Once your phone is infected, a slave bot program will be installed in the base operating system, beneath the application layer that most users are familiar with. From there these bots can monitor and modify all data sent to and from the phone before you do, allowing the botmaster to command and control your phone without your knowledge.
complete articleSource: http://www.notepage.net/blog.htm#1208
gadget guru in india gadget guru mobile gadget guru ndtv gadget guru ndtv good times gadget guru seniors
কোন মন্তব্য নেই:
একটি মন্তব্য পোস্ট করুন