Hacker News new | past | comments | ask | show | jobs | submit login

With the protocols you mention, are you able to reach an unattended machine and take control of it or does someone have to be at that machine to grant you remote access?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: