Attack ASCII: Algorithm is Encoded(1); Algorithm is Decoded (2); ASCII is Saved on a doc basis; The file opens; The system interprets and absorbs 2 ASCII characters. - "In an ASCII Attack the system is overloaded with command and can undo the current programming."