A hacker could take control of the entire system by implanting his own instructions in the software and then he could program the computer to erase any sign().
A.of his being ever there B.he ever has been there C.of his having ever been there D.of him having ever been there