answersLogoWhite

0


Best Answer

Zombie

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is a computer that is controlled by a hacker or other computer criminal?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What does hacking do?

Hacking is basically the vast knowledge of computers or any particular thing. For a computer hacker you should have vast knowledge of computer or in other words you must know everything about everything.There are different types of hackers and the work they do depends on their category.Ethical Hacker or White Hat Hackers do only ethical hacking like securing computers from malicious viruses and activity. They trace the path of the virus and other things.Black Hat Hackers do only non ethical things or malicious things for harming the computer like hacking email accounts, sending Trojans, stealing, and lots of illegal things related to computers.


How do you spike someone who is hacking your computer?

Although it may be possible to "spike" a hacker there are programs that allow you to perform an IP Tracer which can be found at http://download.visualware.com/internetsecurity/index.htmlBut it is far better to inform athorities of the Hacking IP address inwhich the hacker will be delt with accordingly.To "spike" them and cause damage means you are no better than the hacker and can ultimatly get you in trouble or if the serge is too great you may cause harm to the user. In Australia tough new penalities being considered for computer hackers where New Federal laws are being developed to stiffen the penalties for computer hacking and other forms of cybercrime.The new bill would lift the maximum penalty for computer crime to 10 yearsjail.http://www.australianlawonline.gov.au/accesspoint?action=menuHome


What other animals use computers?

Right now, none. Some animals, chickens, dolphins, and gorillas have interacted with computer peripherals (lights, switches and other things controlled by a computer) , but they had no concept of anything about it - software, systems, saving stuff, opening stuff, all beyond them.


What are the functions of white hat hacker?

"White hat describes a hacker who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system's owners to fix the breach before it is can be taken advantage by others (such as black hat hackers.) Methods of telling the owners about it range from a simple phone call through sending an e-mail note to a Webmaster or administrator all the way to leaving an electronic "calling card" in the system that makes it obvious that security has been breached. While white hat hacking is a hobby for some, others provide their services for a fee. Thus, a white hat hacker may work as a consultant or be a permanent employee on a company's payroll. A good many white hat hackers are former black hat hackers. The term comes from old Western movies, where hero's often wore white hats and the "bad guys" wore black hats." Answer from SearchSecurity.com


What is slave unit?

A slave unit is normally a unit controlled my another unit on a network, or that does the same thing as another unit. For example if you have two harddrives in your computer on will be the master and the other one is called the slave unit

Related questions

What is the meaning of hacker?

In common usage, hacker is a term for a computer criminal, often with a specific specialty in computer intrusion.[1] While other definitions peculiar to the computer enthusiast community exist, they are rarely used in mainstream context. Computer hacking subculture is often referred to as the network hacker subculture or simply the computer underground. According to its adherents, cultural values center around the idea of creative and extraordinary computer usage.Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.


What is a hacker how can you can learn the hackers from the company?

The term hacker has a double meaning within the field of computing. A hacker can be a genuine expert of computer software and hardware. The other known meaning of hacker is someone who breaks into computer security networks for a reason of their own, basically they break the law in doing so.


What does a computer hacker do?

A hacker is a programmer who enjoys the challenge of breaking into other computers but does no harm, true hackers have a code of ethics and look down upon crackers.


Is a hacker different than a virus?

Yes, they are extremely different a Hacker is a person which depicted by the media is a person that breaks into computer systems and a Virus is a type of malware that replicates it self and spreads to other computer systems. A Virus behaves pretty much like it does in Biology.


What is the difference between a hacker and attacker?

HACKER-A Hacker is generally someone who just likes to know exactly how things work or how things can be done. They don't want to cause any harm, but rather explore, experiment, and gain knowledgeA Hacker enters your computer and views all your personal files without your permissionATTACKER-Attacker is someone who wants to actually attack your computer or cause harm. Attacker also enters your computer without permission but not only he views them , he will cause serious damage to your computer as well as your profiles on other networks.


How can you make club penguin money maker real?

You can make a money maker for Club Penguin by knowing computer languages and other computer things. So basically you need to be a hacker.


If you use Skype computer chat tool which can be used to have voice communication to converse with your friend both side computer and one side computer and other side mobile can this be tracked?

fankly no not unless the hacker was the best in the world


Can you put computer players in Halo 3?

Maybe, certain websites may inable for you to download maps and computer players but they are called cheaters+hacker. There is no other way than to just download it from someone else.


What is the plot of the original movie Tron?

Tron the original movie, was about a computer hacker that is whisked away into a computer world. He then fights his way to freedom with the aide of other computer programs he meets in the digital world.


What is the term hacker means?

The term "hacker" means someone who illegally breaks into computer systems and uses their private information for illegal purposes i.e can steal bank details, identity, can hack into large companies private info and sell it to other companies etc


Which unethical actions in the computer field must be treated as criminal offenses?

Hacking and virus creations are serious crimes that must be treated just like other criminal offenses.


Electric connection on 700r4 transmissions?

The only thing controlled by the cars computer on a TH700R4 is the lock-up. You will need this if you are towing, otherwise stay in OD(overdrive). The other wires are for the reverse lights. There is also a computer controlled version of the TH700R4 but is known as a 4L60e.