Saturday, July 2, 2011

The Access Nation

>It is intended for a database,if a person has criminal records.
but use to kill a victim.

-A Hacker can see every movement of his/her victim.
for example,the password of a site,Personal Accounts,the sites he/she visited.
-They have information of a victim,that they will plan to kill him/her.
-Some sites are (not) protected.
-Computer Files are being hacked.
-Sometimes,Releasing Confidential Documents from a victim.
-Some of them,using the Hard Drive for malicious purposes.
-In some instances,the Computer can reformat itself.