Transaction recovery
Database recovery
System recovery
Value recovery
Filter
Recovery
Security
Scalability
To create stronger connections with the target
To create ghost server on the network
To obtain a remote access connection
To hide malicious activity on the network
Information gateway
Crack-up password
Facilities provided
Cover-up tracks
Ethernet
Bluetooth
Wi-fi
Computer