RF exploitation: how does it work?
by jazzy_mood from LinuxQuestions.org on (#4YADK)
Hi all,
This is a security question not directly related to Linux, so I am posting it in the General forum.
I have been reading some articles about RF exploitation and I am wondering if it is possible to hack/exploit a laptop or desktop PC. In case it is, I wonder if some special equipment/devices are necessary to accomplish it and how does it work. For instance, what is the distance range of a RF signal from a laptop or PC. Just curious about it.
Thanks for your comments/opinions on this matter.


This is a security question not directly related to Linux, so I am posting it in the General forum.
I have been reading some articles about RF exploitation and I am wondering if it is possible to hack/exploit a laptop or desktop PC. In case it is, I wonder if some special equipment/devices are necessary to accomplish it and how does it work. For instance, what is the distance range of a RF signal from a laptop or PC. Just curious about it.
Thanks for your comments/opinions on this matter.