tag:blogger.com,1999:blog-4026729395503502055.post7636178445881732619..comments2023-10-02T03:55:17.068-04:00Comments on Database of Secret and Rare Information: spy-curious network locationsUnknownnoreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4026729395503502055.post-9300388069431968452008-02-15T06:06:00.000-05:002008-02-15T06:06:00.000-05:00ICICL-written bot contains commands that allow it ...ICICL-written bot contains commands that allow it to tunnel (write itself as a packet wrapped into a packet in a different network protocol) through www hubs and servers, test for presence of Cyrillic, SQL- and other database type datafields, check for the presence of the FSB-specific acronyms and internal lingo. That's the gist of it.Ze Kremenhttps://www.blogger.com/profile/05205804457172825036noreply@blogger.comtag:blogger.com,1999:blog-4026729395503502055.post-23579907530602309832008-02-12T17:24:00.000-05:002008-02-12T17:24:00.000-05:00this is really interesting, though too esoteric fo...this is really interesting, though too esoteric for me to understand. you're using an AI programming language? if you have a chance to write a layman's explanation, it would be greatly appreciated.Anonymousnoreply@blogger.com