On Micro's computer screen, several things scroll by that are indicative of his role as someone that performs illicit computer activities: - A Tor browser is started. Tor is an anonymity network, that lets users conduct nearly untraceable activity on the Internet. - There is a reference to a "bot net". A bot net is typically a collection of computers that have been infected with software that allows them to be used remotely, such as for untraceable intrusion attempts. - The program code that follows is Python script, and that code borrows heavily from various real life publicly available so called "exploits", that is to say code attempts to break into other computers by exploiting vulnerabilities. - The IP number that is shown is not - as is common in TV and film production - a fake, but belongs to a computer conferencing provider, meaning that a successful attempt to breach that can potentially give Micro the possibility to eavesdrop on teleconferences.