To hit it with a WOL magic packet, you need to access the network with another system.
How may other systems on that subnet are compromised?
All of them?
17 posted on 06/17/2013 1:21:49 PM PDT by Only1choice____Freedom
(As long as America's tolerence of failure is not overwhelmed by a desire to succeed, we will fail.)