Article 4YADK RF exploitation: how does it work?

RF exploitation: how does it work?

by
jazzy_mood
from LinuxQuestions.org on (#4YADK)
Hi all,

This is a security question not directly related to Linux, so I am posting it in the General forum.

I have been reading some articles about RF exploitation and I am wondering if it is possible to hack/exploit a laptop or desktop PC. In case it is, I wonder if some special equipment/devices are necessary to accomplish it and how does it work. For instance, what is the distance range of a RF signal from a laptop or PC. Just curious about it.

Thanks for your comments/opinions on this matter.latest?d=yIl2AUoC8zA latest?i=wQnIfvX7McA:wbbV-yc8eCM:F7zBnMy latest?i=wQnIfvX7McA:wbbV-yc8eCM:V_sGLiP latest?d=qj6IDK7rITs latest?i=wQnIfvX7McA:wbbV-yc8eCM:gIN9vFwwQnIfvX7McA
External Content
Source RSS or Atom Feed
Feed Location https://feeds.feedburner.com/linuxquestions/latest
Feed Title LinuxQuestions.org
Feed Link https://www.linuxquestions.org/questions/
Reply 0 comments