Reset Password
Existing players used to logging in with their character name and moo password must signup for a website account.
- Cosmic 1m
- Goris 9s
- Rangerkrauser 58s
- Napoleon 27s Bad bish is bad.
- Atheran 1m
- Damarung 2m
- Malakai 55s
- Supermarket 37s Chute her! Chute heeeer!
- Baguette 50m ye boi
- Stink 2m
- DiamondNine 31m
- Dynamojonesjr 1m
- Vera 6s
- Baron17 1m
- Warlord203 6s
- Zumini 29s Sound Advice:
- Varolokkur 4s
- Roycethe59 2m Ask about me.
- RheaGhe 12s Something about butts.
w Storm 20m I dabble in the puppeting.
- FancyPenguin 12s
- Jameson 3m making the eternal black firmament my side bitch
- pfh 19s
- BCingyou 2m
j Johnny 23s New Code Written Nightly. Not a GM.
j Kwisatz 1d Definitely not a GM.
And 26 more hiding and/or disguised
Connect to Sindome @ or just Play Now

It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."


(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.