When you are in a training session last week, put on one of the students the following question: Is it possible for a hacker to destroy spare computer if they managed to breakthrough. Are any hacker can cause a burning Computer cut? This student was a good question, I tried to ask the same question to the students present and the answers were different between those who say yes and no answers. On the whole I liked that I join my answer in this post because I am sure that there are many of you who asked the same question, or has the wrong idea about the subject and must be corrected through this post
In fact Computer destruction hypothesis Vzaaúaa if the computer hacker hacked, is real but has lived many cases where the Alhecrz destroying computers remotely. Despite the fact that it was fairly simple in the nineties, as well as at the beginning of 2000, however, it has become somewhat complex and requires considerable effort and intelligence of the biggest, because modern computers are becoming more intelligent and protect even more powerful as well. But before I explain to you why it has become has become complicated, let me first, I interpret you how a hacker can be based entirely destroyed the computer in case of a breakout.
Of the most common situations in this topic is heating Processors computer and make it burn through the introduction of the processor in the loop calculations to end, in a very short time, or disable the helicopter remote and enter the processor in the heating process. There is also the possibility of burning graphics card the same way as the burning of a computer processor. Not all Maglnah can destroy a computer by passing flash of Pius remote and therefore when you re-run the computer becomes responsive (Broken).
Of course these are some ways in which a hacker can be performed from which burned Computer cut or destroyed, but as I mentioned before, that it has become very complex in this our last day, but not to say impossible, for example, for Processors we are now dealing with powerful processors where the frequency and the number of operations carried out in the second, secondly that Pius computer has become stronger and more resistant to any abnormal operation in the computer as an example of the sudden rise in the degree of computer heat, where the electric current separation is immediate, but also when you feel the BIOS that the processor entered the ring vicious not to cut off the power supply immediately. The same thing for VGA. Not so for Pius itself became significantly protected against viruses and malware.
Where immediately after exposure to any unusual activity they are separated from the electricity in order to protect the motherboard.
Do I have to feel concerned about the destruction of a computer?
The answer is no! As reported in the first thing a big effort in order to need access to your computer as a result of the destruction of Vzaaúaa. Most other Alhecrz who infiltrate computers may Aimitlkon such capabilities, which need to be a genius in hardware and Alsovetoar. Most of the cases we have seen the destruction and burning devices or computers because of hackers attacks were either attacks on government facilities or industrial.
SOCIALIZE IT →