Where to start creating your own website
Where do any construction work begin? Can I hammer a nail without a hammer? Maybe yes. But is such work convenient and practical? And will it be effective? The questions…

Continue reading →

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

Continue reading →

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

Continue reading →

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official development of the “Black Comet” ceased in 2012, in the hacker environment you can still find improved versions of the program. You need to work with it as follows:

Download and install Dark Comet on your computer, run it. At the end of the launch, a window opens in which you need to select the command “Dark Comet RAT” – “Server Module” – “Full Editor”.

In the new window, select “Stub Finalization”, specify the type of extension (.exe, .pif or .bat), then select one of the icons. Optionally, in the “Network Settings” menu in the “Title” field, you can type in some text, for example, “Error”, “Fool”, “You are hacked”, etc.

Having made the settings, click on the “Bulid The Stub” button and save the file.
As soon as the program “catches” some user, you can start managing it: steal passwords, view documents, delete important files, etc. Those who like to gloat can turn off the victim’s desktop, play the virtual piano, send a message, etc.

Other remote access softwares include RMS, Radmin, LogMeIn, and Hidden Administrator.

Manage someone else’s PC using Skype
A very simple way to access someone else’s PC, which is especially useful in cases where you want to spoil the person who offended you. It is done like this:

Choose the offender in the list of Skype users. Left-click on his name – in the window that appears, opposite the Skype field, copy the user’s login.
Go to the site mostwantedhf.info, enter the copied nickname in the “User” field and click on the “Resolve” button. After processing the request, the site will display the IP you need.
Go to the Essential NetTools program (you can download it here), select “NBScan” in the menu, enter the “IP” you found in the “Final IP address” line.
Click start. If nothing appears in the NBScan window, it means that the user you need is not online or has blocked access to it. If everything is in order, you will see it in the list. Right-click on the entry and confirm the “Open Computer” command.
After that, in your “Network” you will see folders stored on someone else’s PC, and you can avenge your victim: delete documents, important scripts, etc.

How to access through Google Chrome
Go to the Google Chrome online store, type “VNC Viewer for Google Chrome” in the search field and install the application. In the window that opens, enter the IP of the user and select the display quality of the desktop and root folders.

You can find out IP using the above method via Skype or use special programs and sites:

Shared Resource
Net Limiter
ip-whois.net;
2ip.ru;
whatismyip.com
Spyware
Spyware is another way to infiltrate users’ system folders. A computer infected with a virus will send all the information to your email inbox, write down everything that its owner enters on the keyboard, etc.

To install spyware, you can use ActiveX components or trojans of the TrojanDownloader category for remote administration, for example, ALB or LD. You can start the server on a remote machine in a couple of simple ways:

Through the “balls.” If you are trying to enter other people’s PCs through extended resources (porn sites, hacker portals, services for downloading free music and videos), so as not to scan the range again later, download the spy, after setting up its work: “C / Windows disk / Main menu / Programs / Startup “. After rebooting the system, the trojan will start automatically.
Social Engineering. You can push the infected file to potential users using the Joiner v2.1 program. For example, you would like to wish someone a happy birthday or a holiday: glue the Trojan server with your card or video greeting and send it by mail to your potential victims. Having opened the letter, users activate the virus and open access to control their machines.

Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

...

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

...