Although demonstrated with a PC designed for direct input, servers or remote terminals can use the same concepts to reduce their power consumption based on user activity.
These machines then gave instructions to the hacked PC - generally ordering them to direct traffic straight at victim websites, in attempt to overload them and force them to crash.