Perhaps people around you think that you are a computer genius, or you really want to impersonate him. Hacking computers requires a solid understanding of operating systems, network security, and programming. If you pretend to hack into someone's computer, those around you will be greatly impressed; there is no need to do anything illegal - use the command line or create a BAT file that will display a lot of green characters on the screen (as in the movie "The Matrix").
Steps
Method 1 of 3: Using the command line

Step 1. On your computer, open the Run window
To do this, click "Start" - "Run" or in the search box enter "Run" (without quotes) and click on "Run" in the search results.
In Windows, you can simply press ⊞ Win + R to launch the Run window

Step 2. Open a command prompt window
To do this, enter cmd in the Run window. A command line window (or just a command line) will open, through which you can control your computer using text commands.
In Mac OS, the command line is called a terminal, which is invoked by typing the word “terminal” or “terminal” (without quotes) in the search bar

Step 3. Use the command line or terminal to simulate that you are hacking into your computer
There are many commands in the Windows command line and in the Mac OS terminal that perform some action or display information on the screen. The following commands are not illegal and will not harm the system, but they will definitely impress those around you.
- On Windows, enter the following commands; after entering each command, press ↵ Enter. Do everything as quickly as possible so that your "skills" have the desired effect on those around you.
- color a
This command will change the font color from white to green; the background color will remain black. After the color command, enter a number from 0 to 9 or a letter from A to F to change the color of the command line font
- dir
- ipconfig
- tree
- ping google.com
The ping command will check the quality of the connection between your computer and the remote computer (but the average person is not aware of this). This site uses Google's site as an example, but you can enter the address of any other site
- color a
- On Mac OS, enter the following commands to pretend that you are jailbreaking your computer. Commands are entered in the terminal.
- top
- ps -fea
- ls -ltra

Step 4. Switch between windows
Open several command lines or terminals and switch between them by entering different commands. In this way, people around you will think that you have started several complex and unrelated processes at the same time.
Method 2 of 3: Create a BAT file on Windows

Step 1. Open Notepad
To create a BAT file, you need to write a sequence of commands in a text editor and save them as a batch file (has the.bat extension). For these purposes, Notepad or any other simple text editor is suitable.

Step 2. Enter the commands in Notepad
The color and title commands will launch a window with a green font "Jailbreak" (to change the title of the window, change the text in the title line). The @echo off command will hide the command line, and the tree command will display the directory tree to make the hacking process more spectacular. The ping command will test the connection to a Google site, which is not illegal, but will have the desired effect on those around you. In a blank Notepad, enter the following commands:
-
color a
title HACK WINDOW
@echo off
tree
ping www.google.com -t

Step 3. Save the file in BAT format
To do this, click "File" - "Save As". Enter.bat in the File Name line. This will cause the text file to be saved in BAT format, not TXT. The batch file contains a set of commands that will be executed by the operating system's shell.
- The described method may not work on Windows Vista.
- If you try to save a file with a.bat extension, a window will open warning that changing the file extension will change its format. In this case, click "Yes" in this window.

Step 4. Run the BAT file
To do this, double-click on the generated BAT file. For ordinary people, the window that opens will serve as proof that you have launched a complex process of hacking a computer.
Method 3 of 3: Using Online Services

Step 1. Launch your web browser
Some online services help simulate complex computer processes. Such services are sometimes used to create visual effects in clips or films, or to impress untrained others.

Step 2. Open the hackertyper.net website
This site converts any set of characters entered into a kind of program code, and so quickly that it boggles the imagination of ordinary users. However, you may be exposed because the speed of writing code on this service is incredibly fast.

Step 3. Open a second browser window and then go to guihacker.com
Leave the second browser window open - it will display information similar to what a hacker sees when hacking into a computer, for example, strings of numbers, rapidly changing indicators, graphs. Leaving the window open, you can state the following:
- “I compile the data received from my friend's server in order to find errors in the program code. The process will end in a few hours. "
- "I ran a few benchmarks in the background to see how the processor coped with the increased temperature after overclocking."

Step 4. On the geektyper.com website, select one of the many interfaces of a real hacker's computer
Perhaps this service will allow you to impersonate a hacker in the most believable way. Having opened the main page of the site, select one of the interfaces of the computer of a real hacker, and then enter any set of characters from the keyboard or click on a folder on a fake desktop - the service converts your actions into a kind of program code or other processes imitating computer hacking.
To get a semblance of program code, press any keys, and to start some impressive process, click on any folder that will appear in your browser window after choosing the computer interface of a real hacker

Step 5. Open the described sites in separate windows of your browser
Each of the services makes a different impression, as it displays the hacker's activities on the screen in its own way. To quickly move between windows, hold down alt = "Image" and press Tab ↹. To enhance the effect, before each next pressing Alt + Tab ↹ in the active window, enter several characters (any).
Try changing the position of the windows on the screen, or leaving some windows open in the background so that others think you are a seasoned hacker
Advice
- Take your computer hacking simulation to the next level if you know how to work with the command interpreter.
- Use the methods described in this article to impress your friends!
Warnings
- Some people may think that you are really into computer hacking, so be careful not to run into problems.
- Remember that experienced computer users will quickly "figure out" you, so choose your audience wisely for your "presentation".
- When working with the command line, be careful not to enter a command that will damage important files or break the system.