white: This is not fair! !
. B% L' E% B" q* l7 N$ e/ x# A hackers: ah, well, you control the good of the 4 f. p8 n* }3 C6 Q9 l! L
white:. . . . But I will not. . . . + C8 f9 m5 {. n* S' ~% K. ]4 ]
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
( |9 R% p6 f% Z Hacker: I'm white ( m; Z- ^. j3 }4 Y- }
us again: This is probably the last time we met the 4 F; j+ f2 v; h. f# U4 @0 P
Hacker: Oh? What happened?
: |6 C3 n% v1 @) z white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ( G, l! k; r6 t2 g5 `' x
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
( ~$ ~5 ?. a0 }, w4 }% a- h) r y white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! - h1 d! f$ T7 L' u- B0 k4 g) s
hackers:. . . . . . . . . . 0 d# [: T" G7 f9 D5 g
hackers: so late, and how not offline? P9 G( i. }" w) a
white: Oh, is the next, and I went to pull the power - I; m7 \( l" D( h' [3 @% ?
hackers: Slow! You will not shut down? # D$ Q; v# ~5 Z; ?. V; Q7 r
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 | K! ^- T- r, M' i) H$ |9 o. a- d hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \* a$ c+ d1 i: N; z* Y! O
white:. . . . . . I press the power to the hackers call it ( M; w' n5 L8 V, G, K* y: G
white: You are not really powerful
9 H* |; u4 V, `* M3 s4 L hackers: so-so friends
$ }! R# T3 x( t+ w' O' } white: bragging! You have the ability to shut down my machine in the horse. 0 Y! H& k2 U8 o3 v
hackers: this place is difficult! You wait 5 ~" e# h+ g5 C Q ^7 c1 b7 M
hackers: Haha, buttoned regret it
) | U) k# O+ `* I4 p white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 7 V2 a4 Y& w; P
hackers: halo ~ ~ ~ ~ |
|