Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

Continue reading →

Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

How to hack a computer

A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in his memory, but also find out the numbers of bank and virtual cards, and then withdraw all money from them. The resources of the computer itself – the space of the hard disk, the speed of the processor, as well as the speed of the Internet connection will help in attacking other computers that are on the same network as the potential victim. Before you commit a hacker attack, think that the case is illegal and criminally punishable. If this does not scare you, our article is for you.

Hacking a computer through Dark Comet
Dark Comet, or “Rat,” is one of the most popular means of remote computer control. Although the official development of the “Black Comet” ceased in 2012, in the hacker environment you can still find improved versions of the program. You need to work with it as follows:

Download and install Dark Comet on your computer, run it. At the end of the launch, a window opens in which you need to select the command “Dark Comet RAT” – “Server Module” – “Full Editor”.

In the new window, select “Stub Finalization”, specify the type of extension (.exe, .pif or .bat), then select one of the icons. Optionally, in the “Network Settings” menu in the “Title” field, you can type in some text, for example, “Error”, “Fool”, “You are hacked”, etc.

Having made the settings, click on the “Bulid The Stub” button and save the file.
As soon as the program “catches” some user, you can start managing it: steal passwords, view documents, delete important files, etc. Those who like to gloat can turn off the victim’s desktop, play the virtual piano, send a message, etc.

Other remote access softwares include RMS, Radmin, LogMeIn, and Hidden Administrator.

Manage someone else’s PC using Skype
A very simple way to access someone else’s PC, which is especially useful in cases where you want to spoil the person who offended you. It is done like this:

Choose the offender in the list of Skype users. Left-click on his name – in the window that appears, opposite the Skype field, copy the user’s login.
Go to the site mostwantedhf.info, enter the copied nickname in the “User” field and click on the “Resolve” button. After processing the request, the site will display the IP you need.
Go to the Essential NetTools program (you can download it here), select “NBScan” in the menu, enter the “IP” you found in the “Final IP address” line.
Click start. If nothing appears in the NBScan window, it means that the user you need is not online or has blocked access to it. If everything is in order, you will see it in the list. Right-click on the entry and confirm the “Open Computer” command.
After that, in your “Network” you will see folders stored on someone else’s PC, and you can avenge your victim: delete documents, important scripts, etc.

How to access through Google Chrome
Go to the Google Chrome online store, type “VNC Viewer for Google Chrome” in the search field and install the application. In the window that opens, enter the IP of the user and select the display quality of the desktop and root folders.

You can find out IP using the above method via Skype or use special programs and sites:

Shared Resource
Net Limiter
ip-whois.net;
2ip.ru;
whatismyip.com
Spyware
Spyware is another way to infiltrate users’ system folders. A computer infected with a virus will send all the information to your email inbox, write down everything that its owner enters on the keyboard, etc.

To install spyware, you can use ActiveX components or trojans of the TrojanDownloader category for remote administration, for example, ALB or LD. You can start the server on a remote machine in a couple of simple ways:

Through the “balls.” If you are trying to enter other people’s PCs through extended resources (porn sites, hacker portals, services for downloading free music and videos), so as not to scan the range again later, download the spy, after setting up its work: “C / Windows disk / Main menu / Programs / Startup “. After rebooting the system, the trojan will start automatically.
Social Engineering. You can push the infected file to potential users using the Joiner v2.1 program. For example, you would like to wish someone a happy birthday or a holiday: glue the Trojan server with your card or video greeting and send it by mail to your potential victims. Having opened the letter, users activate the virus and open access to control their machines.

Website translation and localization
In technical dictionaries and specialized literature, the term “localization” is often equated with “translation”. However, in practice, localization often goes beyond the scope of translation tasks. What is site localization…

...

Processor
The central processing unit (CPU) is the core of the computer, so to speak its main brain, that component that performs the bulk of the computer’s work. They usually call…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...

Cleaning your computer from dust
The topic Cleaning the computer (judging by the queries in the search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...