The network protocol used by the Computrace Small Agent provides basic features for remote code execution. The protocol doesn't require using any encryption or authentication of the remote server, which creates many opportunities for remote attacks in the hostile network environment.
I would really appreciate some input from slashdotters: Which manufacturers can I trust for buying 'clean' hardware? I'm looking to buy servers, desktop PCs, laptops and tablets.
[We] use bad software and bad machines for the wrong things. -- R.W. Hamming