Well, that's the thing - all machines are compromised physically. All it takes now is some software to use the hole. It could come from something as simple as a web page.
You are viewing a single comment's thread from:
Well, that's the thing - all machines are compromised physically. All it takes now is some software to use the hole. It could come from something as simple as a web page.
Oh Ok. I understand now. Thank you very much for taking your time to clarify me :)