This talk will quickly cover how to control systems that you've exploited that may not always be online through various 3rd party services such as Gmail/Hotmail/etc.