answersLogoWhite

0

They usually have high levels of complex neural networking systems and firewalls set up around their information databases to detect any abnormal activity, such as hacking or unauthorized persons attempting to access classified data. They also have hired persons that are trained to handle hacking and tracking situations.

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Engineering

Which is the best operating system for hackers?

The best OS for hackers is Backtrack Linux 5.


Who builds robots?

Engineers make robots because it is their job. Along with engineers, Hackers make robots (not the computer hackers but the hackers who modify things). Overall anyone can build a robot, it is the engineers and hackers build them for a living.


What are the types of hackers?

there r four types of hackers .white hat hackers :- they do hacking only for ethics they trace and monitor the malicious activity.they have the legal rights to do hack or related to hacking . they are also called ethical hackers.Black hat hackers :- they do only malicious thing like making trojens ,hacking email id .they actually called crackers . they don't have the legal rights to do that. they are called non ethical hackers.grey hat hackers :-some time white hat hackers turn to black hat hackers those hackers are called grey hat hackers.suicide hackers :- that type of hackers do the illegal job without fear of police or law.for more practical knowledge regarding to ETHICAL HACKINGsubscribe the channel:http://labs.google.co.in/smschannels/subscribe/ethicalhackingTricks


Are pecos machines unhackable?

No, pecos machines, like any other technology, are not unhackable. While they may have security measures in place to protect against unauthorized access and tampering, determined hackers can exploit vulnerabilities. Continuous updates and security enhancements are essential to mitigate risks, but no system can be guaranteed to be completely secure.


Can you see a hacker?

hacker is not a bacteria , or invisible man. we can see hackers. probably your question should be "can we find hackers?". hackers are not robbers or gang lords. they are same as common man but with some knowledge about computer's working. but crackers are hard to be found.

Related Questions

What is the form of http?

Full Form of HTTPS: Hyper Text Transfer Protocol Secure i want to protect my computer from hackers by using the https system. how do i do this?


Which is the best operating system for hackers?

The best OS for hackers is Backtrack Linux 5.


Is there a Government agency to protect us from hackers?

What you should be asking is whether there is a hacker agency to protect you from Government.


How can you protect your pcs from hackers?

password it, disconnect it from the internet or use a firewall


How can you protect yourself from hackers?

Install norton or something do not disable your firwall


Are hackers an internal threat to a system?

Not all, some are good some are bad. White hat hackers are good, and black hat hackers are bad.


What hackers do after hacking?

It depends on... Usually after hacking the system, hackers escalate rights on the system, then open backdoors (by installing "illegal" software) to make possible to use the system again. And the last step hackers hide its presence by deleting or modifying log files.


How do you give a program elevation?

by modifying the output and improving the codes to protect it from hackers . Use classes and objects to protect the codes


Who is ranked the greatest threat to a computer system?

hackers


What can the network administrator do to protect the network from hackers who might have learned the SSID?

Change the SSID


Is webroot system hackers?

Webroot is not a system hacker; it is a cybersecurity company that provides antivirus and internet security solutions. Their products are designed to protect users from malware, phishing, and other online threats. While Webroot focuses on enhancing security, hackers typically seek to exploit vulnerabilities for malicious purposes. Therefore, Webroot's mission is to safeguard systems rather than compromise them.


Is fax by email safe?

Unfortunately you will always have to worry about hackers. Faxing via email is a great idea and it is just as safe. You just need to use a trusted service that will help protect you against the hackers.