Jul 9 2010, 09:05 AM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 303 Joined: 26-May 10 Member No.: 18,622 |
Here is the idea for an ICE I have :
Stealthy ICE that Analyse every persona in his node. If the ICE detect a not-allowed persona it will track it back to his origins node. When in the persona node he will launch an Agent in the node then go back home. The Agent is Stealthy and Selfreplicating. Agent script : - If it dont replicate yet, replicate. - Analyse the node to see if it is crypted by his own device, if not then Encrypt the node with a Databomb that would explode if not provided by the Agent password. - Analyse the decryption program to see if it exist or is not encrypted yet, if so Encrypt the program with a Databomb that would explode if not provided by the Agent password. - Analyse all the programs to see if they are encrypted, if not encrypt them with Databomb. - Do the same for the files. - Check for any Agent/Persona unknown presence, if so track and infiltrate them. Go back to start of list. - If nothing left to do check for any master/slave connection in the node and access the master/slave. Go back to start of list. How did it translate in game terms ? More specific question : 1- Is the hacker automatically aware of the lowering of Response on his commlink. 2- Can you really Encrypt a Decrypt program ? 3- Can you run another copy of the program ? 4- Can you Encrypt loaded but not running program ? 5- Can a program/files/node be crypted by different users/programs ? 6- Is it too strong ? 7- What would happen if you Encrypt a Node while a persona is originating from it ? |
|
|
|
IKerensky Description of an ICE characteristic and behaviour : Jul 9 2010, 09:05 AM
CeeJay Well, there are a couple of problems I see with th... Jul 9 2010, 01:33 PM
Udoshi QUOTE (CeeJay @ Jul 9 2010, 07:33 AM) At ... Jul 9 2010, 07:26 PM
hobgoblin actually, given that the hacker being traced alrea... Jul 9 2010, 03:06 PM
MikeKozar I'm working on integrating the Matrix into my ... Jul 9 2010, 03:33 PM
Saint Sithney QUOTE (MikeKozar @ Jul 9 2010, 07:33 AM) ... Jul 10 2010, 03:35 AM
hobgoblin hehe, trace and burn, from back when software coul... Jul 9 2010, 05:05 PM
Wasabi QUOTE (IKerensky @ Jul 9 2010, 04:05 AM) ... Jul 9 2010, 05:41 PM
hobgoblin QUOTE (Wasabi @ Jul 9 2010, 07:41 PM) 3. ... Jul 9 2010, 06:28 PM
Wasabi "Copy Protection prohibits the program from b... Jul 9 2010, 07:20 PM
hobgoblin QUOTE (Wasabi @ Jul 9 2010, 09:20 PM) ... Jul 9 2010, 07:52 PM
Wasabi QUOTE (hobgoblin @ Jul 9 2010, 02:52 PM) ... Jul 10 2010, 02:21 AM
hobgoblin QUOTE (Wasabi @ Jul 10 2010, 04:21 AM) Fo... Jul 10 2010, 04:44 AM
Wasabi And where's it say its legal to load multiple ... Jul 10 2010, 05:38 AM
hobgoblin QUOTE (Wasabi @ Jul 10 2010, 07:38 AM) An... Jul 10 2010, 02:25 PM
Tymeaus Jalynsfein QUOTE (Wasabi @ Jul 9 2010, 11:38 PM) And... Jul 10 2010, 03:06 PM
Wasabi Ah, I see now... good call fella's, thanks... Jul 11 2010, 06:57 AM
IKerensky Ok.
But lets say the ICe Encrypt the Hacker Decry... Jul 12 2010, 06:34 AM
hobgoblin i dont know if a comlink can be encrypted in that ... Jul 12 2010, 12:27 PM![]() ![]() |
|
Lo-Fi Version | Time is now: 22nd April 2026 - 06:28 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.