>> |
02/26/09(Thu)01:26 No.3821738>>3821508 Reposting/adjusting my contributions from the previous thread. I'm trying to get someinterest going, but... They don't seem to be popular.
Prober
If the Hacker and Cracker are wizards, then the Prober is a witchdoctor, listening to the breeze of the datastreams and using scripts like voodoo fetishes. Their method of programming is tied to the server itself, a feat most programmers give up on, due to the interface errors that guarentee a decent into madness. However, communicating through the servers and not through the web has its advantages...
Sample Power/Skills
1. Dowse Link - Gain knowledge about a link, such as it's destination, or both it's Intended destination and it's true destination, if they differ. as well as several other factors. 2. Ping - Gain basic understanding of where and how one server relates to another. The Prober must have knowledge of both Servers. 3. Server Forecast - by extrapolating data provided from the Server, you can divine on the condition of transmission through said server. Such factors include [Weather], viral density, cyber migration, and likelyhood of encountering resistance/hijack. 4. Force Bridged Connection - Rather than create a hyperlink, you create a temporary hardcoded shortcut within a server/network. This connection is quicker to set up and use than a normal hyperlink, but much more fatiguing/Integration hazardous than normal. 5. Peer-to-Peer Data Transit - Using aged technology, you create a software-network between multiple locations, allowing you to bring normally nontransmittable objects to your location. However, these items will likely be corrupted and/or have its Integration altered. 6. Access: Root Command Prompt - Gaining direct access to the Server Prompt, you have access to several powerful commands that no mortal programmer could normally match. Such examples are Terminate Process, KillAll, and FDISK |