answersLogoWhite

0

Download some of the best Firewalls like Comodo Firewall,Avast firewall etc to keep your ps safe from hackers.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

Do you have to connect your xbox to computers when hacking?

You shouldn't be hacking in the first place, so no.


What do you do after hacking computers?

u use them to hack games


How you learn about hacking?

Read books and watch videos about computers.


How do you control other peoples computers without touching them?

Its called hacking a computer =]]


What is one comandments of computer ethics?

Computers shalt not process what they are not intended to. (hacking)


What is tolerance factor of handwriting recognition system?

it stops computers hacking =D


Where can one find a home network security company?

A home network security company is a company that provides security for a computer. Some examples of this are AVG antivirus and Norton antivirus. These protect computers against viruses and also protect security systems from things like hacking.


Who are hacking computers who is going to try to stop it i know who is hacking computers a girl name lyrissa Samuel?

How about you go to the local police station and tell them. Or go to Crime stoppers. Don't know if that have that in America though. Have a nice day. =D


Is it against the law to hack?

Hacking is a broad term. Cracking, which is gaining access to other peoples computers or accounts, is considered illegal. Hacking simply means using computers to do things most people don't realize they can do, which is not illegal in most cases.


How did hacking develop?

The word come out as computers came out, about the 1960's. It origanally meant "to tweak".


Do you know about the site www.computerpapa.com?

It is the best site in the world to learn about hackers , hacking and all about computers.


What steps can one take to protect one from wifi hacking?

There are few steps one can take to protect one from wifi hacking. Some of the steps are: One should not use WEP encryption, and WPA2 encryption only.