Computer and vision
This article will discuss the effects of computers on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the computer. More…

Continue reading →

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Computer assembly, pitfalls
Assembling a computer, especially a new one, is a lottery game. A number of factors that are not dependent on the builder can lead to the fact that the computer…

Continue reading →

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official development of the “Black Comet” ceased in 2012, in the hacker environment you can still find improved versions of the program. You need to work with it as follows:

Download and install Dark Comet on your computer, run it. At the end of the launch, a window opens in which you need to select the command “Dark Comet RAT” – “Server Module” – “Full Editor”.

In the new window, select “Stub Finalization”, specify the type of extension (.exe, .pif or .bat), then select one of the icons. Optionally, in the “Network Settings” menu in the “Title” field, you can type in some text, for example, “Error”, “Fool”, “You are hacked”, etc.

Having made the settings, click on the “Bulid The Stub” button and save the file.
As soon as the program “catches” some user, you can start managing it: steal passwords, view documents, delete important files, etc. Those who like to gloat can turn off the victim’s desktop, play the virtual piano, send a message, etc.

Other remote access softwares include RMS, Radmin, LogMeIn, and Hidden Administrator.

Manage someone else’s PC using Skype
A very simple way to access someone else’s PC, which is especially useful in cases where you want to spoil the person who offended you. It is done like this:

Choose the offender in the list of Skype users. Left-click on his name – in the window that appears, opposite the Skype field, copy the user’s login.
Go to the site mostwantedhf.info, enter the copied nickname in the “User” field and click on the “Resolve” button. After processing the request, the site will display the IP you need.
Go to the Essential NetTools program (you can download it here), select “NBScan” in the menu, enter the “IP” you found in the “Final IP address” line.
Click start. If nothing appears in the NBScan window, it means that the user you need is not online or has blocked access to it. If everything is in order, you will see it in the list. Right-click on the entry and confirm the “Open Computer” command.
After that, in your “Network” you will see folders stored on someone else’s PC, and you can avenge your victim: delete documents, important scripts, etc.

How to access through Google Chrome
Go to the Google Chrome online store, type “VNC Viewer for Google Chrome” in the search field and install the application. In the window that opens, enter the IP of the user and select the display quality of the desktop and root folders.

You can find out IP using the above method via Skype or use special programs and sites:

Shared Resource
Net Limiter
ip-whois.net;
2ip.ru;
whatismyip.com
Spyware
Spyware is another way to infiltrate users’ system folders. A computer infected with a virus will send all the information to your email inbox, write down everything that its owner enters on the keyboard, etc.

To install spyware, you can use ActiveX components or trojans of the TrojanDownloader category for remote administration, for example, ALB or LD. You can start the server on a remote machine in a couple of simple ways:

Through the “balls.” If you are trying to enter other people’s PCs through extended resources (porn sites, hacker portals, services for downloading free music and videos), so as not to scan the range again later, download the spy, after setting up its work: “C / Windows disk / Main menu / Programs / Startup “. After rebooting the system, the trojan will start automatically.
Social Engineering. You can push the infected file to potential users using the Joiner v2.1 program. For example, you would like to wish someone a happy birthday or a holiday: glue the Trojan server with your card or video greeting and send it by mail to your potential victims. Having opened the letter, users activate the virus and open access to control their machines.

BIOS update
Updating (flashing) the BIOS of any device is a responsible procedure. I do not write difficult, because there is nothing complicated there. However, any error made while updating the firmware…

...

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

...

Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

...

Motherboard
A motherboard is one of the main boards (components) of a computer. It is designed to connect the remaining components of the computer into something single called the system unit.…

...