- Sevencolor 3m
- Atheran 1s
- River 2m
- Manywaters 8s youtu.be/lxAOc4JYELc
- CTBridge 3m
- Jonquille 13m
- MrFye 28s
- Kisaki 7s Do Re Mi, I Love You
- Marioanius 40s Hamilton wrote, the other 51!
- Evie 9s
- Baguette 6m ye boi
- Warlord203 12s
- pfh 2h
- jsmith225 12m
- Maina 1m
- FancyPenguin 1m
- MrJDucky2 53m I'm actually a Duck in real life. Honest <3
- Mench 7m I do Facebook and Website stuff.
- SpaceLatency 2m 'And he gave me Venus.'
j Johnny 19h New Code Written Nightly. Not a GM.
- Cosmic 3m
j Kwisatz 1d Definitely not a GM.
- SacredWest 3m
And 34 more hiding and/or disguised
Connect to Sindome @ moo.sindome.org:5555 or just Play Now

ICE
It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."

-Kevlar

(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.