Site hosted by Angelfire.com: Build your free website today!
Close WindowSystem Knowledge
The art of hacking is a complex area, and many years are needed before a hacker starts to master them. There are two main topics on which he can reach power. One is the pure, brute way, the other is the fine way of an expert. Both are equally important and it does not pay off to only concentrate on either PL or System Knowledge.

Powerlevel

The powerlevel of a hacker describes his raw force. It shows how well he can handle his gear. It also indicates how well he can adapt to any given system. So the PL as a whole indicates how well a hacker can adapt to a given situation and thus how many action points he can gain out of it.
The world is not so simple that one either knows all or knows nothing about various system details however. Instead the PL of a hacker is a numeric value. A 1 indicates only very basic skills while an 8 or even more is the sign for almost infinite power. The PL is not limited, but at a certain point increasing the PL even more does not make much difference.


System Knowledge

The second way to improve one's power. Instead of the raw force one can aim to learn how to hack a system more efficiently and how to save action points on procedures, or he can learn how to pick from a wider variety of systems and so always have a better adaption.
Systems define not so much what you do, but how you do it. There are many ways to skin a cat, and the act itself does not say much about your style.

There are 10 known schools of hacking:



Standard

As the name implies this is the most widely used one. Almost everyone starts his work with it. It is a solid collection of various procedures. There is almost nothing that you cannot do within this operating system. On the downside the lack of specitivity causes a certain unspectacularity. Don't expect anything fancy from this school. Also standard tends to be quite unstable. On the library side standard libs tend to be a bit on the smaller side compared to other schools. This makes them ideal for fast strikes or as basis for bots.



Turtle

A turtle doesn't attack. It relies on its thick shell. Unsurprisingly the Turtle method does the same. Hackers relying on Turtle sacrifice attack power and intrusion power for sheer shielding. This property makes the Turtle guys the master of defense and reconnection of sockets. On the downside libraries that build on this property are kinda hard to use. They can only hope that the system itself disconnects the enemy before it disconnects you. It is strongly recommended to not only rely on Turtletech.



Trashbin

Trashbin was one of the greatest hackers of all times. Sadly he died in the great collapse. His knowledge however remains. Systems working on his principles are known for their high adaptability. On the weak side stuff derived from Trashbin's work are hard to modify and quite costly (can you say patent law? ;) )
Still, if you got the money Trashbin is able to do almost everything that Standard does, only better.



Venom

Venom means patience. In a certain way Venom type stuff is rater similar to Turtle. Where Turtle relies on easy reconnection and high defenses Venom often uses heavy built in error correction. As the result the procedures of Venom are more geared on softening up the enemy then to protect oneself, as defense is already covered in its excellent libs...



Ninja

The Ninja brand systems are the masters of shadow. Not especially strong or reliable, Ninja works with different concepts. A Ninja library is almost invisible, making it extremely hard to hit. On the other side it is usually a master in intrusion as well. A deadly combination. The procedures are also designed to further enhance this effect. If one prefers fast operations instead of long wars Ninja is definitely a must buy.



MegaHard

Turtle, just worse. In its long tradition every piece of commodity that came out of that corporation was more bulky then its predecessor. That doesn't mean its necessarily bad, but most hackers still prefer to avoid it. A pretty steep price structure also helps to build that aversion.
All in all MegaHard stuff tends to be easily hit, but it is well known for its ability to take that hits.



CUR53S

To name CUR53S a system is a very far stretch. What hackers call CUR53S is more like an unmaintened heap of alpha grade software. There are some real marbles in here, but most stuff is weired. CUR53S stuff also tends to need a fair ammound of processor power just to keep the mess together. If having in depth knowledge of the target system CUR53S based libraries are often the most efficient ones however. Also CUR53S based procedures are well known for their mass targetting properties.



BullsEye

BullsEye is pretty similar to CUR53S, it is a bit more refined however. In fact the schools share about 70% of their code. Unfortunately the remaining 30% are rather different, preventing the knownledge transfer from one to the other. Where CUR53S sets on strength BullsEye builds on tricks. On the procedure side BullsEye has the nickname sharpshooter. While weaker then CUR53S the procedures are far superior regarding targetting. Some even menage to hit the same enemy 4 times in a row!



Classified

It is hard to say anything about this system. It isn't actually just one system. Most classified systems work quite differently from each other. As such they are as versatile as the standard one if not more. Just that they are rather - chaotic. Classified Systems are formed by a bulk of hacks put together. And that is what you get. Classified procedures are probably the strongest ones available, only second to Military stuff. But you can never be sure what you get. A classified procedure might always have some unknown sideeffects. It migth even harm its user. It is strongly recomended to stay away from this stuff.



Military

No information is available on Military Systems. Obviously they are the best of the best - just too expensive. Military software works exceptionally well against Turtle and Ninja systems, but also most other systems got big problems. Astoundingly the Standard software, as well as then stuff from MegaHard, have rather few problems with Military gear.




Again the world is not so simple that one either knows or knows nothing about a certain system. Instead, how much a hacker knows about a specific one is approximated with four levels of knowledge:



Nothing

Well, that is obviously something to avoid. If you don't know anything then you are out of the community...



Basic Knowledge

The first level of training, basic knowledge provides all the details one needs to use most procedures from this system. It does not yet refine that use or teach details, which means much power gets unnecessarily burned to achieve the desired results.



Advanced Training

In-depth study and extensive training provide the additional rafinesse that makes the art easier to handle and much more reliable. This is the level most hackers aim at. With the exception of some very rare and complicated procedures, advanced training opens the whole arsenal of stuff the school has to offer.



Mastery

Not many people reach mastery. This is mainly because mastery requires extensive dedication and much experience. When the hardships pay off, however, hacking becomes easier, almost natural. In addition, the long training turned it almost into second nature to the hacker, whom has a much easier time handling the more intricate aspects of the art and can run even the most esoteric procedures.

Back To Index