applesainty
Beta member
- Messages
- 5
does it require a lot of bandwidth of a connection for a trojan horse to establish quick screen-surveillancing? and usually how much?
how do you check if the connection is slowed down?
how do you check if the connection is slowed down?