affiliate marketing
Headlines News :
Apply to be a Chitika Publisher!

CounterLanguage

English French German Spain Italian Dutch

Russian Brazil Japanese Korean Arabic Chinese Simplified
Google Translate Muhammad Afifudin Aziz
Free Twitter Followers
Home » » Network Computers Take Over Power

Network Computers Take Over Power

Written By Unknown on Saturday, December 4, 2010 | 8:07 PM

It is not impossible if you can spy suluruh activities undertaken in each computer in your network (school, college, office) without anyone knowing. Even you also can control it from afar.

There was a friend suddenly surprised when he was Chating, messages sent to friends chatnya different from what he typed. Apparently someone has been controlling his computer through another computer and typing dirty words dikomputernya. As a result my friend was disappointed because the opponent chatnya blurry because it was not treated well by him.

Some confidential data on a company's office turned out to have been leaked and altered by someone unknown. How did all that did not happen, if a computer that stores important data connected to the network. Because soseorang employees who know little tricks Hacking has been smuggled into the computer. He changed the value obtained by the person's salary when the user is careless. He even took an important file and send it back with a mess of data that has been dirubahnya. Office party too late to know that the computer has at breaking people, because it is less responsive admins know the development of "Hacker Indonesia."

To take over the computer network of people in there are a variety of ways:
1. Go to the room without permission and took manager
computernya (Ha ha, how silly and surely it will get laid off from the boss he he).
2. Spreading Trojans. Maybe this way more
effective although there are many more other ways.

What is a Trojan?
Klo who do not know please read the book S'to or other sources for more details. This is a Trojan file that gives us access to go to a specific computer when the Trojan is executed. And we also have to have a software controller in accordance with the Trojan pair.

How to get it?
Trojans can easily be downloaded from the Internet with a variety of species as has been published in the book Internet Art of Hacking II. But most files and files trojannya Builder has been able to be detected by most antivirus and Trojan viruses disrupt the system so that the victim was quickly realized that the computer virus. So, what's the solution?
You can donload herehttp://www.geocities.com/anton_riyadi2002/

This Trojan virus is engineered its own code and does not interfere with the system. This Trojan is also not led to a suspicious message, such as local Indonesian viruses in general. It is suitable for the beginner hackers because it is quite easy to operate.
You simply type the computer name / IP address of computers that have been infected with Trojan then there has to take over computers without having known the victim.

Before people take over your computer a good idea to know a little how the techniques of Hacking.

Attention!
Tools Hacking is only a means to learn Hacking. For the risk borne by users of criminal activity.

Nothing is safe in the Network. Stay Online Hacker !!!
Share this article :

0 komentar:

Speak up your mind

Tell us what you're thinking... !

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. ComputerZone - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger