Unintuitive, derivative, and more confusing than writing in binary. That was what they called the Chronivac 5.0. It was a more astronomical failure Windows 8 or the Chronivac 4.0 combined. The Chronivac 4.0 gained immense notoriety for being dangerous and lacking any form of security. Thus, in the new version, the whole program was built to require actual commands, so accidental changes would be too difficult to make. Then, to make hijacking more difficult, the program would require a push command. Any change will only last for one minute but can be pushed during that minute for it to last longer.
Turns out that nobody knew how to use the commands, and the push system meant that nobody could really enjoy transformations. No number of new types of transformation, and no number of updates to the command system could ever save the program, and it ended up a relic of old defunct software.
Lost to time.
Lost to memory.
Then there’s you. You found the software collecting dust at a goodwill. As a programmer, it didn’t take you long to see all the flaws in the broken piece of software. Curious to know what It could do; you start to construct a better UI for running the program without any form of command line. This only helped a little.
You had to tear apart the code, read through any old documentation that could be found online. This old software was becoming your personal Frankenstein. It took several days, but you constructed a whole new system for the Chronivac 5.0. It looked like new, sleek, clean. Now it is time for you to test it. You pick a target.