Online archive of questions on various topics answered by our experts. You can also ask a question (registration is required)
+4 votes
How can I provide a step-by-step guide to hacking if only the ID is known?
by (4.3k points)

7 Answers

+84 votes
 
Best answer
why everyone want to be a hacker all time? we dont need no more,there are enough of us now.
by (4.3k points)
selected by
0 votes
ID has no real meaning. What is an ID? the macaddress, IP#, yahoo ID, what? . . And if you are having to ask a question like this even trying what you ask is a sever problem, because there is no such thing as a sure fire way to access a computer. Every computer is different and depending on the programs on it certain things will have to be changed.. . I'm not trying to sound like an ass, but you know trying to hack someone elses pc w/o their permission is illegal and you just ask in a place where everyone on the freaking planet can see (if you don't think Yahoo tracks stuff like this you are dead wrong).
by (4.5k points)
0 votes
I could, but I won't.
by (4.3k points)
0 votes
u know i think hacking is a bad thing u should go looking for a better life other than hacking because hacking is a dangerous thing so go look for a better thing to do other than hacking.
by (4.3k points)
0 votes
...all these kids wanting to know how to circumvent their schools security routines..... don't they teach them to think for themselves anymore??
by (4.5k points)
0 votes
There is no "step by step" or "guide" that teaches you how to hack. It's about knowing code and the intricacies of a computer that gives one the ability to hack. What commands do what, what stringing of codes will do. You need to understand code before you have the ability or wherewithal to be able to "hack".. . One usually needs to have programming experience in order to understand Source Coding to even have a basic fundamental to be able to hack.. . Just because you have the ability to turn on a computer doesn't mean you have the mentality to hack. Sorry.
by (4.3k points)
0 votes
Hacking doesn't follow a procedure. It all depends on the kind of security provided to the secured information. Anyway as far as i know hacking depends mostly on breaking the password rather rhan finding the unknown password
by (4.3k points)
...