You’ve reached the lowest level of the Hinternet when your computer and network connection don’t even really belong to you any more. The New York Times reports today on how trojan horse programs are used to take over people’s computers and use them to relay spam, distribute porn, or do other things that the scumbags use to make money. Unfortunately, the article doesn’t discuss how these programs are distributed, although we can guess that it’s through unpatched computers, email viruses, and the slimiest of malware.