How would this ever fall under Ethical hacking?
Perhaps to check for vulnerabilities on the computers of you clients?
Please Login to reply.
No replies yet.