dungtroy

Members
  • Content count

    3
  • Joined

  • Last visited

Community Reputation

0 Neutral

About dungtroy

  • Rank
    Newbie
  1. It depends on environtment of embedged code put in
  2. That's secrete, however, hacker can exploit security hole via plugin or secondary interface from interface hackers, i mean they also create other path to change files, folders