Of course there are also the "white" aspects of the coin, as an example those running in IT protection can take gain of having the ability to check programs or infrastructures comfortably from their transportable tool. To perform cyber attacks the options to the conventional computer are varied: pill, smartphone, raspberry as much as the drones.
0 Comments
Leave a Reply. |