Cryax Bane
Red-eyed Snake

Image Source: http://www.deviantart.com/art/Fractal-Pheonix-133658920Intent: For Cryax Bane to offer slicers a fast and easy way to break into a network and take control of it. This product is not sold on the open market and is exclusive to Bane Innovation.
Development Thread: Blue Phoenix Rising
The Phoenix Takes Flight
Manufacturer: Bane Innovation
Model: Version 1.0
Affiliation: Bane Innovations
Modularity: No
Production: Limited physical copies of the software exist on datachips which are then installed on slicers’ datapads. Users must register the software under the Bane Innovation license.
Classification: Malware
Description: Scripted and developed by slicer Cryax Bane, who wrote the entire code by hand, Blue Phoenix is fast-acting malicious software much like a trojan horse that infects the network or system of its victim. Blue Phoenix features a reverse connection to its victims, and once established it gives the attacker complete control over the infected computer or network until it is cleansed of the infection. Once connected to the victim, Blue Phoenix can upload, download, delete or execute files, capture files stored from a Holocam, terminate services or applications, recover stored passwords, shut off power, reboot systems, log off, crash (blue screen of death). Blue Phoenix can also provide a text chat communication between the attacker and victim. It can be manually installed on a victim’s computer as well as sliced in via remote Holonet and/or Satellite access, as well as attached to Holonet downloads.
Blue Phoenix is impervious to most common automated anti-slicing safeguards, but it can be combated by advanced manual anti-slicing maneuvers. Once it is inside the system, it can also be purged using advanced manual anti-slicing techniques. Blue Phoenix can be pirated. However, pirates cannot copy it from an infected computer. It can only be pirated from the physical datachips that were manufactured by Bane Innovation. If it is pirated and installed on a Datapad or computer, the software secretly installs additional software to watch activity on user's computer. Blue Phoenix’s origins can also be traced by someone who is knowledgeable about the galactic slicing community, as the code has the unmistakable signature of Cryax Bane. A layperson would not be able to tell the difference.