- JustSomeGuy 15s
- RazekPraxis 1m
- Vera 2s youtu.be/wmOw-jplSMk
- waddlerafter 1m
- Atheran 1m
- SolBro 2m
- Strummer 12s
- crashdown 42s
- Cyberpunker 38s
- Lycanthorph 23m
- Ostheim 5m
- Marioanius 8m Hamilton wrote, the other 51!
- ZaCyril 6m https://youtu.be/9r4WD60uM18
- Storm 18s
- wiebman 1h
- Rigo 44m
- Speccy 19m
- Dawnshot 30s https://youtu.be/qg_7saEbnwE
- BCingyou 16m
- jwimpeney 3m
- Rangerkrauser 11s
- CellDweller 2s
- Malanth 11s
- Neekly 12s
- ThatOneGuy 3m The Dream Equation is all Wrong
- FancyPenguin 1m
- jsmith225 33s
- Chrissl1983 8h Really enjoying this awesome game to the fullest!
- YourLeftHand 8h
j Johnny 6m New Code Written Nightly. Not a GM.
- Azelle 3h
a Cerberus 3h Head Builder & GM when I need to
And 26 more hiding and/or disguised
Connect to Sindome @ moo.sindome.org:5555 or just Play Now

ICE
It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."

-Kevlar

(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.