Skip to main content

What can a hacker do to my system?

Computers are multi-purpose machines that aids both the good and the bad guys in getting their work done easily. And today, we rely so much on them in performing tasks like:
Sending and recieving mails,Browsing the internet, Keeping business and personal records, Performing banking transactions, Scheduling meetings, Planning events Fighting crimes, Communicating with people, the list is endless.
There is nearly nothing we do these days without computers, most people in the developed countries takes notes with tablets computers and smart phones, this has been adopted as a standard. If this is it, you don't need a technical person to tell you that a computer hacker can even take your life or aid in taking it.


  • A hacker can break into your system and access every information on your system's hard disk.
  • A hacker can send your to jail by impersonating you and using your information or your system's information such as: IP Address, MAC Address, etc. to perform a bad job making it all look like you did it.
  • A hacker can gain access to your company's network through your own system which is connected to the network and perform an attack that could put you in jail or kick you out of your job.

Whatever a malicious attacker does to your system, the end result is always bad.
To learn how to protect your system against an attacker, please check out my previous post "Securing your system from hackers".
Note: There has been some arguments about who a hacker is and while some argue that a hacker is a computer cracker that cracks to gain unauthorized access to a computer service, network, etc. some believe that a hacker is a computer genius (mainly Software Engineers) who can program the computer to do their will. In this post, I refer to a hacker as a computer genius that uses his or her skills for malicious purposes. This hacker could be anybody, starting from your son, daughter,
mother, father, grandmother, a paid hacker or anyone who is good at using the computer systems.

Disclaimer: I can't say that the information provided in this are all a hacker can do. To find more information on what a hacker can do, please google it out.

Thanks for reading....

Comments

Popular posts from this blog

HOW TO WRITE, COMPILE AND RUN C++ CODE ON LINUX KALI

Developing a C++ Program on Kali Linux Without Installing Additional Software This article is for hackers who want to develop a C++ program on Kali Linux without installing any additional software. Some might say you need to install a separate compiler or extra tools to write and run a simple C++ program on Kali Linux. However, I’ll show you how to do it right out of the box. Pre-installed C++ Compiler in Kali Linux Kali Linux comes with a pre-installed C++ compiler called g++ . We will use this to write and compile a basic "Hello, World!" program. Step 1: Check if g++ is Installed Open your terminal and run the following command: g++ -v If the compiler is installed, you should see version details. If not, you will get an error message. Step 2: Create a C++ File In your terminal, type: nano MyCpp.cpp This will create a C++ file and open it in the Nano editor. Step 3: Write the C++ Code Once Nano opens, enter the following C++ code: #include <...

HOW TO MAKE A SIMPLE TEXT TO SPEECH(TTS) WINDOWS PROGRAM USING C# PROGRAMMING LANGUAGE.

This post is a beginner's guide on how to get started with speech programming in visual studio using c# (c_sharp) programming language. For those who don't know what a programming language is, in a nut shell, a programming language is simply a command based computer language used for instructing a computer to do a particular job. When I say job, I mean very complex job. Write the above definition in an exam and stand a chance of losing marks. The definition isn't all there is about what programming language is, so I suggest you make a good search to learn what programming language really is. Though, this article is for beginners but I will say "BEGINNERS ARE CLASSIFIED", am a beginner. If you are a beginner who hasn't tasted code in his or her life before, I suggest you go start something. A good learning source is "tutorial point", they taught me a lot. Now for you who have tasted code, you will need the following: Computer System running wind...

HOW TO APPLY FALLING TEXT EFFECT IN A CONSOLE PROGRAM WITH THREADING IN C#

"A thread is defined as the execution part of a program. Each thread defines a unique flow of control. If your application involves complicated and time consuming operations then it is often helpful to set different execution paths or threads, with each thread performing a particular job.", says the smart guys behind Tutorials Point.Well, our program is not going to be complicated and we are not going to be performing any time consuming task, we are rather going be creating a camouflage application that gives us the effect similar to what you get when you ping a site or an IP address with the "-t" option in cmd or the effect you see in movies like Blacklist, 24, Person Of Interest and the likes.Now let's stop the ranting and get started.We are going be building this application upon our existing code, one we started in the previous article "How to grammatically Change the background and foreground color of a console Application".Now open up the code in...