Reset Password
Existing players used to logging in with their character name and moo password must signup for a website account.
- BCingyou 37s
- Atheran 4m
- HighwayMegabytes 6m
- Cosmic 4s
- Grey0 15m
- Grizzly666 1s
- Warlord203 41m
- Malakai 29s
- MrFye 53s
- Brei714 7s
- f00br 1h
w Storm 6m I dabble in the puppeting.
- crashdown 3m
- tachi 23s
- Evie 12m
- Maina 5s
- SacredWest 3h
- CTBridge 50s
- Jade1202 20s
- MrJDucky2 2h I'm actually a Duck in real life. Honest <3
- Dawnshot 19s
- FancyPenguin 4m
- Baguette 2m ye boi
- pfh 40m
- jsmith225 11h
j Johnny 50m New Code Written Nightly. Not a GM.
j Kwisatz 18h Definitely not a GM.
And 31 more hiding and/or disguised
Connect to Sindome @ or just Play Now

It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."


(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.