My brother owns home.org (which is a massive spam magnet as people think it's cute to enter [email protected] etc...) and every so often I'll find a misconfigured ticoga (something like that) client trying to request it's configuration files. It's apparently some sort of remote configuration tool that home.com used. I've always wondered how many machines I could take over I wouldn't have been actively attacking them as they were the ones requesting the file from me...