Using ICE for programs. |
Using ICE for programs. |
Jan 11 2006, 07:30 PM
Post
#1
|
|
Dragon Group: Members Posts: 4,589 Joined: 28-November 05 Member No.: 8,019 |
Couldn't you just use the biofeedback and other capabilities of IC you encounter form parts of programs that you yourself use? I could see psychotrope being the new Black Hammer.
|
|
|
Jan 11 2006, 07:35 PM
Post
#2
|
|
Man In The Machine Group: Dumpshocked Posts: 2,264 Joined: 26-February 02 From: I-495 S Member No.: 1,105 |
The big differance is horse power. Please remember that ice is fired by a pretty heafty mainframe, and not your cyber deck.
While your desktop might run Quake 3, it wont be able to take 10k people doing real time data operations on it at once. |
|
|
Jan 11 2006, 08:02 PM
Post
#3
|
|||
Creating a god with his own hands Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 |
O rly? most desktops run web server applications just fine. EDIT: The whole purpose of a cyberdeck is the ability to out-proccess the server it is trying to crack, specifically running programs that are quite like corporate ICE, just aimed in a different direction. I don't think you could run psychotrope, but you could certainly write something to mimic it's effects. Tye Dye Hammer, anyone?? |
||
|
|||
Jan 11 2006, 09:25 PM
Post
#4
|
|||
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
eh, yes, but they don't run them for hundreds or thousands of different clients. rewriting someone's brain isn't something that should be possible without hundreds of thousands of Mp of active memory available. |
||
|
|||
Jan 11 2006, 09:28 PM
Post
#5
|
|
Moving Target Group: Members Posts: 295 Joined: 10-July 05 Member No.: 7,492 |
You arn't trying to out-process the host, you're just trying to screw it up enough you can pry out the data. For the basic attack program, you're literally just throwing junk into the code of the IC (or persona), making it fail to operate properly.
|
|
|
Jan 11 2006, 09:41 PM
Post
#6
|
|
Creating a god with his own hands Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 |
sure, that's how attack programs work, but what about sleaze, decrypt, and deception operations then?
|
|
|
Jan 11 2006, 11:42 PM
Post
#7
|
|
Moving Target Group: Members Posts: 295 Joined: 10-July 05 Member No.: 7,492 |
I figure they do the same thing as attack -- they throw code into the various sub-routines that they effect. Sleaze? Toss in some stuff that says you're cool and hope it works. Decrypt? It's just a decryption program. It's not like the server is activly encrypting the file while you're trying to decrypt it.
|
|
|
Lo-Fi Version | Time is now: 29th April 2024 - 10:00 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.