http://www.newgrounds.com/portal/view/368557

(And no, I did not make this. I am in no way affilitated with it, either.)

This is how I think a malicious Agent would behave. (Check out the first Animator Vs. Animation, too, for how a much weaker Agent could behave if it had the ability to copy itself.)

While it is a 2d representation using a Windows environment and a stick figure, I consider it to be a pertinent metaphor for how things occur in SR hacking. He can interrupt user input (such as when he attacks the mouse), he can attack other programs, destroying files (such as what he does to the poor requiredessay.doc) and wreaking havoc on the system (ripping things out of the recyclebin, out of the Files folder), and engages in cybercombat with IC (Firefox, AIM), and eventually gets caught and captured by a much more powerful, dedicated virus-protection IC, which rips into his code and "tames" him. smile.gif