Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Hacking Dragon Tattoo style.

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jan-27-11 03:53 PM
Original message
Hacking Dragon Tattoo style.
For those who have read the girl with the dragon tattoo series, hacking into computers is a specialty for one of the main characters. My question is, just how easy is this to do if they're hacking into wired computers? Computers with land lines? If someone was hacking into your computer, can you see their programs in Task Manager? As for Task Manager, why would there be an Applemobile or Ipod program showing up if you don't use either technology?
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
chrisa Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Jan-31-11 08:43 PM
Response to Original message
1. It's almost impossible in real life.
Most people have firewalls. Large businesses are pretty much impenetrable. You would need a trojan horse, or something of that nature, that has code tricky enough so that an anti-virus software doesn't pick it up. Wireless is easier to 'hack' if people don't use security keys (the password to get into the wireless internet). Not having a password is extremely dumb.

As for the last question, if a program isn't running on a computer, it wouldn't show up in the task manager (minus some weird corruption issues, I guess).

Never heard of the book, though.
Printer Friendly | Permalink | Reply | Top
 
The Backlash Cometh Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Feb-02-11 10:43 AM
Response to Reply #1
2. It's a great book.
I doesn't go into great detail as far as the hacking is concerned. In fact, I get the impression that she gets help cracking into certain organizations' files. The one time the movie showed them cracking into an individual's computer, the hacker was at a cafe and actually saw the porno files that were being downloaded by the crooked shrink.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 03:48 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC