2013 adult webcam
Another turned to social media, where "I've been able to message random hot girls on facebook (0 mutual friends) and infect (usually become friends with them too); with the right words anything is possible." For those who can't even manage this on their own, RAT experts hawk their slave-infecting expertise in e-books such as , a 22-page tome that goes for .95 (and which claims to be the best-selling book on Hack Forums)."Ever faced a situation where you have FUD server but cannot get victims? "Or maybe you're getting a lot less installs compared to the amount of work you are putting in?With a few clicks, the operator can start watching the screen or webcam of any slave currently online.The process is now simple enough that some ratters engage in it without knowing how RATs really work or even how vulnerable they are to being caught."Always thought it was some kind of wierd sick fetish because i enjoy messing with my girl slaves." As another poster put it in a thread called ☆ Show Case ☆ Girl Slaves On Your RAT, "We are all going to hell for this..." But he followed it with a smiley face. They operate quite openly online, sharing the best techniques for picking up new female slaves (and avoiding that most unwanted of creatures, "old perverted men") in public forums. The lead author, who went by the alias Sir Dystic, called Back Orifice a tool designed for "remote tech support aid and employee monitoring and administering [of a Windows network]." But the Cult of the Dead Cow press release made clear that Back Orifice was meant to expose "Microsoft's Swiss cheese approach to security." Compared to today's tools, Back Orifice was primitive.Even when their activities trip a victim's webcam light and the unsettled victim reaches forward to put a piece of tape over the webcam, the basic attitude is humorous—Ha! It could handle the basics, though: logging keystrokes, restarting the target machine, transferring files between computers, and snapping screenshots of the target computer. The woman is visible from thousands of miles away on a hacker's computer. A picture of old naked men appears in their Web browser, then vanishes as a Mc Afee security product blocks a "dangerous site." "I think someone hacked into our computer," says the young man. The poster was referencing a 134 page thread filled with the images of female "slaves" surreptitiously snapped by hackers using the women's own webcams.
One woman targeted by the California "sextortionist" Luis Mijangos wouldn't leave her dorm room for a week after Mijangos turned her laptop into a sophisticated bugging device.
View from the Capitol looking west on Duke of Gloucester Street in Colonial Williamsburg’s Historic Area.
Condensation occasionally may obscure the view through this antique glass pane.
"Mostly I pick up the best bits (funny parts, the 'good' [sexual] stuff) and categorize them (name, address, passwords etc.), just for funsake," he wrote.
"For me I don't have the feeling of doing something perverted, it's more or less a game, cat and mouse game, with all the bonuses included.
It might be an odd hobby, but it's apparently no big deal to invade someone's machine, rifle through the personal files, and watch them silently from behind their own screens.