-
Use Trojan horses, backdoors like Gray Pigeon.
-
Uninstall the page.
Seventh, the gray pigeon official**.
http;8. Introduction of the members of the Gray Pigeon Studio.
Ge Jun: At the beginning of 2003, he and his friend Huang Tuping founded the Gray Pigeon Studio. In 2001, the Advanced version was the first to develop and use the most advanced connection technology on the remote control software.
Huang Tuping: At the beginning of 2003, he and his friend Ge Jun founded the Gray Pigeon Studio.
The gray pigeon is the ancestor of its kind of software.
-
: Thinking too much about big brother. You can't do much with IP alone. What's more, now it's all about assigning dynamic IP programs called metasploit It feels like it depends on the level of the question you ask, and you can't control it.
-
Unless you want to be a hacker. It's not so easy for the average person to do. Nowadays, many computer user systems have been patched with vulnerabilities and firewalls installed. It's not that easy to hack into someone's computer.
-
Learn hacking techniques, scan for vulnerabilities in the other party's systems and software, and then use vulnerabilities and Trojans to invade, and at the same time learn to hide your IP with the ** server to prevent being tracked.
Note: Be somewhat ethical and legal-minded, otherwise you do so at your own risk. )
Hacking techniques, there are teaching materials on the Internet, you can collect them yourself.
-
It's simple, it's all available online. It depends on which software combinations you use. It's easy to hack. But not every one of them can be hacked. I can't teach you exactly what method is, lest you use it to do bad things.
-
Tools, kitchen knives, fruit knives are acceptable. A red scarf.
Steps. 1.Hold a knife. Face covering.
2.Climb through the window and enter the room you want to invade, 3The knife is placed on the neck of the owner of the computer.
4.Make your invasion request.
5.The invasion is complete. Retreat or get caught.
-
If you come here to ask, it means that you are still too far away. Can't teach.
Let's find relevant materials for yourself first.
-
Didn't get to the point. Are you using QQ remote control, yes, it is recommended to adjust the security settings of QQ to the bottom point, and if the other party has anti-virus suggestions, let him turn it off.
-
It is recommended that you use remote assistance on QQ to control that it will not affect your work.
-
With viruses, direct antivirus is enough.
Install a PC Manager on the computer.
Then select the virus detection function, and then select the antivirus mode.
Finally, the detected computer virus can be deleted directly.
-
Dear users, hello:
Knowing the wifi password can only connect to wifi, and cannot control the computer.
China Telecom provides the best quality network communication services, old friends for new phones, Internet age cash, 100 Gigabit broadband free experience, ultra-clear TV ITV, telecom activities can be directly queried through the business hall.
-
Anti-virus: Don't use it.
Detection method: Boot the Internet, don't open any program, only open 360, in the advanced network connection option, see if it is connected to a certain IP, check it, if it is ADSL, it should be in Malaysia.
Resolution. Antivirus reloaded.
-
Simple cyber intrusion methods.
1.Obtaining the other party's IP address, such as, there are too many ways to go into detail.
2.To determine where the other party is surfing the Internet, open a DOS window and type in the information reflected in lines 4 and 5 of tracert, which is the location of the other party's Internet access.
3.To get the name of the other computer, open a dos window and type nbtstat -a, and the first line is the name of the other computer.
The second line is the workgroup where the other computer's computer is located.
The third line is a description of the other computer.
4.There is a file name in the windows directory, change it to lmhosts, delete its contents, and write the other party's IP and computer name to the file in the following format:
Computer name 5Open the dos window and type nbtstat -r6Enter the name of the other party's computer in Start-Find-Computer, and click on the other computer.
Please do not use the above methods indiscriminately, I am not responsible for the trouble you cause by using the above methods, please be cautious.
-
Upstairs you copy the ground there to put.
If you get the virus, you don't necessarily have to be controlled by others.
You have to believe that he who can do the virus will definitely kill him. You don't have to worry.
-
Not necessarily.
Others are to get your personal information and passwords.
Some will control.
-
With viruses, direct antivirus is enough.
Install a PC Manager on the computer.
Then select the virus detection function, and then select the antivirus mode.
Finally, the detected computer virus can be deleted directly.
I didn't give points, why did I tell you? You want to do bad things, don't you?
First, it is illegal to control another party's computer without consent. >>>More
There are several signs that your electro-finger script is being controlled remotely: >>>More
1. Swipe the phone to control the computer.
2. With Microsoft Remote Desktop, you can easily watch your phone on Android. >>>More
The easiest way is to unplug the network cable, then the teacher machine will not be able to search for your machine, but you will also have no way to access the Internet. You can also enable a computer firewall so that you don't have control over your computer. >>>More