Home
About
Bits of Wisdom
Der öffentlich zugängliche Notizzettel von Klaus Kuplen
code
IT
obtree
Project Server
Sharepoint
Tools
Uncategorized
«
Oracle: Top 5 entries with LIMIT / ROWNUM
High Crimes Using Low-Tech Attacks
»
The usages of an hijacked PC
This entry was posted by
Klaus
on Thursday, 25 June, 2009 at
This Whashinthon Post article
explains how the bad guys can use hacked PCs
Category:
IT
You can follow any responses to this entry via
RSS
.
You can
leave a comment
or
trackback
from your own site.
Leave a Reply
Click here to cancel reply.
Name (required)
E-Mail (required)
Website
The Register
US cranks up espionage charges against ex-Googler accused of trade secrets heist
Workday erases 8.5% of workforce because of...AI
Microsoft's final Exchange Server 2019 update still missing as support deadline ticks down
Early mornings, late evenings, weekends. Useless users always demand support
Boeing, Boeing, burned: Over half a billion dollars by Starliner in 2024
Unknown Feed