Use this to see if the computer is compromised?
Just juicy enough and easily obtained.
Please Login to reply.
That is a really interesting idea, I might implement that.