How? He can utilize only those exploits that are readily-available in the victim's operating system. And knowing that a victim is using MS Windows is useless because 90% of all the computer users are probably using Windows.

Reply via email to