I'm just not impressed in general by hacks which begin with "first you must achieve a complete breach of the target machine's security..."
I'm just not impressed in general by hacks which begin with "first you must achieve a complete breach of the target machine's security..."