The description of the screen recorder setup they used is interesting too. Just be very careful in how you name the files and services, or use a rootkit to hide it (although presumably some virus scanners might pick up on this).