Chapter 4: Sudo

After typing in the command, he was able to gain full root access without the needed password and began to test the malware that he modified from ghost code.

, , , ,

Research Log [#010]

Henro delivered a briefing stating that this was happening due to a malware infection, but every time anyone has conducted a post-mortem evaluation there has been no trace of any kind of malware! there is something seriously wrong happening here.

, , , , ,

Chapter 3: To erase

"is the malware ready yet?" arron asked. "almost, i just need to convert it to an executable with pyinstaller," trent said as he booted into debian which was what the servers would most likely run.

, , , ,

P.O.D.S Manual

Support: healing and buffing their allies is their bread and butter, and even though they are the weakest when it comes to direct combat, their virus/malware extermination abilities are above all the others.

, ,

William Grand Schmit

#5 of tsociety profile database profile: william grand schmit skillset: phishing, virus and malware coding, stock trading, simple social engineering age: 32 height: 5 11" gender: m sextuality: hetero species: tabby cat danger level: 5, is able to effectively

,

Trent diolang Schmit

#2 of tsociety profile database profile: trent diolang schmit skillset:sms spoofing, malware coding, wifi hacking, calligraphy, electrical engineering, data science, close quarter combat, info gathering, cryptography, mediocre social engineering, remote

,

The hack: chapter 5 (Kit)

Sure enough furon was no longer selling any encryption keys and people were talking about what happened and the malware was found and everyone could see the message that was left for the ransom.

, , , ,

The Transformation of Fargus

The digital world is malware territory." thorn wasn't sure what to do with his victim at first. he knew he couldn't simply let him go, and he didn't really want to kill him. he could infect him... but somehow, it didn't seem to be sufficient.

, , , , , , , , , , , ,

Malicious Software Detected P2

Once she did she opened her maw once again, the malware-infected avatars eagerly stepping over one another to climb into her maw.

, , , , , , , , , ,

Easter Egg in the Hardware

"the next idea is to find another synth and try to infect them with the same malware you have," ramon stated. "but you have already laid egg-bearer, so what would you like to do?"

, , , , , , , , , , ,

Thirteen Tales 2020: First Tale

Time to close out of this thing and run a malware scan. lockely clicked the x in the corner of the browser. nothing happened. he tried alt f4. still nothing. he pushed the power button the tower but the pc wouldn't shut off.

, , , , ,

Root Directory

The two malware hunters hot in pursuit certainly weren't. was the rapid _tack-chick-chick_ of their hundreds of segmented limbs closer? root dared not send a ping behind him to check. probability of evading them? at this pace, 02.354%.

, , , , , ,