About
Trolling/Hacking
Trolling is when a person who uses a fake identity and then post hurtful/offensive things on social media, but it's really hard to actually find the actual identity of the troll. Hacking is a troll stealing your identity and personal information, or even placing viruses in your electronics. Sometimes it may affect your daily life or even your health, this most of the time occur in adults and teens.
About
Scenarios of Trolling/Hacking
These scenarios of trolling/hacking are some of the ones we'll be focusing on, these will have solutions on how to solve these scenarios. Its in "Solving Trolling/Hacking" page.
Scenarios
Insult Troll
Insult troll is a pure hater. They don't really have reason to hate or insult someone. They like to pick on people and treat them badly on social media. This type of trolling can be so severe that it can be considered serious form of cyber bullying.
Eavesdropping Hacker
These types of hackers can target email, instant messaging services, phone calls, web browsing, and other methods of communication. These hackers like to also listen to your conversations on devices if not protected, they also can detect your device and look at you physically from your device.
Grammar/Spellcheck Troll
They're the people who always tell other users that they have misspelled words and grammar mistakes. Even when they do it by simply commenting. Some of them even use a user's spelling and grammar mistakes as an excuse to insult them.
Spammer Troll
This is the troll that does not care about any post or discussion, and it only posting to benefit himself. He or she wants you to check out his or her page, buy from his or her link, use his or her coupon code... These trolls also include all those users you see littering discussions on any social media platform.
Phishing/Fake WAP Hacker
Fake WAP is when a hacker makes a virus-containing network, when you use it, it will also get access to your personal information when you use that network. Phishing is very similar to Fake WAP, its when a hacker makes a website and when a user uses it, it will ask you to log in or such. This means that you must type in all your personal information in order to log in, which means the hacker has access to your personal information. After logging in, it would just crash and the whole program might even shut down.