Its processor based…they are used tcp/ip/java to get them to issue what ever malicious data to the processor.