Link to Original Source
The network protocol used by the Computrace Small Agent provides basic features for remote code execution. The protocol doesn't require using any encryption or authentication of the remote server, which creates many opportunities for remote attacks in the hostile network environment.
I would really appreciate some input from slashdotters: Which manufacturers can I trust for buying 'clean' hardware? I'm looking to buy servers, desktop PCs, laptops and tablets.
"Bond reflected that good Americans were fine people and that most of them seemed to come from Texas." - Ian Fleming, "Casino Royale"