Site hosted by Angelfire.com: Build your free website today!
Close WindowProcedures [2/2]
Understanding the different procedure types is probably the most difficult part of all. Not only has one to factor in how a procedure works, but also how it interacts with the environment and how the environment interacts with the procedure. So one should take time and slowly read this document.



Attack

Naturally a system you try to invade simply tries to disconnect you. But just as well you can disconnect their security bots or even an other human.

One the technical side an attack works like this:

Restore

In defence against attack software there is reconnect software. It works similar, but different enough to have its own rules.

One the technical side a restore works like this:

Intrude

Alternatively to the rather brute disconnection attempts one also can go a second way. Quickly intrude the core of the operating system. Then kick on its disconnection procedures.

One the technical side an intrusion works like this:

Guard

A guard procedure can do a couple of different things. Prevent intrude procedures, generally slow down a lib and much more. In the end it all comes down to delaying an intrusion, however.

One the technical side a guard works like this:

Crashing

This is probably the most mean type of attack. It is aimed directly at the hardware involved. Such attacks will directly damage the target deck/bot if successful.

One the technical side a crash works like this:

Target

As a part of their design all libraries got a certain stealth ratio. Target procedures are aimed at changing this natural stealthiness, exposing an enemy.

One the technical side target works like this:

Evade

As a part of their design all libraries got a certain stealth ratio. Target procedures are aimed at changing this natural stealthiness, hiding one's library.

One the technical side an evade works like this:

Shield

The shield procedures of a library are the last line of defence against an attack.

One the technical side a shielding procedure works like this:

Soften

A soften procedure weakens the shielding to bring a later attack to full effect.

One the technical side a soften procedure works like this:

Protect

Protection concerns the self encryption rating of a library. The higher something is protected the harder it is to influence.

One the technical side a protection procedure works like this:

Unprotect

Unprotect tackles the self encryption ratio of a library. Thus it is easier to influence in the future.

One the technical side an unprotect procedure works like this:

Transmit

Transmissions are the natural connection of a library to its user. With a transmission command a user can request additional updates of the current system state, thus often providing a higher rate of success for later procedures.

One the technical side a transmission works like this:

Disturb

The adversaries of transmissions are disturbing signals. Sent at the right time, they can block practically every action of the victim.

One the technical side a disturb works like this:

Firewall

A Firewall is designed to trigger the systems defences - practically rendering certain procedures unable to run for a certain amount of time.

One the technical side a firewall works like this:

Virus

A virus changes general system stability. A dedicated virus might for example be able to close a couple of backdoors in the graphic subsystem, thus making it harder for an attack to happen there. Or another software might open some new exploits in the network layer making disconnects so much easier.

One the technical side a virus works like this:
Back To Index