Behind The Hack – Man In the Middle Man In The Middle Attack Did you ever want to know how a hacker gains control of your computer?