Could this be a hacker?

1 Answer

Answer :

What page did you look on? Check your “Profile” page first before you begin to worry.

Related questions

Description : What harm could a hacker do if they hack your Google glasses?

Last Answer : Oh gawd… they could force me to watch My Little Pony reruns! A fate worse than death.

Description : Should you be able to hack back at the hacker?

Last Answer : self defence usually only works if you can show that all other options, like retreat, have already been exhausted. which in this case is having an impenetrable defence. And besides, I do not ... on the road? They are not an important reason enough to endanger traffic by braking or swiveling.)

Description : How does a Hacker hack?

Last Answer : I do not know and wouldn’t presume to tell you if I did. But I think the first step has something to do with selling your soul to the debil.

Description : What is the latest on Gary McKinnon? (UK/US Hacker case)

Last Answer : Last I heard is that they were doing a huge mental check-up on him because he was going through depression and suicidal thoughts. He requested for a full analysis of his mental health to prevent being extradited. Ever since then, nothing really big has come from the case.

Description : What can a hacker/malicious person do with just an IP address?

Last Answer : For some reason I think I heard this somewhere before I think they can be used and sold to set up a system failure on a different website with high security. If a mass quantity of IP ... website would crash. This would make it easier for someone to obtain information from a high security site.

Description : Are some companies in Russia also getting attacked by hacker-blackmailers for money?

Last Answer : Blackmailers or ransom? Either way, I would assume so, but I’m finding it less than trivial to search for, because of all the articles about cyber ransom attacks from Russia.

Description : Ashley Madison is a 'dating' site for married couples that want to cheat on their spouses. Apparently they have been hacked and the hacker is threatening to release all 37 million names, unless the site closes up shop. Is this good or bad?

Last Answer : While I don’t condone what people do on that site. I find it weird that our right wing friends say we all have a free will to go through life with, yeah sure as long as it meets their views,if it doesn’t then they will force theirs on you, pretty cool huh?

Description : Can a hacker make an SMS text message look like you sent it to THEM?

Last Answer : Let's say I am C. I make an email address with B's phone number. I use Vtext to send a message to A . A will reply thinking it is from B, but C will will get it. I'd stop using SMS and start ... is to set up C for a fall. Make lots of false appointments with B. Discuss this setup off line. Got it?

Description : With my e-mail handle alone how can a hacker hack my password?

Last Answer : answer:By guessing. If you are using real words that are found in a dictionary then you are susceptible to a dictionary attack where a program try's to log on to your account using ... anonymous hacked the emails of a computer security company employed by the US government by doing exactly that.

Description : Has the hacker association "Anonymous" been hitting appropriate targets?

Last Answer : If they are attacking drug cartels then it’s fine by me. They should have a taste of modern PITA.

Description : Is there a way to keep your Facebook account hacker free?

Last Answer : Supposedly they are instituting better and simpler to implement privacy settings soon so that your information will not be as available to advertisers, etc.

Description : Hacker' symbols: Why monkeys, ninjas, pirates and robots?

Last Answer : I can answer for monkeys, it’s that ‘infinite’ theory that if you had an infinite number of monkeys….............

Description : In '96 or '97 there was a sort of book going around the fake hacker community that used warez etc. What was that book called?

Last Answer : Oh! The Anarchist Cookbook! My brother printed that out and hid it under his mattress. He never did anything from it, though. Wait, no! We made napalm out of styrofoam and gasoline one time. Edit: ... some of the phreaking stuff in there, but I don't think that a black box works with cell phones

Description : Can a hacker reactivate your Facebook account?

Last Answer : If “hackers” actually do anything more than serve as a scapegoat for media technophobia, I’d imagine that they certainly have better things to do with their time than reactivate old Facebook accounts.

Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?

Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…

Description : Who is the world's best hacker ?? -AI Class 9th

Last Answer : Kevin Mitnick

Description : is bestkid917 aka roblox acount a hacker?

Last Answer : FREAND BESTKID917 TO BE POSITIVE

Description : what do you do when some stupid hacker hacked you?

Last Answer : It's obvious report it to the police about the stupid hacker. DUH

Description : What is the difference between hacker and cracker ?

Last Answer : The difference between hackers and crackers is that hackers attack your computer with malicious intent and without your knowledge. Crackers, on the other hand , enter your computer to grab your important information. With which you can be harmed.

Description : What is the job of a black hat hacker ?

Last Answer : The job of a black hat hacker is to gain malicious intent by illegally entering a user's computer system or network.

Last Answer : Hacker Yes That Person Who Security Insecurity With Involved Or Who Security Weak Direction Find out Fence Karaya Skilled hacker Work Invalid Way Computer Or Internet On the network Duke Hacking To do.

Last Answer : Stanley Mark Rifkin ( Stanley Mark Rifkin ) _ One Hacker Name Guinness Chest Recorded Was in the "Biggest Computer Fraud" category . Also named Kevin D. Mitnick in 1999 One Hacker in the "The Most Famous Hacker" category Guinness Chest Place Got it .

Last Answer : Cozy Bear Hacker The group 2006 In Established Is.

Last Answer : Cozy Bear Hacker The group Russia.

Description : I would like to ask if it is not possible to find out where or from whom the sms was sent when someone wrote it from the Internet de to find out ??? would some hacker help me ???????? or someone who can

Last Answer : Need Answer

Description : hacker attack on the phone ... what to do with such a phone? ... how to prevent it? ... premium sms, calls to foreign numbers without one's knowledge. Antivirus installed. How to solve such a problem.

Last Answer : ... "premium sms, calls to foreign numbers" ... As far as I know, the user must allow Premium SMS. And the "call to foreign numbers" do you mean ?? - the phone "dials" the number from itself ??? ... , applications, etc. will be deleted). If you do not know how to solve it - contact the service ...

Description : How to become an ethical hacker?

Last Answer : is it legit because hacking is good and interesting something and web design work they can provide u money I mean online money

Description : If your Facebook account has ever been hacked, why do you the hacker was successful?

Last Answer : There are many ways by which hackers get hold of our account and hack into it,so people just have to be very careful so as not to be victims.one way which is very rampant is through our ... is when we access our account through a non secured connection our login data might be stolen by hackers.

Description : Is john doe from roblox really a hacker?

Last Answer : John Doe is not a hacker and was made to be a test account.

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above

Last Answer : d) All of the above

Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker

Last Answer : b) White Hat Hackers

Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls

Last Answer : a. Avoiding Detection

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Last Answer : C)Combination of White and black hat hackers

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : . What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed

Last Answer : c. Bachelor’s degree in the related field