1.You just have to install this software on your system and ask the people on the other side to install the same and tell u the ID and password.
2.Once you enter the id and password you will be able to connect to their system.
3.Mostly use remote support option.
People on the other side can watch what you are doing on their computer screen and can learn how to fix the problem themselves if it happens again. This login id and password will be valid only for one session.
For those who have never done real hacking and think that it’s tough and impossible…
See this software from a hacker’s perspective. This is something like a Trojan(This isn’t exactly a Trojan, a Trojan installs on the victims computer with out his knowledge and runs in the background) which installs on the victims computer and give you access to his computer
See this software from a hacker’s perspective. This is something like a Trojan(This isn’t exactly a Trojan, a Trojan installs on the victims computer with out his knowledge and runs in the background) which installs on the victims computer and give you access to his computer
No comments:
Post a Comment