This is a rudimentary tool from the late 20th and early 21st centuries. It was used by the top secret spies of the time to hack into old computer systems and intercept data.
Go Back