Quote:
Originally Posted by Napster
Learn Networking and Linux. Then, whois.com her, trace her IP, find her open ports, infiltrate, map her machine/network. Take her out.
|
Infiltrate? That step alone is more than 95% of pretty much any hack (especially since any planned attack usually involves researching the target), and the part very few know anything at all about.