 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
& ~- ^; a0 B0 { white: how control? + n" j2 z: @$ W& e
hackers: white with a Trojan $ ?8 S* T' w. m
:. . . . . . Where? I did not see
1 a' N6 x9 C9 ]8 r. p; V hackers: Open your Task Manager # S, t: r W" n* }; O% ^& j
white:. . . . . . . Task Manager, where?
0 R7 ?7 A2 |+ k9 u+ L hackers:. . . . . Your computer below! ! + O* U; X8 r1 p% M% G( Q* B
white: \; & V% f0 _2 n, E, V! e
Hacker: I have control of your computer : ]6 I% X8 I- s A2 r! L
white: Oh . D6 v) z) }" k( j4 A
hackers: a funk? ! Hey $ E& s9 t( X# g7 z" e" q$ w
white: for the just, help me kill the virus it, many of the recent problems my Lord
; ]5 ?( M5 L5 w machine hackers:. . . . . .
% m% G& @3 k7 m/ V& r7 n( i0 |, ? U4 l# V# v, Z) e
white: how do you always in my computer and out of 3 I2 p9 d- \8 x5 I: P3 G
casual hackers: You can install a firewall
' m+ Y' z$ W# i0 L) U7 l white: install a firewall, you can not access it? 3 N) `$ {+ f: ?) b- g! P
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
: U9 L; ^, w4 S4 ?% U
9 ~' L( _! v- i% @# X' e* u! q, i6 G small White: I heard that you will create a \! $ h1 v4 f7 W, t8 K% s
hackers: ah
$ @' i _* t* F8 F; }% d: E- J white: you can control someone else's computer? !
+ `9 Q- j( r9 W+ G: d3 ] hackers: General is the # q6 S- d6 K8 m# K8 ~# ]$ L. x1 _
white: you can black out those sites?
4 t6 C) _" N, P0 E: [7 T* e hackers: of course, did not hear people call me a \
. t% q+ b0 O2 W1 _/ h, F4 ` white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . - e# a; H; @& r# \, m% _7 I! X; O- ]
\!
# f6 b7 O+ n! x& P# v- C1 g7 u white: every day you come in, do not feel tired of it?
' T2 R4 Z! l4 J8 X hacker: is a pain, your machine is the worst I've ever seen in one of the # O3 s; W4 Z0 g& o7 B1 i6 p
white: is not it, this is Brand 9 G- j, s' {" K1 }, }
Hackers: I was mentally retarded in addition to your yard game machine only virus a 3 [; Y, [8 z4 M' [5 e! Q2 P
white: Oh ~ ~ that you see me The \. . . . Goodbye ; @2 z7 ^' z# {
% u- I$ T' `8 D+ z hacker: Hey ~ ~ ~ I come! A( O: a" Q/ t- N, R
white: not seen you for days, was my firewall blocking you?
0 @% y6 c& o% @- P) x hackers: Haha, jokes, on your machine is easier than my own, not you miss me . w7 O Y' P+ b1 w. x& J
white: I want to Please help a busy
) t4 h7 n: X) ^* H: X hacker: What?
) T6 b. M- O+ n3 w, @7 [& E white: you can not modify the point into the power system data
. K5 R0 a _- N1 }' E hackers:. . . . . . Why do you want to! !
. F9 R$ x7 K" X. l! f white: Please, help me to my house this month, the electricity consumption of the bar. . . . . .
( O+ R! v! N$ K hackers: die! ! 9 P1 I8 P# @4 u) A& r- j
$ s! _4 x" K8 l( f7 S
hacker: you die Where is? ! ! ! # `/ i* m1 X: R1 W3 E- _) Z
white:. . . . Go out and play for a few days, ah, come to me why % u& l0 n: X* j. G) E9 y
Hacker: I'm looking for something
# G J+ n- m! l3 Q8 ?0 `; c6 A white: what I find here?
8 W* c5 x+ C' y1 X2 ^+ f hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
9 L/ M7 e0 _. `" ~& K6 N 6 _( e/ \) \) o$ }) L
most hackers : I come! !
) k2 e# D4 C3 I k. a. . . . . .
+ \+ q1 O1 o8 _/ W0 P hacker: how not to speak? 1 ~) [2 Z# p4 b7 R# Q% j
white: a bad mood
* r/ b6 j: e, R hackers: Who bullied you?
# D& j& A) x. c0 X5 ~7 r white: a Q No. I have not lost inside of my first love
! o. U" W# A! z4 k0 e) Q; F Internet hackers: this simple, I get it for you
/ U1 O, \, D9 ^6 k" p4 N white: do not get back
& G$ `# H( Q j. w; M hackers: No, tell me what number?
- V L) H) h6 Q0 J+ y& C white: Woo ~ ~ ~ ~ just do not remember ; L3 S3 B, u* z* A
8 ]# B. `" H# W9 h. G" X white: you gave me out! ! ! !
; i' `/ W2 ]+ _+ l: Y hacker: how wrong? !
7 i7 d% B' s$ H: r% G0 _4 H) V white: You are not the forum to use my ID to play it? ! !
) B P9 f0 q9 d# Q% H! t4 Y0 F hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 6 R. j3 s; U. Q& B3 R
white: it does not work! ! ! " m9 k: K4 Z- t3 o! s
hacker: how should you like?
0 F* n. V, @ s9 U white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
2 }( l( A! Y; B1 h4 `1 y0 ^' z
' O2 r' T5 g* h; |: L' K hacker: Hey,ralph lauren pas cher, I did a lot of fun 2 @! O3 m8 i- ]6 Y9 w) `4 A
white: what # ^: ^$ W1 C7 o7 \; T9 d
hackers: I go to the forums posted the top
5 d) T% g% _( S- `! m white: This very common ah
: ^/ y. L- \; D: [; n X Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
1 k4 h: \- l I4 q) v white: Wow, very enjoyable, and I can never dare, will be blocked!
# a9 A7 s* J+ H* r! e, y9 @' x Hackers: Yes, has been banned. / k3 d5 N: w+ E2 E5 s
white: this is also fun? !
4 ^4 B% A0 a- z$ e9 f# |# f# [/ ~: g" i Hackers: Yes, ah, because I use your ID " x3 }' E( r6 S/ _
white: you are pro? 8 U" {6 q! {1 ?4 ~/ i
hackers: You can say it.
$ `& a0 A7 h& v9 C6 [ white: to what extent high?
8 H4 s a- y8 D. ^' t% ~ hackers: ah, I am bored when their own
2 G7 l/ R% B0 b" w* w/ g/ j( x white black: Ah, this I will!
+ f2 y7 g4 D1 ^' j% X hacker :#?%! You can? ! 3 [( g4 D$ c! t. S' W4 P
white: Yes, ah, a black off it. . . . . 5 y/ _1 U. S/ f/ I; W5 g5 G- `
hackers: Go!
9 b* z- [$ Y$ {) O$ o white: Ask your question
w& i q; S' l% D( c hacker: says 0 W9 ]6 Y; t$ p0 o. U7 F8 I! w1 K
white: Besides me, you can also control other people's computers do ? ' [& o- X! F# B
Hackers: Yes you can. . . . 7 X) _! _( e' m- E
white: no networking is also OK?
& X! [' T/ L# k# v6 e4 I9 Z hackers:. . . . . . .
. I0 h# a) e1 j1 B2 ]6 Y( Y white: You can remote control to open someone else's machine it?
! G6 W, ^6 ?$ H9 c hackers:. . . . . . . .
9 Y" U0 | {* \# W! D9 d white: You can steal top-secret file it! ! !
1 \2 V5 R0 j& Z: q. k hackers: I think you see more movies, go to sleep 4 n% N, h" q, [1 \5 d/ m
white wash: my computer is broken & A2 C4 U( k+ }. w- L; l
hackers:. . . . . . . Just checked, your computer no problem ) @' e3 S6 D9 I4 l3 [5 j Y; U
white: that is, you bully me
' j0 ^) k6 _1 _: o& `7 s) c hackers: No ah
7 i! u/ O/ E/ [$ X$ Q white: You are! MP3 files are passed to my no images!
; _' i/ ^; W' M8 ? hackers: help ah ~~~~~~~
, R, A! o3 n# R% B1 R4 a* h o1 s white: Ask a computer problems can you answer? ( i4 z9 k! y# W ~: Z
Hackers: should be able to
$ c. |+ ]; C# O) ~, H, }2 Z white: Which key on the keyboard the most handsome? 0 L. M$ V- }" l9 x& ^! B) `
hackers:. . . . . . . Do not know $ i, ?" u0 _$ m* L
white: of course, \! % I/ H& X \4 @3 d4 A
hackers: halo ~ ~ ~ This is a computer problem? ! ! * S$ o' Y) f( ^
4 G* y8 `7 [+ t6 J4 Q3 |
white: ask you a computer problems you can answer?
% b# t j9 ?1 h hackers: If the problem is not your idiot & i" P( d( R" l1 G! C/ O+ z7 U/ ]( `
white: I am serious! ! You can operate my computer? ; z3 m- D( w1 d8 `- p$ g
hackers: ah,juicy couture shop, yes
& L8 R* G6 R" I white: that problem, you can solve it
. ]. x* c u. Z( C6 E: d- s0 ~ hackers: Your question is, should not be difficult ;
9 Z! j% G$ m9 ^7 q) \4 h white: Great, my fans do not seem to turn up,nike air jordan, help me change it / f, b% W, Z% W7 w3 S: x& W- [
a hacker:. . . . I excused
. }$ O: [# ~: V& b white: we see meet you? * V6 x5 z9 J: P- |
hackers:. . . . This, not so good, why should we see
: \' ? u( V& ?8 q) L" T white: I want to see you are not the same and I would like to 8 F; s; a% M) Y6 V. j
Hacker: Oh, what you think? 5 E' c; [% r8 P6 r
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights / ^( P; G$ j3 w( V$ G
hackers:. . . . You say that Spider-Man, boss!
6 P7 C! P) }1 J# ~) Y) H* B hackers: Kazakhstan woven ~ ~ ~ # ?& X- b" n% ^! \9 a% Y
white: You called every day, is not very curious about me? ' ^. M0 ?# J- P6 |
hackers: not curious, is the habit, easily came in ) {+ D9 {7 {4 } a4 d! O W
white: Well, I have a good way to change your habit 5 b& P, a/ h9 a* q% s
hacker :. . . . Oh? ! Any way % C9 f1 Q& ~$ `& [. I0 s3 d8 \
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ ! W+ w* \' D& h/ X' C
hackers: Genius ah! . . . . . You can also connect to it? . I4 [8 t( o0 a8 S! g" |0 e. R* Z
white: to ah, and slowly the hymns! 5 E4 _1 j( |$ o1 z) @
white: you every day into my computer, is not very curious about me?
% n! _4 k) S6 P! I) j5 { hackers: No wonder, only used 7 s6 `: o+ o0 h) P
white: no you're curious about the place? 0 @6 z# a4 ~5 ^' k, Q- H, \
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
; I/ l2 D7 S! Y" I7 S
+ S6 K9 P# j/ X' F( G/ e+ {( w white: I would like to control your computer
5 L( K& ~3 e4 Q- H1 d Hackers: I will not have other people access my computer I will be mad ; u8 U2 {6 @0 g* g7 L# L: n: Y
white: This is not fair! ! ' i( G% j6 U: _2 u
hackers: ah, well, you control the good of the
7 `$ X) L4 U: `7 W* I3 s white:. . . . But I will not. . . . " k' I: J- m+ Y% A% @$ c* P
hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! ! B1 _& @6 g, v' w
Hacker: I'm white
/ ^ J T J' y; G# a us again: This is probably the last time we met the
" S" t# c5 k% Y3 |0 m- L/ A Hacker: Oh? What happened?
E4 S6 ~: R; P( E6 Y" P white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ! u5 h( m7 X5 _
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 2 V0 O; _: w* U+ ]- q: z) T$ q: W
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! # C6 D+ q0 {7 N! G( g
hackers:. . . . . . . . . . ! S8 D: U# @- j5 O/ Y6 b
hackers: so late, and how not offline? / R2 _+ x7 J5 n% ?& j3 m, W ^
white: Oh, is the next, and I went to pull the power . Z: u- P( l# i f3 X; M
hackers: Slow! You will not shut down? + H! `* o' U/ O' c
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
6 [; L$ M: \8 w. i5 [# y0 Y hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \
( l; O, M4 `( j white:. . . . . . I press the power to the hackers call it # j) R: R- s" X6 c
white: You are not really powerful
! a# e' \7 R j8 Y, U3 o/ v hackers: so-so friends
, w+ J7 ]& H: K5 ^ white: bragging! You have the ability to shut down my machine in the horse. ( h* q# j* C$ E u
hackers: this place is difficult! You wait
) P( J5 Z0 K( _- H: L' h8 H* E hackers: Haha, buttoned regret it 4 a/ @0 p8 O* Z Q# G$ v# x
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . - U7 q% w% f0 q+ g
hackers: halo ~ ~ ~ ~ |
|