Use this to see if the computer is compromised?

Reply to this note

Please Login to reply.

Discussion

Just juicy enough and easily obtained.

That is a really interesting idea, I might implement that.