Filming an hack attack externally
Using an external filming device to film a hack attack. Or a hijacking.
-When using the inbuild camera of a phone, it's important that the phone is at that moment not
connected to the internet.
Extra for when having enough knowledge:
Knowledge about taskmaneger and command, netstat is very important.
Or even better knowledge or specialised software.
-Danger: Sometimes they might try and destroy the computer because of opening command and
using commands.
Though some or even most hackings and hijackings are automated.
And it's best to put the videos on a laptop or computer not connected to the internet and then storing it
on a for example very cheap but durable data storage device.
Double proof is better.
-When using the inbuild camera of a phone, it's important that the phone is at that moment not
connected to the internet.
Extra for when having enough knowledge:
Knowledge about taskmaneger and command, netstat is very important.
Or even better knowledge or specialised software.
-Danger: Sometimes they might try and destroy the computer because of opening command and
using commands.
Though some or even most hackings and hijackings are automated.
And it's best to put the videos on a laptop or computer not connected to the internet and then storing it
on a for example very cheap but durable data storage device.
Double proof is better.
Comments
Post a Comment