answersLogoWhite

0


Best Answer

A trojan horse. A trojan horse is a program designed to disguise itself as a innocent program, and later find a backdoor into your computer, therefore letting the person on the other end take over your computer. Then, they can do anything they want. Steal your info, destroy Windows causing you to have to go buy another copy and reinstall, display pop-ups, and much, much more.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

entering through the internet

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: The most likely method a hacker would use to access a computer is?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

The most likely method a hacker would use to access a computer is .?

entering through the internet


What does DMA stand for and what does it do?

DMA, Direct Memory Access, is a method of transferring data from the computer's RAM to another part of the computer without processing it using the CPU.


Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?

From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.


How do you find out if a firearm is clean for purchase?

No standard method- as a private citizen, you cannot access the police computer database of stolen property.


What is the definition of a file based approach?

It is a method for storing and organizing computer files and the data they contain to make it easy to find an access.


What are the two characteristics of the controlled media access method?

It is known as a deterministic access method.


What is deterministic access method?

When using the controlled access method, network devices take turns, in sequence, to access the medium.


What has the author Bryan Douglas Knysh written?

Bryan Douglas Knysh has written: 'An alternative computer access method for physically disabled persons'


Full form for HSAM?

Hierarchical Sequential Access Method-is a method to use sequential access of database.


What is meant by private visibilty of a method?

It means that the method is visible from only within the current method. Also, any class that wants to use or invoke the private method has to create an object of the class in which the method is created in order to access/invoke it. The private access modifier is the most restrictive of the four java access modifiers. The total opposite of private is public which gives access to everyone.


What is the random access method?

Is one of the three types of Access Protocols. In this method any station has the right to access the medium with out being controlled by any station.


What is the easier object in Access provides a data entry method?

What is a easy data entry method in Microsoft Access to use