Quote:
Originally Posted by The_Jazz
OP, if you're going to come back and post a link where you "discovered" this, don't bother. It will just confirm that you're a spammer, your link will be removed, and you'll get banned.
If that's not going to happen, then I think you owe us an explanation of why you want this. The hive-mind is already suspicious.
|
I am mainly interested i finding out more information whether this can be done only for my own self concious and no more. No plans to install such a device, assuming that it exist on someone else's computer. I have read that its possible here if you read this link.
If you search for the google book 101 Spy Gadgets for the Evil Genius apparently the author of this ebook has explained in some depth on how this type of surveillance works. I merely only wanted to know more thats all nothing more.
---------- Post added at 11:01 AM ---------- Previous post was at 10:59 AM ----------
I should not have mentioned TEMPEST because that technolgy or techniques uses sophisticated equipment that the average user cannot afford and further its does not involve and covert devices planted inside a computer box whether monitor or power supply.
Victor