From CodeMonkeyZ
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (108)
sorted by:
this is where the Routers / Firewalls come into play, which have still been denied access too. Examination of these devices would be able to tell if ports / access on these devices were capable or not to be breached allowing external access to things such as a connection to an SQL database or other manipulation techniques.