Why And How Do Hackers Use Those Black Screens?

Why And How Do Hackers Use Those Black Screens?