Step 1: Find a system with lax security.
Step 2: Identify the codebase.
Step 3: Crack the password (or not).
Step 4: Copy, modify, and delete.
Step 1: Plant malware.
Step 2: Wait for the inevitable panic.
Step 3: Laugh maniacally while the system burns.
Step 1: Delete all logs.
Step 2: Set up fake alibis.
Step 3: Deny, deny, deny.
Want to see how to set up a fake alibi? Click here.
Want to see more chapters? Check them out.
Or, if you're feeling extra sassy: Read the advanced guide.