Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Cracking, blackhat hacking, etc.

Name: Anonymous 2014-07-14 21:05

How does that stuff work, exactly? I mean how does someone (or is it even possible?) "penetrate" into another person’s computer and then get their credit card (how does credit card theft even work?) or somehow "download" their files onto the hacker's computer? Does it matter if the target's computer is on or off or on and being used? If on and being used how does the target don't notice? How would one "download" a terabyte of someone's files and do it quickly (within a day) and unnoticed? Doing it from another continent? How would it differ from OS to OS? How would they gain root on a unix computer? How would they do it and how would it differ on a linux one? How would (and what are) 0days and how would they play into this? How are exploits created and used? How do you protect and secure yourself from such things? What if you became a target?

Name: Anonymous 2014-07-14 22:16

blackhat hacking
A T T E N T I O N: Topic subject changed
New subject: Shaloom!
Shaloom Shaloom Shaloom Shaloom!!!!!

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List