Well, a hacker can certainly hack your system just to sell its resources, like to a company as a server. For example, a hacker can sell 25% of your CPU time or RAM to another company who will pay the hacker for something that the hacker doesn't own. It can also install software that will do stuff for it, like hack a bank. That way, if your computer gets caught, it becomes very hard to track down. The software a hacker installs can also spread itself to other computers.
In other words, a hacker can nick the computer itself if there's nothing on your computer worth nicking.
2007-02-09 05:16:17
·
answer #1
·
answered by Cheese Lover Bob 3
·
3⤊
0⤋
They could use your computer as part of a "botnet". That is a group of computers which have been 'hijacked' and are used together to be the equivalent of a big computer. All of this happens invisibly to the legitimate user (it may run slower).
Botnets are used for many purposes; one of the main ones is to facilitate the spread of spam emails. In that respect you would be doing the whole community of decent internet users a favour if you used anti-virus, anti-worm and anti-trojan software. Do this even if you don't keep sensitive personal data on your machine.
2007-02-09 14:09:24
·
answer #2
·
answered by Anonymous
·
1⤊
0⤋
hackers dont just hack you for your information or for finanical gain
they can hack you just to use your computer to hack the "bigger fish" so if anything does happen ull be blamed
they can sell loads of stuff on ur computer to big companies say spam mail companies wud buy ur contacts list and such
the gain for hackers is not always direct or quick
you can just be a means to an end and you wont even notice
2007-02-09 13:20:30
·
answer #3
·
answered by Anonymous
·
2⤊
0⤋
A couple of things botnets a zombie computers
While the term "botnet" can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure
http://en.wikipedia.org/wiki/Botnet
A zombie computer, abbreviated zombie, is a computer attached to the Internet that has been compromised by a security cracker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a "botnet", and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the vector tends to be unconscious, these computers are metaphorically compared to a zombie.
http://en.wikipedia.org/wiki/Zombie_computer
2007-02-09 13:22:30
·
answer #4
·
answered by Anonymous
·
1⤊
0⤋
These people look for just about anything they can use to make you hurt. You may not be a risk, but there are many others out there who use the Internet for banking and other services. A good anti-virus/anti-spy-ware software should keep many users safe nevertheless.
2007-02-09 13:41:59
·
answer #5
·
answered by cardo11 3
·
0⤊
0⤋
a lot of peopel shop and bank online, hackers after money would go mainly for your credit card number, your paypal login, your email login and your bank details.
you may have nothing on your pc worth stealing but a hacker can install software on your pc that enables them to hack more pc's directly from your pc.
2007-02-09 13:17:15
·
answer #6
·
answered by Anonymous
·
2⤊
0⤋
Minor correction, but the phrase you should be using is a 'criminal.'
'Hacker' typically means 'an accomplished programmer or engineer' and has no moral compass associated with it.
2007-02-09 13:29:51
·
answer #7
·
answered by singlecell_amoeba 4
·
1⤊
0⤋
Hackers could store porn on your computer, set up an FTP server, use it as a gateway to email spam, etc. They can also kill your bandwidth.
2007-02-09 13:18:26
·
answer #8
·
answered by whodeyflya 6
·
2⤊
0⤋
Many 'newbie' hackers get kicks off hacking useless clients.
2007-02-09 13:17:57
·
answer #9
·
answered by Kyle S 3
·
1⤊
0⤋
i agree. nowadays they are using their skill in making spywares for business purposes. i mean like tracking ur online habits and giing u pop ups and pop under pages and also installing rogue spywares without u even knowing all this happening.
2007-02-09 13:18:26
·
answer #10
·
answered by Neo 5
·
1⤊
0⤋