Figure 12.17  When the telecommuter uses the VPN again, the Trojan horse backdoor searches for mountable shares on the Monstrous corporate network