No, I'm not looking for nudie pics of her on her hard drive. Nor do I believe she has any; I'd like to believe she has more respect for herself than that, though given my experience with Stateside girls, that's probably not too likely. But I digress.
Tbh, I'm just using her as an example. My real question is: If someone knows your IP address, how can he use it to, err, remotely access your WinXP computer hooked up to your IP address? Despite being more secure than Win98, WinXP is still easy enough to hack for your friends to play practical jokes on you.
When one of my mates claimed he could break into my WinXPHome computer in less than half an hour, I challenged him to prove it, gave him my IP address, and waited. Fifteen minutes later, he created a folder on my desktop.
WinXP had been patched on an automatic basis, the built-in firewall was running, he'd never physically accessed my computer before, I was on dial-up, I wasn't connected to a LAN, there were no Trojans or viruses... nothing. I asked him to show me or give me books on how he did it. He wouldn't.
I read books like Windows Server 2003 (Hacking Exposed) and Secrets of Computer Espionage: Tactics and Countermeasures. However, they're totally in-specific; that is, they simply go from "Find out the target's IP address" to "Crack the target's password." Wtf? Assuming remote, not physical access, how the hell do I get the target's login screen? And what about that mysterious next step, "Install a sniffer or keylogger on the target's computer," without explaining how to upload files to the target's computer? Yeah, real helpful, and a great way to blow $50 US on a book that doesn't explain anything. (Too lazy to return it, though; I still skim through it in my free time.)
I know you blokes know more about this than I do. Has someone released a noob-friendly tool that'll scan an IP address for vulnerabilities, then automatically access the computer remotely?
I already asked my other mates how anyone could've done the above; according to them, it's pretty much impossible to do any of the above on a standard, regularly patched WinXP computer, without having physical access to the target's computer and installing a Trojan. That can't be true; excepting Sam Fisher, I don't know any hackers who do their deeds by physically accessing the target's computer first. How do they do it? How do you do it?