His methods are unusual to say the least. Upon exposure, he unleashes a relentless attack with incredible specificity. His processes are tightly orchestrated, involving several structural components. Once inside, he unpacks his cargo, containing tools and maps. Using the world around him, he replicates, hijacks, and incorporates. From here on, his programs are permanently encoded. His onslaught is aggressive—duplication, triplication, and so on and so forth. Forming millions of copies, he decimates. His neighbors don’t like him.

Most of his victims belong to a group of “typical progressors” which (if left alone) will develop persistence during the chronic phase, due in part to latent pools of what’s left behind. Among experts, there are theories: (1) promote him, expose him, and purge him or (2) just leave him be.

Featured image courtesy of Wikimedia Commons


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s