hey guys,
I know absolutely nothing at the moment really but just in general I am trying to get my head around the basics... am I right in thinking that proxies don't really serve as protection if you wanted to get up to a bit of mischief and that remote access to another's computer is the standard procedure that hackers adopt? I guess you gotta cover your tracks etc. I don't want exact info or anything but was curious to find out some insights if anyone can provide a few?
thanks
edit: just realised, sorry if this should've been posted in newbie section but I thought it was hacking question so put here