How is a hacker found through programming?
Explain like I'm five, please. So let's say that I was to attempt to hack into the NSA or FBI (or successfully, not likely, but for the purpose of the hypothetical, let's say that I did) and rummage around and then leave. How, then, would the NSA/FBI or the Government, in general, determine 1) they were hacked, 2) who the hacker is, 3) how they were hacked.
Also, how does one go about hiding their "footprint" (and is possible to erase completely)?
I realize that this might be an enormously complex issue, but I am rather curious about it.
Be the first to answer this question.