It is not impossible if you can spy suluruh activities undertaken in each computer in your network (school, college, office) without anyone knowing. Even you also can control it from afar.
There was a friend suddenly surprised when he was Chating, messages sent to friends chatnya different from what he typed. Apparently someone has been controlling his computer through another computer and typing dirty words dikomputernya. As a result my friend was disappointed because the opponent chatnya blurry because it was not treated well by him.
Some confidential data on a company's office turned out to have been leaked and altered by someone unknown. How did all that did not happen, if a computer that stores important data connected to the network. Because soseorang employees who know little tricks Hacking has been smuggled into the computer. He changed the value obtained by the person's salary when the user is careless. He even took an important file and send it back with a mess of data that has been dirubahnya. Office party too late to know that the computer has at breaking people, because it is less responsive admins know the development of "Hacker Indonesia."
To take over the computer network of people in there are a variety of ways:
1. Go to the room without permission and took manager
computernya (Ha ha, how silly and surely it will get laid off from the boss he he).
2. Spreading Trojans. Maybe this way more
effective although there are many more other ways.
What is a Trojan?
Klo who do not know please read the book S'to or other sources for more details. This is a Trojan file that gives us access to go to a specific computer when the Trojan is executed. And we also have to have a software controller in accordance with the Trojan pair.
How to get it?
Trojans can easily be downloaded from the Internet with a variety of species as has been published in the book Internet Art of Hacking II. But most files and files trojannya Builder has been able to be detected by most antivirus and Trojan viruses disrupt the system so that the victim was quickly realized that the computer virus. So, what's the solution?
You can donload herehttp://www.geocities.com/anton_riyadi2002/
This Trojan virus is engineered its own code and does not interfere with the system. This Trojan is also not led to a suspicious message, such as local Indonesian viruses in general. It is suitable for the beginner hackers because it is quite easy to operate.
You simply type the computer name / IP address of computers that have been infected with Trojan then there has to take over computers without having known the victim.
Before people take over your computer a good idea to know a little how the techniques of Hacking.
Attention!
Tools Hacking is only a means to learn Hacking. For the risk borne by users of criminal activity.
Nothing is safe in the Network. Stay Online Hacker !!!
Tutorial
ComputerZone
Hacking
Download
BesT Appearance
PhreakIng
Programming
Blogging
Serial Number
Facebook Connect
SynCC
Facebook
Free Articles
LinkedIn
Make Windows XP Genuine
About This Blog
Google Adsense
Phising
Pro Software
Situs Berbahaya
Antivirus Premium
All About Firewall
Desaign Grafis
Games
Image Editing
Kaskus Script
Tips Internet SEO
Html Secret Code
Social Network
Windows 8
Windows Hack
Graphics
My Life My Adventure
Photo Editor
Twitter Bot
Autorun.inf
Blackberry Hack
This is Free
0 komentar:
Speak up your mind
Tell us what you're thinking... !