How would this ever fall under Ethical hacking?

Reply to this note

Please Login to reply.

Discussion

Perhaps to check for vulnerabilities on the computers of you clients?