Pull Time Action
Components Security tools
You gain complete control over target computer, with full access to all data, functions, and connected systems. Only a gambit or Super Science item could remove your access. You can access this computer remotely from any other computer.
HYPERLANES Developer Ryan Chaddock Copyright 2017 Scrivened, LLC