j
k
j a
j l
On Wed, 19 May 2021 21:02:24 +1200, David McNab wrote:
The hacker exercises "control". To implement this, the server sends "commands" when they get polled by the infected networks.
Actually the term comes from military usage.
Back to the thread
Back to the list