0 Members and 3 Guests are viewing this topic.
http://prntscr.com/96vgahThis information could help an attacker determine which attack vectors the attacker are to use when targeting the system, and i dont want that!