2013 adult webcam
This is commonly done by seeding file-sharing networks with infected files and naming them after popular songs or movies, or through even more creative methods."I seem to get a lot of female slaves by spreading with a [RAT] server on torrent sites," wrote one poster.It might be an odd hobby, but it's apparently no big deal to invade someone's machine, rifle through the personal files, and watch them silently from behind their own screens."Most of my slaves are boring," wrote one aspiring ratter. It makes it more exciting when you can literally spy on someone. " One poster said he had already archived 200GB of webcam material from his slaves.With a few clicks, the operator can start watching the screen or webcam of any slave currently online.The process is now simple enough that some ratters engage in it without knowing how RATs really work or even how vulnerable they are to being caught."Always thought it was some kind of wierd sick fetish because i enjoy messing with my girl slaves." As another poster put it in a thread called ☆ Show Case ☆ Girl Slaves On Your RAT, "We are all going to hell for this..." But he followed it with a smiley face. They operate quite openly online, sharing the best techniques for picking up new female slaves (and avoiding that most unwanted of creatures, "old perverted men") in public forums. The lead author, who went by the alias Sir Dystic, called Back Orifice a tool designed for "remote tech support aid and employee monitoring and administering [of a Windows network]." But the Cult of the Dead Cow press release made clear that Back Orifice was meant to expose "Microsoft's Swiss cheese approach to security." Compared to today's tools, Back Orifice was primitive.
The hacker sends the pair a message that reads "achoo! But, of course, the kinds of people who watch others through their own webcams aren't likely to limit themselves to these sorts of mere hijinks—not when computers store and webcams record far more intimate material.Today, a cottage industry exists to build sophisticated RAT tools with names like Dark Comet and Black Shades and to install and administer them on dozens or even hundreds of remote computers.When anti-malware vendors began to detect and clean these programs from infected computers, the RAT community built "crypters" to disguise the target code further.Another turned to social media, where "I've been able to message random hot girls on facebook (0 mutual friends) and infect (usually become friends with them too); with the right words anything is possible." For those who can't even manage this on their own, RAT experts hawk their slave-infecting expertise in e-books such as , a 22-page tome that goes for .95 (and which claims to be the best-selling book on Hack Forums)."Ever faced a situation where you have FUD server but cannot get victims? "Or maybe you're getting a lot less installs compared to the amount of work you are putting in?