- Sara 5s
- BCingyou 3m
- Fire 5m https://i.imgur.com/CF2ywFy.jpg
- Vera 11m https://twitter.com/dril/status/218160412510785536
- Atheran 1m
- geoux 20m
- Oberst 4s
- coconut 16m
- KalaniPup 31m
- Jameson 14m making the eternal black firmament my side bitch
- Kisaki 15m Don't Stop Music...
- White 5s I am just a boy.
- NovaQuinn 15m
- JMo 5m I said I know. Everybody funny. Now you funny too.
- Strummer 6s
- Brozilla 6m
- jsmith225 10s
- Storm 14s
c Mephisto 18m Malt doch nicht immer den Teufel an die Wand.
- FancyPenguin 3h
- attaboy 4m
- Baguette 18m ye boi
- Grey0 53m
j Johnny 9h New Code Written Nightly. Not a GM.
- deepBlue 6h
- NimbleZone 1m
a Cerberus 38s Head Builder & GM when I need to
- SacredWest 7m
And 23 more hiding and/or disguised
Connect to Sindome @ moo.sindome.org:5555 or just Play Now

ICE
It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."

-Kevlar

(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.