Good adult webcams 2013
In other cases, they simply hand them off to others in a "Free Girl Slave Giveaway." Calling most of these guys "hackers" does a real disservice to hackers everywhere; only minimal technical skill is now required to deploy a RAT and acquire slaves.
Once infected, all the common RAT software provides a control panel view in which one can see all current slaves, their locations, and the status of their machines.
"Your laptop's going to go kaboom next." The video freezes, the mayhem lasting for slightly more than one minute. They're on You Tube, along with thousands of other videos showing RAT controller (or "ratters," as they will be called here) taunting, pranking, or toying with victims.
They even have strategies for watching where women store the photos most likely to be compromising.
The weirdest thing is, when I see the person you've been spying on in real life, I've had that a couple of times, it just makes me giggle, especially if it's someone with an uber-weird-nasty habit." By finding their way to forums filled with other ratters, these men—and they appear to be almost exclusively men—gain community validation for their actions.
One woman targeted by the California "sextortionist" Luis Mijangos wouldn't leave her dorm room for a week after Mijangos turned her laptop into a sophisticated bugging device.Today, a cottage industry exists to build sophisticated RAT tools with names like Dark Comet and Black Shades and to install and administer them on dozens or even hundreds of remote computers.