[Burichan] [Futaba] [Nice] [Pony]  -  [WT]  [Home] [Manage]
[Catalog View] :: [Graveyard] :: [Rules] :: [Quests] :: [Discussions] :: [Wiki]

[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]
Posting mode: Reply
Name (optional)
Email (optional, will be displayed)
Subject    (optional, usually best left blank)
Message
File []
Password  (for deleting posts, automatically generated)
  • How to format text
  • Supported file types are: GIF, JPG, PNG, SWF
  • Maximum file size allowed is 10000 KB.
  • Images greater than 250x250 pixels will be thumbnailed.

File 125495202013.png - (12.24KB , 640x400 , Splash.png )
59566 No. 59566 ID: 5eea01

>Connecting...
71 posts omitted. Last 50 shown. Expand all images
>>
No. 64686 ID: 5eea01
File 125553833763.png - (18.76KB , 800x600 , 28.png )
64686

I'll store the encrypted file for later, doesn't seem I can't do much with it yet.

>>64684

Like this? Seems a bit odd to rearrange one's avatar like this, but if you think it'll help...

I am slightly concerned, since I have no idea what exactly is going to happen. Still, if it was designed for me, it must have been left for me to find on purpose. Makes me wonder...
I understand that even small changes in a new program's code can have long-reaching impact upon its performance. This will be...intere-
>>
No. 64687 ID: 5eea01
File 125553892010.png - (58.33KB , 800x600 , 29.png )
64687

>*FWOOMH*

AARGH! THE PAIN! THE PAIN!

>[Choose attribute to upgrade]
>POWER
>STEALTH
>CRACKING
>PROGRAMMING
>DEFENSE

>[Choose program to unlock]
>VIRAL INFECTION - corrupts ICE, variable effects
>CHAMELEON CIRCUIT - blends into background node activity
>FORGED ID - ICE may treat as authorized access
>BARRIER FIELD - sets up a field to restrict access to unauthorized programs/ICE
>DECRYPT - Breaks into code-locked data files and systems

>[You may now customize the AVATAR]
>>
No. 64688 ID: 7526d0

>>64687
Could you explain the attributes? Stealth and Defense are pretty self-explanatory, but the others could use some clarification.
>>
No. 64689 ID: 7526d0

>>64687
Oh, also we already have Chameleon Circuit. What about Security Bypass? If that's an option then my vote is to upgrade Stealth and unlock Security Bypass.
>>
No. 64694 ID: 5eea01

>[List revised]
>VIRAL INFECTION - corrupts ICE, variable effects
>SECURITY BYPASS - allows undetected entry through locked access points
>FORGED ID - ICE may treat as authorized access
>BARRIER FIELD - sets up a field to restrict access to unauthorized programs/ICE
>DECRYPT - Breaks into code-locked data files and systems
>TAZER - Momentarily disables ICE with minimal fragmentation

>[Stat description]
>POWER - Makes brute force (such as the ICE Pick) methods and combat programs more effective
>STEALTH - increases the chances of avoiding detection
>CRACKING - Makes bypassing security systems easier and more efficient, increasing the speed and reducing the load of hacks
>PROGRAMMING - Primarily used for creating custom utilities/programs as well as altering existing Grid objects
>DEFENSE - reduces fragmentation caused by hostile programs as well as making it more difficult to be booted off the system
>>
No. 64695 ID: 5eea01
File 125554041193.png - (2.88KB , 500x400 , papordoll.png )
64695

>[Also, for clarification, you may now suggest cosmetic changes to the avatar. Here, have a papordoll.]
>>
No. 64697 ID: 6faa8c

>>64694
Votan stealth/security bypass.

WE SHALL BECOME A TROJAN
>>
No. 64700 ID: 9e9b47
File 12555409297.png - (4.65KB , 500x400 , newsuggestion.png )
64700

>>64695

Wait wut

Also, cracking
>>
No. 64703 ID: 8ca61a
File 12555416386.png - (6.83KB , 333x333 , monoclesom.png )
64703

How you look in the machine itself is very pretty. Those are good colors for you. You don't need to change much, just keep that phazon coloring they're applying like a good Rex.
>>
No. 64709 ID: c32040

>>64694
Reiterating my Stealth/Security Bypass vote.

>>64695
I can't think of anything to change. You already look like a ninja, so it's perfect, Tycho.
>>
No. 64898 ID: db1ae6

>>64703
Huh...is that image from a quest?
>>
No. 64901 ID: 4e9b58

That image is from her hand.
>>
No. 64942 ID: db1ae6
File 125557577027.png - (7.00KB , 502x388 , tron.png )
64942

D-D-DO THIS, IIIINESEEEECT.
>>
No. 64961 ID: c0f3bf
File 125557675434.jpg - (30.95KB , 500x400 , Kidding.jpg )
64961

In all seriousness though, just stay the same, your triangleness is well appreciated :3
>>
No. 64998 ID: db1ae6

>>64942
>>64961
Hmmm...
>>
No. 64999 ID: db1ae6
File 125558017074.png - (9.86KB , 502x400 , tred.png )
64999

>>64998
direct copy over with a bit erased from Tron design to give teeth.
>>
No. 65081 ID: c0f3bf

>>64999
O.o

Retract previous statement, use this one!
>>
No. 65272 ID: 5eea01
File 125570392913.png - (58.45KB , 800x600 , 30.png )
65272

>[Trait chosen: STEALTH]
>[Program unlocked: SECURITY BYPASS]
>[Changes to Avatar saved]

Nnnnrrrh. The pain is subsiding. Everything is coming to a focus. I feel...different. Changed. Improved, perhaps. Whatever it is, it was not gentle. Perhaps the upgrade unit was put together in a hurry.
I can only hope that any other such devices will be more refined.
>>
No. 65273 ID: 5eea01
File 125570454145.png - (20.21KB , 800x600 , 31.png )
65273

After a brief diagnosis I seem to have been slightly trimmed to generate a smaller signature, allowing me to evade detection more reliably.
I can also bypass some security systems with a little time and dedicating memory to the job.

I have enough memory to run two programs at a time. Upgrading my memory will be quite tricky and I am not entirely sure how it is even done.

>[Character sheet]
>[Stats]: Pwr1, Sth2, Crk1, Pro1, Def1,
>[Programs (Memory 2)]: ICE Pick, Security Bypass, Chameleon Circuit
>[Inventory]: Passcoded datafile
>>
No. 65274 ID: 5eea01
File 125570524180.png - (21.12KB , 640x400 , Chapter1end.png )
65274

And that is how I was born...and re-born.
>>
No. 65675 ID: 5eea01
File 125580976463.png - (18.30KB , 640x400 , Chapter2.png )
65675

>Reconnecting...
>>
No. 65677 ID: 5eea01
File 125581042635.png - (19.72KB , 800x600 , 32.png )
65677

The upgrade unit did not give me any information as to what I should do or what is expected of me...but given the nature of the modifications I would hazard a guess there is some place I must break into with as little fuss as possible. But to find that place I need clues as to where it is...

I think that even with my meager programming ability I could search for nearby locations using the Gateway. Or I could venture into the general traffic of the Grid and try to blend inconspicuously with the torrents of data and hope I don't catch the eye of any more malware.
There might also be hints hidden somewhere in this system.

What should I do?
>>
No. 65684 ID: d2fdab

>>65677
What happened to that locked data? Is it still around anywhere?
>>
No. 65685 ID: e06ea4

Search with the gateway.
>>
No. 65691 ID: 5eea01
File 125581378686.png - (20.59KB , 800x600 , 33.png )
65691

>>65684
I still have it with me, since I cannot decrypt it without potentially corrupting its contents yet.

>>65685
Allright, let's go take a loo- oh, right. Restarting the Chameleon Circuit program seems to have slipped my mind.

>[Sentinel]: ID signature verified. You may pass, Master Tycho.

...ah. How thoughtful of the person responsible of this set-up to allow relatively free exit. It seems that I have some degree of control over this ICE program.
Should I try to issue it (a) command(s)?
>>
No. 65692 ID: d2fdab

>>65691
Ask it for a list of its programs and see if it is able to unlock the data.
>>
No. 65694 ID: 5eea01
File 125581516030.png - (21.86KB , 800x600 , 34.png )
65694

[Tycho]: List available programs.
[Sentinel]: Currently loaded programs include MalwareZapper 2.5, ZortriumPlate 1.0 and KickanGaemz 1.6
[Tycho]: So...nothing to decrypt files with?
[Sentinel]: Affirmative.
[Tycho]: Just checking.

Well, I don't know what I was expecting from a simple grunt program like this. Guess I'll just go toy around with that Gateway.
>>
No. 65695 ID: d2fdab

>>65694
See if it will accept commands to transfer programs to yourself.
>>
No. 65700 ID: 5eea01
File 12558160278.png - (21.82KB , 800x600 , 35.png )
65700

[Tycho]: Can you transfer the listed programs to me? And if so, would I be able to use them?
[Sentinel]: Negative. The programs are designed only to function when installed in a Sentinel core. Transfer would result in highly corrupted data.
They are also very resource-intensive and without sufficient memory dedicated to them would suffer massive performance drops.

[Sentinel]:...no offense, sir.
>>
No. 65709 ID: d2fdab

>>65700
Well it was worth a shot. Proceed to that gateway to commence tinkering!
>>
No. 68579 ID: ac3813
File 125624299027.png - (34.20KB , 800x600 , 36.png )
68579

>Connection re-established.

-and I've never felt as good as how I do right no-
Oh. There you are. I was wondering where you went. I have just finished reconfiguring the Gateway to connect to nearby, unblocked systems.

Let's see...

>Scanning...
>3 available locations found.
>EON Corp File Repository [High Security]
>Gridtalk [Open Access/Medium Security Admin functions]
>GridNIC [No Security]

All of them are connected to the Grid, so I can attempt to access them. Which one do you think would be the best starting point in my search for my intended purpose?
>>
No. 68594 ID: a9ac4e

>>68579
Well, the NIC should have information, or at least links to other nodes, so I vote head there.
>>
No. 68595 ID: f0c8b3

Let's give InterGridNIC a try.
>>
No. 68606 ID: ac3813
File 125624668257.png - (132.33KB , 800x600 , 37.png )
68606

>>68594
>>68595
Ah, yes. The Grid Network Information Center! A freely accessible collection of public node addresses, one of the most important free access servers within the Grid. Surely I will find useful information in here!

>Gateway opened.
>Transferring...
>>
No. 68611 ID: ac3813
File 125624762661.png - (23.68KB , 800x600 , 38.png )
68611

>Transfer complete.

...wow. The scan was not kidding when it said "No Security". The Admin access point is in plain sight and it seems a previous visitor cracked the password and posted it on the wall.

>GridNIC password 'swordfish' acquired!

I'm starting to doubt we will find anything useful that has NOT been tampered with in here. Should I inspect it anyway?
>>
No. 68612 ID: f4963f

>>68611
Bah, let's at least check out the admin access point~
>>
No. 68613 ID: 632862

>>68611
Beware of viruses. See if you can verify that that's the correct password and not some kind of trap.
>>
No. 68619 ID: f0c8b3

Remember kids, always wear protection when tapping into a public I/O port.

Investigate that fucker.
>>
No. 68626 ID: ac3813
File 125624919733.png - (22.48KB , 800x600 , 39.png )
68626

I will be mindful of danger, regardless.

>[Activating SECURITY BYPASS]

>run bypass.exe
>password required, running force.gen
>password generated: swordfish

Looks like it's the correct password, at least.
Better safe than sorry...
>[Activating CHAMELEON CIRCUIT]
In we go, then.

[HOPEFULLY THE IMAGE IS CORRECT THIS TIME I SWEAR]
>>
No. 68635 ID: ac3813
File 125625097142.png - (23.95KB , 800x600 , 40.png )
68635

I have Admin. I am seeing two access points, leading to the public database, the other to admin-only log files. Of course, given how easy it is to get admin-level access, most of the logs are either exceedingly outdated, deleted thirty-five minutes ago or completely made up.

What now?
>>
No. 68637 ID: a9ac4e

>>68635
Check the data, then make sure to delete the logs yourself.
>>
No. 68638 ID: 9891a9

>>68635
Check out the data, sounds like the logs will be entirely useless.
>>
No. 68639 ID: 632862

>>68635
What's that green thing up there?
>>
No. 68647 ID: ac3813
File 125625185845.png - (23.15KB , 800x600 , 41.png )
68647

>>68637
>>68638
I will get to the logs later, then. Now, is there anything specific you want to recommend searching for? There are many, many addresses stored here. Narrowing it down would help immensely.

>>68639
What green thi-
Oh. Good thing I turned on the Chameleon Circuit. That there is a traffic monitor. They usually have pretty high detection rates, but thanks to my recent stealth upgrade, I managed to slip in without it noticing and thus avoided getting logged at all.
>>
No. 68658 ID: a9ac4e

>>68647
PROTIP: Look up all internal service machines and banks, make fake accounts at all the banks, then bounce your connection through all those nodes whenever you need to hack something.
>>
No. 76308 ID: 5eea01
File 12581560985.png - (17.59KB , 800x600 , 42.png )
76308

[Apologize for the unannounced break, unfortunately I've caught some sort of flu, possibly of the bacon-flavored variety so will be too tired to continue further today.]

...this is the GridNIC database? All I see is three folders. Untitled folders. I don't particularly relish having to go through them, but if you think it'll help...
>>
No. 76313 ID: d912cb

>>76308
Eh, can't take that long.
>>
No. 76331 ID: e0499d

find something to practice picking with
>>
No. 76343 ID: f4963f

>>76308
Might as well see what's in it, anyway.
>>
No. 76347 ID: 632862

While we're here, how about we organize everything?
[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]

Delete post []
Password