14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

166 Appendix<br />

processScramble<br />

rebuild ENTITY<br />

reclaim HARDWARE<br />

reject<br />

repress MEMORY<br />

reverseEngineer TARGET<br />

scramble DEVICE<br />

selfDestruct<br />

struggle<br />

zapMemory<br />

randomly renumbers all currently<br />

running process IDs<br />

begins the process <strong>of</strong> rebuilding<br />

the specified entity. Often used to<br />

remedy the effects <strong>of</strong> destroy.<br />

rescues any given piece <strong>of</strong><br />

HARDWARE from obsolescence.<br />

Opposite <strong>of</strong> obsolesce.<br />

rebuffs the current state <strong>of</strong> affairs.<br />

Often used as a precursor to destroy.<br />

disables any and all attempts to<br />

anthropomorphize the machine<br />

If object specified in TARGET is an<br />

application, this function decom -<br />

piles the application and returns<br />

commented source code. If the<br />

object specified in TARGET is a<br />

protocol, this function returns a<br />

formal description <strong>of</strong> the protocol.<br />

randomly shuffles all filenames on<br />

the storage medium specified by<br />

DEVICE<br />

imposes fatal physical damage on<br />

self. Equivalent to destroy SELF.<br />

assists agitation and opposition to<br />

existing exploitation and control<br />

clears all RAM on local machine

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!