Site hosted by Build your free website today!
Close WindowLocations
Every place in the cyberspace got its own look. Its own feel. Its own charm. Just as the looks of the places change, their properties do as well. Some systems bet on speed. Others are geared at providing maximum security. When intruding a system one should have a careful look at how it is designed.

There are countless fields. Every machine that is connected to cyberspace got its own one. Just describing the looks of each would be pagefilling. Procedure designers account for that and write their stuff in a way that it adapts to different environments. However some characteristics of the location are still important to know.

To ease the navigation within the web a standard template has been done to represent all systems:

What is show is the most basic information about a system (more information can only be obtained by trading for it or by gaining access to the system in question). The knowledge that is easily aquireabe when asking around. It usually has 5 values: Besides the system information also the state of a system is represented in the symbolic notation:

In the above example each star icon represents one hacker. The blue, pink and green one all got access to the system, while the red hacker got root access.

Besides the player icons also two other state icons exist:

The icon on the left, as the writing suggests, denotes a crashed system, while the right icon is the infamous sand-clock. It indicates that the system is currently blocked due to some heavy activity (a cyber fight usually).
Back To Index