You could use the BadBIOS , or subsonic speaker escape features that security researchers are exploring now.
Both covered by Ars Technica.
You could use the BadBIOS , or subsonic speaker escape features that security researchers are exploring now.
Both covered by Ars Technica.