Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?