One
Small
Set of commands
The procedure:
Invade
Attach
Disable
Duplicate
A seemingly
Harmless link
An invitation
To open a
Pathway
With the above
In place
Another set
Of commands
Shuts down
Security
By hiding
Within the system
Itself
Then the
Master plan
Overload the system
By mass reproduction
At breakneck speeds
Turning its life span
From years to mere seconds
All because
Of
One
Harmless
Click...