I might add that I had looked into the mind of PRINCE WILLIAM and believe me, it was like an infected computer...so many corrupted files...it was almost unbelievable.
I can also remember not having the time to explain how I 'hacked' into their minds...to the SOCA chiefs...this was a system that was based upon meta-knowledge of computing...how it really works...and based upon 'seeing patterns' and knowing how to loop, double-back...your pathways around a computer...but put simply - if you want to hack somebody's system...this is how you do it:
Firstly you manage to get some bogus files upon it that look just like a large group of files already upon it...
For example - after 'seeing' what GILL had done to this laptop...all of MARK R's and GILL's files upon it...I then decided to add a few of my own - which I could 'pick up' later on and use as tools...for example - I had hacked the HELP MENU to code in a 'how to take over administrative privileges' file...with a 'secpol.msc' file....this was nonsense but a 'trigger' for myself...and the ill missed that one...
GILL complained to MARK R that after having another look at my laptop...there seemed to be a few more files upon it - than he had put on...he had the number of files that he had put on...100s of them...about 400 or more...and he was puzzled to see that there were a few more than his number...MARK R told him not to worry...because it would mean 'doing the whole thing again' and it had taken so long...
Anyway, once you have your files upon the system...they are the 'key' into the 'lock' of the bogus files...because you have connected them up to them...and once you release 'permissions' upon your files...you can then begin to unlock the permissions upon their bogus files...that is one method of hacking another system and a very effective method, I might add...my 'hacking days' are beginning to come back now...
Wednesday, 11 August 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment