but use to kill a victim.
-A Hacker can see every movement of his/her victim.
for example,the password of a site,Personal Accounts,the sites he/she visited.
-They have information of a victim,that they will plan to kill him/her.
-Some sites are (not) protected.
-Computer Files are being hacked.
-Sometimes,Releasing Confidential Documents from a victim.
-Some of them,using the Hard Drive for malicious purposes.
-In some instances,the Computer can reformat itself.
No comments:
Post a Comment