Existing players used to logging in with their character name and moo password must signup for a website account.
- Soltan 12s
- Rillem 9m Make it personal.
- Burgerwolf 1m PANCAKES
- AdamBlue9000 1m Rolling 526d6 damage against both of us.
- Vanashis 39m
- Ociex 16m Brownies for the win.
a Mench 2m Doing a bit of everything.
- Skeedombop5 49s
- Lena 1m Yippee Ki-Yay
- Hivemind 4m
- Raven 23m I lost myself, in the dark charade.
- Thia 3h
- Pladdicus 40m uh
- Sivartas 4h
- PinkFox 3h
- Balreskan 38s
- zxq 12m Tools: https://ansicolortool.neocities.org
And 24 more hiding and/or disguised

ICE
It's begining.

This, ladies and germs, is how ICE starts.

The paper outlines the effectiveness of using a computer to detect remote attacks (think email and MS worms like the rash we recently had), sink their services (the equlivent of asking a telemarketer about all his services which you arn't going to buy; he can't bother someone else while he's on the phone with you), and launch a counter-attack against the attacker (use the same hole that orinigally wormed the attacker to remove the worm and close the hole, so no one can do it again).

This happens to have altruistic intentions, but what about when this is used for 'evil'? Or just as a 'precautionary measure'?

"We didn't 'hack' their computer, your honor. Our machine told their machine to shut down because it was attacking our computer. A machine that's shut down can't be hacked, therefore we didn't 'hack' their machine. We made a defensive move in response to thier offensive one. It was self defence, your honor."

-Kevlar

(Edited by Kevlar at 1:52 pm on Oct. 28, 2003)

*cackles insanely*

It is at moments like this that I wish I could program.