Figure 12.17
When the telecommuter uses the VPN again, the
Trojan horse backdoor searches for mountable shares on the
Monstrous corporate network