answersLogoWhite

0


Best Answer

well maybe by hacking into their entire database, splicing encrypted files, finding bad information the company has payed millions to keep hidden. then, the hacker uses the information and says 'pay me a million or else

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How do you think that hackers may be able to blackmail companies?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

What is meant by creativity and innovation?

Creativity and innovation is the act of thinking differently and uniquely. People who are creative and innovative are able to think for themselves and think in a way that is considered to be 'out of the box'.


How do you think society will be if scientist are able to create a chip that will perform a trillion operation in a single second?

it will change the computers effects.


What is foam resistance?

Foam resistance is a term that is commonly used in companies that create injection molds and fire resistant equipment. This term means that a product is able to resist damage or corrosion when it is in direct contact with chemicals or solvents.


Can you install mac os in Lenovo z570?

i think ....it's only able to install only on Apple products!If you need , you can install it through VirtualBox!


What is a criminal hacker?

Originally the term referred to people who used a razor blade and/or fingernail clippers to "hack" or roughly cut parts in electronics such as the traces on circuit boards, legs of diodes etc. Police scanners were "hacked" in order to add more memory, remove CPU processors , speed up scanning by "hacking" the crystal oscillator and replacing with faster ones. Thes methods are directly related to why computers now have more RAM, and are faster. Some of the old (and I do mean old) "hackers" devised a system in the 1960s to simultaneously send voice and data over a phone line using frequency phase shifting and filtering. A similar process used later by DSL."Hacking" and "Modding" evolved into things such as examining the programming of a thing. Beginning with noticing things such that by pressing certain keys or combinations of keys in certain secquences on a device could produce certain results. Following the era of IBM's "Big Blue" chess tournament, AT&T introduced the "unbeatable Tic Tac Toe Computer, and exhibited it. I, I mean a "hacker" back then, was able to beat the computer with a sequence of key presses in order to "cheat" the computer out of a move. On many Shortwave radios, Police Scanners, even cell phones etc, certain key presses are used in the programming, and could be used to alter that programming.The keys on a keyboard of a device are a "Matrix" Keyboards use a matrix with the rows and columns made up of wires. Each key acts like a switch. When a key is pressed, a column wire makes contact with a row wire and completes a circuit. The keyboard controller detects this closed circuit and registers it as a key press to the software.I'm going to try to keep this understandable to readers ...Software can emulate or act like hardware.Example: a hardware modem versus a DSP/Digital Signal Processor modem, where a chip is programmed to act like the hardware....So, later, the focus turned even more from "hacking" the actual electronics and hardware to software "hacking" through PROGRAMMING.A "black hat" hacker is often referred to as a microcomputer user who attempts to gain unauthorized access to proprietary computer systems. Although that could be a "cracker" ... a person cracking passwords etc.Most often people who call themselves "hackers" are called "wannabes" by the old-timers, and nowadays are often adolescents using a program they didn't write, by clicking a button they didn't create, to do what don't understand, in an attempt to disrupt something they don't know how to fix."White Hat" hackers are the "good guys" like ... Like the old-timers who vastly improved what computers are capable of doing, and the ones currently trying to improve security by locating and preventing weaknesses.This Answer is dedicated to the memory of Bill Cheek, author, The Scanner Modification Handbook series, and his BBS and Fidonet terminal (prior to "The Internet") Good man, Good freind to many... May he R.I.P.

Related questions

How do you think that hackers may be able to blackmail a computer user?

by hidding the information


What do you call a person to capture or take something by force?

you may be able to call this person a blackmail victim.


Why are there so many hackers in the US?

The United States has many hackers for many reasons. We are a highly populated country with a high standard of education, with an ease to access technology. Therefore many people are able to learn how to work computers and turn to illegal ways to easily gain money. By hacking consumers hackers are able to steal account information and sell it or use it to make payments on goods and services. The lucrative and easy, however illegal method of earning money is the main reason why there are so many hackers in the US.


Where can you change your dob in runescape?

You can't once you have set your D.O.B on your character, it stays there. If you were able to change it, it would mean a new way of hackers being able to steal accounts.


What if you are withholding information because of blackmail?

Leaving aside the fact that "blackmail" is a criminal offense in its own right, and you should report it to law enforcement, if that is going to be your defense you had better be able to produce some convincing evidence of it because you could be charged criminally with 'Obstruction of Justice' or Contempt of Court.Also:It is not contempt of court if you are being forced to withhold the evidence against your will as long as you would, absent the blackmail, have provided the evidence. To be in contempt of court, a person must intentionally of his/her own free will, refuse to do that which the court requires. The element of blackmail negates the required intent and willfulness.


Should fast food companies be allowed to advertise If yes Why If No Why?

I do not think that fast food companies should be able to advertise. It encourages heavy consumption of unhealthy products. I also think that kid's meals should be outlawed, except for healthy meals, as it encourages children to lead unhealthy lifestyles.


How can one find companies that offer aerial lifts?

There are many ways in which one would be able to locate companies that offer aerial lifts. One would be able to locate these companies with sites such as Rental Force.


What are hacking softwares for?

Hackers typically solve problems and encourage open availability of information. Specialist software aids the facilitation of hacking such as being able to hack and expose email passwords, bank information and unencrypting files. Hackers are considered bad but essentially they improve the safety of our data by exposing weaknesses.


What are the three most popular companies in the world?

1. Diapers inc. 2. Sham-wows United I am unfortunately not able to remember the name of the third but I think it was spelt: BRIVON7Q


Is lipstick poison?

I'm not sure, but I don't think is it. The companies wouldn't be able to produce the products if they could poison people. Also, if you accidentally lick your lips when you had lipstick on, you wouldn't drop dead. So no, I don't think lipstick is poison.


where can I get the best deal on a commercial truck lease?

I think there is but I would inquire with companies that sell the trucks. They should be able to tell you if they offer leasing options. Check your local yellowpages for info on this!


How are landline telephone companies able to use other companies poles and lines?

There is a rental fee for other lines. This is similar for power companies also. Not all lines are owned by local companies.