![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,589 Joined: 28-November 05 Member No.: 8,019 ![]() |
Couldn't you just use the biofeedback and other capabilities of IC you encounter form parts of programs that you yourself use? I could see psychotrope being the new Black Hammer.
|
|
|
![]()
Post
#2
|
|
Man In The Machine ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,264 Joined: 26-February 02 From: I-495 S Member No.: 1,105 ![]() |
The big differance is horse power. Please remember that ice is fired by a pretty heafty mainframe, and not your cyber deck.
While your desktop might run Quake 3, it wont be able to take 10k people doing real time data operations on it at once. |
|
|
![]()
Post
#3
|
|||
Creating a god with his own hands ![]() ![]() ![]() Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 ![]() |
O rly? most desktops run web server applications just fine. EDIT: The whole purpose of a cyberdeck is the ability to out-proccess the server it is trying to crack, specifically running programs that are quite like corporate ICE, just aimed in a different direction. I don't think you could run psychotrope, but you could certainly write something to mimic it's effects. Tye Dye Hammer, anyone?? |
||
|
|||
![]()
Post
#4
|
|||
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 ![]() |
eh, yes, but they don't run them for hundreds or thousands of different clients. rewriting someone's brain isn't something that should be possible without hundreds of thousands of Mp of active memory available. |
||
|
|||
![]()
Post
#5
|
|
Moving Target ![]() ![]() Group: Members Posts: 295 Joined: 10-July 05 Member No.: 7,492 ![]() |
You arn't trying to out-process the host, you're just trying to screw it up enough you can pry out the data. For the basic attack program, you're literally just throwing junk into the code of the IC (or persona), making it fail to operate properly.
|
|
|
![]()
Post
#6
|
|
Creating a god with his own hands ![]() ![]() ![]() Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 ![]() |
sure, that's how attack programs work, but what about sleaze, decrypt, and deception operations then?
|
|
|
![]()
Post
#7
|
|
Moving Target ![]() ![]() Group: Members Posts: 295 Joined: 10-July 05 Member No.: 7,492 ![]() |
I figure they do the same thing as attack -- they throw code into the various sub-routines that they effect. Sleaze? Toss in some stuff that says you're cool and hope it works. Decrypt? It's just a decryption program. It's not like the server is activly encrypting the file while you're trying to decrypt it.
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 9th May 2025 - 04:45 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.