Page 2 of 2

Posted: March 18th, 2005, 15:10
by Joose
An update, seeing as i havent got around to doing any more on the site for ages:

Ive slightly re-thought the way the actuall hacking will work. It'll still be a case of running programs on servers etc, but getting into a new system will be slightly more analagous to wandering around a dungeon in your standard RPG fare. This is basically to make it a bit more fun.

People who are "in the know" might recognise some of this. Thats because its...inspired, shall we say, by an old RPG, called Shadowrun. It had a nice system for hacking, and im making this similar. Not the same, but similar.

Basic idea is that a system is a series of nodes, all of which do different things. A data storage node stores data, like a fileserver. An access node is an entry point into the system. the Root node is the equivalent of getting administrator privaleges, and so on.

These nodes all get connected together to for a kind of map of the system. Then this system is populated with stuff like anti-hacker software, valuable data etc.

At the moment, the 6 different nodes are:

I/O: for accessing devices controlled by the system, like a factory production line.
Access: for getting in.
Datastore: File storage for the system
Security Node: Kinda like a firewall, this'll be used to create chokepoints in the system.
Root: Like the bridge on the Enterprise, everything can be controled through here
Control Module: Like a watered down root, some things can be controled here, but not others. Different control modules may have different capabilities.

Any thoughts? Other modules i might want, or suggestions for changes would be welcome. Once ive got this sorted, im going to start making Actual Codeā„¢

Posted: March 19th, 2005, 13:22
by JamieChalm
Ho boy, this is looking awesome!!! I can't do much on a PC except join forums and draw crude drawings in MS paint, but if you think there's anything I might be able to help you with, don't hesitate to ask :wink: .