14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lose DEVICE<br />

mutate SEQUENCE<br />

narcolepsis HOST<br />

unlinks a random file on the storage<br />

medium specified by DEVICE<br />

introduces a mutation into the<br />

given informatic SEQUENCE<br />

unexpectedly initiates “sleep” mode<br />

in a given organic or inorganic<br />

HOST<br />

netbust TARGET<br />

exposes a network specified in<br />

TARGET to extremely high volt -<br />

ages, thereby fatally damaging any<br />

network hardware attached to the<br />

network. TARGET can also be<br />

“self” to affect only the local<br />

interface. 2<br />

noise PROTOCOL, AMOUNT scatters a specific AMOUNT <strong>of</strong><br />

random noise packets into the<br />

default network interface using the<br />

specified PROTOCOL<br />

obfuscate SEQUENCE<br />

obsolesce HARDWARE<br />

overclock MULTIPLIER<br />

possess SEQUENCE<br />

processKill<br />

Appendix 165<br />

renders any given SEQUENCE<br />

(gene, character string, etc.)<br />

illegible to any known parsing<br />

technologies<br />

renders any given piece <strong>of</strong><br />

HARDWARE obsolete. Opposite <strong>of</strong><br />

reclaim.<br />

increases the clock frequency <strong>of</strong> the<br />

central processing unit according to<br />

the value <strong>of</strong> MULTIPLIER. A<br />

negative value will decrease the<br />

clock frequency.<br />

allows any system, living or<br />

nonliving, to take control <strong>of</strong> itself<br />

selects a process at random and<br />

kills it

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!