I'm just curios.
Lets a say a person downloaded a trojan by mistake and the trojan gives a attacker commands and control to control the PC. If that happens a user can unplug the PC and pull out the hard drive to connect it to another desktop and format the hard drive so the attacker won't have access to the old OS they had access to.
User can put the hard drive back and then format the computer from beginning, but I think the attacker might have already know the users IP and other information.
What is your opinion?