- Joined
- Jul 10, 2012
- Messages
- 5,448
- Reaction score
- 2,980
Hellossss computer experts of AW! I have a few queshuns about hacking. Thank you very much for your time!
1. If you hack into someone's computer, would you leave a trace? Would the person be able to trace it back to you?
2. If there is a trace, would it be possible to manipulate the trace so that it traces to a different computer? Would there be evidence of such manipulation having occured?
3. Would it be easier to hack using a physical keylogger planted in the person's computer? What if it's a laptop?
4. If you used a physical keylogger, would it be easy to trace it back to you?
Thankyewssss!
ETA: More details!
The hacker needs to have continual access to the computer. If possible, I need a trace which can be manipulated to trace back to a different computer (so that the hacker can frame someone else for it), but it is preferable if there is at least evidence of a manipulation (so that someone else can figure out that the trace is a false one). Would that be doable?
-The hacker is a 17-yr-old girl in a boarding school. She is hacking into a teacher's computer (she can break into his office if needed, so if a physical keylogger works better, then that can be achieved) to access his files and steal test papers. She'd probably want to access his computer about once a week, just to copy the files. She doesn't need to edit or add new files.
-Since they're at a boarding school, they're all on the same wireless network. Her computer is probably registered under a user name and ID given by the school. Is there a way that she could mask that, or redirect the trace (if there is one) to, say, another student? (But it needs to be able to be traced.)
1. If you hack into someone's computer, would you leave a trace? Would the person be able to trace it back to you?
2. If there is a trace, would it be possible to manipulate the trace so that it traces to a different computer? Would there be evidence of such manipulation having occured?
3. Would it be easier to hack using a physical keylogger planted in the person's computer? What if it's a laptop?
4. If you used a physical keylogger, would it be easy to trace it back to you?
Thankyewssss!
ETA: More details!
The hacker needs to have continual access to the computer. If possible, I need a trace which can be manipulated to trace back to a different computer (so that the hacker can frame someone else for it), but it is preferable if there is at least evidence of a manipulation (so that someone else can figure out that the trace is a false one). Would that be doable?
-The hacker is a 17-yr-old girl in a boarding school. She is hacking into a teacher's computer (she can break into his office if needed, so if a physical keylogger works better, then that can be achieved) to access his files and steal test papers. She'd probably want to access his computer about once a week, just to copy the files. She doesn't need to edit or add new files.
-Since they're at a boarding school, they're all on the same wireless network. Her computer is probably registered under a user name and ID given by the school. Is there a way that she could mask that, or redirect the trace (if there is one) to, say, another student? (But it needs to be able to be traced.)
Last edited: