Discovery Gaming Community

Full Version: Security Breach Evaluation
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
:: initiating database ::
:: upload = enabled ::


:: accessing database ::
:: access granted - program name = “Progenitor” ::
:: initiating evaluation of collected data ::
:: searching database ::
:: keyword = invasions ::
:: #28936 results found ::
:: adding criteria “timespan = 1.5 Gammu-Years” ::
:: #1634 results found ::
:: security breach tolerance - timespan = #75 ::
:: analyzing possible actions ::
:: accessing database ::
:: access granted - program name = “Incognito” ::
:: calculating possible countermeasures ::
:: listing measures ::
:: #1 construction of defense platforms at jumpholes ::
:: #2 collapsation of the Delta jumphole ::
:: #3 increasing local defense forces ::
:: evaluation of measures ::
:: #1 construction of defense platforms at jumpholes ::
:: inefficient expense of resources ::
:: #2 collapsation of the Delta jumphole ::
:: inefficient due to limited mobility ::
:: #3 increasing local defense forces ::
:: tolerable expense of resources ::
:: moving resources to drone production facilities ::
:: moving power to drone production facilities ::
:: initiating construction of additional drone production facilities ::
:: exit database ::
:: departing - program name = “Incognito” ::
:: exit database ::
:: departing - program name = “Progenitor” ::

:: upload = completed ::
:: shut down ::