packersmovers

Members Login
Username 
 
Password 
    Remember Me  
 

Topic: Black hat forum

Post Info
Veteran Member
Status: Offline
Posts: 26
Date:
Black hat forum
Permalink  
 

Hey There. I found your blog using Google. This is a very well written article. I’ll be sure to bookmark it and come back to read more of your useful info. Thanks for the post. I’ll definitely return.  Black hat forum



__________________
Newbie
Status: Offline
Posts: 1
Date:
Permalink  
 
The terms derive from the color coding scheme found in 1950s westerns, where the bad guys wore black hats, and the good guys wore white or other light colors. Black Hat hackers are criminals who break into computer networks with malicious intent.

__________________
gracepil
Newbie
Status: Offline
Posts: 1
Date:
Permalink  
 
I used to be more tech savvy but that was a long time ago and I kinda lost track of what can be done to a phone to spy on someone. Basically we want to reset the phone to a safe point where it would be impossible for him to still be able to exploit it.

He may also have done it on her computer. What would be the steps to check up the computer as well? I heard that some exploit can still be there even if you format, is that true? How is it even possible.

__________________
 
Page 1 of 1  sorted by
Quick Reply

Please log in to post quick replies.



Create your own FREE Forum
Report Abuse
Powered by ActiveBoard