 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer 5 {% B0 d! O/ M% g D: k) A
white: how control?
9 y3 p7 P0 F/ l0 y: l hackers: white with a Trojan : ]1 M& X, a/ D* `& \8 m( r% q# C1 W
:. . . . . . Where? I did not see ; S" p7 \' \' }5 I9 }1 T, v
hackers: Open your Task Manager ) S! {) ?4 n! J& ^
white:. . . . . . . Task Manager, where?
- ?5 e* n/ E9 ~$ c9 I hackers:. . . . . Your computer below! ! 5 F- S3 x/ G& {" S( s
white: \; 0 n: v5 ~& p0 r4 U2 }; L) z
Hacker: I have control of your computer
# B8 y0 H$ l! Z2 E: y white: Oh
' r: }9 U# V' y: A9 e: F: ? hackers: a funk? ! Hey ! a8 C ?4 V- B
white: for the just, help me kill the virus it, many of the recent problems my Lord ) g* X/ e& w; C. O) K5 c
machine hackers:. . . . . . , I# Y; K# L0 E2 H2 i9 l9 b
' Q! W% m4 ?. W* ~9 D5 D- G white: how do you always in my computer and out of $ P: u# P& \: m! p J
casual hackers: You can install a firewall
" F, a5 i* J2 { white: install a firewall, you can not access it? 6 s) d- h2 O Z7 J% j+ r
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah 3 t# @( ] Q; l
: f, K- [7 W1 Q& I$ } small White: I heard that you will create a \! ( |( [: K. A8 Y+ t* R
hackers: ah 5 q, I1 ?3 H& Q' _
white: you can control someone else's computer? ! - A2 h, w6 ?. z0 d0 }
hackers: General is the % H' R# a0 j( y$ l* l8 V/ l
white: you can black out those sites?
& e, g4 V' Y" @6 I# V# R hackers: of course, did not hear people call me a \+ M* [9 [9 B1 H: K. y% Q/ M! s8 e' S
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
2 I0 @7 w% y# ?& I \!
# S4 x' V% a" Y white: every day you come in, do not feel tired of it?
+ |) P# g i( Y, d2 `; M hacker: is a pain, your machine is the worst I've ever seen in one of the
/ _3 s! l+ ]5 O; H4 j& j$ Q# R1 d white: is not it, this is Brand
) }, @4 b- D' }& ~7 Q Hackers: I was mentally retarded in addition to your yard game machine only virus a ! ? Q" S) `4 Y
white: Oh ~ ~ that you see me The \. . . . Goodbye
1 k: X4 S" X( c4 M3 u* D , r' e8 n6 N Y5 t% S7 i
hacker: Hey ~ ~ ~ I come! 9 Y% k2 ^" d8 F _- {2 ^, t7 k. N
white: not seen you for days, was my firewall blocking you?
}5 q1 z4 N' ^+ Q1 n( ^ hackers: Haha, jokes, on your machine is easier than my own, not you miss me
2 m0 a, e+ Q# ^5 A( \- I white: I want to Please help a busy
' W. V0 S9 s# f4 N hacker: What? ' V( Z ]( ^3 P9 P: U
white: you can not modify the point into the power system data ' x1 W/ Q) F0 i3 N, v
hackers:. . . . . . Why do you want to! ! # s* v# c/ K5 W3 ~: L& _. A, c
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 2 m: y/ j4 Z2 X3 A C6 z
hackers: die! ! , C' e( n" N# N6 E; E$ k: C3 b
# { K: l2 u' b; l0 d# s- ~
hacker: you die Where is? ! ! !
c% u" f/ v) W! z' ^ white:. . . . Go out and play for a few days, ah, come to me why
. w, ?( A* b) p9 Z Hacker: I'm looking for something 4 O y4 u- e& \
white: what I find here?
3 ~+ _# d% t8 I hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights / r4 ^; F# Q% D/ A
! H7 |% j- e3 l) i* Q/ w
most hackers : I come! ! , X& V% E6 r6 t" w' j
. . . . . . 3 X$ |$ R `9 R
hacker: how not to speak? 9 ?( h# ?+ W4 c! o: a
white: a bad mood
% k3 Y9 R/ v' p8 E8 Q hackers: Who bullied you?
2 u4 m1 \* s! g0 m( ~2 X white: a Q No. I have not lost inside of my first love / d) v7 n( X# ^1 ]& A
Internet hackers: this simple, I get it for you
' O' E- M+ Z! M* Y2 b white: do not get back , e5 p( r0 S: w4 C F2 a0 v; `7 n7 d
hackers: No, tell me what number? / r1 I/ g a: m- E* V' A; T
white: Woo ~ ~ ~ ~ just do not remember
# d0 L1 Y, o$ b e% h1 e e0 P: T9 l# v' ?! q* I7 |& S
white: you gave me out! ! ! !
& I8 M; p& F, y% c& X hacker: how wrong? !
1 Q; @% _, ]9 t' O5 |# o1 d4 O white: You are not the forum to use my ID to play it? ! ! / T; t! Y4 u0 L( F8 i1 f; G L
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
+ Q1 g8 X/ b* D% W white: it does not work! ! !
/ d+ u' l7 l/ `! A* ^3 l hacker: how should you like? , _$ n, h- c9 q5 }
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! * S9 p. @. E# V8 \, \2 @
$ Q" M7 N5 K8 p8 i% M- i1 {+ V hacker: Hey,ralph lauren pas cher, I did a lot of fun ( ?" K3 P/ t2 E+ a0 ?0 R
white: what $ |: ~- D. X9 h6 q! I) @/ v
hackers: I go to the forums posted the top 8 j3 ?# `# H4 q; G# Z6 |2 Y3 o
white: This very common ah
0 E! u' @# e) ?( f Z* H) k Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
: h# r' Z$ A8 B7 k! u: f3 p- | white: Wow, very enjoyable, and I can never dare, will be blocked!
' C/ N0 v6 }. ?, _, `, a& \; G/ j8 @4 z Hackers: Yes, has been banned.
7 c9 @3 z- ~$ }7 a white: this is also fun? !
% L2 ^) z" @4 W4 ~ Hackers: Yes, ah, because I use your ID 3 k% i+ W3 ?+ e5 P' g3 i5 {6 L0 V3 o
white: you are pro?
! X) p6 N0 _% c/ w' T; y hackers: You can say it. + q1 O+ o" t0 R" M2 G0 B
white: to what extent high?
8 q* @! q9 y x$ q4 s hackers: ah, I am bored when their own
3 H3 j' d+ ?( R& S- T white black: Ah, this I will!
/ [( i' y ^7 F' e: E4 m b hacker :#?%! You can? !
! G- D# w6 |7 R& } white: Yes, ah, a black off it. . . . . # C$ j+ t6 z! U+ O% j
hackers: Go!
# j/ d8 z" ~" B* M: v white: Ask your question : q) w. |* ?5 g
hacker: says - Y" e" K4 Z H1 O; d- g
white: Besides me, you can also control other people's computers do ?
/ Y" Z5 [" ]1 l+ b Hackers: Yes you can. . . . 1 p9 e. K# j' F2 U7 ]
white: no networking is also OK? 5 R3 F+ w+ c( X3 V) _9 X
hackers:. . . . . . .
q# o- N% y! I8 | white: You can remote control to open someone else's machine it? & _5 k/ D0 \, Q" I/ C8 G9 W6 h
hackers:. . . . . . . .
9 D- F9 e" [% m6 S+ j- g* b white: You can steal top-secret file it! ! !
' j! ?$ y1 W- }2 i hackers: I think you see more movies, go to sleep
( G1 ~3 |; V2 y o% I white wash: my computer is broken
~0 @; f; V0 c7 K3 _9 } hackers:. . . . . . . Just checked, your computer no problem 5 A) M5 M8 S- z2 x0 j7 N- w
white: that is, you bully me
$ B4 d8 x% X7 p) L, R hackers: No ah 5 Y- c1 o9 |2 d. C! e: C
white: You are! MP3 files are passed to my no images!
2 X0 g2 C% |9 a. E hackers: help ah ~~~~~~~
: P+ x, b. M& o! D8 P7 T% K white: Ask a computer problems can you answer? - u0 S1 ^( M, e r
Hackers: should be able to
( T: }: g0 a( P6 _1 J white: Which key on the keyboard the most handsome?
, x! M/ k( x( R' \/ {3 { hackers:. . . . . . . Do not know - O1 E6 k3 r/ j; S% B- v
white: of course, \!
+ G2 S( v& {4 A3 f+ W hackers: halo ~ ~ ~ This is a computer problem? ! ! ! H% k; m+ I, {7 N6 u4 X
: v- v6 g$ e+ w: U! F white: ask you a computer problems you can answer?
5 u' g Y/ U5 t( m j, n0 t hackers: If the problem is not your idiot
. L6 \- C2 n, j' W! l+ C# n8 Q- h white: I am serious! ! You can operate my computer? ; c7 x* H. H/ m: l& ?9 X$ A
hackers: ah,juicy couture shop, yes * v# k' @- a7 [! j: H
white: that problem, you can solve it
2 O; [- ~. y* K7 W, P, ]8 O hackers: Your question is, should not be difficult ; . B( @" E/ X7 g9 D
white: Great, my fans do not seem to turn up,nike air jordan, help me change it
' j' P7 s1 G4 X& n4 Z! E. \ a hacker:. . . . I excused + i4 C3 T* X' t) o. c3 {6 [: V
white: we see meet you? # e9 w: D: J( J8 T% T" T; J. e* l
hackers:. . . . This, not so good, why should we see % g8 c( m$ D6 H0 U/ {
white: I want to see you are not the same and I would like to 4 ?% I8 M3 B, [+ N' T+ q
Hacker: Oh, what you think? % h; z3 [, D# c8 r
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights ( v9 N4 K2 V9 w8 ~/ A/ [6 Z
hackers:. . . . You say that Spider-Man, boss!
9 I# P( U5 n* f- G hackers: Kazakhstan woven ~ ~ ~ . s7 h3 P" N& N1 x* I9 `0 B
white: You called every day, is not very curious about me? 2 [1 ~1 {& V/ U' f* I
hackers: not curious, is the habit, easily came in
l& k( Q) R0 }* R, F0 A white: Well, I have a good way to change your habit , _0 F% c5 g# I+ `7 t$ G! \
hacker :. . . . Oh? ! Any way
3 H4 `& }, Y- O- P# b7 ? s$ I white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ 4 y* ~: W6 }/ O
hackers: Genius ah! . . . . . You can also connect to it?
. l9 F+ {$ S9 | white: to ah, and slowly the hymns! 1 U3 d8 K& l0 _3 _3 G9 ^' [& M
white: you every day into my computer, is not very curious about me? 0 ] C2 M8 S1 }' t5 P
hackers: No wonder, only used ( {" `0 E- D% C1 u0 j; @: k* a \
white: no you're curious about the place? " r, @2 H2 O; H6 U2 s; V, a+ m
hackers: a ah, I always wanted to know your machine so much as when the virus crashes ; `6 }0 Y" }; T3 }/ c- ]) f) n/ r
& I$ x7 w0 o8 S( ]) i
white: I would like to control your computer
3 f( ]* g. A c5 ^ Hackers: I will not have other people access my computer I will be mad
1 S. J: }' v+ V+ n! w white: This is not fair! !
' f% \ X7 H5 V# Z$ X# s" @ hackers: ah, well, you control the good of the + [' `+ [) R& b2 M$ J L
white:. . . . But I will not. . . .
/ ~2 ^8 x4 H: S* M& \( n9 _ hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! 6 N- f6 m7 a7 K: j4 f# R: o$ Q
Hacker: I'm white 0 w& U+ x4 E: ?1 I7 h( k
us again: This is probably the last time we met the
* v8 H7 @+ B: H. r9 t( o) { Hacker: Oh? What happened?
' A; P! r8 J y white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ( y1 \2 H& `9 n3 F9 P* }& I. Y! P
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 1 z, |6 }5 }4 N; z7 m5 @0 [
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! 5 [5 e" L* K+ H" l" R9 l0 C
hackers:. . . . . . . . . . & k4 @& S1 Y# Y- g
hackers: so late, and how not offline? ! e$ @, H; W1 N3 Y
white: Oh, is the next, and I went to pull the power
4 H+ U( k* U1 v) K! \% P6 f hackers: Slow! You will not shut down? + z4 |; B% Q) @ h
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
: d& e Y# E1 _* ^: ]- Z hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
+ e: w2 u' n+ W, g# W4 @ white:. . . . . . I press the power to the hackers call it
z/ X2 G6 a6 L( { white: You are not really powerful + _ r8 o7 W- C+ @( y p" V
hackers: so-so friends 5 W# {, x+ k _6 }" R5 P
white: bragging! You have the ability to shut down my machine in the horse.
. F6 K1 ]2 K" ?+ _ hackers: this place is difficult! You wait 7 N8 {1 `8 R1 A7 p
hackers: Haha, buttoned regret it
! K6 H& ^+ J! G! ? white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . 6 h4 ?! |; b$ S
hackers: halo ~ ~ ~ ~ |
|