Hacker fight story

I don't really know if this is the right subreddit, but I'd need help with a story featuring a "hacker fight". I'm quite ignorant in terms of computer knowledge so... The thing is: Hacker A has a main computer connected to other computer via a private net. Is it possible for Hacker B to isolate the main computer from the net and making it unusable for Hacker A? How could this thing be done? How could Hacker A solve the problem?

submitted by /u/Chrisosamu
[link] [comments]

from hacking: security in practice https://ift.tt/K83ZOya

Comments