How to hack computer through the power supply?

https://youtu.be/hmY7C8Nl-Us?t=2m26s here the dude says that it happens. Anywhere we can read more about this?
June 3rd 19 at 19:40
3 answers
June 3rd 19 at 19:42
Solution
so as to rotate, and to something sane, instead of random noise, requires you to install the software on your computer, which will transmit data through the mechanical parts of the computer. but if the software already on your computer, it does not hurt to organize full control of the computer to its Creator. - Leora commented on June 3rd 19 at 19:45
June 3rd 19 at 19:44
Through the power supply to hack the computer, for example, pliers.

That says man is not to hack the computer, and remove information from it. But to do this on the PC first you need to install special software that could manipulate the dispenser and the load on the CPU.

This can be useful for specific, isolated computers that are not connected to Internet or any local network, but with which I want to periodically get some data.

Your pre-installed software can:
1) to modulate the speed of the cooler, and a separate device in the room can remove that sound. Transfer rate is very small, but nevertheless can transmit data.
2) changing the load on the CPU and changing electricity consumption, to modulate the power signal cable, removing its device, which is included in parralelno socket (even at a considerable distance). The faster transmission speed and more reliable.

But through the power supply itself. the PC is not put, so this is a "special hack" and not just a hacking home password-protected PC.
June 3rd 19 at 19:46
This is not hacking, and the organization channel of information leakage. Moreover, the technique is not new - "put the agent on the computer and let it somehow creates vibrations that can be removed". All of these methods are derived from the method of reading a conversation in a closed room by vibration of the glass.

The problem with this method is the same as that of other similar - first you need the "agent" to put :)

Find more questions by tags Information security