First off its not a stupid question, and I belive the lad to seem very mature. He's asking a question out of "curiousity", and if YOU did your homework you would have found out that that question is asked everyday by thousands of people. Hacking may be misunderstood, but even if you do the research like I did, seems everyones definintion of hacking is same, and has bad rep, same with doctors, lawyers and contractors, doesnt' mean they are all bad. Someone who just wants to have credit for getting into a website but does no harm to it is a hacker, a cracker is the same but they will insert trojans, viruses, and software.
true hacking involves massive codes, passwords and thing pros like to call unix
if you want to control computer you can use what they call trojan, you need other things such as the trojan itself, ip sniffer, there computer has to be on and connected, as well as yours, they need remote acces, ip address is usefull, with this you can move peoples cursor, and open their cd tray over and over.
as advice of ethics
do not hack governement computers
do not change files or install software on computer
yes you can get caught!
2007-08-11 02:28:24
·
answer #1
·
answered by Kraze 2
·
0⤊
2⤋
*Sigh*
Your understanding of the term 'hack' is quite wrong, and honestly, it's not your fault.
The Media seems to like calling people criminals, no matter the truth or accuracy behind the claims.
That's called slander (and libel) and is quite illegal.
Most people just accept the media as true, and don't do research.
Hacking is the art of programming well. Hacking is pushing limits, going beyond standards, exploring.
You're asking about _cracking_, young newbie, breaking into computer systems, stealing, and any sort of illegal activities.
Not only should you learn your terminology, you should mature a little.
So basicly, stop insulting the people you're asking.
2007-08-11 01:55:36
·
answer #2
·
answered by Anonymous
·
1⤊
1⤋
Software Programs
2007-08-11 01:55:21
·
answer #3
·
answered by Don M 7
·
0⤊
1⤋
Yeah quite!!!!. If & provided that that man or woman is acquainted with the password.And his computing gadget is a factor of a "area" & it quite is in sharing & he has administrative rights to the "area" he "Authenticates" to. So, in the journey that your So suggested as "Hacker" Satisfies the above set parameters, then "He" can 'hack' into your acquaintances computing gadget & on the comparable time open & close your cd stress............ So, now you recognize that penetrating into any gadget isn't a walk interior the park.the point of ability required must be quite extraordinary to accomplish this variety of act........
2016-10-14 23:18:07
·
answer #4
·
answered by Anonymous
·
0⤊
0⤋