Problem:
Question 1: What's the significance of Metasploit to a network defender? Why does this dramatically increase the risk to potentially vulnerable devices and applications?
Question 2: In Java do Radio Buttons use the same interface as for JButton?
Please provide description of your answers.