Quote:
|
Originally Posted by Soul_Rebel
of course
|
What I mean is that the shear volume of desktops that would have to be owned by this secret "hijacker" in order to have a massive, noticeable, internet wide effect on a gigantic processor would be enormous.
The simplest answer is usually the right one.