Is there an issue? Send a MessageReason:
None
Added DiffLines:
* ShownTheirWork: And how.
** Component flavor text describes technologies fully within the range of possibility
** One computer specialist crewmember will actually try to hack the enemy using Actual Linux commands. First using Nmap to probe the enemy's network and then using an open port (if they have one) to attack their computers, sometimes even shutting the enemy down.
** Component flavor text describes technologies fully within the range of possibility
** One computer specialist crewmember will actually try to hack the enemy using Actual Linux commands. First using Nmap to probe the enemy's network and then using an open port (if they have one) to attack their computers, sometimes even shutting the enemy down.