 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer # @4 S! f9 q$ s* J, o! U
white: how control? / a( O s9 O' J: p# H9 }
hackers: white with a Trojan
/ |: T3 z! ] X; g2 E# N3 ~' e:. . . . . . Where? I did not see
7 ]% u% t: j. ^3 Y) [) K hackers: Open your Task Manager 5 A% W* V, M; X3 J/ \5 w7 @/ ?/ y: o
white:. . . . . . . Task Manager, where?
( f( G" g1 G+ m3 a" }# x! i hackers:. . . . . Your computer below! !
6 x0 l. I. ?2 S! Q6 o3 Z. S3 B, d white: \;
# _; z3 z3 ~ A: Q Hacker: I have control of your computer + j( h. i. {, T. G9 y% ?
white: Oh 8 t" \" b& j# w4 O6 P. c
hackers: a funk? ! Hey ( B3 Q( I4 m5 s" t
white: for the just, help me kill the virus it, many of the recent problems my Lord / o. G/ Q9 g5 a' f
machine hackers:. . . . . . 9 K& f6 U* k! q) z
: [3 n Q, T/ j; w. Q( c white: how do you always in my computer and out of 5 X- v( q9 ? O# e1 f+ X
casual hackers: You can install a firewall
0 Z, h u8 F' J% f white: install a firewall, you can not access it? 7 D' @ p; U" T1 Y! x' I* u; `
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah : S( O; ~. u1 } s7 g5 V9 C: y) }, O. u
S, T& X9 U) W% L small White: I heard that you will create a \!
: p7 p* u1 K" N9 | hackers: ah 7 l% j* b0 C; y* H: _: [
white: you can control someone else's computer? ! 7 T7 ~% H6 O3 n
hackers: General is the & s& ^+ q T( f4 Y8 x! H" G( q
white: you can black out those sites? * |* l- N. v+ {; y2 `
hackers: of course, did not hear people call me a \: T& x1 T/ ?0 N3 W* K/ R
white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . .
0 ^$ p" Y1 k* W5 A2 p, U! F8 c \!
) ^( Z; b: K/ m! j c white: every day you come in, do not feel tired of it?
* e* x; M) B. Z" O+ E% R6 W hacker: is a pain, your machine is the worst I've ever seen in one of the
v* t8 E4 k& L. e white: is not it, this is Brand
% ]0 C0 a) z6 ~, Y$ u/ D& E Hackers: I was mentally retarded in addition to your yard game machine only virus a
8 T3 \8 y3 `( q) x& v; r$ G, U white: Oh ~ ~ that you see me The \. . . . Goodbye , q1 A0 g* w1 [, E1 |3 W: i
( h/ R! S# |" `0 z1 Y' A) x
hacker: Hey ~ ~ ~ I come!
8 q2 w/ t4 c5 N! z- j white: not seen you for days, was my firewall blocking you?
! V; Z& D. v9 h* ]# h9 A hackers: Haha, jokes, on your machine is easier than my own, not you miss me
. _8 r. L7 V! ^3 d8 |6 M' Y x1 J G# E white: I want to Please help a busy
6 t6 x( @ v8 L5 I# i9 |' [ q hacker: What? 5 a% T# r$ X; A+ L. z& T
white: you can not modify the point into the power system data
" x5 u- O( W8 g" v7 \+ w hackers:. . . . . . Why do you want to! !
8 ^7 [% r; W; ]6 v2 K4 {# M, f white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . 5 ~$ n/ e& ~3 S# U; b6 p2 k' V
hackers: die! ! + C. F; c+ Z6 a' p
: s/ c: ?- }2 B- R2 R' i- U hacker: you die Where is? ! ! !
C2 o. G L Q8 n* O V* E/ G white:. . . . Go out and play for a few days, ah, come to me why ' A5 }0 M" Z, q; ] K1 x; {$ b
Hacker: I'm looking for something & m8 g' n" m' Q4 y0 S! \
white: what I find here? 8 d* l9 |/ F5 n! i) ^
hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
% n" h* Z1 A9 F) _
, r. w6 d% I/ |" B( Y most hackers : I come! ! % I8 f; F; H/ u* @ A
. . . . . . " {) o! y7 s- B8 \
hacker: how not to speak?
! L5 L4 I. |* Z% S- i1 ^ white: a bad mood $ s+ U0 e" A+ g+ f- i8 j
hackers: Who bullied you? 7 X( k/ Q [% h+ ^
white: a Q No. I have not lost inside of my first love
! |: o6 ], n8 C2 Q& C( C. d0 w4 j Internet hackers: this simple, I get it for you
[8 Q$ |" v" ^+ d | white: do not get back 2 V" \$ D- B+ s8 s
hackers: No, tell me what number?
7 l j# h* G) k& x, ? v: V white: Woo ~ ~ ~ ~ just do not remember
- m: n8 o K2 N! h: Z+ _" W3 r
' w% [! H% }5 u+ Z0 x% T: M white: you gave me out! ! ! ! + J1 v( |) O4 Q0 o$ M: `
hacker: how wrong? ! ( t( F2 q1 U0 \
white: You are not the forum to use my ID to play it? ! !
, e. [, m/ w, ?7 e5 y hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
" R) W. D0 G4 u5 U( C1 k white: it does not work! ! ! - W5 f' l- W% m" k9 O. L! K! ~3 }
hacker: how should you like?
. ^$ q6 l/ _( c2 s o3 k7 ~ white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
. C- j! g% ~- `) i* s 6 [. q" R& }" Z4 G! i
hacker: Hey,ralph lauren pas cher, I did a lot of fun
4 \3 o5 G! r, s! R3 O9 f white: what ' S; e3 q' u3 @5 c+ _, r" T) u/ [
hackers: I go to the forums posted the top * X2 t m+ e1 T n0 U9 S1 K
white: This very common ah 1 e9 `- ]0 ]: q# E
Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent 5 q Q) {2 J1 H
white: Wow, very enjoyable, and I can never dare, will be blocked!
" ~( l. r% ^4 Y, u# r- G Hackers: Yes, has been banned. ) m, Z4 P* e! r: A8 W, S
white: this is also fun? ! . F6 k N5 h: O' |/ n
Hackers: Yes, ah, because I use your ID
( x/ C7 O1 u, O, ^ white: you are pro? ' o, F" j. V7 v/ W! q
hackers: You can say it. . n$ p# j) ? m6 }5 L; ]
white: to what extent high? 9 W& K; W, @0 k# W# F$ u
hackers: ah, I am bored when their own
. Y- o8 n9 g9 v9 h white black: Ah, this I will!
7 r7 z# g6 h5 _' e( D, j% E hacker :#?%! You can? !
) z; h7 ?. }( m, ?& |3 C) r white: Yes, ah, a black off it. . . . .
- z, ?' Z) R; } c4 U. H hackers: Go! 9 ]6 m1 {" y- b1 K4 D. x. d `
white: Ask your question / s( g& B/ D) z" S( X' H
hacker: says 2 I0 L" J; O8 U; q' b
white: Besides me, you can also control other people's computers do ? . h" Y8 h3 I( A2 l
Hackers: Yes you can. . . .
( b: g. _; I& f white: no networking is also OK? ( w! j) h/ f: O$ d' t( M: ~, ^
hackers:. . . . . . .
+ d( S0 @! r! C% z: F white: You can remote control to open someone else's machine it?
, _: I9 S7 T2 d9 B9 M1 } hackers:. . . . . . . . 7 i: p$ E" N3 Q2 B9 a
white: You can steal top-secret file it! ! ! / w) s: D x' c, a6 ]$ e0 q
hackers: I think you see more movies, go to sleep
+ z: j7 [+ ^; W" S! C' ~ white wash: my computer is broken / u. n$ F. W: y
hackers:. . . . . . . Just checked, your computer no problem
3 V9 _% o U6 t) O white: that is, you bully me $ h3 e" \ c3 G1 _6 |9 }! H
hackers: No ah ; h* P& {% D( P3 X% H* d; Z
white: You are! MP3 files are passed to my no images!
Q" ~2 n# d% R" u7 [* X+ \ hackers: help ah ~~~~~~~ 5 U8 }2 z+ v' v, F1 C5 j+ w4 H
white: Ask a computer problems can you answer?
: F* R. ^* r2 t9 X Hackers: should be able to
. L2 R7 e9 A8 U4 A& |! {" @ white: Which key on the keyboard the most handsome? 3 l% }" {0 C" m2 o
hackers:. . . . . . . Do not know 6 @+ p5 n! Z# @
white: of course, \!
& F9 H* L) E% l- m3 ^: u hackers: halo ~ ~ ~ This is a computer problem? ! ! 9 n& E5 `; m) t6 O; _3 J
; I' O* w' s* a# [; ~( ?
white: ask you a computer problems you can answer?
) O5 E$ l- L- b6 i. a/ n% F hackers: If the problem is not your idiot
+ ]8 w/ t' l$ }; q1 U white: I am serious! ! You can operate my computer?
5 l z2 q5 y9 ?7 o! B7 U- T hackers: ah,juicy couture shop, yes & X0 ?5 h% x4 D6 d' p$ z; ^" n
white: that problem, you can solve it . ]3 k) m1 F- I; _' {& c% I
hackers: Your question is, should not be difficult ;
9 f+ `& e; a' }. J0 _: v, L4 z white: Great, my fans do not seem to turn up,nike air jordan, help me change it
6 R& F9 B4 r: B( Y- x a hacker:. . . . I excused 8 {) ?; o _5 }3 E# L2 t( b/ _3 o/ s1 L9 o
white: we see meet you? ' _; B: i* q' j" Z' |; k1 \, n
hackers:. . . . This, not so good, why should we see 5 x% h* ?3 ^$ A/ z7 ?2 E! w" R
white: I want to see you are not the same and I would like to $ b5 E% i/ e% d4 w3 r, u
Hacker: Oh, what you think? : J7 I+ L! a! V8 s
white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
$ f/ R) q( W/ w c& F hackers:. . . . You say that Spider-Man, boss! : y/ V3 Q! [, O# i2 j3 d: h+ x( c
hackers: Kazakhstan woven ~ ~ ~ ; n* e- Y$ K+ Y; x7 Y: l* @! k
white: You called every day, is not very curious about me?
. b* t9 o2 C$ Y ?' M hackers: not curious, is the habit, easily came in
. L/ x( z6 h) c6 z( |% \ o white: Well, I have a good way to change your habit
) w$ w* L. T: k, q hacker :. . . . Oh? ! Any way
2 K% l# n# ^1 T9 Z white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~ , P" e) Q! C; P9 ~( a1 Y
hackers: Genius ah! . . . . . You can also connect to it?
. O- z e$ }" F/ B3 _: I white: to ah, and slowly the hymns!
* I% o; f' N; W* I white: you every day into my computer, is not very curious about me?
% E4 j1 ^* ]; c. J: Y; k5 J: } R hackers: No wonder, only used 2 o: O9 j, o, C7 z0 N
white: no you're curious about the place? - q* e1 x! X; M; P% j- V
hackers: a ah, I always wanted to know your machine so much as when the virus crashes ' g1 V$ g( \, x, q9 x
- U, P* o' A* Y+ m& T! R
white: I would like to control your computer & k3 i; ]( l# E) ?9 ]* m$ P! ~
Hackers: I will not have other people access my computer I will be mad 1 Z: V" a' {! m) ~
white: This is not fair! !
\) H4 n. m1 {+ J hackers: ah, well, you control the good of the
+ x6 U: C$ c7 L' W2 j white:. . . . But I will not. . . .
: E! E; J% J2 w+ e+ p8 Y$ x3 Q9 R hackers: Ta-ta ~ ~ ~ why I agree with ah! ! !
( V3 O A( z8 A5 b# I Hacker: I'm white 8 K0 z8 T$ E8 ^7 R/ W( _
us again: This is probably the last time we met the
3 d# o3 m# Y0 l' T& n9 L Hacker: Oh? What happened?
+ D& y! \6 L3 N7 J white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in! ) b8 p. y1 l, b' O2 S0 J
hackers: You are so tired of me. . . . . Well, since I do not come, goodbye - ]- \: V' ?1 Y2 V# [/ b; T
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
: Y: H/ A8 j* E8 u0 _0 C2 d hackers:. . . . . . . . . . " V; V. T, h8 T0 o7 `: ?
hackers: so late, and how not offline? $ q) G7 b7 Z. ?! V9 @
white: Oh, is the next, and I went to pull the power ! }+ e& y% u- E
hackers: Slow! You will not shut down? * K- f5 R* d9 S
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power
) g- H! G. o9 h) T; f* L0 v/ D4 ^ hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \: [5 O4 J7 D' x- {# ~5 Q- B# i
white:. . . . . . I press the power to the hackers call it
$ E: H: V, H( @* `$ @3 J white: You are not really powerful
, r+ n* T8 m5 K) D8 ^8 I3 W. ]3 | hackers: so-so friends 3 J7 V+ P* \1 V' ~# e/ X* y
white: bragging! You have the ability to shut down my machine in the horse.
7 p2 N/ R3 W9 u% N3 @ hackers: this place is difficult! You wait , a- C* x, |" c: k
hackers: Haha, buttoned regret it 2 R/ J2 j2 b# ]( |9 ` |8 P
white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
; h) \' z/ n9 b% S9 u U hackers: halo ~ ~ ~ ~ |
|