P. 1
Hackers Secrets

Hackers Secrets

4.78

|Views: 21,042|Likes:
Published by mateusd

More info:

Published by: mateusd on May 14, 2007
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/17/2013

pdf

text

original

Make no mistake this is very real. Depending on how much you
read and how much you know about Trojans you are probably
aware of what I am talking about.

If you are not aware, then I am referring to the ability to
effectively turn your computer into an audio/video survellance
unit without you knowing.

Question: How?

Answer: How many of you have Webcams? How many of you
have Microphones?

Not all Trojans have the ability to access your Web Cam and
Microphone. The ones that do, have the ability to turn your
computer into a video/audio survellance camera.

The Trojan records the sounds in a room via your microphone
and then sends the file back to the “hacker.” The hacker then
plays the file back and can hear any sounds recorded in the
room. Add to that since the recording is a file they can play it
back whenever they want to who ever they want.

By the same method they access your Web Cam effectively
getting both a video and audio feed from your house of what is
currently going on in that room.

That sounds crazy, but I can assure you it is not. I don’t think I
need to tell you what type of security hazard this represents to
you and your family.

41
41
41

41

By now you are probably worried/scared of the possible
vulnerabilities of your computer. Don’t be. In Chapter 7 we will
discuss methods to protect yourself from these individuals.

42
42
42

42

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->