 鲜花( 0)  鸡蛋( 0)
|
Hacker: I have control of your computer
7 S9 O# J3 f+ {9 H: Q' I5 C, l white: how control?
0 y) v6 d$ z& E2 w hackers: white with a Trojan
; \3 {6 q5 J- {3 ^:. . . . . . Where? I did not see 8 n0 C' n, A- L! ]5 j" s
hackers: Open your Task Manager
9 o1 E8 d; y0 U1 P# {/ M) g5 b* t white:. . . . . . . Task Manager, where?
7 u X& q! {: `5 e- S; f hackers:. . . . . Your computer below! ! 9 ~$ y3 q9 ]$ A- m9 E
white: \; ! O( Y) I; E5 S( _
Hacker: I have control of your computer
: H$ D0 R/ ^/ N6 J' G; p. ]5 H white: Oh 7 F# p# X# ]/ M5 G7 L! Y4 e
hackers: a funk? ! Hey
7 {' e3 C! L# h4 R- B white: for the just, help me kill the virus it, many of the recent problems my Lord 8 E1 {9 t2 F/ A
machine hackers:. . . . . . # [# r! b4 O$ |) M2 }# a7 p" f
0 c7 {/ p9 w2 ~( u, _ white: how do you always in my computer and out of
% D" N: o! P; ?" i" J- @) R/ k casual hackers: You can install a firewall
8 Z. h5 z3 C; E: i white: install a firewall, you can not access it? : t7 {/ D4 \! }5 e( p
hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah : {: Z4 Z# n k. V0 [+ s" i
% M. r" s& U, z7 Q$ Y4 g( x small White: I heard that you will create a \!
0 g1 N7 w! Z# s hackers: ah + L" m- [; J- c1 M1 `1 j2 B& e/ J
white: you can control someone else's computer? ! , D9 F; k# y( m% D
hackers: General is the . W, |( |: H1 z2 a+ G
white: you can black out those sites?
* @& g4 h7 i* `, C8 I/ \ hackers: of course, did not hear people call me a \
" [6 y% d: S1 @8 @ white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 8 D1 {+ W# o3 U0 ^6 V" U: X
\! ' q! M9 l+ Y+ X( B* y
white: every day you come in, do not feel tired of it? 0 I& X9 @2 d( d% b5 \7 \0 r
hacker: is a pain, your machine is the worst I've ever seen in one of the
# N4 m5 h# K+ w3 z6 ]- F3 G: G white: is not it, this is Brand
4 z" {5 Y6 @- j" F: { Hackers: I was mentally retarded in addition to your yard game machine only virus a ) o4 Q; U# {+ b! ?' F
white: Oh ~ ~ that you see me The \. . . . Goodbye
& [1 c7 q' ^& q- B 9 b" i6 }' h4 v* Q; R7 z! c( g; q1 i6 b
hacker: Hey ~ ~ ~ I come!
, A1 C" l( h t. G. k white: not seen you for days, was my firewall blocking you?
/ t% X( h0 w$ V8 q hackers: Haha, jokes, on your machine is easier than my own, not you miss me 5 {0 ~5 L4 N0 E, F* i4 ]- i8 @
white: I want to Please help a busy 7 ]& q8 o% p# s# M2 B/ z
hacker: What?
, o, V0 M9 j ?: a3 ]) O white: you can not modify the point into the power system data
5 H7 `( y; s, ]2 v, w hackers:. . . . . . Why do you want to! !
4 ?( W4 c6 r9 z- @$ Q6 i; m2 Y5 O white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . / A% ~; E' Z. K8 U3 p5 _- N5 ^" R* S
hackers: die! !
+ ^+ s6 S1 H; _
, g! a/ M9 x# X9 \6 ]0 G- k hacker: you die Where is? ! ! ! * W9 j0 A; d$ N7 A
white:. . . . Go out and play for a few days, ah, come to me why
; l& o8 J$ f- M. X9 f Hacker: I'm looking for something
6 P Q) }* f7 t$ q) ]& n6 ] white: what I find here?
% s3 ]+ \# n0 R0 j$ H- u hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights
# K% {9 O0 e/ L . d7 |& O6 C" B( I6 m: u
most hackers : I come! ! ( l2 s9 W; q, L" @$ Y6 c- l3 m) N
. . . . . . ) D4 R3 ?4 H1 l$ x% J
hacker: how not to speak? ( x7 W' D" O7 z& [& D d. e
white: a bad mood 7 C0 i& J; y5 u/ J6 r+ ?
hackers: Who bullied you? + f5 [! t8 z$ z' ^/ \5 F
white: a Q No. I have not lost inside of my first love
N9 A- R7 z! I6 s* r Internet hackers: this simple, I get it for you $ h, `4 @/ T! z4 r% [! U
white: do not get back
5 Z* X$ d% h8 G1 {' x& [ hackers: No, tell me what number?
7 j. P6 ]9 I+ c! k, \) m; o% ? white: Woo ~ ~ ~ ~ just do not remember
) t6 p5 U) J6 f+ c) J0 D% g2 d" | 5 r2 y8 @9 E5 P5 Y; v# c. t
white: you gave me out! ! ! !
* i6 K/ T8 C) U. {3 [/ I- l: _ hacker: how wrong? !
0 ]3 C( F& e3 N white: You are not the forum to use my ID to play it? ! ! x3 x! u# r/ G- A6 G; y! V
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the 2 T) h7 b% L3 Q
white: it does not work! ! ! ; }. K0 L5 `4 T# Z( z7 J6 u. f' P
hacker: how should you like? 5 q j) w; ?7 Z! [3 ]& M2 E
white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down! " l. o) f9 W. C4 V
( F# y- H# n0 k
hacker: Hey,ralph lauren pas cher, I did a lot of fun + Z4 ~& B, U; q3 b
white: what # }( {# R" T& ^
hackers: I go to the forums posted the top " V6 O1 D7 M. `! k1 G5 s7 O
white: This very common ah
7 g1 s, W! v. R5 w! |$ Z Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent - G& y& `2 {' F# x3 \/ V; \
white: Wow, very enjoyable, and I can never dare, will be blocked! 1 A: Y$ U) [( B1 `$ V) U+ i1 E
Hackers: Yes, has been banned. " O5 L! H* Z7 G
white: this is also fun? !
/ o5 ] f$ v) x/ F4 Y Hackers: Yes, ah, because I use your ID 3 x7 X; V$ Q/ a! o: [
white: you are pro?
, c) N3 |2 \' J/ C9 l hackers: You can say it. ' e- F) P9 l2 ^3 y" ?9 }
white: to what extent high?
! L9 x9 A. f- ?6 f. S0 W hackers: ah, I am bored when their own
6 e+ B! m; f* Y# C white black: Ah, this I will!
. \+ Q% r- d& U9 t, D' M, E hacker :#?%! You can? ! 2 e/ C0 p3 S1 `5 d# X% D w
white: Yes, ah, a black off it. . . . .
9 u; U: I! p6 Q, Z hackers: Go! ( G8 Q/ N6 B1 S8 N$ f( @
white: Ask your question - J! E6 E, d: m5 }+ r
hacker: says
: v) q1 @" N& \6 t8 N2 u4 S" g* ]7 z white: Besides me, you can also control other people's computers do ? " G5 r( M' K# n8 j5 h4 G7 @0 F
Hackers: Yes you can. . . .
4 I; ?- j3 n( ~; T white: no networking is also OK? 9 Y2 R9 y t, N
hackers:. . . . . . .
+ G* l7 J$ X9 a7 f+ C5 q white: You can remote control to open someone else's machine it?
; p e9 F7 ]6 C# w- T1 L. c$ ] hackers:. . . . . . . . ) m, O* W( W, s, D7 T
white: You can steal top-secret file it! ! !
5 C: f7 I6 F# u hackers: I think you see more movies, go to sleep ( A9 v8 K7 Q4 ?8 q
white wash: my computer is broken 6 Y! y' |! \+ Y9 ]- |
hackers:. . . . . . . Just checked, your computer no problem 7 X2 e, ^2 M: I0 y
white: that is, you bully me ' M. C: H0 N5 x4 P' b7 r
hackers: No ah ( E% }8 o2 G' T- V" @$ h; j) l
white: You are! MP3 files are passed to my no images! + U1 L) R2 X) X) v
hackers: help ah ~~~~~~~ _/ @/ [5 G! f5 G; a" }' E
white: Ask a computer problems can you answer? $ j; D& w4 |: G" E# n3 A3 u
Hackers: should be able to 4 a- \3 b/ y9 T* Q* ]' b" C
white: Which key on the keyboard the most handsome?
" B5 \0 ~% ^7 O4 y5 H' g8 S3 Q0 p+ g hackers:. . . . . . . Do not know
8 j D, x2 {! @; I7 T white: of course, \! ' h( u& A S: c. I5 j! ^
hackers: halo ~ ~ ~ This is a computer problem? ! !
# u1 H: F9 x" Y2 w( i6 z
1 l" Z, c* C2 [; P# w7 G! _ white: ask you a computer problems you can answer? $ Q$ [& r4 \4 v* q" u6 e' ^
hackers: If the problem is not your idiot
2 f. r$ U6 E$ I+ j white: I am serious! ! You can operate my computer?
, z" X' s: M/ ]: \ hackers: ah,juicy couture shop, yes @) F$ H4 w9 U* _/ o% I6 `
white: that problem, you can solve it
! N/ B3 L1 h. u0 e hackers: Your question is, should not be difficult ;
5 I% V" j/ i3 x$ S' T1 y& _$ h white: Great, my fans do not seem to turn up,nike air jordan, help me change it
; Y% K4 {( K/ U4 a0 o/ \ s! R a hacker:. . . . I excused 8 j% i1 b& k ], D9 a! b! q: k0 u
white: we see meet you? " t2 x! b* |6 j5 M; X
hackers:. . . . This, not so good, why should we see - o: e, c& k6 M& W- h: }
white: I want to see you are not the same and I would like to , u$ O6 B; Z z, A+ e
Hacker: Oh, what you think?
1 I/ c5 b+ h% X* B white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights $ O- e% M2 ~7 d% j- k2 m( j
hackers:. . . . You say that Spider-Man, boss! . m9 W+ Q! ?4 H" D' E" t
hackers: Kazakhstan woven ~ ~ ~ 1 O/ ?" g) _$ Q% `. i( T" O
white: You called every day, is not very curious about me? / Y5 h, B. w7 [. F1 e3 W8 ?
hackers: not curious, is the habit, easily came in
/ s4 I; i! W: z* Z* a- C5 R% O white: Well, I have a good way to change your habit
+ V9 q. q& O! c0 q/ ] hacker :. . . . Oh? ! Any way ( [! Y- L* f0 ?9 ]$ G8 F
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
) S# q% i% E; Y& b% ? hackers: Genius ah! . . . . . You can also connect to it?
( D9 ?2 q( a& u! k white: to ah, and slowly the hymns!
9 X% d# k+ Q7 Z8 b& r4 T white: you every day into my computer, is not very curious about me? # d" B t8 ~0 i& ^
hackers: No wonder, only used
7 p& A6 M/ C; d; _' A8 N white: no you're curious about the place?
5 Y; r- V1 O+ D6 q hackers: a ah, I always wanted to know your machine so much as when the virus crashes 2 S% G( P/ y( O* b+ l: A$ S$ |" c
$ Q u! C% ?3 W- c. Q- P
white: I would like to control your computer
8 p" {/ }' p( y( U Hackers: I will not have other people access my computer I will be mad r% S; E% s' Q. Z
white: This is not fair! !
* [3 D- r2 t" l# e- R. k. m7 ? hackers: ah, well, you control the good of the
; {. q- C$ x3 v* G6 B. {; G white:. . . . But I will not. . . .
& q, R" Q& W' u- y4 |! ?( u& F hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! - Z4 l- i" N: U/ [! }) W! n
Hacker: I'm white 5 }% K! x3 l. h. C1 p) b
us again: This is probably the last time we met the
$ C% T. O$ s; h" [, h Hacker: Oh? What happened? ! @' C9 V2 w) w# K# k
white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
- m1 o5 d* ? s h hackers: You are so tired of me. . . . . Well, since I do not come, goodbye 0 {. a, P9 b" n& _4 g0 L, B4 K
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system! ( l. i, [( h2 T$ q
hackers:. . . . . . . . . .
* F' N9 d$ j+ l, ~9 g$ T# {4 C hackers: so late, and how not offline?
% y, ~& C- o" E# ? white: Oh, is the next, and I went to pull the power ; ?! W8 y8 A$ p$ O
hackers: Slow! You will not shut down?
5 I5 m+ E; Q* w# M! T* t white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power 5 [& f4 y( s$ q! a! s- b# I
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \& g; x1 y2 ~2 w& v" o M# r& A: Y
white:. . . . . . I press the power to the hackers call it
! D, j* x- a3 s' O% N. P white: You are not really powerful
7 W1 T+ p' q1 M$ I hackers: so-so friends
2 f. A! R5 }, H( o white: bragging! You have the ability to shut down my machine in the horse.
% @" b: H/ q" ^2 I hackers: this place is difficult! You wait & y! F# I q# k4 N
hackers: Haha, buttoned regret it
1 \- O: y! `6 c" Z$ R white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . . " |1 q0 O0 V5 `# X
hackers: halo ~ ~ ~ ~ |
|