Um what lol? you were the one that started talking about it......................................
Anyway its where you reverse engineer a keylogger server to get their email user name and password to get all the logs they got from the keylogger if that makes sense?