The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
The Exploit: A Theory of Networks - asounder
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
lose DEVICE<br />
mutate SEQUENCE<br />
narcolepsis HOST<br />
unlinks a random file on the storage<br />
medium specified by DEVICE<br />
introduces a mutation into the<br />
given informatic SEQUENCE<br />
unexpectedly initiates “sleep” mode<br />
in a given organic or inorganic<br />
HOST<br />
netbust TARGET<br />
exposes a network specified in<br />
TARGET to extremely high volt -<br />
ages, thereby fatally damaging any<br />
network hardware attached to the<br />
network. TARGET can also be<br />
“self” to affect only the local<br />
interface. 2<br />
noise PROTOCOL, AMOUNT scatters a specific AMOUNT <strong>of</strong><br />
random noise packets into the<br />
default network interface using the<br />
specified PROTOCOL<br />
obfuscate SEQUENCE<br />
obsolesce HARDWARE<br />
overclock MULTIPLIER<br />
possess SEQUENCE<br />
processKill<br />
Appendix 165<br />
renders any given SEQUENCE<br />
(gene, character string, etc.)<br />
illegible to any known parsing<br />
technologies<br />
renders any given piece <strong>of</strong><br />
HARDWARE obsolete. Opposite <strong>of</strong><br />
reclaim.<br />
increases the clock frequency <strong>of</strong> the<br />
central processing unit according to<br />
the value <strong>of</strong> MULTIPLIER. A<br />
negative value will decrease the<br />
clock frequency.<br />
allows any system, living or<br />
nonliving, to take control <strong>of</strong> itself<br />
selects a process at random and<br />
kills it