Skip to Content

A hacker can take remote control of your computer

You probably hear about this all the time. A big bank was hacked, Tumblr was hacked, the infidelity website Ashely Madison was hacked, and now the secret is out. However, there is more to it, and it is not as flashy as it’s portrayed in movies.

A hacker can take remote control of your computer

Hacking is when an unauthorized person gets into a computer system. A hacker will ‘break-in,’ and then they have access to information they aren’t supposed to have. Some hacking attacks are large-scale such as the hack Yahoo experienced back in 2013. This attack saw billions of people have their personal data compromised. There are also small-scale hacking attacks, like having your Facebook account hacked.

Content Summary

What do hackers do after hacking?
Steps to hacking
How to avoid being hacked

Hacking is not just about typing some magic words single-handedly on a keyboard. Hacking is difficult and usually takes lots of planning and time. Stopping malicious hackers can be even more challenging. Some people dedicate much energy and time to stopping malicious attackers.

What do hackers do after hacking?

Companies are now more vigilant to protect themselves against hackers to avoid hacking. Once hackers gain access to your computer, they have a few choices.

They can gather information, cause some damage to your computer’s system or they can also do nothing and instead notify the company of the security loopholes. That’s the significant difference between the three major types of hackers:

Black hats

Hackers who hack into systems intending to cause harm or illegally get information.

White hats

These are hackers who’ve been hired to legally break into other systems to test the systems’ vulnerabilities. Once these hacking vulnerabilities have been detected, they are fixed.

Grey hats

These are hackers who walk the line between black and white hacking. While they don’t actively seek to cause damage, their actions are still illegal or unethical. For example, breaking into a system without being hired to do so.

However, whether you are either of the three aforementioned hackers, the techniques used are essentially the same. Because, if you’re a white hat, you have to know every step a black hat would take to identify different system vulnerabilities.

Steps to hacking

Looking at the steps to hacking is a great way to explore some of the basic principles of hacking.

Taking a penetration (pen) test is usually the first step. Reconnaissance/recon is the first pen test step. This is where the victim’s data is taken to figure out the best way to hack them—for example, identifying the kind of OS the victim is using. That way, you’d use viruses tailored for that specific OS.

After the recon, the next step is taking protective steps. Here, you’ll take all the OS system versions and hardware you are running and see if they have any known hacks. Knowing your IP address is equally useful. When some hackers find ways to exploit software using an IP hacking tool, this tool allows you to check your IP and if a vulnerability is found there, it gets published online. After that, the OS manufacturing company creates a patch to prevent that vulnerability.

It is, however, worth noting that updates and patches won’t always be installed immediately on your systems. That’s why you are advised to check for all new updates now and then.

Another part of the penetration test has to do with websites. For every part of a website, some parts are supposed to be seen by everybody. However, there is also an entire administrative side to it. This is the part that not everyone is supposed to see. Those pages usually have sensitive information developers might need.

Hackers will generally try to find URLs to see if they will bump into files or pages that shouldn’t be accessible to the public. To find these URLs, crawlers are used. Crawlers are programs that automatically map out sites by visiting different directories and links.

Once the test is done, it is time to fix those vulnerabilities.

How to avoid being hacked

  • Fix all easy/weak passwords
  • Enable two-factor authentication
  • Be smart about the Wi-Fi networks you connect to


Even with all the above, you can never be 100% safe from hackers. You still have to always be on the lookout for new threats. However, for the most part, the above information will help increase the odds in your favor. Even though hacking may or may not ever happen to you, the saying ‘better safe than sorry’ remains true. Always ensure that you have put out all necessary precautions while online to avoid losses caused by hacks.

Alex Lim is a certified IT Technical Support Architect with over 15 years of experience in designing, implementing, and troubleshooting complex IT systems and networks. He has worked for leading IT companies, such as Microsoft, IBM, and Cisco, providing technical support and solutions to clients across various industries and sectors. Alex has a bachelor’s degree in computer science from the National University of Singapore and a master’s degree in information security from the Massachusetts Institute of Technology. He is also the author of several best-selling books on IT technical support, such as The IT Technical Support Handbook and Troubleshooting IT Systems and Networks. Alex lives in Bandar, Johore, Malaysia with his wife and two chilrdren. You can reach him at [email protected] or follow him on Website | Twitter | Facebook

    Ads Blocker Image Powered by Code Help Pro

    Your Support Matters...

    We run an independent site that is committed to delivering valuable content, but it comes with its challenges. Many of our readers use ad blockers, causing our advertising revenue to decline. Unlike some websites, we have not implemented paywalls to restrict access. Your support can make a significant difference. If you find this website useful and choose to support us, it would greatly secure our future. We appreciate your help. If you are currently using an ad blocker, please consider disabling it for our site. Thank you for your understanding and support.