Originally Posted by
Riddle
I meant this:
What I understood from that is that from every computer they infect, a connection will be granted to a "Master" application. And if one of the people that has access to that main application connects to a client that is just waiting to track back to the origin for some stupidity that one of the users committed, then whoever is using the main application can get involved in something they had nothing to do with and get screwed over. I hope that's a little more clear, or maybe I misinterpreted what you said?