-
mcoates1
at February 07,2016
I've never hacked into another machine before, but it seems as if with the right tools and persistence, one can easily do it. It's amazing how the person was able to hack into another persons machine and look at all of their emails and steal a lot of the users files.
-
fpazdzin
at February 16,2016
It’s interesting how persistent these hackers are. He spends an hour trying to access the victim computers. It just goes to show how dedicated some of these hackers are to getting into their target systems. It also shows just how useless your security measures can be when you fall victim to a phishing email. The first step in securing your system and your files is to be smart about what you click on in your emails and on the sites you visit because a single wrong click can open a door for someone to get into your computer system.
-
adam
at February 16,2016
This video is both harrowing and terrifying at the same time. Contrasting this with the U.S. Military Cyber Training you can see the offensive and defensive capabilities of both nations battling each other in this landscape. I do believe, in response to mcoates1, that these people prey upon the common majority and if most people took some personal cyber security responsibility they would not fall victim to this.
-
danielm8
at March 04,2016
It is very frightening how fast it is for someone to be able to gain backdoor access to your computer. The only way to avoid this is good practice and do not click on unknown links?
-
haneen
at April 12,2016
This feature can be used in tracking bad people. Like pretending that the agent using one of the groups IP address and other accounts to contact with the other members. Maybe use at least the messages and e-mails for evidence.