Computer Hacking

Computer Hacking

The penultimate type of hacking is represented by Computer hacking which is a type of hacking used by hackers to get access to another person’s computer and control it without the owner permission and there are few operations performed on the hacked computer like collecting material or using it to chat and even access some sensitive files on that computer. Computer hacking is about changing the hardware and software on the hacked computer, reports show that most of the computer hackers are teenagers and very young adults but there are as well old aged hackers, as any other hacking type, computer hacking is considered by hackers a form of art and it not an opportunity to bother others as many people see, in fact, computer hacking is a chance for hackers to prove their abilities and skills. 



There are famous computer hackers and we should thank them every day for their realizations because if they weren’t maybe the technology nowadays won’t be at this point,  Dennis Ritchie and Ken Thompson worked early in the 70’s to create the UNIX operating which highly affected the development of Linux and they were tagged as former hackers. Another important computer hacker is Shawn Fanning who created Napster. There are three methods to hack a computer and the first one is called Hacking Logins, the second one Remote hacks and the third one is about hacking Wi-Fi. There are few steps to follow in every case. We are going to start with the first method of computer hacking, so the first step is to open your computer and boot it in the safe mode and after doing this wait a couple of seconds until the computer is open, when it’s open in the safe mode please click on Start button and select “run” after that try to write in “control userpasswords2” and change passwords for any other account if there are multiple accounts and at the end of the process don’t forget to restart the fresh hacked computer. The second method is used to hack remotes and the first step in following this method of computer hacking is downloading and installing the LogMeIn software, they will give you a free limited version, this program should be downloaded on the computer you intend to remotely view. You have to make an account on the LogMeIn website to use the free program. When you already own an account on the website, log in and go to the “ My Computers” page in case if it doesn’t open automatically after logging in. The next step is searching for “ Add computer”, click on this button and put there the information of the computer you intend to access and the computer should be added automatically. Check if the computer name is added and click on it if it is there, if not then repeat the below step. For the next step you will have to know the username and the password of the computer in order to log on it and view the account you want to access and after that select the “Remote Control” option and log out the website once you satisfied your curiosity.  Computer hackers use another method to get access to your computer and use it. The whole process is realized if hackers know your personal Internet Protocol which is totally
unique and any hacker can contact your computer if they know your IP. The first step in this case is downloading and installing Nmap, a tool used for port scanning and after you have got the Nmap installed you should search by scan option a local computer and after you did this please scan your individual target, after the scan you should notice the open ports. The last step after scanning is banner grabbing and here you can use the regular ol’ telnet client, Telnet has Linux and most Windows distributions: telnet <host IP> <port banner to grab> and you just tried this method as well. Hackers are creative minds and love to solve problems, one hacker asked himself if there would be no problems and he ended up concluding that he would commit suicide, hacking is so addictive, once you get it right, you never leave it. A massive computer hack was made by Anonymous in 2011 when they broke into the Syrian Leader’s account and accessed more than 78 inboxes of the president’s personal and made it public and accessible to any person . According to the official sources, the hackers group didn’t need a lot of effort to break the email because the president’s password is number two weakest password in the world on an official top, his password was 12345 and it was associated with a couple of his accounts not only the official one, while the country was on fire, hot news appeared due to the Anonymous group of hackers. The black hat hackers who have big goals such as Anonymous goal that later turned into a big realization are more than dangerous because by contributing with their creative mind, they have 90% chances to succeed but there is 95% to make other collateral victims of the hack, so think ten times before you take attitude and action as a hacker because you might destroy other people lives including your life as well, once you take a decision and you realize what you decide you can’t erase your own actions, it’s exactly live a famous movie, once is filmed it is never deleted. As a real hacker, you should act with responsibility and never forget to assume everything you do, even if we are talking about white hat hacking or black hat hacking, both of them request a mature creative mind, not only a creative mind because little children have also creative minds, but they don’t became hackers in the most of the cases. Hackers don’t want only to hack your computer, they are doing it because they want to get deeply in your life, so they decide to spy on you by hacking your computer. Due to the computer technology spying is not anymore an action that could be performed only by agencies and organizations like CIA, NSA, and KGB because you can do it too if you are a dedicated and motivated hacker. This book is going to tell you how to transform any computer into a listening device. 

0 comments:

Post a Comment

Hack Me Tech