MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
| |
|
jakenhic1
|
  |
| Joined: 28 Sep 2010 |
| Total Posts: 5756 |
|
| |
|
Am4uryXp
|
  |
| Joined: 04 Sep 2011 |
| Total Posts: 20550 |
|
| |
|
MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
|
| 05 Aug 2013 01:41 PM |
| Who would purchase BC to impersonate somebody? |
|
|
| Report Abuse |
|
|
|
| 05 Aug 2013 01:42 PM |
OYUS And you have to be his slave. |
|
|
| Report Abuse |
|
|
Abel20032
|
  |
| Joined: 04 Sep 2012 |
| Total Posts: 18399 |
|
| |
|
| |
|
MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
| |
|
| |
|
MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
| |
|
|
| 05 Aug 2013 02:53 PM |
kl'd=keylogged
Not hacked, not exploited, kl'd |
|
|
| Report Abuse |
|
|
MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
|
| 05 Aug 2013 03:27 PM |
| Hacking is defined in many ways, and the tech defintion is "to gain unauthorized access", so key logging is apparently the same? |
|
|
| Report Abuse |
|
|
|
| 05 Aug 2013 03:31 PM |
| No, a keylog is sort of like a scamming website used to get someones personal information |
|
|
| Report Abuse |
|
|
MythineX
|
  |
| Joined: 01 Apr 2013 |
| Total Posts: 3769 |
|
|
| 05 Aug 2013 03:33 PM |
Yeah. When people fall for it, they take the info to apparently gain unauthorized access. |
|
|
| Report Abuse |
|
|