Travel through the underbelly of a compromised computer system by solving binary logic puzzles, restoring your way from the port to the heart of the system