Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Keymaker.exe

Status
Not open for further replies.

giphy.gif

OUT OF CHARACTER INFORMATION
  • Intent: To expand Hacks' slicing repertoire.
  • Image Source: ASCII [x]
  • Canon Link: Scramble Key [x]
  • Permissions: N/A
  • Primary Source: N/A

PRODUCTION INFORMATION
  • Manufacturer: Hacks [x]
  • Affiliation: Hacks [x]
  • Market Status: Closed-Market
  • Model: Keymaker.exe
  • Modularity: Yes
  • Production: Unique
  • Material: Digital Code

SPECIAL FEATURES
  • Password Miner - The Keymaker.exe works as a digital Scramble key. When the target system is infected with the Keymaker virus, the program will perform rapid calculations to decode the password and allow access to the system for the slicer.

STRENGTHS
  • Digital Threat - The Keymaker can allow the user access to targeted systems, bypassing digital locks, alarm systems and network security.

WEAKNESSES
  • Digital Threat - The Keymaker can only operate on devices connected to the net or have operating transmitters. If the targeted system shuts down from the net and/or deactivates its transmitters before the Keymaker program has finished its work, it will be protected from the virus and therefore its data, passwords, security systems will remain secured.

  • Power Hungry - Due to the breakneck speeds the program performs its calculations it will soak up vast power resources as a result, hindering the datapad or computing systems ability to function during the execution of the program.

DESCRIPTION
Hacks has spent a career of writing code on-the-fly rather than pre-written programs she could utilise. Without the backing of fellow shadowrunners and slicers in the Darkwire network, she has begun to establish these programs to expediate her slicing as a solo.

She designed Keymaker.exe as a passive program she could infect networks with. Once executed in the targeted system it begins by identifying the minimum password requirements of the system and then performing vast calculations within those perimeters. During this process the power consumption from the originating datapad or computing system will be considerably taxed, slowing down operations to a slog until the Keymaker is finished. Once the password is correctly identified, Keymaker alerts the user of access.

As a passive program it becomes dead in the water without specific user commands. If a targeted system shuts down for a restart while Keymaker is in effect it will disable the program. When the system is rebooted the virus will be inactive having lost its connection to the originating user. While this serves as a temporary defence it will only require the originating user to send in another Keymaker program finish what the last could not. This requires network security to deal with the slicer themselves, or have their slicers dismantle the keymaker code before it is finished running.


 
Last edited:
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom