These archives often contain executables (.exe) or scripts designed to infect your computer.
If you do find a valid, recent server, the process typically involves:
Uploading unverified configuration files directly to your receiver via FTP can sometimes crash the firmware or "brick" the device. 3. How to Use Them (General Process)