When they get your data, they will obviously use it.
e.g if they get your credit card credentials, they will use your money.
You do not need to contact any hacker to recovery data from a computer. If the computer is yours, use a recovery software. If the computer is someone else's and had stoled the data, this is illegal and should be delt with legally.
it depends on who is playing it...if it is a hacker than yes
entering through the internet
A hacker can access or computer over your wifi signal and access your computer files if your computer is lift on ... i don't know what "green light" your are referring to ... but the only indication of a hacker being on your computer is if you check you inbound -outbound connections and don't recognize a IP address ...
That would be aiding a hacker - which we in the Wiki community will not do ! The legitimate owner of he computer will know the password !
To become a hacker, you would first need to take a wide variety of computer science courses and become well-versed in all the different programming codes and languages.
Not possible. A hacker would need to be either sat at your computer, or have access over the internet.
It may be either a hacker, the fact that you might have made them mad, or they just arent very nice.
You would have to load a password hacker, so you need to re post your question, with the OS of the computer.
A "bad hacker" does things for personal gain, usually money, while an "ethical hacker: does what they do for the betterment of mankind. It depends on your morals, but most people would rather be good than rich.
arguing that a takeover by Computer Associates International would harm Computer Sciences customers because Computer Associates International lacked the flexibility and objectivity of Computer Sciences and that the takeover would harm employees
a hacker is an intelligent person who an expert on programming languages and computer systems. Hackers enjoy breaking into computer systems and gaining unauthorized access to private networks for fun. They do not have evil intentions. They are copying data from your computer system and are less harmful whereas crackers are people who gets unauthorized access to an individual or organisation' s computer system to cause harm..