Ah well I'll stick to just modifying at my level then. What I do sometimes is grab someone's IP whom I've hacked before and are still in my IP Database then replace it with my IP, just to be harsh ;D
Thanks for the other info guys
but one last question. To use a Spam Daemon, to I find a good server then upload it to there? Once it's done go to the server and install? Then Hide / Encrypt.?