On Wed, 19 May 2021 21:02:24 +1200, David McNab wrote:
> The hacker exercises "control". To implement this, the server sends
> "commands" when they get polled by the infected networks.
Actually the term comes from military usage.
_______________________________________________
wlug mailing list -- wlug@list.waikato.ac.nz | To unsubscribe send an email to wlug-leave@list.waikato.ac.nz
Unsubscribe: https://list.waikato.ac.nz/postorius/lists/wlug.list.waikato.ac.nz