Presumably the transferred data packages get intercepted and injected with little bots that land in the cache of the server (or in the RAM Cache of my desktop) where they can be remotely activated to sabotage, block, delete, infect.
At least now I know what 's vexing them.
Thanks TL for your attention and further efforts to shed some light onto the dark monsters' playground.
The Java technique is similar to Microsoft DirectX but more complicated.
In fact, DirectX and Java are REMOTE CONTROL by design.
So no wonder when strange things happen. The only save method would be
I'll have to dig a little bit deeper in the coming days.