Network Interpreter

Item

Image Cube25.jpg
Description This program stays mainly in the background, translating network traffic for you as you go.
Type Program
Requires 1 Processor
Tools Watch Ports, Probe Defenses
Effects +2 code finesse
Combat Message You see a tiny transmission heading back from defender towards central security. It's probably not a threat yet.

or

You see a transmission heading back from defender towards central security. That might become a problem.

or

You see a large transmission heading back from the defenders towards central security. Damn.

Sources

No longer: Oldos Hacking: Files on a Open Computer Lab workstation.
No longer: Oldos Hacking: Files on a Software Company website.

Note: The following recipe still exists but one or more ingredients are no longer available.

Expand a Language Interpreter with Networking Code
computerchip.jpg
Language Interpreter Networking Code
= Network Interpreter

Uses

Connect your Network Interpreter with a Vulnerability Database
computerchip.jpg
Network Interpreter Vulnerability Database
= Eavesdropping Tools
Restrict traffic with a Network Interpreter and a Software Firewall
computerchip.jpg
Network Interpreter Software Firewall
= Network Jammer
Set a Protein Loop to search with a Network Interpreter
computerchip.jpg
protein loop network interpreter
= protein receiver
Tune a Network Interpreter with Viral Code
computerchip.jpg
viral code network interpreter
= viral interpreter
Adjust a Network Interpreter to understand a Recursive Integrator
Requires Advanced Interpreter
computerchip.jpg
Network Interpreter Recursive Integrator
= Signal Triangulator
computerchip.jpg language interpreter, networking code
GoldCoins.jpg This item cannot be added to a gang stash.

Notes

Running this program will also keep you informed about the alert level of the site you're looking at between hacking attempts. Possible messages are:

  • There isn't any alert on the system. If anyone's noticed you, they haven't told the system here.
  • The system is on alert, but it'll still take them a while to notice your intrusion.
  • The system is on medium alert. You shouldn't be in any immediate danger of the admins noticing you, but you might want to throw them off your trail.
  • The system is on high alert. If you can't find some way to defuse the situation, they're bound to find you out.

If you have full control of a system and there are alerts, you get an option to cancel alert. This takes 1 energy, and gives you this message:

You manually cancel the alert. A reassuring "Bwooooooooooop" rumbles from your speakers.

It'll show up in the security logs, but at least the present danger has passed.

Browsing the security logs after receiving this message will show that there are traces, but there doesn't seem to be any way (yet?) to tamper with the logs to remove them.

Tool Summary

Tool Memory Size Target Intensity Notes
Probe Defenses 0 Memory 1 Adds +2 damage to Exploit if used earlier in the round
Watch Ports 0 (Defense) 1 Defends against stealthy attacks
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License