Reading time: 2 minutesHere will be shown how a “pseudo-hacker” can gain sensible data of other computers in easy way with some programs commercial or free already developed for this purpose.
I also briefly talk, by other side, how acts a “serious hacker” and the countermeasures that the possible victim should take.