for all of you that say if a hacker must be physically present to do this - he may as well just take the PC. You're missing the point, this can easily be turned into a boot sector virus, so the hacker just covertly plugs a USB into his work computer and within no time at all the entire network is compromised. Then someone inadvertantly spreads the virus on another network by using an infected USB stick. the zero day cababilities of such a virus are phenomenal, and would have antivirus companies scrambling like never before. Deployed right, this could be huge