Can hacker use your internet

Updated: 10/25/2022
User Avatar

Wiki User

16y ago

Best Answer

Yes, a hacker can use your internet if you have a wireless connection and they are close enough to your Wireless access point and it is not locked down with an Encryption(Standard WEP encryption 128-bit). They can also use your internet if they have hacked your computer to where they can control it.

User Avatar

Wiki User

16y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can hacker use your internet
Write your answer...
Still have questions?
magnify glass
Related questions

What technologies does an ethical hacker use?

computers, internet and special software

The most likely method a hacker would use to access a computer is .?

entering through the internet

Does Norton Internet Security block instrusions Does the attempt succeed by the hacker?

Yes, the attempt succeed by the hacker.

Who is the first hacker fo the internet in the world?


How can you stop the Hacker?

If a hacker has gotten into your computer once, they will get in again. If you are unable to track down any programs that they left behind, you should seek professional help. As a last resort, backing up your important data and reformatting your computer will guarantee removal of these programs. Remember to always use strong passwords and to be suspicious of any programs you download from the internet.

What is the name of the device that will allow multiple internet jacks?

Hacker Bots is what lets you get more internet jackes.

How do you find out if someone has search your name on the internet?

you cant! unless your a hacker.....

What is wap and why you use wap?

WAP Is Defined as Wireless Application Protocol. It is secure way to use internet on your pc/laptop via wi-fi and can not be easily hacked by hacker.

How do you make hacker in doodle Devil?

You combine life & internet so in a sum formation (Internet + life = cyberspace)

What is good and bad use computer and internet?

Using a computer saves trees, and internet is a great way to gain necessary information. A computer is addicting, as well as the internet, and too much reliance on a computer can result in lost files if a virus or hacker enters the system.

Which procedure does a hacker use in ping scanning?

A hacker sends ICMP messages to a range of IP addresses.

Similarities between the hacker and cracker?

Hacker use Ownmad (selfmade) Softwares and tools and methods... While cracker use Another,s Tools and Softwares for Hacking.