1MIND REWIRE
7CHAPTER 5: THE EVIDENCE ALGORITHM
2INTRODUCTION: YOU ARE RUNNING MALWARE
8CHAPTER 6: THE SHUTDOWN PROTOCOL
3CHAPTER 1: THE BIO-COMPUTER ARCHITECTURE
9CHAPTER 7: THE FIREWALL PROTOCOL
4CHAPTER 2: THE MALWARE SCAN
10CHAPTER 8: THE MAINTENANCE SCHEDULE
5CHAPTER 3: THE SYNTAX OF POWER
11CONCLUSION: THE INFINITE UPDATE
6CHAPTER 4: THE BOOT SEQUENCE
12APPENDIX: THE 7-DAY REWIRE PROTOCOL