On the Subject of Surprisingly Simplifying Searching through SUSadmin

It’ll be pretty suspicious how quickly you do it.

Section 1: The table

Use the status command to get the three installed safety protocols. Then, find the only row in the Table 2 that contains all three of them and the list of allowed viruses will be on the rightmost column of that row.

Section 2: The Vulnerability

Use the formula at the bottom row of Table 1 below to calculate the vulnerability value.

Table 1.
OSNumber provided when status is used (multiply by -1 if “Boom”)
BHNumber of battery holders
AINumber of indicators
PPNumber of port plates
STBomb starting time (in minutes)
OS - BH*5 + AI*7 - PP*3 - ST
Table 2.
Awast MedicWeb Disco UBNL MPDZ PERK BIN8 A125
5O8K 3UD7 7Z17 C43B
MOD32 6881 UBNL MPDZ M821 BIN8
A093 33FT 3UD7 6V00
Disco MOD32 UBNL D4YD 7R7B MPDZ BIN8
3UD7 7Q2K ZI53 48NT
MedicWeb Disco MOD32 5YP4 UBNL MPDZ K34Q BIN8
J333 23JJ 3UD7 W9Q5
Table 2 continued.
ByteDefender Kasperovich Awast 2E1E 8V00 8U63 48NT 81RM
6V00 7D2U X642 C43B
MedicWeb 50KD ONE5 1K63 32EI W9Q5
6V00 7D2U X642 C43B
Disco 50KD O2V5 8339 32EI W9Q5
8V00 8U63 48NT C43B
MOD32 O2V5 8339 ONE5 1K63 W9Q5
2E1E 48NT 81RM 6V00
Awast MedicWeb A093 33FT 5O8K 3UD7 7Z17
6V00 7D2U X642 C43B
Disco 5O8K 3UD7 7Q2K ZI53 7Z17
8V00 8U63 48NT C43B
MOD32 A093 33FT 3UD7 7Q2K ZI53
2E1E 48NT 81RM 6V00
MedicWeb Disco J333 23JJ 5O8K 3UD7 7Z17
50KD 32EI W9Q5 C43B
MOD32 A093 J333 23JJ 33FT 3UD7
ONE5 1K63 W9Q5 6V00
Disco MOD32 J333 23JJ 3UD7 7Q2K ZI53
8339 W9Q5 48NT O2V5
Kasperovich Awast MedicWeb 6881 UBNL PERK M821 A125
6V00 7D2U X642 C43B
Disco UBNL D4YD 7R7B PERK A125
8V00 8U63 48NT C43B
MOD32 6881 UBNL D4YD 7R7B M821
2E1E 48NT 81RM 6V00
MedicWeb Disco 5YP4 UBNL PERK K34Q A125
50KD 32EI W9Q5 C43B
MOD32 5YP4 6881 UBNL M821 K34Q
ONE5 1K63 W9Q5 6V00
Disco MOD32 5YP4 UBNL D4YD 7R7B K34Q
O2V5 8339 W9Q5 48NT