How does the Hacker?


Understood a business connected network are protected but a domestic connected network are not.


Trojan horse:


The trojan horse, get access to your remote computer.



Keylogger:


The keylogger is a tool of a hacker. He catch to distant or directly to local machine all is push on the keyboard. Run to distant or to local by a man who had running the spyware by a floppy disk or cd-rom... on a sytem can be desaster for the victim.



Phishing:


The email can be use by a hacker who can get your password for get access to your account mail as MSN or Gmail for example. The hacker try to get your confidence.




DDoS:


The hacker use a software of DDoS or Denial Of Service, the most popular or the most perfect for denied a site with or without anonym person who participate to attack.



We can talk about a rootkit who are a malware used by the hacker for do a DDoS, exploit or spam...