answersLogoWhite

0

Your password.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What do hackers use to access and delete all files on your computer send email run programs and do just about anything else you can do with your computer?

backdoor program


How do Hackers Hack a Computer?

Hackers hack computers by using viruses or coding that enables them to get onto your network and access files.


What could happen if your password was stolen?

hackers can hack into your personal computer/ devices and access personal files and have free range over all of them.


Does fragmenting computer delete photos?

No, a Disk Defragmenter is moving the files around so they can be read easier for quicker access. It's not removing them from the computer.


Can you delete rbf files on your computer?

RBF files are a type of backup file that are found in the Config.Msi folder on your operating system. Yes, you can delete RBF files on your computer.


Which is used to access files and programs on the computer?

Icons are used to access files and programs on the computer.


What is a descriptive sentence for the word delete?

Did You Delete the files off of the computer ?


How does technology affect maintaining confidentiality of medical records?

Though medical records are usually encrypted, there is a chance that hackers can access them. Certain technologies allow savvy computer users to access hidden files.


How do you delete compressed files on computer?

You can delete them just like any other folder.


What is Imsmn?

it is a computer virus, which gets copied to your program files>video activeX access and which could not be deleted. each time you try to delete it, it will replicate


How do you delete all browser files?

Ether find away to delete all the files one by one, or beat your computer with an axe.


What is antivirus software and how it can be used to combat crime?

AntiVirus Software is a program that deletes harmful files on your computer that can be used to keep track of your keystrokes, delete files off of your computer, or send personal files to another person's computer. These programs can be used to combat computer crime because it's deleting files that could be used to gain access to personal information.