"FIG. 4 is a flow chart of an embodiment of an implementation of a generic attack." . . . .