“…The possibilities in terms of exploiting user data include sending more convincing spam (Aycock, & Friess, 2006) and establishing markets for efficient sales of purloined data (Friess, Aycock, & Vogt, 2008). In terms of using the computing power of compromised machines, the output from cryptographic hash functions has been searched for useful values for anti-disassembly (Aycock, De Graaf, & Jacobson, 2006), and the computing power required to forge SSL server certificates has been estimated (Hemmingsen, Aycock, & Jacobson, 2007). This latter work brings up to date an earlier publication by White, looking at using computer viruses' application to distributed computing (White, 1989).…”