Graham included: "What we could conclusively say through the proof in the files is that they're building snippets of code for use in other assignments and they are reusing procedures in code which they come across on the web. ... Elsewhere they speak about obscuring attacks so that you can't see the place It is really coming from, but there's no co