If you mean remotly across the internet its usually done by seting up something like an FTP server which is specifically meant for transfering files. Somone uploads a file to the FTP server and you go to the same site and download that data. If you mean illegally...its usually done by infecting your system with a trojan horse program that opens a backdoor on your system allowing other users to login and download your files.
In some cases there can also be vulnerabilities in your system that if exploited correctly can allow a user to install a backdoor, download a file or run a command
2007-02-17 15:44:04
·
answer #1
·
answered by optik_0v3rd0se 2
·
0⤊
0⤋
Copy it from the hard drive to a floppy or USB thumb drive. Or get info that you think is hidden? There are traces of things in your registry, IE history. Even deleted files on your drive(if not overwritten) can be read with special software. The files are still on the drive but they are prefixed with the Greek letter Sigma (Σ), so the OS knows that they are marked for deletion.
2007-02-17 14:14:56
·
answer #2
·
answered by Anonymous
·
0⤊
0⤋
Yes i can tell you how. Go to college get a degree in computer tech then apply for a job maybe HP/Compaq. They teach you very well. Thats called hacking or theft which in the United States is punishable by law in EVERY state.
2007-02-17 14:16:06
·
answer #3
·
answered by cree4u2000 3
·
0⤊
0⤋
If some different person is logged onto aol including your account, and also you try to log onto aol, it is going to say you're logged on elsewhere. If it grow to be basically an aol caution, they arent on your pc, they are possibly on line utilising your account. I used to bypass on line utilising my friends account (she gave me her password) and that i ought to go on line from everywhere with it. yet then she would get that caution if we tried to signal in mutually. Your dad will understand the password, and get on to study the expenses that are despatched to the e-mail of the important account. Or , think ofyou've got accidently given away your password in a phishing rip-off. In phishing, you're despatched an e-mail through a rip-off artist that appears like a valid e-mail. it would have aol trademarks throughout it, and allow you to understand to "examine in" including your password or some thing. those scams are troublesome to grow to be conscious of, they oftentimes look authentic, or direct you to webpages that look legitimate. You enter your assistance no longer understanding its a pretend web page or e-mail. substitute your password basically to substantiate.once you need to, basically ask your dad if he receives on. Or call aol.
2016-12-04 07:49:13
·
answer #4
·
answered by Anonymous
·
0⤊
0⤋
sometimes the things u delete will be in a temp folder inside ur comp !
2007-02-17 14:14:48
·
answer #5
·
answered by Anonymous
·
0⤊
0⤋