|
|
|
|
|
|
|
|
|
Posted: Sun Dec 12, 2010 7:49 am
General Program Info As you RP your programs, please keep a few things in mind. They are basically computer code, and as such function very differently from humans or any other organic race you might have previously RPed. As we want this B/C to be as true to the concept as possible, below we've made a list of some things you should keep in mind while writing. •• Your programs can feel the full range of human emotions, as they all have artificial intelligence; however they cannot fully physically express some of them. For example, lacking any kind of real body they cannot cry. •• As stated above, programs do not have a "real" body, so they can't perform any functions a "real" body would perform. This includes eating, using the restroom, bleeding, etc. (but if a program is cut, data might fraction/fragment off, and bad wounds could very much look like gaping holes in their form). •• They can sleep, but don't require rest nearly as often as humans do. •• They can't get sick in the human sense of the word. A program can become infected with a virus, but we're not talking about the flu. •• They can't become deformed in any way or lose senses (ie. become blind or deaf), unless their programmer is some sort of sick b*****d, or if their data is corrupted by someone or something.
|
 |
 |
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Tue Jan 25, 2011 8:31 am
Anti-Virus Types •• BRUTE - These are the tanks of the anti-virus world. Slow, but with strong defenses and amazing stamina, they act as a shield to their quicker or stealthier teammates, and can pack quite a punch if goaded into attacking. •• STEALTH - Swift, but fragile, these are like the assassin class. Flexible and agile, they are able to sneak around system defenses, exploit holes or backdoors in programs, and catch malware off guard. With their teammates serving as distractions, their job is made even easier. Unfortunately, they are not very strong or sturdy, and don't do well in head-to-head combat; it's best if these guys stay in the shadows. •• PROTECTOR - Like the healer class, Protectors flounder in combat, but can deactivate Malware defenses, scan targets for their allies, and decrease recovery time for a wounded program. Not only that, but they can erect defenses around their teammates, temporarily shielding them from harm. A good Protector is a valuable asset for any team. •• ATTACKER - Attackers are like the knight class, able to best hold their own in a direct fight. They're slower than Stealths, but can hit for more and take more damage. They aren't as sturdy as Brutes, but are much faster. Though they're not supporters by any means, they do have a few small buff-type skills with which to work. What they lack in specialization, they make up for in being great all-around fighters, and without at least one or two, direct combat might pose a challenge for any team.
|
 |
 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Tue Jan 25, 2011 8:32 am
Malware Types •• TROJAN - Much like their Greek namesake, Trojans are designed to look like harmless programs in order to deceive a user into downloading or executing them. They usually never look threatening (at the very least, to their intended audience-- a Trojan designed to dupe only a certain group may be designed to appeal better to them rather than to the public at large), and any unusual features or accessories serve to help their image as nonthreatening. Once inside a system, they are free to wreak havoc on system files, alter computer settings, impair or manipulate internet functionality/connectivity, and/or make use of email or chat clients to spread themselves. They could probably even be used to swipe a password or two off a certain website (but by no means could they monitor key strokes, or even pull saved passwords off more than one site like a keylogger could). They are a little all-purpose, decent at a lot of things, but not particularly spectacular at any of them-- initial infiltration is where they shine, and though they do not often pose a challenge for an AV once discovered, they are good for generally mucking up a lot of systems at once and being frustrating. •• WORM - Worms are designed to exploit security holes in systems or websites. Without a hole, there is no way for them to get into a system-- but if there is, and they manage to get in, they can be incredibly dangerous. Worms are self-replicating, unlike other malware, and can create copies of themselves to continue exploiting the holes on other systems. They are able to link infected systems together and, along with their creator, have access to any currently on the network. As well, worms can cause harm to the servers hosting the site, usually by eating bandwidth by the truckload as they copy and send themselves over it numerous times, and can bring smaller networks to screeching halts if not stopped in time. •• ADWARE - Though Adware do not have any real destructive power on their own, they are valuable as distractions (so other, more destructive programs can sneak in undetected as the user is busy dealing with the Adware), or encouragement (for the user to download something they may have otherwise not looked at). As well, Adware can be used to scare or annoy money or information out of a user, such as a fake antivirus program that restricts computer usage or continues to nag and annoy the user until a 'full version' is bought with no easy uninstall process in sight. Adware are often colourful and flashy, with eccentric designs and features that can border on gaudy. •• KEYLOGGER - Keyloggers are the information thieves of the malware world. Quiet and sly, they run in the background of a system once infected and try to make their activity minimal. Though this means that they usually have no literal destructive power to the system, nor any reproductive ability, their threat lays in their ability to both record active keystrokes, and recall any saved passwords currently stored on the system, and relay them to a host computer. The creator of a Keylogger could have anything from banking information to blackmail material right at their fingertips. •• VIRUS - These guys are the real hardhitters of the malware world. They don't bother with fancy disguises or stealth tactics-- as soon as a system accesses a website on which one is hosted or boots up a CD-ROM or flash drive containing one, it tries as hard as it can to bash its way through. Despite having a tougher time entering a system (thus increasing the chances that it could be dealt with before being able to do anything at all), true Viruses are capable of incredibly heavy damage if allowed to get in, and can be a nightmare to remove. Particularly strong ones can take out an entire system in a matter of moments if things go their way.
|
 |
 |
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Wed Mar 09, 2011 11:48 pm
Capabilities Below is a list, divided by malware and anti-virus, of what your program can and cannot do at each stage. Please read and remember this while you roleplay and write journals. Anti-Virus••Stage 1All stage 1 programs are unfinished and as such do not venture far from their creator's computer(s). Remember that your AV will belong to CoreTech, so it is acceptable for it to wander into other CT servers, as long as it is within the same branch. So, for example, it is not acceptable for your program to venture into CoreTech England's network if it is based in CoreTech Australia, but it may move freely between CT Australia's divisions. There is one exception to this: you program may go to other CT branches and interact with other CT AVs if sent directly by its creator. Your program may not leave CoreTech's servers and access the internet. It may not come into contact with any malware. ••Stage 2This is where the real fun begins, because now your program is complete and it may go outside CoreTech and begin eradication. It may also hop independently between different CT branches and team up with other CT AVs all over the world. It may go onto the world wide web, but may not venture onto any malware message boards. Your program may only eradicate or do battle with malware it finds lurking outside these forums. Your program may also not go into the digital crossroads. ••Stage 3Your program is now free to go wherever it likes, including MMBs and the digital crossroads. It may also project itself into the real world and interact directly with its creator and other humans. Organotechnology and integrated biosystems are now available for debugging. ••Stage 4Malware••Stage 1Again, stressing the unfinished bit, your malware may not venture far beyond its creator's computer or the MMBs that your creator posts on. Major sites such as Google and Facebook are fair game, but remember if your malware meets an AV it will definitely be above your malware's level. Your malware may not directly infect other computers and it may not infect organotechology or integrated biosystems. It may not do battle with any AVs it meets. ••Stage 2Your program is complete and can now begin infecting computers and exploring the internet more thoroughly. It may also venture into the digital crossroads, and it tends to be a haven for malware. Your malware may do battle with AVs and may team up with other malware for more complicated infection assignments. You may not try and hack into CoreTech's servers. ••Stage 3Your malware can now begin infecting organotechnology and IBs in the real world. Eradicating AVs becomes easier, and you can attempt hacking into CoreTech networks and servers. ••Stage 4
|
 |
 |
|
|
|
|
|
|
|
|
|
 |
|
|
|
|
|
|