top | item 37175909

(no title)

throwaway03626 | 2 years ago

Another scenario is a large office. If a user leaves their desk to get a coffee, an attacker could walk up and get access. Of course, in that case they could also install key loggers, MTM software etc. so they will get access to anything they want.

discuss

order

No comments yet.