Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.
Systematic Procedure For Hacking ...?
Enumerate- find well know exploits and vulnerabalities, ports running, etc Footprint - find out the comp info, such as versions, Os's, user names/passwords Exploit- use the information u found and find a weakness in the computer, then use it (such as DoS attack, buffer overflows, etc) Root- gain access, then keep the account