answersLogoWhite

0

Of course not! No one can access a machine while it is powered off or not connected to the internet. A hacker MAY however insert code into the master boot sector of the hard drive, so that whenever the computer is turned on, the code executes and carries out malicious actions.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

Where is the turn computer off button?

computer turn button is located on the cpu or on casing of your cpu by which you can turn off your computer, but it is not a safe way to turn your computer off instead of shut down from the start menu option,


HOW can a computer turn off by itself?

A computer can not turn off by itself. The monitor just turns blank it you leave it. To turn off the computer you have to prees the on button on your computer. If you press the botton on the monitor it is not turning the computer off... just the screen.


What type of program is a backdoor?

They are computer viruses that let hackers and other viruses in to your computer undetected. They are computer viruses that let hackers and other viruses in to your computer undetected.


How do you get people off the computer?

Turn it off.


How energy you use to turn off the computer?

Turn off the fuse box.


Can you sue computer hackers?

Yes.


Does logging off a computer keep hackers away?

no but maybe try changing your password once in a while and have virus checks


What law is broken by computer hackers?

The Computer Misuse Act.


Does your computer turn off is you take off the keyboard?

No, use the power button to turn off your computer. USB is best because You can unplug and plug the keyboard back in without your computer turning off.


When you turn your computer off do you automatically sign out of windows live messenger?

yes if we turn off our computer without signing out our computer will automatically disconnect with internet.


how do you turn off screen time without parent's permissions (only hackers answer!)?

Oh yeah! only proffessional Black hat hackers can answer, because it is impossible to break through apple's devices! see if you can!


What do you do when you log in to your computer and it freezes?

You should try rebooting it. (Turn off the computer and turn it back on.)

Trending Questions
How many 2 liter drinks needed for 20 people? How to Remove a range of cells after selecting it? What does virus protection software do to get rid of computer virus? What are the Picture contextual tools display on in Word Art? What is the set of instructions that tells a computer to initialize the motherboard how to recognize devices connected to the computer and to start the boot process.? What is device driver API? How do you delete apps off Huawei Ascend? How many bus cycles are required for an unconditional or a conditional jump instruction in 8086 microprocessor to be executed? How much is 6 oz in milliliter? How many papers in MCSE? What do you use to ensure that a Web browser and a web server is a secure Cryptographic connection? Why does 'Error 1068 The Dependency Service or Group Failed To Start' appear when starting the remote access auto connection manager or print spooler in Windows XP? How do you remove System Antivirus 2008 from your control panel? What Blank Integrity refers to a set of Access rules that govern data entry and helps to ensure data accuracy? Is the standard communications protocol used on most clientserver networks? How do you select a single cell single column single row a cluster of cells and an entire worksheet in Microsoft Excel 2007? How many people will 1.5 pints of juice serve? What is software entity? Where can I find some laptops on sale? Two home networks across the street from each other - What do you need to connect them together wireless?