if you have physical access to the computer of the target person, Keylogger is the best to use.. Software keylogger or hardware keylogger..
if no physical access, use phising or what they called fake login page..
Quote:
Originally Posted by wadtexture80
what is that key logger?,,
|
key = all keys press in the keyboard
log = records all
get it?
Quote:
Originally Posted by wadtexture80
can you teach me sir?i will owe you, ,,
|
actually, you are in the game hacking website.. its out of the topic