The attacker – configuring your client machine