Reverse Shells

How Hackers take over computers with Reverse Shells