English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I dont want you to TEACH me or anything... But how does it actually happen? :S.. How are they able to get into the pc and make the mouse move and stuff?... Its so creepy

2007-01-18 08:08:27 · 4 answers · asked by TheOne 1 in Computers & Internet Computer Networking

4 answers

its a long story but to try to make it short, they access your's from another comp..........then they have tools downloaded from the net its self, boot tools if you will it scans the comp in question, then its downloaded what ever they choose to put in yours, hell they can even get your pics,porn,all the good stuff, but the thing that makes my blood boil is they can set and monitor you while your in chat with some hotbabe.its just not right

2007-01-18 08:14:07 · answer #1 · answered by rpoker 6 · 0 0

A program has to be installed on the hacked machine for this to happen.. the hacker has another program that connects to this one.. The program installed on the hacked machine can be coded to take some control on the machine.. Some network administrators actually use tools like this to control other pcs on their network remotely.. So its just a tool.. Its only called hacking when its against the owner of the PC's will .. That's why you shouldn't install untrusted software..

2007-01-18 16:16:41 · answer #2 · answered by Beavis111 2 · 0 0

Two major ways:

1. Exploit a bug, either in OS or an Application. Keep your OS and all apps that you use to open untrusted data (esp. browser, but also movie players, MS Office, PDF viewer, etc.) up to date with all security updates.

2. Trick you into running something. Either by sending you an attachment and getting you to run it, or getting you to download and run a file (usually advertising the file as a new c00l game, or virus cleaner, or any other program that you need).

After that, a program gets installed which in your case sounds like giving control to someone remotely -- but it really can do anything on your PC.

2007-01-18 19:05:17 · answer #3 · answered by olegos 3 · 0 0

In a nutshell - hackers know vulnerabilities of the operating systems and network protocols of devices on the Internet. For example - if you throw enough network traffic at a server serving web pages you might be able to crash the server just enough to make it vulnerable to receive commands that would let the hacker take control of it. When vulnerabilities are discovered the operating system vendors try to patch as quickly as possible. It is a constant cat-and-mouse game.

2007-01-18 16:17:19 · answer #4 · answered by HomeSweetSiliconValley 4 · 0 0

fedest.com, questions and answers