鲜花( 0) 鸡蛋( 0)
|
Hacker: I have control of your computer ' E0 f% O& z1 j0 f. |- ?
white: how control? - k$ _5 b5 w* i8 z4 i
hackers: white with a Trojan
/ `, Q- e% w3 { U:. . . . . . Where? I did not see
* m4 P; B5 R% m4 Z6 n2 t3 W8 E hackers: Open your Task Manager 1 I) g, d# f/ P: U. t4 P& v
white:. . . . . . . Task Manager, where?
' t! ]0 r! a$ J' g" i8 u/ ~' {( ? hackers:. . . . . Your computer below! ! 9 v# i8 l& }" D6 P3 d* w6 ?! y8 Q1 ~
white: \; . q, S( Y i+ ^) u! U; F
Hacker: I have control of your computer
$ k' } C4 K" R8 q6 |' c white: Oh
) o: G& A- T) L5 H hackers: a funk? ! Hey ' y% |1 M" ~" J4 e% f! u
white: for the just, help me kill the virus it, many of the recent problems my Lord
' X, }' S2 F7 ]! m9 l5 D5 T" | machine hackers:. . . . . .
M: ~2 M: h/ e! c + _; C7 t) o& C$ L/ K
white: how do you always in my computer and out of # _: h" \0 M+ b7 O
casual hackers: You can install a firewall . ?; `& M4 N" j3 z& I; {% A
white: install a firewall, you can not access it?
8 u( ~+ H l9 Y hackers: No ah, I just want to increase the point of interest, so control your computer made me feel an idiot yeah
, P1 Q) J- S. D, R " J7 f; o0 a1 e1 j# t; B0 ?1 z
small White: I heard that you will create a \! 6 {! U1 s- Y" U5 Z
hackers: ah
4 ]+ f4 l* J2 F4 J% W white: you can control someone else's computer? !
4 J# y* f- |% g. L hackers: General is the
@) `3 Z% B/ Y$ _" ]! n white: you can black out those sites? . V4 W9 y2 l$ {7 L5 `9 s/ d( h
hackers: of course, did not hear people call me a \
! D. b- l3 N3 s4 w white:. . . . Oh ~ ~ ~ `I think that is because you look black. . . . . 2 B- `! c% A) \$ k, u' |" b
\!
m2 a- V1 b2 r8 l white: every day you come in, do not feel tired of it?
1 ]6 c/ |6 h2 t, Q( O- o hacker: is a pain, your machine is the worst I've ever seen in one of the 6 [4 P, n! R/ x0 i
white: is not it, this is Brand
; E5 h5 U {9 U2 | Hackers: I was mentally retarded in addition to your yard game machine only virus a
3 I$ @( l% ^/ F" ]" K% w white: Oh ~ ~ that you see me The \. . . . Goodbye 1 @( q; g8 ^4 U, a9 y
1 b4 L! l$ c/ z+ `" ?% O9 y
hacker: Hey ~ ~ ~ I come! 9 D: k4 [8 V% p6 e& {- [, ?
white: not seen you for days, was my firewall blocking you? " I. P6 [0 p6 m' y# W+ P
hackers: Haha, jokes, on your machine is easier than my own, not you miss me
# g) ^$ k, t ~ white: I want to Please help a busy
( p, @& m' ^( o5 U4 e& ] hacker: What?
- ]. l2 E% x( v5 h4 Z+ q white: you can not modify the point into the power system data 7 @: f* U& n/ n( {& p: i6 T
hackers:. . . . . . Why do you want to! ! ( [$ h/ e% x, A* a) a4 k
white: Please, help me to my house this month, the electricity consumption of the bar. . . . . . : g9 w' `5 c" n' s |
hackers: die! !
% F9 q k7 ^! e; \5 s, S
k! W4 R9 u2 q( b% A hacker: you die Where is? ! ! ! " i, T+ l; E; r% |9 G A
white:. . . . Go out and play for a few days, ah, come to me why 4 p2 B5 v0 l$ D: {1 `8 R7 R
Hacker: I'm looking for something ; F7 f& W9 o5 C+ q" g0 C
white: what I find here?
, J( A e3 i! h5 H2 W" T, t hackers: the virus, looking for a few years ago an old virus, the virus is only stored on your machine All Rights + D2 J4 D/ }7 o( w. r
- c# u* g/ @' K! {& l8 V u% m most hackers : I come! !
( K% h1 S) u- Y. . . . . . 0 v8 y! u; F1 Q- X8 W
hacker: how not to speak? 4 g# `( {, w$ b- F! x4 ~
white: a bad mood # d" I; u/ n6 z2 Q5 n
hackers: Who bullied you? % W1 M: H- m+ h( W8 H' w* n/ w5 _; G
white: a Q No. I have not lost inside of my first love 8 Z7 c9 C- S: P- r
Internet hackers: this simple, I get it for you $ ?, U) q2 m( Q; ?' \( M
white: do not get back 8 i* _! s. L+ V% S- X) {
hackers: No, tell me what number? * f. s9 _$ s$ Q# E7 ]- c$ w
white: Woo ~ ~ ~ ~ just do not remember
. d" F8 i+ R. n. \7 m
0 }4 ?2 i9 |$ E0 o' L white: you gave me out! ! ! !
6 p# \. ?. T. J. C% Q hacker: how wrong? !
4 U5 ~: v/ ]; e+ b" y+ Q" K, s, Y white: You are not the forum to use my ID to play it? ! ! 8 G; l' ~- S5 Y8 _
hackers:. . . . Sorry, forgot to tell you, but I did not do bad things, it makes up the one post, I promise next time not to play the
0 r" l+ z1 G& `: G white: it does not work! ! ! 0 {$ @1 W" u' |, q) [/ [
hacker: how should you like?
* P' g, A6 p' N white: you made the post was red-faced on this trip, my first was red, very happy Oh, you must give me code one \br> hackers: down!
4 n9 Y& H8 _/ ^* K) K. y ( j5 T/ d1 d: Y3 B. g5 O% H
hacker: Hey,ralph lauren pas cher, I did a lot of fun
/ f8 ]7 Q! s- ^1 f3 V white: what
" h# j4 T. \ N! D2 b hackers: I go to the forums posted the top
3 b6 Y6 B# D% i white: This very common ah
* ?! X" f- h7 v( J4 q4 D) F) q Hacker: I see stickers on the top , enjoy the landlord scolded pigs, good vent
' S9 W4 |. |! W+ h# R# z white: Wow, very enjoyable, and I can never dare, will be blocked!
; D6 i5 r5 z4 ?+ f6 G Y Hackers: Yes, has been banned. ( x+ }- l% a3 d0 B/ J e
white: this is also fun? !
" [ q5 u w0 c) o a Hackers: Yes, ah, because I use your ID % A6 Z) O/ r0 e5 l! J
white: you are pro? ! l# T% F0 Z, ?+ K
hackers: You can say it.
1 }5 O( G8 H0 H: H, {% W white: to what extent high?
- r b* C0 @$ q- \3 z7 ~ hackers: ah, I am bored when their own 1 |! ~; _9 X2 G S" d7 B! N) S1 q
white black: Ah, this I will!
9 n" w9 [* O- n8 G hacker :#?%! You can? ! ; I) K1 E! }% Z6 @+ V D
white: Yes, ah, a black off it. . . . . ; C$ p* Q( b4 ?% D! \5 s, V1 M
hackers: Go!
9 A, c; ^* [7 }+ r1 u7 C white: Ask your question 5 ?$ \/ k3 m1 Q9 N$ F0 V9 G7 e" T
hacker: says ) B6 H* W8 r. |* B" J+ P
white: Besides me, you can also control other people's computers do ?
& c$ ?+ Y! v7 W0 m$ h' Q. N" d8 m5 T Hackers: Yes you can. . . . P, S4 _. v) [- @; t
white: no networking is also OK? 6 `: G J- t# _* z3 e4 ~# V! v
hackers:. . . . . . . ( f$ L; d1 J9 J) `$ D- X
white: You can remote control to open someone else's machine it? % _& ` A+ c! I1 ~+ p+ z! x
hackers:. . . . . . . . . _/ O4 l4 A# C% }
white: You can steal top-secret file it! ! ! ' D* p- \0 u9 E: k( i& W$ |0 p
hackers: I think you see more movies, go to sleep
" P! ?/ m* U" J, R white wash: my computer is broken
$ |& \% Y- L* H' k hackers:. . . . . . . Just checked, your computer no problem
( M/ Y) [7 F5 U, ]6 |, ^( ^ white: that is, you bully me
1 `3 Z J% c, @0 @/ A, G hackers: No ah
6 `8 C) z: p# b3 ^4 C) a white: You are! MP3 files are passed to my no images! 0 q. D$ s1 B! Q) C& V
hackers: help ah ~~~~~~~ 7 w! A6 k) u4 W2 |8 K
white: Ask a computer problems can you answer? - ]; ` k2 O3 O0 F- X: J
Hackers: should be able to
2 p8 l. H2 _& d6 v# |0 ~; R( Q- X: Y9 P white: Which key on the keyboard the most handsome? ' A) [, W. C. Q
hackers:. . . . . . . Do not know & x8 ^2 A: G: v, P1 j" X* o' n
white: of course, \! & ]; `4 U2 b* ~7 g% P
hackers: halo ~ ~ ~ This is a computer problem? ! ! 8 }7 x- u) r" ~5 S* L
- W# E" m7 ?) ?
white: ask you a computer problems you can answer?
+ F, v6 V+ b ^7 R hackers: If the problem is not your idiot # E4 `. t) N3 {/ h3 ~' s. q
white: I am serious! ! You can operate my computer?
3 L7 ^' }" O8 u L& } hackers: ah,juicy couture shop, yes 8 D2 z+ i4 Q0 Y% r8 Y! d
white: that problem, you can solve it
5 S* X/ f( z$ { hackers: Your question is, should not be difficult ; ' f- J# ?6 Z% p* k- d
white: Great, my fans do not seem to turn up,nike air jordan, help me change it 8 J, j `. U- W
a hacker:. . . . I excused
, W" _8 h" b- k white: we see meet you?
. D2 N9 U' c. r* x R hackers:. . . . This, not so good, why should we see ' i( \/ S1 q' p' _4 j( e
white: I want to see you are not the same and I would like to
- j) x# @9 a; J' E* v Hacker: Oh, what you think?
5 }! M: T/ ^ s! d' f4 | white: handsome, wearing tights, and very magical, where can go around the maintenance of world peace Rights
6 r4 h/ _& \) O$ s" E hackers:. . . . You say that Spider-Man, boss!
$ h# x8 J7 \1 I/ [+ B6 M hackers: Kazakhstan woven ~ ~ ~ & @4 ?- w2 @0 F0 R0 p
white: You called every day, is not very curious about me?
/ s! k! v" Z4 ]3 L/ a, u hackers: not curious, is the habit, easily came in
, T- |' `# z o# c white: Well, I have a good way to change your habit : |1 P' b5 E0 ^
hacker :. . . . Oh? ! Any way ! x9 T4 A% V, q! t
white: I went to the bureau to change the bandwidth 1K, so you can not squeeze in, because too narrow, ha ha ~ ~
: f6 {" f0 u$ ^- V, u k! O hackers: Genius ah! . . . . . You can also connect to it? 6 r+ i# d( W2 @: e3 B
white: to ah, and slowly the hymns!
, M+ j- {2 k0 v, b white: you every day into my computer, is not very curious about me? 2 {7 d* L$ i# _/ g: o
hackers: No wonder, only used # d1 g$ s5 p3 e f9 `# D8 z( }/ J
white: no you're curious about the place? ; Y' q% N8 X% C
hackers: a ah, I always wanted to know your machine so much as when the virus crashes
0 l6 a9 p5 [/ Y& J' K, d/ u5 \ , b1 H/ g! e* b; t+ d4 Y
white: I would like to control your computer 5 u/ u$ U' h. O7 f
Hackers: I will not have other people access my computer I will be mad
9 T) |0 h4 K( G& a1 r white: This is not fair! ! 1 C8 F' C* E' I( J5 ^
hackers: ah, well, you control the good of the
6 W0 S- M8 R/ y2 ]3 ^ i9 _- o+ e white:. . . . But I will not. . . .
4 x4 u9 d' v4 C9 ` hackers: Ta-ta ~ ~ ~ why I agree with ah! ! ! . z6 l- T E- B
Hacker: I'm white
# c; N$ g6 c* l$ j2 {$ d" H us again: This is probably the last time we met the & J9 |$ j Y6 |9 Z
Hacker: Oh? What happened?
& {5 y/ s. N; ^" L6 G o% h& ` white: I want to reinstall the system, antivirus, firewall protection,Ed Hardy T-Shirt, will not let you come in!
6 r" ?# u: _0 G hackers: You are so tired of me. . . . . Well, since I do not come, goodbye + t6 ^) ?5 Q; Q# W6 \
white: ah. . . . . Hey, wait a minute! ! First taught me what is the reload system!
9 O# Q# a; b; L9 W5 E hackers:. . . . . . . . . . 9 i" N0 m" o, I# ~ h
hackers: so late, and how not offline? 4 x1 P" Q( [# {; Z. J& R9 b5 ?
white: Oh, is the next, and I went to pull the power
0 r5 ]% C7 h% C% s* I$ r hackers: Slow! You will not shut down? - ^) ~4 [0 N" R* x0 M) n" p
white: Yes ah, just point the shutdown, it does not move,paul smith bags, and can only press the power " G) v" J1 L( E1 y: e) U) Z6 B. O/ W
hackers: you modify the registry: Open the HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon Right-click on the Winlogon key, select \% X6 [5 D2 _2 F8 |) ~! ^) s
white:. . . . . . I press the power to the hackers call it 4 ?) d. w |" m" U K- k
white: You are not really powerful
9 X/ P7 w( U, W9 {2 a( D hackers: so-so friends 9 Y* ]/ y* ~- S. ?# B
white: bragging! You have the ability to shut down my machine in the horse.
" D, ~2 m, ?9 ^5 ^8 a5 n1 i hackers: this place is difficult! You wait
- c$ @6 M* { _3 B hackers: Haha, buttoned regret it
0 l2 {* L0 c0 @ white: Hey,abercrombie fitch clothing, thank you friends ~ ~ ~ ~ I was out to play, just want you to help me shutdown . . . .
0 k# u' s6 Y- D c; n, F6 C1 P4 K. {) e hackers: halo ~ ~ ~ ~ |
|