- SniperComZero 2m
- Rapidvalj 1m
- Newbs21 2m We're all crazy here!
- SushiAllDay 24s
- Baron17 27s
- FancyPenguin 1m
- Stingray 2m
- Selly 2s
- Trakel 1m
- crashdown 4m
- BCingyou 7m
- himble 1h youtu.be/og243Dom4Sw
- SacredWest 1h
- Meoris 1m https://www.youtube.com/watch?v=Vn5OMaPiX2M
- Kanuin 2h
- Dawnshot 51m https://youtu.be/qg_7saEbnwE
- Ryuzaki4Days 14s Shoot your ace in the face.
- Jackserious 35m
- Napoleon 1m Bad bish is bad.
- Grey0 2m
- MrJDucky2 8m
- coconut 17s Partially inactive during summer.
- jsmith225 2h
j Johnny 15h New Code Written Nightly. Not a GM.
a Cerberus 5h Head Builder & GM when I need to
- Chrissl1983 48m working on my @history for too long...
- Azelle 5h
And 22 more hiding and/or disguised
Connect to Sindome @ moo.sindome.org:5555 or just Play Now

ICE
It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."

-Kevlar

(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.