Spiking a computer
I know that basically when your computer is spiked, it basically cease to work. My friend recently said his computer was spiked, my guess is he just f'ed it up, but him bringing it up brought some questions to my mind.
1. what exactly happens when someone spikes a computer?
2. why does someone do it? from what i can tell it really offers nothing to the person doing it.
3. how (im not looking to learn how, just like how do they do this? a program? or what?) is it done generally. does it have anything to do with a power spike? if so how does someone else do that to a remote computer?
Karma/rep is always appreciated
There are only 10 kinds of people in this world. Those who can read binary, and those who can't.