The network protocol used by the Computrace Small Agent provides basic features for remote code execution. The protocol doesn't require using any encryption or authentication of the remote server, which creates many opportunities for remote attacks in the hostile network environment.
I would really appreciate some input from slashdotters: Which manufacturers can I trust for buying 'clean' hardware? I'm looking to buy servers, desktop PCs, laptops and tablets.
It is difficult to soar with the eagles when you work with turkeys.