|
Hacked Computer

A hacked computer can be used to:
- Record keystrokes and steal passwords.
- Send spam and phishing emails.
- Harvest and sell email addresses and passwords.
- Access restricted or personal information on your computer or the SST network.
- Illegally distribute music, movies and software.
- Distribute child pornography.
- Infect other systems
- Hide programs that launch attacks on other computers.
- Generate large volumes of traffic, slowing down the entire SST network and systems.
|