Do you own a computer? Do you know if you're been traced right now? Throughout so many years there have and still are, people who have the knowledge to learn about others just by using their computer. Someone can be hacked you and findout where you live, what you do day in and out, your phone number, and so much more you don't know.
       The last but not least way to Hack someone is by using your computer, simply click your mouse. For example if you click on the advertisement that showed up on your screen the URL  might have contained a coded system used to trace you. If the URL you clicked was in a place where you consider private, like filling out your information to get an e-mail then it has the chance of getting the information to another website. There is also the ISP you need to watchout for because if your e-mail reaches the ISP then it is shown to others such as Hotmail. Those are some other ways you can be Hacked, there are so many interesting ways Hacking occurs.
          Unfortanitly as you have read you can be Hacked quicker and easier than you think. I think the most dangerous way is being in a chat room and telling your information. The most sneakiest way is websites that send out advertisements and trick people and then they end up picking up your address, your phone number, or even your social security number.Normally It's a guy manipulating a young girl. He starts with convincing her that she could trust him. There are so many
Rapers out there, so if you give out all your information to someone you just met in a chat room you will most likely be stalked or in danger. Always think twice and be careful  with what you put and do to your computer because you never know if you are being hacked.
     There are computer Techniques that monitor and record every keystroke on someone's computer. Something  inportant about privacy, as it becomes more and more visible that both employers and huge websites can hack every move in cyberspace. The best graphic example of the company that has picked up detailed private imformation is DoubleClickinc., which is the internet's largest advertising company. Years before DoubleClick has gotten information on the browsing habits of millions of web users by using "cookie" files on hard drives. Cookies are electronic footprints that allow web sites and advertising networks to monitor online movements. Its understandable that everyone wants their own privacy because privacy protects us from being misunderstood and misjudged.
        
Chat rooms are one of the most popular and interactive places on the Net, which is not the safest things to do sometimes.  Online relationships with strangers in chat rooms can also lead someone from being cyberstalked or worst being a victim of cybersex. It's never good to give so much information because predators are very good at getting information from victims. Another way you can be Hacked is by your e-mail. GUID's, are making it possible to link every document that is made by one user with the message he or she e-mails, the chats are posted on some websites that are browsed. Now you see there are so many ways you can be Hacked these are just two out of so many that are also possibe.
You Want to know about me?
         HACKING
        by Yahaira Lescana Classic
            Computer Technology
Hi my name is Yahaira Lescana and I am 14 years old on to 15 in August 21. I am one daughter out of 3 other. I don't have no brothers. I'm the second oldest and one of the middle childs. As you have seen my web page is about tracing. I hope it has teached you that your computer is not that safe. I think chating is the most dangerous way and I did give you some information about that. I hope you'll be more careful about what you do on your computer next time.
            Double Click & Chatting
                 Clicking Your Mouse
Google.com
Askjeeves.com
They have Hacked  somone just by using a computer, now guess what could happen.
This man has foundout a way to hack someone. It looks so simple because it is.
At this point they have Hacked  you. In this photo is proof that Hacking does exist, take a close look.
     A diagram how tracing happens