You need to take steps to protect your hardware from compromise: pretending that they don’t want to use your system for a zombie doesn’t work any more than walking down main street naked and pretending no one will look.
American Programmers Independent, LLC.
When you want something done, call API
You need to take steps to protect your hardware from compromise: pretending that they don’t want to use your system for a zombie doesn’t work any more than walking down main street naked and pretending no one will look.