Sort:  

Well, that's the thing - all machines are compromised physically. All it takes now is some software to use the hole. It could come from something as simple as a web page.

Oh Ok. I understand now. Thank you very much for taking your time to clarify me :)