funny, though not surprising. Once an exploit is known it doesn't take any computing power at all to exploit it. about the same amount of computing pattern that it takes to access any old web page or fill out a form on a website. large computing power is needed when scanning for vulnerabilities, especially with complex systems, but most of the time that is done by gray hat hackers and blackhat hackers looking to sell the exploits online rather than exploit them themselves.
funny, though not surprising. Once an exploit is known it doesn't take any computing power at all to exploit it. about the same amount of computing pattern that it takes to access any old web page or fill out a form on a website. large computing power is needed when scanning for vulnerabilities, especially with complex systems, but most of the time that is done by gray hat hackers and blackhat hackers looking to sell the exploits online rather than exploit them themselves.