AFTER THEY FIND A WAY INTO A COMPUTER

AFTER THEY FIND A WAY INTO A COMPUTER

Through war-dialing, port scanning, or war-driving, hackers can locate nearly any computer that communicates with another computer through a network, a phone line, or the Internet. Unfortunately, once hackers find a computer, they often can't resist the temptation to explore and break into that computer, and once a hacker has broken into a computer, the results could range from simple browsing to trashing the entire system and wrecking everything in sight.