IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Using ICE for programs.
emo samurai
post Jan 11 2006, 07:30 PM
Post #1


Dragon
********

Group: Members
Posts: 4,589
Joined: 28-November 05
Member No.: 8,019



Couldn't you just use the biofeedback and other capabilities of IC you encounter form parts of programs that you yourself use? I could see psychotrope being the new Black Hammer.
Go to the top of the page
 
+Quote Post
Lindt
post Jan 11 2006, 07:35 PM
Post #2


Man In The Machine
*****

Group: Dumpshocked
Posts: 2,264
Joined: 26-February 02
From: I-495 S
Member No.: 1,105



The big differance is horse power. Please remember that ice is fired by a pretty heafty mainframe, and not your cyber deck.

While your desktop might run Quake 3, it wont be able to take 10k people doing real time data operations on it at once.
Go to the top of the page
 
+Quote Post
Fix-it
post Jan 11 2006, 08:02 PM
Post #3


Creating a god with his own hands
***

Group: Members
Posts: 1,405
Joined: 30-September 02
From: 0:0:0:0:0:0:0:1
Member No.: 3,364



QUOTE (Lindt @ Jan 11 2006, 07:35 PM)
The big differance is horse power.  Please remember that ice is fired by a pretty heafty mainframe, and not your cyber deck.

While your desktop might run Quake 3, it wont be able to take 10k people doing real time data operations on it at once.

O rly?

most desktops run web server applications just fine.

EDIT:

The whole purpose of a cyberdeck is the ability to out-proccess the server it is trying to crack, specifically running programs that are quite like corporate ICE, just aimed in a different direction.

I don't think you could run psychotrope, but you could certainly write something to mimic it's effects.

Tye Dye Hammer, anyone??
Go to the top of the page
 
+Quote Post
mfb
post Jan 11 2006, 09:25 PM
Post #4


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (Fix-it)
most desktops run web server applications just fine.

eh, yes, but they don't run them for hundreds or thousands of different clients. rewriting someone's brain isn't something that should be possible without hundreds of thousands of Mp of active memory available.
Go to the top of the page
 
+Quote Post
Slump
post Jan 11 2006, 09:28 PM
Post #5


Moving Target
**

Group: Members
Posts: 295
Joined: 10-July 05
Member No.: 7,492



You arn't trying to out-process the host, you're just trying to screw it up enough you can pry out the data. For the basic attack program, you're literally just throwing junk into the code of the IC (or persona), making it fail to operate properly.

Go to the top of the page
 
+Quote Post
Fix-it
post Jan 11 2006, 09:41 PM
Post #6


Creating a god with his own hands
***

Group: Members
Posts: 1,405
Joined: 30-September 02
From: 0:0:0:0:0:0:0:1
Member No.: 3,364



sure, that's how attack programs work, but what about sleaze, decrypt, and deception operations then?
Go to the top of the page
 
+Quote Post
Slump
post Jan 11 2006, 11:42 PM
Post #7


Moving Target
**

Group: Members
Posts: 295
Joined: 10-July 05
Member No.: 7,492



I figure they do the same thing as attack -- they throw code into the various sub-routines that they effect. Sleaze? Toss in some stuff that says you're cool and hope it works. Decrypt? It's just a decryption program. It's not like the server is activly encrypting the file while you're trying to decrypt it.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th April 2024 - 10:00 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.