Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Cerberus.exe

Status
Not open for further replies.

giphy.gif

OUT OF CHARACTER INFORMATION
  • Intent: To expand Hacks' slicing repertoire.
  • Image Source: ASCII [x]
  • Canon Link: N/A
  • Permissions: N/A
  • Primary Source: N/A

PRODUCTION INFORMATION
  • Manufacturer: Hacks [x]
  • Affiliation: Hacks [x]
  • Market Status: Closed-Market
  • Model: Cerberus.exe
  • Modularity: Yes
  • Production: Unique
  • Material: Digital Code

SPECIAL FEATURES
  • Intrusion Countermeasure - Cerberus is designed as a personal program to safeguard Hacks data and hardware. The program monitors system traffic to detect outside manipulation of code. If slicing is detected, Cerberus will lockdown the systems. While this can cripple the functions of a system it is protecting, it prevents slicers from altering code by hard-locking the data.

  • Hellfire - While the data is hard-locked the program tracks the source of the slicing, infecting originating systems with a virus controlled by the Cerberus program. The virus is designed to overload temperature control systems to force operating systems and even cyberware to overheat and burn out. At the least it will force the system into heat-induced shutdown, at the most it could potentially fry the computer, datapad or cyberware the slicing originated from.

STRENGTHS
  • Digital Threat - Cerberus is a ferocious program. When executed it is capable of disabling operating systems and cybernetics by dramatically overheating their hardware.

WEAKNESSES
  • Digital Threat - Cerberus exists solely within the digital realm. Disconnecting from the net and shutting down transmitters will prevent Cerberus from performing any actions. It is the safest and easiest defence against Cerberus.

DESCRIPTION
Hacks designed the Cerberus program as threats to her both in the flesh and on the net rapidly grew. The code is represented on the net as a three-headed hellhound with a spiked collar on each neck. The program is installed on Hacks personal datapad and computing system, used as an intrusion countermeasure to monitor her software and safeguard her when she is not actively running the net.

It is able to be used in a targeted attack, although its functions are limited to overheating hardware. It is best utilized in defensive operations during her slicing, watching the slicers back in the digital realm to fend off counter-slicing, but in its act of defence it will simultaneously lock Hacks out until it has overheated its targets systems. The program is limited to attacking systems connected to the net or with active transmitters. It operates by following the source signal and infecting the local software. If those systems are shut down or transmitters turned off before Cerberus can act, Cerberus will be unable to execute its virus.

 
Last edited:
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom