It's as if the hacker were sitting in front of your computer and executing commands. #cybersecurity