Last visit was: It is currently Thu Mar 28, 2024 8:09 pm


All times are UTC-05:00




Post new topic Reply to topic  [5 posts ] 
    Author Message
     Post subject:New mission/server type- Supercomputer cracking
    PostPosted:Sun Apr 15, 2007 2:51 pm 
    User avatar
     

    Joined:Sat Mar 11, 2006 8:28 am
    Posts:365
    Location:Canada
    Code:
    We have the location of a supercomputer we want you to copy the research files and destroy the supercomputer. It will only be connected to the internet from <time> to </time> for security reasons.
    For something like this, the supercomputer will run very hard to crack security, you will require to bounce through all of the servers owned by the company. When you hack in there would be multiple proxy's/firewall's to bypass (one for upstream and one for downstream), possibly more then one voice analyzers, and possibly a LAN for the computer to connect to its file server(s). With ALOT of data to copy you may have to copy half the data and dump it on the company that hired you's file server and get the rest.

    This would be a very high level mission paying the highest pay you can get. This mission would require all your skills and highest level software.

    _________________
    Best file compression around: "DEL *.*" = 100% compression
    "640K ought to be enough for anybody." - Bill Gates, 1981


    Top
    Offline  
     Post subject:
    PostPosted:Tue May 15, 2007 2:35 am 
     

    Joined:Sat Jul 16, 2005 10:06 am
    Posts:16
    Nice idea. I think hacking a supercomputer is an excellent theme, and it wouldn't be too hard to add some story to it. For instance, the original storyline could be lengthened to incorporate the theme. On the Faith side, after ARC has been taken down, a lone copy might be discovered on an isolated supercomputer. Worst still, the supercomputer has been modified with evolving software (thank the Darwin company) and therefore it is impossible to hack directly.

    The supercomputer, being impenetrable to direct hacks, would only be vulnerable at certain times through hacks of "node" computers which are controlled by the supercomputer. The player learns of these nodes by the in-game BBS once a new Apocalypse virus (the evolved Revelation) suddenly attacks the internet.

    Following this event, the player is contacted by a mysterious person; little is known about him. This person is a "representative" of some company (which is unknown to the player) whose goal is to stop the virus. The player is then prompted to complete the first mission of the new storyline, which is to probe an infected computer looking for information which might be useful in tracking down where Apocalypse was unleashed on the Internet. More detail on the missions later.

    Following standard Uplink plotlines, soon after the player completes the first mission, he or she is contacted by another mysterious person, whose goal is to spread Apocalypse. From this point the player has the option of choosing which path to take, either on the Neo-Faith side, or the Neo-ARC side. I'm kind of tired, so I'll try to sum up what I've said so far.


    New Storyline :

    Involves two new factions: Neo-Faith, and Neo-ARC

    A new virus has appeared on the web, named Apocalypse, the evolved form of Revelation.
    Little is known about the new virus, other than it is capable of mass systems destruction is a short period of time. The truth of the matter is that the virus is actually controlled by a supercomputer that has been modified by the late ARC organization to be an evolving system. In this way the supercomputer is immune to direct hacks, it adapts to quickly to hack directly. The supercomputer also maintains a complicated stealth mode, making it difficult to locate. The supercomputer maintains autonomy by operating through node computers, which get the dirty work done.

    Mission Descriptions :

    Mission 1 : Emergence

    Once the virus Apocalypse appears, the player can initiate the story either by probing an infected computer himself, or by waiting for an email from a mysterious person who works for a company unknown. In the email the representative explains that the details around his identity are dangerous, and must be kept secret. All the player needs to know is that even though ARC is dead, there still lingers some terrible side-effects. The first mission is to probe an infected system looking for any info that could be helpful in finding out the source of Apocalypse.

    Contained on the infected system is a text file (not sure yet on this) or some type of file that contains some code/info about the Apocalpyse virus. This file could be a corrupted piece of code the virus left behind.

    Mission 2 : Choice

    Another email from a mysterious person, these things never get old. In this mission the player learns that there exist more people who would rather see Apocalpyse succeed where Revelation failed. In this email the representative gives more sketchy details about another organization, whose name is not given. The player is given the IP of a computer owned by a rival corporation, the same corporation that contacted the player in Mission 1. Once the player hacks this computer, he/she will learn the name of the corporation that wants Apocalypse destroyed. Their name is Neo-Faith. The goal of mission 2 is to destroy all of the files contained on the computer, as well as destroying the system itself.

    For these missions, some custom logos and artwork could really help in getting the theme across. The F.B.I. database looks awesome, and it should because it is a unique server in the game. The Neo-Faith systems and the Neo-ARC systems should defiantly have custom images and login screens, etc. etc.

    Mission 3 : Deception



    Eventually the whole point of this storyline will boil down to either Apocalypse succeeding (internet is no more), or the player gets to the final Neo-Faith mission. The final Neo-Faith mission will involve some form of double hacking. Meaning, the player will have to hack into a node computer (a dummy system controlled by the supercomputer), and perhaps other things, in order to hack, and take down, the supercomputer itself.

    I'm really tired, and I sort of came up with this stuff on the fly. Post any questions and I'll get back to you guys tomorrow or the next day to clarify on some things. Anyway, I'm gonna hit the sack.


    Top
    Offline  
     Post subject:
    PostPosted:Tue May 15, 2007 10:51 am 
     

    Joined:Thu Apr 28, 2005 3:57 pm
    Posts:175
    AOL:DKWiz214
    Wow, that sounds really awesome. Just one thing I wanted to point out. ARC was disbanded, but it was run by Andromeda, which is still secret, and still alive. Also, Arunmor is still around, so they could be used if you wanted.

    _________________
    The light shall be your demise.


    Top
    Offline  
     Post subject:
    PostPosted:Tue May 15, 2007 4:50 pm 
    User avatar
     

    Joined:Sat Mar 11, 2006 8:28 am
    Posts:365
    Location:Canada
    Possibly for the <time to </time> you may have to find the company's other servers and check out the logs and see what time people log in to the supercomputer, you have to watch the time because the supercomputer will disconnect <hardware> from the internet and your logs will still be there.

    _________________
    Best file compression around: "DEL *.*" = 100% compression
    "640K ought to be enough for anybody." - Bill Gates, 1981


    Top
    Offline  
     Post subject:
    PostPosted:Wed May 16, 2007 1:55 pm 
     

    Joined:Sat Jul 16, 2005 10:06 am
    Posts:16
    In order to stay somewhat consistent with the original Uplink storyline, I would like that player to also be able to switch sides. During the first three missions (1-3) the player would be forced into working for Neo-Faith, Neo-ARC, and then Neo-Faith again; no room for choice directly. After mission 3 the player would be given a final choice between which Neo organization he/she wants to join.

    Another thing that bugged me in the original storyline, that I believe can be fixed in the Neo storyline, is more interaction with the other big systems in the game. To give an example, here is my idea for mission 4.

    Mission 4 : Government

    To recap Mission 2, the player has just destroyed a system belonging to Neo-Faith. In Mission 3 (I'll define it more formally later) the player gets a confusing email. The email is from a Neo-Faith representative. Contained in this email is a large sum of money, a reward for proving to Neo-Faith that the player is capable of hacking their systems. The email explains that Mission 2 was all just a guise, and that the player was really talking to a Neo-Faith representative (not a Neo-ARC rep). The motivation behind the mission was Neo-Faith wanted to see if the player had the guts and knowledge to hack a Neo-Faith system. The new goal for Mission 3 will most likely involve a feature of the game that is unique to Onlink. Unfortunately I'm not very familiar with everything that's new in Onlink, but Mission 3 would be a nice place to try out the C++ coding module I think. (player downloads files from a Neo-Faith FTP server in order to construct a preliminary counter-virus to Apocalypse, something like that).

    The Mission 4 email comes from a person claiming to belong to the still mysterious, Neo-ARC organization. In the email, the representative claims that Neo-Faith is misguided and is blinding the player to the truth. This mission is the pivot of the two storyline paths. Neo-ARC has stolen a file from Neo-Faith, a very, very important file. Neo-ARC has stolen this file and placed it in the vault of the F.B.I. database. The player's mission is to either hack into and delete this file, or hack in and copy it, later uploading it to the Neo-Faith FTP server from Mission 3.

    If the player deletes the file, the he/she is locked into the Neo-ARC path of the storyline. If the player chooses to copy the file and upload it to the FTP, he/she is locked into the Neo-Faith side of the story.
    Regardless of which path the player chooses, the F.B.I. will notice the player. In response to the hack that is performed in Mission 4 by the player, the F.B.I. will assign agents to track down the player. The player will then have to take a proactive stance, in order to stay alive, by hacking into the F.B.I database daily, in order to gain information to hack the agents computers to delete key files.

    This means the F.B.I database will have to be modified slightly, adding one screen that will list agents and their current missions. This screen will be the starting point for the player.

    Current Agents :

    Tracking Hacker for Crime (hacking into F.B.I vault)

    Agent Hanks (IP : 123.23.321.444)
    Agent Hilton (IP : 345.745.23.567)
    Agent Seinfield (IP : 999.333.44.222)

    The player will be given the IP addresses of the Agents currently on the case of tracking the player. But, the player will be unable to hack these systems directly. The player will only be able to hack an Agent computer during the times that that Agent is connected to the Internet. The player determines these times by hacking into the F.B.I. database and reviewing the logs. The player will have to watch for a log message that looks like this :

    123.23.321.444 connected to mobile LAN at 19:00

    The player is guaranteed that the Agent will remain online for at least 3 hours after this log message is generated.

    From there the player will then hack the Agents personal computer, and look for the specific file that contains all the information the Agent has gathered on the case. Some files may be encrypted, or might be password protected. The player might also have to consider backups. This would also be a nice place to add some flavor to the game. For instance, in the root directory of the Agent computer, there would probably be some files not relating to the player. I imagine that a normal F.B.I. agent would have pictures of his family, emails from bosses, and other things (even porn).

    I think that there should be at least two different ways to delete the key files of an Agent's computer. The first is simply to delete it, but there might also be another way. I heard that the player might be able to create viruses in the C++ coding module. Well, if the player has complete access of an Agent computer, what is stopping him/her of planting a virus in the Agent's email system! This would be a great way to use the C++ module I think, and plus it would be really satisfying to see in the BBS, "F.B.I. Agent Tom Hanks was fired today after opening an email containing a malicious virus. After destroying the Agent's laptop completely, the virus went on to infect other F.B.I systems, causing mass mayhem".

    Once Mission 4 is completed Agents will always be on the lookout for the player. The player can keep up with these Agents by monitoring the BBS, looking for news that might say, "In response to the recent increase in hacking, the F.B.I. has assigned 3 new agents to catch the culprits for good. Let's hope that these new men will be able to clean up the Internet, making it safe for normal users again".

    That's it for today, more on it tomorrow.


    Top
    Offline  
    Display posts from previous: Sort by 
    Post new topic Reply to topic

      All times are UTC-05:00


      Who is online

      Users browsing this forum: No registered users and 20 guests


      You cannot post new topics in this forum
      You cannot reply to topics in this forum
      You cannot edit your posts in this forum
      You cannot delete your posts in this forum
      You cannot post attachments in this forum

      Search for:
      Jump to:  
      cron
      Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
      Theme created by Miah with assistance from hyprnova