(turn) content in network security
Friend has developed a system, if you want to make a copy of the system in the past, the mother system can monitor the operation of the subsystem? Mother and child share a database system? Subsystem and in what ways can avoid mother monitoring systems?