Some common methods used by hackers to stole users sensitive data in Internet
Anatomy of an hacker’s attack: the methodology explained in simple way
Here will be shown how a “pseudo-hacker” can gain sensible data of other computers in easy way with some programs commercial or free already developed for this purpose.
I also briefly talk, by other side, how acts a “serious hacker” and the countermeasures that the possible victim should take.
Glider the hacker symbol