how to do it?
what r risks?
what am i able to do with it when it is hacked?
are there any cons? please answer thanks