Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

RAM
Random access memory - it is the RAM (RAM), it is also an opertivka. Serves for temporary storage of data with which the central processor works. Surely some are asking…

Continue reading →

Why Kaspersky is not installed
The question of why Kaspersky is not installed is asked by many users. It is no secret to anyone that Kaspersky Anti-Virus is today considered one of the most popular…

Continue reading →

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official development of the “Black Comet” ceased in 2012, in the hacker environment you can still find improved versions of the program. You need to work with it as follows:

Download and install Dark Comet on your computer, run it. At the end of the launch, a window opens in which you need to select the command “Dark Comet RAT” – “Server Module” – “Full Editor”.

In the new window, select “Stub Finalization”, specify the type of extension (.exe, .pif or .bat), then select one of the icons. Optionally, in the “Network Settings” menu in the “Title” field, you can type in some text, for example, “Error”, “Fool”, “You are hacked”, etc.

Having made the settings, click on the “Bulid The Stub” button and save the file.
As soon as the program “catches” some user, you can start managing it: steal passwords, view documents, delete important files, etc. Those who like to gloat can turn off the victim’s desktop, play the virtual piano, send a message, etc.

Other remote access softwares include RMS, Radmin, LogMeIn, and Hidden Administrator.

Manage someone else’s PC using Skype
A very simple way to access someone else’s PC, which is especially useful in cases where you want to spoil the person who offended you. It is done like this:

Choose the offender in the list of Skype users. Left-click on his name – in the window that appears, opposite the Skype field, copy the user’s login.
Go to the site mostwantedhf.info, enter the copied nickname in the “User” field and click on the “Resolve” button. After processing the request, the site will display the IP you need.
Go to the Essential NetTools program (you can download it here), select “NBScan” in the menu, enter the “IP” you found in the “Final IP address” line.
Click start. If nothing appears in the NBScan window, it means that the user you need is not online or has blocked access to it. If everything is in order, you will see it in the list. Right-click on the entry and confirm the “Open Computer” command.
After that, in your “Network” you will see folders stored on someone else’s PC, and you can avenge your victim: delete documents, important scripts, etc.

How to access through Google Chrome
Go to the Google Chrome online store, type “VNC Viewer for Google Chrome” in the search field and install the application. In the window that opens, enter the IP of the user and select the display quality of the desktop and root folders.

You can find out IP using the above method via Skype or use special programs and sites:

Shared Resource
Net Limiter
ip-whois.net;
2ip.ru;
whatismyip.com
Spyware
Spyware is another way to infiltrate users’ system folders. A computer infected with a virus will send all the information to your email inbox, write down everything that its owner enters on the keyboard, etc.

To install spyware, you can use ActiveX components or trojans of the TrojanDownloader category for remote administration, for example, ALB or LD. You can start the server on a remote machine in a couple of simple ways:

Through the “balls.” If you are trying to enter other people’s PCs through extended resources (porn sites, hacker portals, services for downloading free music and videos), so as not to scan the range again later, download the spy, after setting up its work: “C / Windows disk / Main menu / Programs / Startup “. After rebooting the system, the trojan will start automatically.
Social Engineering. You can push the infected file to potential users using the Joiner v2.1 program. For example, you would like to wish someone a happy birthday or a holiday: glue the Trojan server with your card or video greeting and send it by mail to your potential victims. Having opened the letter, users activate the virus and open access to control their machines.

Silent installation of applications (silent install)
Silent installation is such a process in which you sit quietly and look at the screen where the software installation process takes place without your participation, provided that it is…

...

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

...

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

...