ANSWERS: 10
  • Gets someone's IP address. Uses a port scanner to see which ports are open. Attmpet to connects through those ports and take advantage of known operating system and software issues. This process is called creating a back door. Some one could have complete access to your computer, and you wouldn't even know it. Sometimes there is software that you could accidently run that would purposefully create a back door for hackers. This is called a trojan - named after the Trojan horse. You can run a port scanner on your computer to moniter ports, and other software to moniter any activity over the internet.
  • To add to nick's answer, take a look at what some real life hackers had to say about hacking: What they do, how they do it, why they do it....
  • 1) Hacking computers is a complicated and broad subject that involves intricate knowledge of systems and system processes; your question is far too vague. 2) Hacking computer systems is an illegal activity. You will not find instructions for illegal activities as this is against AnswerBag Terms and Conditions.
  • First you must learn how to write a proper sentence.
  • you abuse the use of "Remote assistanse".
  • This is like asking "how does safe cracker crack a safe?" Well, it depends on the cracker, the safe, what exactly the cracker is trying to accomplish, how they want to accomplish it, the tools that the cracker has. Most software has vulnerabilities, you generally have to exploit one of the software's vulnerabilities to communicate directly with the computer via C code or assembly, from there you can command the computer to do things for you. If you're really interested you can go to hackthissite.org. Noone will tell you how to "hack" and don't ask, but it's a good place for a novice to learn, if nothing else, about how computers function.
  • after practicing hacking into his own several times☺
  • Through an internet connection.
  • If you are wondering yourself, as in, how to do the actual action, then I won't go into specifics. Basically, the hacker looks for ways to break in, based on knowledge obtained by observation. Sometimes you are targeted, sometimes it's random. Just avoid giving personal information on websites that don't show a little padlock icon at the top or bottom of your browser, and don't go to websites you don't trust. Just opening them in a browser leaves your computer's methodical front door wide open.
  • Any number of ways. I think the 2 most common are the port penetration (which rarely happens on a properly configured updated computer) and email trojan horse where the user clicks on an attachment that has a trojan horse. Never click on any attachment or follow a link from a sender you don't know and always keep your computer OS and browser up to date.

Copyright 2017, Wired Ivy, LLC

Answerbag | Terms of Service | Privacy Policy