 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
* Z! I* I% h% N) g. T white: how control? 4 J: j" [- m0 _5 f% p* I% W( J
hackers: white with a Trojan ( \# V% Q- ^, ^ z& }9 s5 F6 @
:. . . . . . Where? I did not see
# z% y1 c ]. M hackers: Open your Task Manager
6 W' ~9 c* ~2 p! \ white:. . . . . . . Task Manager, where? 9 p7 w) P9 { {1 r5 c8 [4 l
hackers:. . . . . Your computer below! ! 4 \, M8 a* }, T" r# v
white: \;
x- ?( g) T6 A1 U Hacker: I have control of your computer + X# f e. n, X3 [8 Y: ?( p) M. ?
white: Oh / U4 t1 I+ ]$ Y
hackers: a funk? ! Hey @2 n" [9 P' @% W! E' P
white: for the just, help me kill the virus it, many of the recent problems my Lord 5 k! j& R& q f# g4 x9 E
machine hackers:. . . . . .
) c/ {. d1 s3 ?
7 D/ R( O5 L4 F+ ] white: how do you always in my computer and out of " V8 j2 Z4 A, L3 a0 h, O
casual hackers: You can install a firewall ' Z* P9 P3 c/ T/ M( y
white: install a firewall, you can not access it? {% S) n% m7 W Q$ K: w* _1 d; ~
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 9 A1 a; }8 V/ w; p9 v `" A+ ^
1 x* W- Y7 E; }9 O' N- s" _
small White: I heard that you will create a \! 4 A% }1 K! B/ ^& C, u" l" N7 h* Y
hackers: ah % D4 ~3 c! z. V+ Y
white: you can control someone else's computer? ! 4 E0 N& c# A" r
hackers: General is the 7 Y0 a5 U' A( ?" J
white: you can black out those sites? , r. c, G$ r1 K0 O( H4 d
hackers: of course, did not hear people call me a \
# l* Z1 B4 M6 p) Q8 x white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
; G) q; v! s1 G \! t! z- {; @# {# |! Z* s, o/ l
white: every day you come in, do not feel tired of it? : q4 C" K1 L6 C) O+ X2 K% T) G
hacker: is a pain, your machine is the worst I've ever seen in one of the
& j' J- \. z# f2 G5 M% j8 M5 m; `' L white: is not it, this is Brand
5 @, t4 C N7 O5 J8 x Hackers: I was mentally retarded in addition to your yard game machine only virus a
: Z; G# r+ ^' Y3 w" s/ N6 J white: Oh ~ ~ that you see me The \. . . . Goodbye 2 @% _1 E! P+ N8 F
5 ^6 I8 I; }6 V4 y6 _$ G hacker: Hey ~ ~ ~ I come! . Q9 i5 N+ O: W' D& T
white: not seen you for days, was my firewall blocking you?
" R& R0 [) g, O3 E/ D hackers: Haha, jokes, on your machine is easier than my own, not you miss me 5 r: k2 k! h1 Z$ ~! ~) K6 H6 b y# L
white: I want to Please help a busy
! s, R0 N& V8 \, e: C hacker: What?
, a8 _1 C" ^' T0 J2 I$ ` white: you can not modify the point into the power system data ?1 _0 `/ i; |% V5 L8 U9 }" W
hackers:. . . . . . Why do you want to! ! + W0 P4 p6 m$ U
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
. A; f) ?! U, C& e% s- x* u hackers: die! ! # h9 {; U. p; _
# V6 M* r! T+ F/ \2 @" f
hacker: you die Where is? ! ! !
/ H( Y7 N+ x$ W white:. . . . Go out and play for a few days, ah, come to me why * m+ Z1 m1 y6 Q! N3 B/ _) `) B( ~, B) F
Hacker: I'm looking for something
7 q! |+ _: Q. g8 X' {$ l4 J, z white: what I find here?
, d# v7 O2 h& R# T! _% y! X hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights - B$ ?$ z6 A" d
; r9 x. A8 \! M+ h R
most hackers : I come! !
- Q8 Q8 U9 g; I% N. . . . . . + V, w, p5 v& H$ } }
hacker: how not to speak?
7 F$ W8 Y& f7 k* Y6 d0 V$ {. S white: a bad mood 8 ^: t, h1 H& |8 G' E5 Q: O
hackers: Who bullied you?
& U4 m3 D4 `; }) \6 O( V white: a Q No. I have not lost inside of my first love : k! y$ s. g! D: K" J0 s( J
Internet hackers: this simple, I get it for you ; u2 B6 q- s( N! W9 E' g M
white: do not get back ! ^8 Q% W2 h( e: f( ^/ [9 S
hackers: No, tell me what number?
# \" g3 d! r0 P" o' k2 [/ z* l white: Woo ~ ~ ~ ~ just do not remember 8 z- ]& o: s% r# G
/ ^% W+ Y1 Z5 Q( k, }: z
white: you gave me out! ! ! ! 2 G& F6 P! }% P/ E5 x0 Q
hacker: how wrong? ! - m5 W# H1 [: ~ d2 H$ b5 b
white: You are not the forum to use my ID to play it? ! !
$ N4 ~6 k( m$ E& Q hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the [) \' z* b) L5 P
white: it does not work! ! ! , T" U, D2 Q- O
hacker: how should you like?
( i) [( z% V2 }+ K6 x3 B7 I; n white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! * t7 S( N$ F t/ p
0 |! c7 d7 q$ J |$ R$ w/ G hacker: Hey,ralph lauren pas cher, I did a lot of fun
. J7 b0 [* y- _+ l' K: M, f white: what
0 @1 A# q. C8 P# v8 M8 u' F hackers: I go to the forums posted the top ! v4 F. F. v- |3 S/ m& t, l
white: This very common ah / o& _( i9 w$ @( {* X
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent / T8 C( @7 m' ?8 h0 Z% a* |9 n2 v, @
white: Wow, very enjoyable, and I can never dare, will be blocked!
/ C3 B; E0 g, J, ]0 I Hackers: Yes, has been banned.
6 F- m; s6 w' O# a- ]! f white: this is also fun? ! 2 _# U4 {5 E& V
Hackers: Yes, ah, because I use your ID
0 `; r5 I" N7 g, e white: you are pro? $ v: I; p+ ?% Q/ F
hackers: You can say it.
+ }& n8 t7 f8 V1 D- K" b9 ^3 B white: to what extent high?
8 ^6 P% K/ a$ d" R* N+ G hackers: ah, I am bored when their own
2 ^# ]( V5 j9 l5 |6 c: D H U white black: Ah, this I will!
- Y* a: G$ d0 H) n% |2 l+ p hacker :#?%! You can? !
! N7 A! u% t% A5 f3 ?. g' e$ K white: Yes, ah, a black off it. . . . . ; U& K" Q. @6 d/ y2 T+ s
hackers: Go!
, ~* w5 ^8 g& [3 B2 G) j white: Ask your question
' x$ z( X( B# \- C hacker: says
+ c% [, u5 X& A white: Besides me, you can also control other people's computers do ?
5 Y3 G6 Z. d7 Y+ G5 x Hackers: Yes you can. . . . . R, o" h: K* p3 m' f7 ]3 T8 \
white: no networking is also OK? 2 s9 D" X6 O: W
hackers:. . . . . . .
7 S7 G' ?& |* R' k& P: \6 g3 | white: You can remote control to open someone else's machine it?
# ^6 G; Q( Z: B- `. e$ }# b! L hackers:. . . . . . . . , r; s5 y* D7 R/ A% l% o, l
white: You can steal top-secret file it! ! ! . p" Y2 a; F0 q# Y
hackers: I think you see more movies, go to sleep
% m8 a# a$ R# C# Y7 }7 X* d; m white wash: my computer is broken
; e N3 A. x; s hackers:. . . . . . . Just checked, your computer no problem
& u k, Z2 {' D4 }; i# A. Y5 e( c. y white: that is, you bully me 5 n1 a6 Q- x% ^7 Y: J' D! o
hackers: No ah
$ |0 H# b& Z7 ^9 T- m7 u white: You are! MP3 files are passed to my no images!
' I: e3 x V' H& R4 Y* p j hackers: help ah ~~~~~~~
* s0 e2 |! r# b- f0 {6 W' U white: Ask a computer problems can you answer?
7 D; o1 r# r& f9 r3 ~7 K! J Hackers: should be able to
: ^. H$ @- j6 } white: Which key on the keyboard the most handsome?
+ D- M3 z" |+ I7 D$ T" W hackers:. . . . . . . Do not know 3 [' B/ S' Q/ l
white: of course, \!
9 y6 S: k8 e6 W, H hackers: halo ~ ~ ~ This is a computer problem? ! !
* c! C6 I1 x! P" a' Y* D/ }' y
! Z' `2 k& S W( [) O; C4 f) o white: ask you a computer problems you can answer? 0 H8 i0 r. v- b" k% l% d7 D( D, [
hackers: If the problem is not your idiot 5 {1 D& i. z$ {5 z6 R
white: I am serious! ! You can operate my computer? : ?5 |5 s1 Q% a3 V! H1 ]6 _8 D
hackers: ah,juicy couture shop, yes
( f! j9 }( H* w white: that problem, you can solve it
$ P$ k$ J; Z- S: u hackers: Your question is, should not be difficult ; # h& ^9 v" E# A
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 3 w: B& C' k6 D/ p) Z
a hacker:. . . . I excused $ {6 @ g- b) e( t
white: we see meet you?
8 w& l6 U( v- B4 z2 N0 s: j! `& b hackers:. . . . This, not so good, why should we see
) K m, Q' O& x) z( W4 t white: I want to see you are not the same and I would like to ; c7 ?1 ]7 h$ g# T6 s& d
Hacker: Oh, what you think?
; ^1 \1 U. p& O8 V white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights # Z) D) K4 `' h. c9 J- b( u+ \9 R ^
hackers:. . . . You say that Spider-Man, boss!
. q" h& b I* R ]9 b hackers: Kazakhstan woven ~ ~ ~ ' E- V) j7 Y: A2 ?
white: You called every day, is not very curious about me?
# W# B7 A9 {9 }% [' u# H hackers: not curious, is the habit, easily came in
1 X9 _# z N) i, z3 C* g white: Well, I have a good way to change your habit
5 V( r7 F$ Q+ I- }9 i hacker :. . . . Oh? ! Any way ! j' E9 F7 S; y( H1 u/ ?
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
u8 n' Q6 ]/ f hackers: Genius ah! . . . . . You can also connect to it?
2 q( T: {, Q4 {6 x- p' t white: to ah, and slowly the hymns! 2 w8 z% T+ m6 {6 T( }3 F
white: you every day into my computer, is not very curious about me? ; G* F5 u2 Q+ O9 J
hackers: No wonder, only used
9 [2 D( o5 ^ a/ P5 @0 F* e* `0 B white: no you're curious about the place? 2 C6 D1 @( E8 C; r
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
, [, b' _, A; p - |9 \+ `8 P( |& I8 g
white: I would like to control your computer # _2 E m& Y8 U& F# S, e7 K. H
Hackers: I will not have other people access my computer I will be mad 1 i4 t8 j5 e* D1 S
white: This is not fair! ! ( {9 [, ^) ~3 N- k( b
hackers: ah, well, you control the good of the
' e w8 X% n3 e( t3 z! n; F4 j white:. . . . But I will not. . . . . Y6 v0 k8 T* c* U, c2 k0 K
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! & Y3 }4 L2 ]: O8 _1 ^
Hacker: I'm white
3 W: G) n# Y; [9 H us again: This is probably the last time we met the - Y! N/ `, F a ` R; `
Hacker: Oh? What happened?
; o b3 Y. z8 U* Q$ C) z( N2 ` white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
! U# }9 |/ ]+ x9 \8 [+ Y# s hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
- p6 s8 x& u- I white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
0 Z1 }6 M" V( g( r hackers:. . . . . . . . . . . b- w2 d" k& v* n
hackers: so late, and how not offline?
1 N; [5 b- Y9 H white: Oh, is the next, and I went to pull the power
% r" }/ e% [+ \6 Y/ R/ ^( ] hackers: Slow! You will not shut down?
1 a7 @9 |4 ^/ b white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
% w: j% `. z O: f* q hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \+ [! Z/ p/ M- C( b) a1 u
white:. . . . . . I press the power to the hackers call it
' \" W% D7 \5 Y* e white: You are not really powerful : h. A/ l! {' ^# m$ w, T; v+ Z$ h
hackers: so-so friends
/ D4 R; I0 [! }- Y white: bragging! You have the ability to shut down my machine in the horse. ! P |/ a( L; j/ F
hackers: this place is difficult! You wait 2 m; d7 m, X' @0 ^. q. I. @8 e
hackers: Haha, buttoned regret it 1 s& i* U% z2 U; |; F# I
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . M. N4 ^" ~) c6 F- O
hackers: halo ~ ~ ~ ~ |
|