On the Subject of Surprisingly Simplifying Searching through SUSadmin
It'll be pretty suspicious how quickly you do it.
Section 1: The table
status command to get the three installed safety protocols. Then, find the only row in the table on page 2 that contains all three of them and the list of allowed viruses will be on the rightmost column of that row.
Section 2: The Vulnerability
Use the formula at the bottom row of the table below to calculate the vulnerability value.
|OS||Number provided when |
|BH||Number of battery holders|
|AI||Number of indicators|
|PP||Number of port plates|
|ST||Bomb starting time (in minutes)|
|OS - BH*5 + AI*7 - PP*3 - ST|