answersLogoWhite

0


Best Answer

backdoor program

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What do hackers use to access and delete all files on your computer send email run programs and do just about anything else you can do with your computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Can someone access my computer if i leave my network connection open?

Typically no, but computer hackers can access anything they put their minds to.


What do hackers use to access and delete all files on your computer?

Your password.


Which is used to access files and programs on the computer?

Icons are used to access files and programs on the computer.


How do Hackers Hack a Computer?

Hackers hack computers by using viruses or coding that enables them to get onto your network and access files.


What are the features of the YourFile Downloader?

The YourFile Downloader features spyware and is essentially a virus that allows outside individuals to access your information. The programs downloads a toolbar to your browser and then connects your computer to an outside server, allowing hackers to access your information.


What is a root kit?

It is a piece of software that is used by hackers to gain unlimited access to your computer


Can A denial of service attack can be used to deny hackers access to a computer system?

A denial of service attack is a technique that hackers use once they have already gained access to an individual computer, or a larger network. They essentially keep the computer or network so busy that it cannot access the internet. One would not use this technique to stop hackers. Strong virus and malware protection, coupled with a firewall, is the best defense.


Use A Firewall To Keep Hackers Out?

There are always hackers who are looking for ways to get into any exchange serve that they think they can access. You need to keep them out at all times, especially if this server is located at a business that you own. You can use a firewall to do this. It will automatically block people who do not have the right access codes. It can also block automated programs that hackers may have set up.


What damage is caused by key logging software?

Keylogging software doesn't cause damage, the main priority of a keylogger program is to record what has been typed into the computer/what keys have been pressed, these programs are created by 'hackers' to gain access to sensitive information.


What is the program that hides in a computer and allows someone from a remote location to take full control of the computer?

Its called a R.A.T which is Remote Access Tool. These programs are encrypted allowing them to pass unrecognized through Anti Virus software. AV companies are constantly updating their software as hackers find new and better ways to stay undetected whilst in your computer. These programs are illegal if used to enter someone's computer without their knowledge or permisson.


Explain why firewalls are valuable tools for denying access to unauthorised persons on your computer?

because they can stop hackers from taking or viewing your data


What are small pictures on a computer called?

there called Icon's - which represent software programs or hardware you can access on your computer