|
How did they HACK me?
Serious question here. Wondering if someone into security or hobby hacking can suggest the basic hacking procedure most likely used.
When hackers hack what program do they use to spread the codes? How come it gets certain wordpress installs and not others? What's the common factor that links those installs? How do they miss others? Also why did they miss my joomla install but was able to infect php list along with most of my adult wordpress installs on one particular host?
Just curious if someone can explain the basic procedure to me
Thanks
|