On the Subject of Surprisingly Simplifying Searching through SUSadmin
It’ll be pretty suspicious how quickly you do it.
Section 1: The table
Use the status
command to get the three installed safety protocols. Then, find the only row in the Table 2 that contains all three of them and the list of allowed viruses will be on the rightmost column of that row.
Section 2: The Vulnerability
Use the formula at the bottom row of Table 1 below to calculate the vulnerability value.
OS | Number provided when status is used (multiply by -1 if “Boom”) |
BH | Number of battery holders |
AI | Number of indicators |
PP | Number of port plates |
ST | Bomb starting time (in minutes) |
OS - BH*5 + AI*7 - PP*3 - ST |
Awast | MedicWeb | Disco | UBNL MPDZ PERK BIN8 A125 5O8K 3UD7 7Z17 C43B |
MOD32 | 6881 UBNL MPDZ M821 BIN8 A093 33FT 3UD7 6V00 |
||
Disco | MOD32 | UBNL D4YD 7R7B MPDZ BIN8 3UD7 7Q2K ZI53 48NT |
|
MedicWeb | Disco | MOD32 | 5YP4 UBNL MPDZ K34Q BIN8 J333 23JJ 3UD7 W9Q5 |