High-tech computer crime and industrial espionage |
Hack into rival computer systems | Steal research data | Launder money and try to erase the evidence | Modify academic or criminal records | Construct the most dangerous computer virus ever designed | Processor, Pentium 300Mhz | Memory, 32Mb RAM, 25Mb hard disk space | CD-ROM drive | Compatible with Windows 95,98, XP, ME |
|