[Burichan] [Futaba] [Nice] [Pony]  -  [WT]  [Home] [Manage]
[Catalog View] :: [Graveyard] :: [Rules] :: [Quests] :: [Discussions] :: [Wiki]

[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]
Posting mode: Reply
Name
Email
Subject   (reply to 59566)
Message
File []
Password  (for post and file deletion)
  • Supported file types are: GIF, JPG, PNG, SWF
  • Maximum file size allowed is 10000 KB.
  • Images greater than 250x250 pixels will be thumbnailed.
  • Currently 39865 unique user posts. View catalog

File 125495202013.png - (12.24KB , 640x400 , Splash.png )
59566 No. 59566 ID: 5eea01

>Connecting...
Expand all images
>>
No. 59569 ID: 5eea01
File 12549521164.png - (23.37KB , 800x600 , 1.png )
59569

>Connection established
>Installing software...
>>
No. 59577 ID: 5eea01
File 125495229070.png - (78.40KB , 800x600 , 2.png )
59577

>Auto-configuring settings...
>Done.
>Activating Gateway...
>Loading program into memory...
>>
No. 59580 ID: 5eea01
File 125495243530.png - (83.74KB , 800x600 , 3.png )
59580

>Program entered node I/O-031.

I...live.
>>
No. 59584 ID: 09d188

>>59580
Define:'live'

Also scan node.
>>
No. 59587 ID: 5eea01
File 125495276690.png - (24.37KB , 800x600 , 4.png )
59587

It would seem I am not alone. Greetings. I am...hm. Curious. I seem to lack an identifying title. I shall require a name. I require input.

> Name?
>>
No. 59591 ID: 2cbe3e

>>59587

Upside-down pyramidhead
>>
No. 59593 ID: 09d188

>>59587
Hello World.

No wait...

Tycho!
>>
No. 59594 ID: f21281

>>59587
Kaeleos.
>>
No. 59597 ID: 099247

Mokai
>>
No. 59606 ID: fb5d8e

NO, BATMAN!
>>
No. 59627 ID: 5eea01
File 125495433495.png - (24.23KB , 800x600 , 5.png )
59627

>>59591
>>59593
>>59594
>>59597
Ah, there are more of you? While the first one is...descriptive of my current avatar, I must stress that it is my current one. It is liable to change to reflect my development, with some leeway for customization.
Or so I understand.

As to the other suggestions...I cannot decide quite yet, so I'll just take all of them (except the copyrighted one).

Self-identifying title changed to Tycho Kaeleos Mokai.


>>59584
Live, exist, think. In short, I am. This knowledge has been imparted to me in addition to certain basic functions, such as the knowledge of communication with you, whoever you are.

As to my surroundings, this is clearly an I/O node, as evidenced by the I/O Port, also known as a Gateway, from which I emerged. And that would seem to be an access point to another node. If you are using a standard VR interface, it would appear as a simple door. With a knob. How quaint.
>>
No. 59630 ID: 5eea01

[Correction: upside-down pyramid head is not even descriptive, author derp]
>>
No. 59636 ID: 18212a

Give us an inventory of your known abilities, if you would be so kind.
>>
No. 59637 ID: 036360

A simple plan:Open the door!
>>
No. 59708 ID: 5eea01
File 125495702691.png - (31.23KB , 800x600 , 6.png )
59708

>>59636
I have many abilities which could theoretically surpass those of any autonomous or semi-autonomous program. Most of them are, however, security-locked. The comments file on this specify "your own safety" as the reason, without further elaboration. I could, if required, open them with a code file. A simple password would not hold me for long, but as my database tells me, the codes used in many high-security systems are of such length and complexity that they have to be stored in relatively weighty files, which would take most codebreaking software ages to crack.
I, however, am not most codebreaking software. A large number of my locked functions are dedicated to bypassing security systems. But that is for later. Right now, I am limited to scanning nodes, moving between them [as I just demonstrated] and reading/writing data files. Kind of like...that.
>>
No. 59711 ID: aba0a3

His name better be Rex T. Angle, I'll be pissed.
>>
No. 59713 ID: 18212a

>>59708
Read note.
>>
No. 59715 ID: 9cc8fd

>>59708
 retrieve your spoils
What else is that in this node, other than port and file?
>>
No. 59789 ID: 5eea01
File 125495903975.png - (33.37KB , 800x600 , 7.png )
59789

>>59713
>>59715
Upon inspection, the data file contains an activation code for one of my more specialized programs.

>[GATEWAY REDIRECTION UNLOCKED]

It also contains a Gateway address, untitled.

That thing on the ceiling is an opening into the outside Grid. I could leave it and try to scour the Grid for the Gateway address I found, but that would leave me unprotected. A safer way would be to use the Gateway access in the other node.
>>
No. 59799 ID: ee6acb

/name Rex.T.Angle
>>
No. 59829 ID: 18212a

Reenter node 031, then use your newfound powers to redirect the gateway.
>>
No. 59847 ID: 036360

Yeah.. that's all very interesting... but lets change our name to Rex T Angle before that Anti-Sleep program starts to malfunction.
>>
No. 59880 ID: f71f97

REX. T. ANGLE. YES.
>>
No. 59893 ID: 5eea01
File 125496126644.png - (135.75KB , 800x600 , 8.png )
59893

>>59829
Gateway redirected and activated. Let's see where it goes...

>>59711
>>59799
>>59847
Perhaps if I grow bored of my name I'll try something else. But for now, I'll leave it as it is.

Transfer will take some time. We will most likely lose contact until it is complete.
>>
No. 59918 ID: 5eea01
File 125496192528.png - (115.71KB , 800x600 , 9.png )
59918

Until then.
>Transfer in progress

[This is it for now, author requires sleep as evidenced by accidently in a new thread.]
>>
No. 61587 ID: ac3813
File 125509197050.png - (131.88KB , 800x600 , 11.png )
61587

>*DVOIP!*
>Transfer complete.

Ah, there you are again. The Gateway bounced me around for quite a while there.
Let's see...same VR model, same node dimensions... still in the same system. I wonder why aren't they directly connected.
>>
No. 61590 ID: 9cc8fd

>>61587
consume the file
Maybe it's a sort of security measure, to prevent the spread of infection?
>>
No. 61591 ID: 43d730

>>61587
See how many zennys are in that file.
>>
No. 61592 ID: 276781

>>61591
That MYSTERY DATA could contain viruses, a Battlechip, or Zenny. Not just Zenny! Hell, if we're really lucky, it could be an Untrap Subprogram.

Regardless, inspecting the MYSTERY DATA sounds like a good idea.
>>
No. 61594 ID: ac3813
File 125509530864.png - (43.27KB , 800x600 , 12.png )
61594

Read/erase commands are uncommon, but possible.
Down the hatch. What's a Zenny, by the-

>[Security code obtained. Program unlocked: ICE Pick]
>Attached note: "They'll be coming for you, Rex. Don't let them. -D."
>>
No. 61595 ID: 276781

>>61594
Scan memory banks/encyclopedia for term "Megaman Battle Network".

If you can't, or you get no results:
Green diamondic data is reminiscent of the "Mystery Data" from these games, and can contain zennyy (currency), battlechips (items for fighting with), viruses (monsters to fight), or subprograms/subchips (various effects.)

Does ICE Pick do what I think it does, and allow hacking through doors/locks/security?
>>
No. 61597 ID: 43d730

>>61594
Apply GREEN CRYSTAL to DOOR.
>>
No. 61599 ID: ac3813
File 125509784021.png - (47.14KB , 800x600 , 13.png )
61599

>>61597
If you are referring to the data file, it has already been copied into my personal data storage and destroyed.

>>61595
Correct. The ICE Pick is a general brute force tool usable on most Intrusion Countermeasure Electronics as the name implies, but can also be used to disrupt the function of most Grid-based objects, unless they are specifically made to be pick-proof.

While it is widely usable, it has the drawback of being very easy to detect and can cause unwanted damage to whatever it is used on.
>>
No. 61600 ID: 276781

>>61599
It would appear there is only one way forward, barring going back through the Gateway for an indeterminate period of time and getting nowhere.

Liberal application of the ICE Pick on local security it is.
>>
No. 61603 ID: 8ca61a

Pick the Door.
>>
No. 61606 ID: ac3813
File 125509948726.png - (46.04KB , 800x600 , 14.png )
61606

Allright, this door lock does not seem particularly complicated.

1...2...
>>
No. 61610 ID: ac3813
File 125510065324.png - (25.45KB , 800x600 , 15.png )
61610

>[Nearby...]
>Sentinel standing by.
>>
No. 61613 ID: ac3813
File 125510148358.png - (38.19KB , 800x600 , 16.png )
61613

..3!

>[Access deni-*KZRRT* Access granted.]
>[Sentinel]: SECURITY BREACH! INTRUDER DETECTED!

....oh great.
>>
No. 61614 ID: 8ca61a

Go in, quickly go in trap door, it's too big to go down after you.
>>
No. 61616 ID: 0c7e0c

>>61613
It detected you from a different node? That's... weird. Or maybe it just means that the act of intrusion was detected. Either way, do you have a stealth program? Any way to hide your processes as background noise? Maybe mask your ID to come back empty? Because I doubt you're ready for cybercombat yet.
>>
No. 61618 ID: ac3813
File 12551036757.png - (22.49KB , 800x600 , 17.png )
61618

>>61614
>>61616
The Sentinel detected me breaking through the lock on the access point. And no, I don't have any stealth programming. If I did, it's still locked. I could try to use the Pick on it, but it'd likely boot me off the network or worse. Luckily there's a narrow-bandwidth exit here.

So long, sucker!
>>
No. 61619 ID: ac3813
File 125510562137.png - (86.62KB , 800x600 , 18.png )
61619

...ah. I was wondering why there was a hatch. One-way exit to the outside Grid, probably to boot intruders out of the system. Lovely.

Hello, malware.
>>
No. 61623 ID: 43d730

>>61619
Leg i...
Swim it?
Fall it?
In any case, GTFO from it.
If you think the ICE pick would work on it, you're welcome to try that, too.
>>
No. 61635 ID: 8ca61a

Help the malware in so it can distract the sentry and you can go through the door.
>>
No. 61783 ID: 632862

>>61619
That's not a grid-based object, is it? If it is, smash it with the ICE Pick. Otherwise, run away!
>>
No. 62026 ID: ac3813
File 125516634428.png - (84.74KB , 800x600 , 19.png )
62026

>>61623
Swim? Fall? I'm... not sure I understand what you're trying to say. But still, I doubt retreat would help much, since it would just follow me.

>>61783
Technically it is Grid-based, since we are still inside the Grid. This is exactly why I'd rather not go outside without defensive programs. I suppose the Pick could work as a last resort, though.

>>61635
That doesn't actually sound like a bad idea, provided we can actually communicate with it. Malware and virii usually can break through some security systems, so I might be in luck.

>[Opening connection...]
>>
No. 62027 ID: ac3813
File 125516653969.png - (97.42KB , 800x600 , 20.png )
62027

>WARNING: INFECTION DETECTED.

Ack! It's trying to penetrate my internal firewall with its endlessly hungry, probing tentacles! It hurts it hurts it hurts!
>>
No. 62028 ID: 632862

>>62027
If a problem comes around, you must PICK IT.
>>
No. 62029 ID: ac3813
File 125516755824.png - (98.23KB , 800x600 , 21.png )
62029

N..no...I..I'VE HAD ENOUGH! I WILL NOT BE CONSUMED AND VIOLATED BY THIS FILTH!
>>
No. 62030 ID: c0f3bf

>>62027
You said you can change to reflect your development.

Spontaneously become a badass and see if you can sprout katars from your arms.
>>
No. 62031 ID: 632862

Perhaps simply smashing the malware would be enough at this point.
>>
No. 62033 ID: ac3813
File 125516903296.png - (148.38KB , 800x600 , 22.png )
62033

>*BWAMF*
>Infection purged
>Rogue process terminated

Well, would you look at that. It contained relatively undamaged data.
>>
No. 62035 ID: aba0a3

read data
hug sentinel
>>
No. 62072 ID: ac3813
File 125518273224.png - (19.93KB , 800x600 , 23.png )
62072

Vile abomination...let's take a look what it contained. The red colour should not be anything to be alarmed about. Usually. Better erase it while I'm at it, free-floating data files may attract other malware.

>[Security code obtained. Choose program to unlock.]

>VIRAL INFECTION - corrupts ICE, variable effects
>CHAMELEON CIRCUIT - blends into background node activity
>SECURITY BYPASS - allows undetected entry through locked access points
>>
No. 62074 ID: aba0a3

Chameleon Circuit
>>
No. 62078 ID: ac3813
File 125518511025.png - (22.84KB , 800x600 , 24.png )
62078

>Running Chameleon Circuit 1.0

>>62030
Yes, but keep in mind that they would be cosmetic changes at best. They would have to be linked to a combat program to be of any actual use.

Hmh, fortunately the trapdoor was still open. And the stealth program is doing the trick; the Sentinel did not immediately detect me. Any particularly overt action, such as using the ICE Pick, will give me away, though.
How should I proceed?
>>
No. 62079 ID: f0c8b3

>>62078
I doubt the pick would work on that thing. Let's sneak past it.
>>
No. 62080 ID: 27a05f

>>62078
Let's try using Viral Infection on it. We need to find out its potential anyway.
>>
No. 62082 ID: f0c8b3

>>62080
We could only pick one new power, and we already took the chameleon thingy.
>>
No. 62083 ID: 27a05f

>>62082
Oh, what? We voted?
>>
No. 62085 ID: f0c8b3

>>62083
Well there was like one vote but since he's already using the chameleon circuit I think there's no goin back.
>>
No. 62088 ID: 27a05f

>>62085
Well, a stealth program doesn't do us much good without a subtle exploit ability. It's like dressing all in black and then bursting through a door with a battering ram. And vice versa is also true. You can be the stealthiest lockpicker in the world but if you're wearing a garish clown suit, once you get in you're going to get spotted. You have to have both for it to be of any use.

So I propose we head back to the outside Grid and fight more malware to unlock the Security Bypass. Although I have no idea how an ICE pick worked against malware, which is not ICE...
>>
No. 62106 ID: ac3813
File 12551942275.png - (26.68KB , 800x600 , 25.png )
62106

>>62088
The ICE Pick, as stated before, is a general tool for disrupting various systems. It is just called an 'ICE' Pick because it is the simplest tool for disabling ICE.
And I suppose there's some joke hidden in the name as well.

And the thing about Chameleon Circuit 1.0 is that while it is not perfect, it can still be used to avoid ICE without advanced detection algorithms, such as this Sentinel. And while breaking through locks using the pick would make me noticeable, simply using an unprotected access point will not. Like so.
>>
No. 62108 ID: d610dd

>>62106
Oh yeah, it's definitely useful. But only in a very limited number of scenarios.

Well, hopefully you'll be able to further branch out soon. Keep explorin'!
>>
No. 62279 ID: 632862

>>62106
Your sensors appear to be red now. Is part of the Malware infection still present?
>>
No. 64677 ID: 5eea01
File 125553359020.png - (22.76KB , 800x600 , 26.png )
64677

>>62279
Really? I'm not detecting any changes to my avatar, but just in case...

>Running self-diagnostic...
>Self-diagnostic complete: file corruption at 0.2%

Well, that's completely within normal safety limits. I've gotten off lucky, considering that extended contact with free non-Gateway Grid traffic tends to reduce unprotected programs into fragmented wrecks rather quickly.

>Entering node ???

I...um. I have no idea what this node is for. There's an unidentified device and what seems to be a locked data file. I do not have anything to open it with as of right now.
>>
No. 64679 ID: 8ca61a

Sit in the S&M chair.
>>
No. 64680 ID: 7526d0

>>64677
Run an Analyze program on the device. If you don't have one of those try inserting the locked data into the machine and if that does nothing then try holding your arm under machine.

Er, right, those'd be the meatspace terms. Try executing the function with the locked data as input.
>>
No. 64682 ID: 5eea01
File 125553520628.png - (24.42KB , 800x600 , 27.png )
64682

>>64679
'Sit'? In the what now?

>>64680

Well, it's not acceptin the data file.
My more sophisticated scanning utilities seem to remain locked, but from what I can tell this...thing is designed to perform minor rewrites on active programs which have a specific ID signature.

...specifically, mine. I can't help but feel slightly apprehensive about all of this.
Why is my internal encyclopedia incomplete? And what is this 'meatspace' you are referring to?
>>
No. 64683 ID: 7526d0

>>64682
If it's designed for you then who are you to go against design? Let it minorly rewrite you!

And never you mind what meatspace is. You have bigger codes to compile.
>>
No. 64684 ID: 9cc8fd

>>64682
Sitting is rearranging your profile into a less mobile but smaller (and more stable when properly interfaced) shape by bending one's legs forward at the hip, and down at the knees. You could fit into the device with less movement that way.
>>
No. 64686 ID: 5eea01
File 125553833763.png - (18.76KB , 800x600 , 28.png )
64686

I'll store the encrypted file for later, doesn't seem I can't do much with it yet.

>>64684

Like this? Seems a bit odd to rearrange one's avatar like this, but if you think it'll help...

I am slightly concerned, since I have no idea what exactly is going to happen. Still, if it was designed for me, it must have been left for me to find on purpose. Makes me wonder...
I understand that even small changes in a new program's code can have long-reaching impact upon its performance. This will be...intere-
>>
No. 64687 ID: 5eea01
File 125553892010.png - (58.33KB , 800x600 , 29.png )
64687

>*FWOOMH*

AARGH! THE PAIN! THE PAIN!

>[Choose attribute to upgrade]
>POWER
>STEALTH
>CRACKING
>PROGRAMMING
>DEFENSE

>[Choose program to unlock]
>VIRAL INFECTION - corrupts ICE, variable effects
>CHAMELEON CIRCUIT - blends into background node activity
>FORGED ID - ICE may treat as authorized access
>BARRIER FIELD - sets up a field to restrict access to unauthorized programs/ICE
>DECRYPT - Breaks into code-locked data files and systems

>[You may now customize the AVATAR]
>>
No. 64688 ID: 7526d0

>>64687
Could you explain the attributes? Stealth and Defense are pretty self-explanatory, but the others could use some clarification.
>>
No. 64689 ID: 7526d0

>>64687
Oh, also we already have Chameleon Circuit. What about Security Bypass? If that's an option then my vote is to upgrade Stealth and unlock Security Bypass.
>>
No. 64694 ID: 5eea01

>[List revised]
>VIRAL INFECTION - corrupts ICE, variable effects
>SECURITY BYPASS - allows undetected entry through locked access points
>FORGED ID - ICE may treat as authorized access
>BARRIER FIELD - sets up a field to restrict access to unauthorized programs/ICE
>DECRYPT - Breaks into code-locked data files and systems
>TAZER - Momentarily disables ICE with minimal fragmentation

>[Stat description]
>POWER - Makes brute force (such as the ICE Pick) methods and combat programs more effective
>STEALTH - increases the chances of avoiding detection
>CRACKING - Makes bypassing security systems easier and more efficient, increasing the speed and reducing the load of hacks
>PROGRAMMING - Primarily used for creating custom utilities/programs as well as altering existing Grid objects
>DEFENSE - reduces fragmentation caused by hostile programs as well as making it more difficult to be booted off the system
>>
No. 64695 ID: 5eea01
File 125554041193.png - (2.88KB , 500x400 , papordoll.png )
64695

>[Also, for clarification, you may now suggest cosmetic changes to the avatar. Here, have a papordoll.]
>>
No. 64697 ID: 6faa8c

>>64694
Votan stealth/security bypass.

WE SHALL BECOME A TROJAN
>>
No. 64700 ID: 9e9b47
File 12555409297.png - (4.65KB , 500x400 , newsuggestion.png )
64700

>>64695

Wait wut

Also, cracking
>>
No. 64703 ID: 8ca61a
File 12555416386.png - (6.83KB , 333x333 , monoclesom.png )
64703

How you look in the machine itself is very pretty. Those are good colors for you. You don't need to change much, just keep that phazon coloring they're applying like a good Rex.
>>
No. 64709 ID: c32040

>>64694
Reiterating my Stealth/Security Bypass vote.

>>64695
I can't think of anything to change. You already look like a ninja, so it's perfect, Tycho.
>>
No. 64898 ID: db1ae6

>>64703
Huh...is that image from a quest?
>>
No. 64901 ID: 4e9b58

That image is from her hand.
>>
No. 64942 ID: db1ae6
File 125557577027.png - (7.00KB , 502x388 , tron.png )
64942

D-D-DO THIS, IIIINESEEEECT.
>>
No. 64961 ID: c0f3bf
File 125557675434.jpg - (30.95KB , 500x400 , Kidding.jpg )
64961

In all seriousness though, just stay the same, your triangleness is well appreciated :3
>>
No. 64998 ID: db1ae6

>>64942
>>64961
Hmmm...
>>
No. 64999 ID: db1ae6
File 125558017074.png - (9.86KB , 502x400 , tred.png )
64999

>>64998
direct copy over with a bit erased from Tron design to give teeth.
>>
No. 65081 ID: c0f3bf

>>64999
O.o

Retract previous statement, use this one!
>>
No. 65272 ID: 5eea01
File 125570392913.png - (58.45KB , 800x600 , 30.png )
65272

>[Trait chosen: STEALTH]
>[Program unlocked: SECURITY BYPASS]
>[Changes to Avatar saved]

Nnnnrrrh. The pain is subsiding. Everything is coming to a focus. I feel...different. Changed. Improved, perhaps. Whatever it is, it was not gentle. Perhaps the upgrade unit was put together in a hurry.
I can only hope that any other such devices will be more refined.
>>
No. 65273 ID: 5eea01
File 125570454145.png - (20.21KB , 800x600 , 31.png )
65273

After a brief diagnosis I seem to have been slightly trimmed to generate a smaller signature, allowing me to evade detection more reliably.
I can also bypass some security systems with a little time and dedicating memory to the job.

I have enough memory to run two programs at a time. Upgrading my memory will be quite tricky and I am not entirely sure how it is even done.

>[Character sheet]
>[Stats]: Pwr1, Sth2, Crk1, Pro1, Def1,
>[Programs (Memory 2)]: ICE Pick, Security Bypass, Chameleon Circuit
>[Inventory]: Passcoded datafile
>>
No. 65274 ID: 5eea01
File 125570524180.png - (21.12KB , 640x400 , Chapter1end.png )
65274

And that is how I was born...and re-born.
>>
No. 65675 ID: 5eea01
File 125580976463.png - (18.30KB , 640x400 , Chapter2.png )
65675

>Reconnecting...
>>
No. 65677 ID: 5eea01
File 125581042635.png - (19.72KB , 800x600 , 32.png )
65677

The upgrade unit did not give me any information as to what I should do or what is expected of me...but given the nature of the modifications I would hazard a guess there is some place I must break into with as little fuss as possible. But to find that place I need clues as to where it is...

I think that even with my meager programming ability I could search for nearby locations using the Gateway. Or I could venture into the general traffic of the Grid and try to blend inconspicuously with the torrents of data and hope I don't catch the eye of any more malware.
There might also be hints hidden somewhere in this system.

What should I do?
>>
No. 65684 ID: d2fdab

>>65677
What happened to that locked data? Is it still around anywhere?
>>
No. 65685 ID: e06ea4

Search with the gateway.
>>
No. 65691 ID: 5eea01
File 125581378686.png - (20.59KB , 800x600 , 33.png )
65691

>>65684
I still have it with me, since I cannot decrypt it without potentially corrupting its contents yet.

>>65685
Allright, let's go take a loo- oh, right. Restarting the Chameleon Circuit program seems to have slipped my mind.

>[Sentinel]: ID signature verified. You may pass, Master Tycho.

...ah. How thoughtful of the person responsible of this set-up to allow relatively free exit. It seems that I have some degree of control over this ICE program.
Should I try to issue it (a) command(s)?
>>
No. 65692 ID: d2fdab

>>65691
Ask it for a list of its programs and see if it is able to unlock the data.
>>
No. 65694 ID: 5eea01
File 125581516030.png - (21.86KB , 800x600 , 34.png )
65694

[Tycho]: List available programs.
[Sentinel]: Currently loaded programs include MalwareZapper 2.5, ZortriumPlate 1.0 and KickanGaemz 1.6
[Tycho]: So...nothing to decrypt files with?
[Sentinel]: Affirmative.
[Tycho]: Just checking.

Well, I don't know what I was expecting from a simple grunt program like this. Guess I'll just go toy around with that Gateway.
>>
No. 65695 ID: d2fdab

>>65694
See if it will accept commands to transfer programs to yourself.
>>
No. 65700 ID: 5eea01
File 12558160278.png - (21.82KB , 800x600 , 35.png )
65700

[Tycho]: Can you transfer the listed programs to me? And if so, would I be able to use them?
[Sentinel]: Negative. The programs are designed only to function when installed in a Sentinel core. Transfer would result in highly corrupted data.
They are also very resource-intensive and without sufficient memory dedicated to them would suffer massive performance drops.

[Sentinel]:...no offense, sir.
>>
No. 65709 ID: d2fdab

>>65700
Well it was worth a shot. Proceed to that gateway to commence tinkering!
>>
No. 68579 ID: ac3813
File 125624299027.png - (34.20KB , 800x600 , 36.png )
68579

>Connection re-established.

-and I've never felt as good as how I do right no-
Oh. There you are. I was wondering where you went. I have just finished reconfiguring the Gateway to connect to nearby, unblocked systems.

Let's see...

>Scanning...
>3 available locations found.
>EON Corp File Repository [High Security]
>Gridtalk [Open Access/Medium Security Admin functions]
>GridNIC [No Security]

All of them are connected to the Grid, so I can attempt to access them. Which one do you think would be the best starting point in my search for my intended purpose?
>>
No. 68594 ID: a9ac4e

>>68579
Well, the NIC should have information, or at least links to other nodes, so I vote head there.
>>
No. 68595 ID: f0c8b3

Let's give InterGridNIC a try.
>>
No. 68606 ID: ac3813
File 125624668257.png - (132.33KB , 800x600 , 37.png )
68606

>>68594
>>68595
Ah, yes. The Grid Network Information Center! A freely accessible collection of public node addresses, one of the most important free access servers within the Grid. Surely I will find useful information in here!

>Gateway opened.
>Transferring...
>>
No. 68611 ID: ac3813
File 125624762661.png - (23.68KB , 800x600 , 38.png )
68611

>Transfer complete.

...wow. The scan was not kidding when it said "No Security". The Admin access point is in plain sight and it seems a previous visitor cracked the password and posted it on the wall.

>GridNIC password 'swordfish' acquired!

I'm starting to doubt we will find anything useful that has NOT been tampered with in here. Should I inspect it anyway?
>>
No. 68612 ID: f4963f

>>68611
Bah, let's at least check out the admin access point~
>>
No. 68613 ID: 632862

>>68611
Beware of viruses. See if you can verify that that's the correct password and not some kind of trap.
>>
No. 68619 ID: f0c8b3

Remember kids, always wear protection when tapping into a public I/O port.

Investigate that fucker.
>>
No. 68626 ID: ac3813
File 125624919733.png - (22.48KB , 800x600 , 39.png )
68626

I will be mindful of danger, regardless.

>[Activating SECURITY BYPASS]

>run bypass.exe
>password required, running force.gen
>password generated: swordfish

Looks like it's the correct password, at least.
Better safe than sorry...
>[Activating CHAMELEON CIRCUIT]
In we go, then.

[HOPEFULLY THE IMAGE IS CORRECT THIS TIME I SWEAR]
>>
No. 68635 ID: ac3813
File 125625097142.png - (23.95KB , 800x600 , 40.png )
68635

I have Admin. I am seeing two access points, leading to the public database, the other to admin-only log files. Of course, given how easy it is to get admin-level access, most of the logs are either exceedingly outdated, deleted thirty-five minutes ago or completely made up.

What now?
>>
No. 68637 ID: a9ac4e

>>68635
Check the data, then make sure to delete the logs yourself.
>>
No. 68638 ID: 9891a9

>>68635
Check out the data, sounds like the logs will be entirely useless.
>>
No. 68639 ID: 632862

>>68635
What's that green thing up there?
>>
No. 68647 ID: ac3813
File 125625185845.png - (23.15KB , 800x600 , 41.png )
68647

>>68637
>>68638
I will get to the logs later, then. Now, is there anything specific you want to recommend searching for? There are many, many addresses stored here. Narrowing it down would help immensely.

>>68639
What green thi-
Oh. Good thing I turned on the Chameleon Circuit. That there is a traffic monitor. They usually have pretty high detection rates, but thanks to my recent stealth upgrade, I managed to slip in without it noticing and thus avoided getting logged at all.
>>
No. 68658 ID: a9ac4e

>>68647
PROTIP: Look up all internal service machines and banks, make fake accounts at all the banks, then bounce your connection through all those nodes whenever you need to hack something.
>>
No. 76308 ID: 5eea01
File 12581560985.png - (17.59KB , 800x600 , 42.png )
76308

[Apologize for the unannounced break, unfortunately I've caught some sort of flu, possibly of the bacon-flavored variety so will be too tired to continue further today.]

...this is the GridNIC database? All I see is three folders. Untitled folders. I don't particularly relish having to go through them, but if you think it'll help...
>>
No. 76313 ID: d912cb

>>76308
Eh, can't take that long.
>>
No. 76331 ID: e0499d

find something to practice picking with
>>
No. 76343 ID: f4963f

>>76308
Might as well see what's in it, anyway.
>>
No. 76347 ID: 632862

While we're here, how about we organize everything?
[Return] [Entire Thread] [Last 50 posts] [Last 100 posts]

Delete post []
Password