LEGAL DISCLAIMER: This "hack" has been performed on my own computer, for educational purposes only. Don't use it against other people's systems, unless you've been given explicit written permission by their owners. I'm not responsible for any unintended use of these instructions.
When we hear about security breaches in the news, we immediately think of Matrix-like scenarios, where the Pentagon or NSA fight a cyber war against the bad guys.
Real-life scenarios are a little different and less exciting than you could think. Not all hacks rely on technical skills solely.