 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 6 P; f3 F- q0 w" ^4 p( c8 @
white: how control?
) ?/ ?: h* ~6 B( i9 @8 Q hackers: white with a Trojan 9 p% K: h6 G6 v0 z
:. . . . . . Where? I did not see 5 a! P$ g$ Y0 H+ d5 Q# K6 N3 x
hackers: Open your Task Manager % i! e0 D, _7 x" F, E) @6 a; F
white:. . . . . . . Task Manager, where? % _9 Z. f" N: g) Q4 _- c# \
hackers:. . . . . Your computer below! !
4 R0 ?% N# a* m! @* k1 q2 @ white: \; % A/ ^8 e- t0 ?8 i3 A
Hacker: I have control of your computer 1 x) Z5 T% b) ~- _8 i& o
white: Oh * S1 P9 ~/ K* }* ?% h% a) f8 ^
hackers: a funk? ! Hey
4 I9 [7 R6 i7 g white: for the just, help me kill the virus it, many of the recent problems my Lord % R1 g4 M- K" N/ G
machine hackers:. . . . . .
4 |+ |0 h$ v- T - O, l- e/ W: M: g1 v3 {2 a7 \
white: how do you always in my computer and out of
( l& S9 q5 U+ E; ] casual hackers: You can install a firewall
9 t5 o) C3 a# V! [9 A white: install a firewall, you can not access it? # W3 K4 V) _% g5 r. e. R: e
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
- y( r* Y" G9 \& E+ _
' [9 B/ A; P8 K/ D5 J: v0 D' @/ K small White: I heard that you will create a \! ( f3 O+ v2 }) W5 H. f! L
hackers: ah
, d/ z! `3 @: s3 i white: you can control someone else's computer? ! " }/ J$ Z* ?- o, x2 A" @# ?: _1 j X* X6 d
hackers: General is the . U( d" X; R. t+ d. K) h' Q4 V5 Z! I
white: you can black out those sites? ) @6 K0 O g n2 u6 C1 Q
hackers: of course, did not hear people call me a \
0 v# ?' O# u _: P& D( O+ w6 ]% ^ white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
$ N! n9 N3 U; p0 q+ z \! 1 Z; r, T; T/ N: j7 x
white: every day you come in, do not feel tired of it? 8 x* |8 M3 V( _5 Q" a2 c$ L
hacker: is a pain, your machine is the worst I've ever seen in one of the ! K% f- ]& v( N% X
white: is not it, this is Brand
; d$ B, u) D- h5 q Hackers: I was mentally retarded in addition to your yard game machine only virus a
1 r0 M5 n: C1 Q5 Y c white: Oh ~ ~ that you see me The \. . . . Goodbye
+ u' z2 C7 H5 o& [ 8 W1 s5 b: @- b0 {' J' a
hacker: Hey ~ ~ ~ I come! 1 E( x! U1 U# ^8 W
white: not seen you for days, was my firewall blocking you?
! d5 r% z" x$ T# l hackers: Haha, jokes, on your machine is easier than my own, not you miss me
2 c& L- _, P* R) h, v2 F6 C white: I want to Please help a busy
: k0 D2 c' M. \; b8 x hacker: What? - T' ^/ ]8 D @4 m- ?8 X0 T0 G
white: you can not modify the point into the power system data
; W2 x& M. X S5 S; I' Y! L hackers:. . . . . . Why do you want to! ! 5 u' l2 m0 W; P* P L- d
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . e' a/ D8 x: F- r* s7 S
hackers: die! ! 1 _/ S$ p h& l2 w, K9 P8 ?
3 j5 y# m5 X! G! u& W
hacker: you die Where is? ! ! ! 7 T/ j! u" S( r [% s
white:. . . . Go out and play for a few days, ah, come to me why
& K1 F+ | H" V z3 M# F e3 U Hacker: I'm looking for something ! l/ y8 u% t9 }. z: P# Q
white: what I find here?
; S, J% \: {5 z" {3 o1 v7 N B4 B hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
% Q6 Z. i. c* k; n% W2 u : ^ k9 G, b3 Y( T0 J) J
most hackers : I come! !
' T; _. g$ Y5 e" [: g. e$ i5 B. . . . . .
& d+ ^) G6 v+ f: W1 t2 Z- d# q hacker: how not to speak?
, n5 V; G: @3 O$ q6 J0 W4 @; @! J white: a bad mood : M3 O% S% ?3 C
hackers: Who bullied you?
3 I# d* L X3 Z9 u' e white: a Q No. I have not lost inside of my first love ! S+ ~5 y1 J7 p! r) w4 [( F
Internet hackers: this simple, I get it for you : n4 ]3 f& p) y
white: do not get back
. N+ |# _) E& p: r0 W0 k hackers: No, tell me what number? 8 f+ o; n+ |( r* V6 x
white: Woo ~ ~ ~ ~ just do not remember
% x( H* d8 U% m5 S) R3 c ' J; J6 N% s! O, \, t+ q
white: you gave me out! ! ! !
4 O5 c/ C& d2 }, S3 _ hacker: how wrong? ! ! T0 }7 X" L& n/ B9 _. J; y% s
white: You are not the forum to use my ID to play it? ! !
0 j4 B G; @/ n( {; ] M hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the ) P, P0 E$ @; N [: I
white: it does not work! ! !
; T7 _5 U( V. ?- b7 R ~ hacker: how should you like? ! h+ m+ r' H5 o% |9 S8 s6 `: p
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! + F4 C# s% ^- w* Q
9 V4 H" b3 l% |5 D( p7 `
hacker: Hey,ralph lauren pas cher, I did a lot of fun ' n& h: X& k9 S# V: _
white: what
7 p) f" a$ v/ Z( z* Y) I6 N hackers: I go to the forums posted the top ' u/ z0 e' c8 O @
white: This very common ah
\' x$ ^; `2 |( c0 ? Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
& Z- ^, E' ?" q: x white: Wow, very enjoyable, and I can never dare, will be blocked! 7 d3 C7 ^: ~5 P- P
Hackers: Yes, has been banned.
3 k& w4 A" g% k0 T- B* X white: this is also fun? ! $ ]9 w0 d' t1 J5 W' R1 R3 g) a
Hackers: Yes, ah, because I use your ID
2 d7 H& S, W( I" U white: you are pro?
& d8 s* W$ S0 T, t% e3 d/ p hackers: You can say it.
* k9 F. ~$ j7 i* i white: to what extent high?
' ^# x, t$ E( c hackers: ah, I am bored when their own
7 r, x) H: T: b2 s! L9 E) D3 q! z white black: Ah, this I will! " ^- O( I" {, w6 s2 q$ |$ j
hacker :#?%! You can? ! % T4 ] {: d$ }1 A% s; b6 A
white: Yes, ah, a black off it. . . . . 0 N$ M0 R- [) }$ G' K$ {
hackers: Go!
$ p5 W" Q' u h white: Ask your question + y" z6 y8 X- b
hacker: says
0 a ?; }% G; }1 r1 G" \ white: Besides me, you can also control other people's computers do ?
( S- I7 x+ M6 g: \2 Z6 g Hackers: Yes you can. . . .
9 U, I- C5 E3 y white: no networking is also OK?
. g6 H$ A+ q' J9 f7 o hackers:. . . . . . .
* N3 W9 Q2 }* g Z) j5 z white: You can remote control to open someone else's machine it?
) Q" q( s Z5 J: i hackers:. . . . . . . . ; @, a9 \- g% h* {
white: You can steal top-secret file it! ! ! 1 g# l0 e, b; s/ g N, }
hackers: I think you see more movies, go to sleep % }8 O7 H5 s }& u- J& y
white wash: my computer is broken
0 b# q R! b* w5 A: Z' E hackers:. . . . . . . Just checked, your computer no problem 4 P- p! x* e, H% [0 z1 |
white: that is, you bully me ) \' i. f) o! z. R
hackers: No ah
9 r& K2 T. _4 j; B4 P1 o white: You are! MP3 files are passed to my no images! 4 U% e0 M0 d. `% i- m
hackers: help ah ~~~~~~~
; ~$ A$ F! O* A6 O b2 J. s- y4 C' I. Q white: Ask a computer problems can you answer? 9 r( W: k7 r/ G6 [
Hackers: should be able to
/ y! P* O; `* l: S white: Which key on the keyboard the most handsome? 9 n9 v8 V6 L2 W1 Y+ b4 J
hackers:. . . . . . . Do not know
j( v" H: o0 v* T white: of course, \!
+ ?9 a4 x4 ^8 z& b0 [ hackers: halo ~ ~ ~ This is a computer problem? ! ! 9 x7 O0 f u" ~; Y9 X0 U
8 n0 h$ V$ Q& a white: ask you a computer problems you can answer?
+ i. [1 C3 y e' ~6 s hackers: If the problem is not your idiot % w4 m& \& e9 r# @) u
white: I am serious! ! You can operate my computer?
* {/ ^% _/ L0 t' \1 Q hackers: ah,juicy couture shop, yes
+ R( \% F# O: `; ~$ y: E/ J white: that problem, you can solve it
( T. Y! i9 x0 Z$ K E3 C hackers: Your question is, should not be difficult ;
( R3 z5 ^! ?2 O7 ]5 G6 Z: g; {, i+ F white: Great, my fans do not seem to turn up,nike air jordan, help me change it 1 z( V* t! t, [2 Q9 V2 c% w* ?
a hacker:. . . . I excused
: |* i: P8 e/ @+ i white: we see meet you?
1 S$ [. T2 D& l1 U$ M2 E4 }( l hackers:. . . . This, not so good, why should we see
0 c' \/ {" j- r8 n2 [ white: I want to see you are not the same and I would like to
?3 a/ i9 k1 U* P$ ~ Hacker: Oh, what you think? 0 s; ~0 r" n4 J8 e( f2 n9 B( T
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ; Z( g6 P1 J* X5 t7 C! R& f
hackers:. . . . You say that Spider-Man, boss!
! l9 T- K8 }+ Z* g# V6 L hackers: Kazakhstan woven ~ ~ ~
# [( a) Z0 v; k( _% W white: You called every day, is not very curious about me? ( m) I- o! V- U6 w+ p( B2 \0 X+ b; }
hackers: not curious, is the habit, easily came in
* d9 f% t. Y- r3 }( n4 z- ~! ~ white: Well, I have a good way to change your habit % J8 S3 V" c# G/ J- e
hacker :. . . . Oh? ! Any way $ b b, r# W' T# U! `. ~( _1 T$ o
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 8 [. x6 R5 ]1 [# ~
hackers: Genius ah! . . . . . You can also connect to it? . D4 [0 {. d6 ~7 {' z
white: to ah, and slowly the hymns!
4 X0 G, @/ ?4 ~4 b ^& S white: you every day into my computer, is not very curious about me? * L7 B. L$ f7 x# u1 D) K" y$ ^
hackers: No wonder, only used 2 A; o+ \1 |' E$ i8 U' V6 U, O6 f
white: no you're curious about the place? 5 ]2 p: G2 d' N
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
- J! Q2 C4 p0 M/ w ! g7 a/ V. t7 @9 ?
white: I would like to control your computer * H# d! M( Y" G' c$ |- h6 L7 R4 R8 x
Hackers: I will not have other people access my computer I will be mad / G4 g' Y4 ]' A+ W
white: This is not fair! ! " |" s# }8 e% f1 J+ }6 g
hackers: ah, well, you control the good of the 2 Y! _1 a/ f2 P% B" x1 _
white:. . . . But I will not. . . .
5 _0 t! `6 f7 e* C3 e1 o hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
" l& ?; i! \. o: S Hacker: I'm white ' {4 F, Y# S5 W* i- u+ v' t1 s
us again: This is probably the last time we met the
( ?) [5 c3 f U4 I; Z- U' A+ o Hacker: Oh? What happened? % F0 l% Y3 o3 O6 ~
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! , U: `1 K" P; P
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye
; X! H. E3 ~3 u white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
$ }' E5 @9 h7 ^ V8 o hackers:. . . . . . . . . . # Y: [$ |) @9 B# z
hackers: so late, and how not offline? 7 p7 b6 i! Z) a4 W
white: Oh, is the next, and I went to pull the power ) J- N5 d0 @: p7 A( N0 i4 N, F$ ?
hackers: Slow! You will not shut down?
/ ]& p( _1 ?, y0 p white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power # E7 i$ l/ Y# @5 ^# e" _
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
, B7 h- d) `# C. n" m, e1 C white:. . . . . . I press the power to the hackers call it % |( M3 C% `- Q+ t' ^( O
white: You are not really powerful 2 {8 a5 ]! i3 x) @# _! f8 f8 z
hackers: so-so friends
7 z/ n! T) G/ y$ p7 b/ w white: bragging! You have the ability to shut down my machine in the horse. 4 J" b2 B: O* x8 d6 y
hackers: this place is difficult! You wait
1 J* X5 n2 i" C6 J hackers: Haha, buttoned regret it . W7 q4 r* Z3 ^0 }; @) f
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . $ g- x/ G! I% m" o8 C
hackers: halo ~ ~ ~ ~ |
|