All processes connected with the detected devices (usually recording, monitoring or detection of movie/audio/network streams) also are identified and can be stopped from the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying genuine proof of your intrusion operation.All round, the selection involvi