In the Hands of the Gods OOC #5
Posts: 1549
  • Posted On: Nov 11 2003 1:39pm
Kas, before i post i'd like a ruling posted as to the Azguard fleet numbers. 40 were stated as surviving (by dolashs own post) who then rallied and attacked Myself and Silus. With half vapourised by my detonators (placed in the time it would take to rally 40 men of various positions from around a 7000 metre ship) and the damage uncontested, there would be 20 left.

They were subsequintly destroyed in my post as well as my apprentices (and once again the damages were uncontested) which means none are left.

This is a result of my and Dolashs own postings.

Now, i'm asking you to rule on the act of godmoding (namely, these other azguard appearing out of nowhere) in respect to editting of Dolashs latest post.
Posts: 4291
  • Posted On: Nov 11 2003 4:50pm
Forty were stated as ATTACKING. Every Azguard on the ship would nt be able to get to you, just those who were encountered by the security team
Posts: 7745
  • Posted On: Nov 11 2003 6:28pm
Dolash's last post was completly edited out...
  • Posted On: Nov 11 2003 11:04pm
"There was every thing. Command codes, Ship schematics, procedures, Encryption Keys, and most importantly a rundown of the battle plan.

Brilliant.

They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications. The shrouds were all assigned to take out specific ships and take them over. The ships in question had the sith on board.

From the computer he had the last known locations of each of the boarding craft.

He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis. For now working out how to use this information to his advantage. "


-The post that I downloaded the information.



I am going to have to challenge that last post of your simon.

C4 in his last post determined a way to sepparate the given cascade program from the valid information that came in.

His processor is in no way slow either. He is so smart, in fact that you imperials discontinued the line becuase they acted like sentient beings that did not follow orders and made their own decisions. You are trying to use this fact againest him. But in fact this is why this last post is invalid.



"Immediately he went to work as the virus was downloaded he surgically cut it from the imperial data files."



The cascade program would have had to have had to be in storage with the Line of code in order to corrupt any data at all.

C4 determined that the code was in the incoming data stream, so before it could corrupt anything the virus was cut and rerouted to another protected area where it thought that it was working and then deleted without coming into contact with the stored information.

An Algorithm has to actually be in contact within an AI processor and the information that it is corrupting to work, C4 worked so fast that he cut the given code as it was being downloaded.

When information is downloaded it is incomplete. So the virus could not, infact, do anything until it was completed. Before it that was so the virus was sepparated from the data stream and rerouted to another protected area.

Where it had no access to the droids processors except what he allowed it before deletion. Which was no access at all.



"..though quite useless. The hacker program did not need to corrupt data that was essentially garbage in the first place. The data dump would give the droid the entire genus of the pica worm in all 193 million languages across the galaxy."

-Simon



This is already made un-realistic in terms of posted information by the fact that C4 has been making use of the stored information since the download.


A)

"They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications."

He was accessing the information to know how TNO is communicating.


B)

" The shrouds were all assigned to take out specific ships and take them over."

Further accessing to know specifics about the plan.

C)

"The ships in question had the sith on board."

More specifics accessed.

D)

"From the computer he had the last known locations of each of the boarding craft."

He accessed the last updated information about said actions.

E)

"He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis."

Stored and accessed later.

F)

"For now working out how to use this information to his advantage."

He is accessing the complete information.

G)

"He gave the two droids more instructions and as they head off in different directions he headed back to the ship."

With said complete files he had the droids head to specific points of the ship to stretigically place thermal detonators. This required a knowledge of the layout of the ship and how to get from point A to point B according to the schematics of a ship. Showing that the droid was accessing said intact information.

H)

"C4 pulled out 4 thermal detonators. Accessing the engine scematics he places them for maximum affect along with a time piece mecanism to set them off."

Accessing stored engine schematics from the main computer he set the charges so that he knew what placement would do the maximum damage.

I)

"He entered in several command codes. Now his ship registered on enemy sensors as a freindly. The explosion left enough radiation to scramble sensors in the immediate area. But once they cleared enemy fighters fly by him without distinction of him as an enemy."

Imperials pass him as one of their own when he uses imperial freindly codes.


J)

"He had gotten to the Yonos by changing his sensor beacon to appear to look like an imperial vessel's but he did not want to take any chances. "

Further access to detailed and accurate info using the data to make his Beacon appear to be an accurate imperial signal.


k)

"He called on the files for strategy analysis. He determined the flight patterns of the tie fighters that flew above him. Giving him just enough leniency to avoid their sensor detection as he flitted over the hull of the Yonos cruiser."

The droid further accessed stored data files to predict the movements of the fighter flight formations in order to avoid detection.



That being my case I would like simon to edit out that last bit from his post seeing as it is unrealistic with the existing IC events and given IC information. To not do so would mean that I would need to alter the information of my posts that had already been resolved, and as far as I know that would alter the threads events and no one likes it when that happens.
Posts: 2377
  • Posted On: Nov 11 2003 11:26pm
Oh boy.
Posts: 1621
  • Posted On: Nov 12 2003 1:24am
ditto
Posts: 1200
  • Posted On: Nov 12 2003 4:16am
-The post that Vonta downloaded the information.



"There was every thing. Command codes, Ship schematics, procedures, Encryption Keys, and most importantly a rundown of the battle plan.

Brilliant.

They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications. The shrouds were all assigned to take out specific ships and take them over. The ships in question had the sith on board.

From the computer he had the last known locations of each of the boarding craft.

He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis. For now working out how to use this information to his advantage. "





Use of downloaded information... 99% of them in the same post I might add.





A)

"They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications."

He was accessing the information to know how TNO is communicating.

Noting the dead sith would have been a tip off too.


B)

" The shrouds were all assigned to take out specific ships and take them over."

Further accessing to know specifics about the plan.


what plan?



C)

"The ships in question had the sith on board."

More specifics accessed.

He took a lightsaber from his floating corpse so this is rather redundant.


D)

"From the computer he had the last known locations of each of the boarding craft."

He accessed the last updated information about said actions.

So you are saying that you rp'd TNO knowing up to the minute where all their ships are and what is going on in each one?


E)

"He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis."

Stored and accessed later.

yeah.. that "alot of information to review" is really what I was after..


F)

"For now working out how to use this information to his advantage."

He is accessing the complete information.


But he cannot (now) figure out how to use it to his advantage. If I had the complete genus of the pica worm in 163 million languages, it might take me a while to figure out how to use that to my advantage too..

I didn't change the existence of the information despite uber-droid references but rather, the type of actual information stored.




G)

"He gave the two droids more instructions and as they head off in different directions he headed back to the ship."

With said complete files he had the droids head to specific points of the ship to stretigically place thermal detonators. This required a knowledge of the layout of the ship and how to get from point A to point B according to the schematics of a ship. Showing that the droid was accessing said intact information.

Given that the ship was dead in space (in my post after yours, a major level exposed to space), your "strategic" locations could have been the nearest toilet and the charges would have still destroyed the ship.

H)

"C4 pulled out 4 thermal detonators. Accessing the engine scematics he places them for maximum affect along with a time piece mecanism to set them off."

Accessing stored engine schematics from the main computer he set the charges so that he knew what placement would do the maximum damage.


Given the ship was dead in space, this is sort of redundant too..

I)

"He entered in several command codes. Now his ship registered on enemy sensors as a freindly. The explosion left enough radiation to scramble sensors in the immediate area. But once they cleared enemy fighters fly by him without distinction of him as an enemy."

Imperials pass him as one of their own when he uses imperial freindly codes.


No.. your signal IFF code would read Imperial..

It would not affect Imperial sensors..

Uber droid ship would still read on sensors as uber droid ship..


So you are saying that he stole an IFF transponder code from the computer only?



J)

"He had gotten to the Yonos by changing his sensor beacon to appear to look like an imperial vessel's but he did not want to take any chances. "

Further access to detailed and accurate info using the data to make his Beacon appear to be an accurate imperial signal.

See I

k)

"He called on the files for strategy analysis. He determined the flight patterns of the tie fighters that flew above him. Giving him just enough leniency to avoid their sensor detection as he flitted over the hull of the Yonos cruiser."

The droid further accessed stored data files to predict the movements of the fighter flight formations in order to avoid detection.


You assume we fly the same pattern no matter what battle we are in? You assume we follow "planned" patterns no matter the battle?






This was my direct response posted right after yours since we do retain the right to ..respond.




Shroud K402


The ship was dead in space before C4 entered..

The thin stream of power still trickled though the main memory core had been dumped. Automated procedure took over the moment the AI interface shut down and all biological activity scans read negative.

The ship had no life onboard before C4 entered. With no positive biological activity scans, this happens:

With power distribution in passive mode, the memory began a series of cascading program activations that would reconstruct memory space to give the appearance of mass storage while using meaningless information as a catalyst for detonation.

The corrupted data would act as a trigger for the engine core computer that would be unable to derive any deactivation overrides from the mass storage.

Unfortunately, that particular program was unable to perform because the engine room core computer was completely exposed to vaccum rupturing conduits between reserve energy storage areas and the main power source.

As a result, no detonation could occur via computer activation.


And so the random data just sat there....taking up space in a memory storage unit that no longer had purpose.


This happened before C4 comes onto the scene.


At least until an unauthorized entry..


Enter C4


triggered another cascade program.

First activation that directly affects C4 and a part of that "cascade" was..

A virus was uploaded ..

and the memory upload suddenly began to unravel at the code level for there was no substance to the information.

Given the speed with which it's systems were activated, the core hardwired program (damaged as much as it's hardware was) was in no condition to test wills.

With the decision making AI programming purged, the only confirmation of authenticity would be a simple one.

Visual Scan - Passive.

No match found.

Cascade program activated.

Virus upload complete.


A few minutes later... K402 exploded.




Your response to the response..



He continues to analyze data as he flies.

But analyze what? This I take advantage of..

He found it interesting that the imperial computers had a fail safe virus program just incase of such a system intrusion. The Cascade virus was good, he gave its designers credit, this virus would have halted any hackers system download efforts. Any hacker except for an imperial designed positronic droid. He was designed for just such hacking missions as the one that this virus posed to him.

You see... while you do have an uber droid.. you don't see it do you..?

Most hackers could get around data and make some semblances of change to affect a given system. Unlike a positronic droid they could not rewrite data at will and subvert the very systems that they were trying to merely circumvent.


umm.. unless of course it was the algorithm recognition program that was the system being "subverted".

hmmm.... Now I wonder what you, in fact, did erase?

The virus could make it look like... child's play yes?



It was child’s play for the droid to see the virus in the data stream. Immediately he went to work as the virus was downloaded he surgically cut it from the imperial data files. He had worked up in his free time an algorithm that would trick a virus into thinking that it was, in fact doing it’s job of corrupting data.


If that was the virus' actual purpose...


IN reality though the virus was merely redirected into a file, one protected by a system of firewalls and completely autonomous from the data that he was downloading. There it went about it’s business thinking that it was working it’s ‘magic’.

..but as you point out so well, the virus cannot think..Not like a positronic uber droid.


When he finished downloading the intact and complete system files from the shroud. He was fully aware of the ships functions that he was manipulating at will.


The ship was floating in space... there was no ship function that he could actually manipulate.


System response:



Quote:
----------------------------
Cascade program activated.

Virus upload complete.
-----------------------------



In possession of all of the imperial data he simply took the virus apart algorithm by algorithm Studying the design before he made it totally harmless and deleted it.

Wow.. that virus never knew what hit it..

If you will notice, I am not saying that the files you downloaded were incomplete or not intact. I am just saying that they do not say what you think they say. The most intact, complete reference to the pica worm every compiled...








Now, my response to your response to my response to your action:






Inside C4


The droid was good. There was no denying that fact. Unfortunately, the droid was inexperienced and could only build on his experience from similar circumstances faced in the past.

This is true with everything..


AI could only “project” so much for a droid’s “intuition” (if there was such a thing) before such projections passed a point of diminishing returns causing the whole analysis to collapse making the projection useless.


Basically telling you your "assumptions" are pointless..


Quote:
-------------------------------------------------------

He continues to analyze data as he flies. He found it interesting that the imperial computers had a fail safe virus program just incase of such a system intrusion.

-------------------------------------------------------



The amusement algorithm of the droid was noted.

Note from writer... ;)


Quote:
----------------------------------------------------

The Cascade virus was good,

-----------------------------------------------------


You don't see it do you....nor does your uber droid character.


The very nature of a “cascade” is its multiplicity. Its nature built upon series after series of activations of multiple applications, one building upon another…advancing one after another.


umm.. unless of course it was the algorithm recognition program that was the system being "subverted".

hmmm.... Now I wonder what you, in fact, did erase?



One such series was a simple hacker program..


Which has been identified, pulled apart by the following:

"he simply took the virus apart algorithm by algorithm Studying the design before he made it totally harmless and deleted it"






Quote:
-------------------------------------------------------------------

he gave its designers credit,

-------------------------------------------------------------------



And as well he should, for the Imperials were the master of the “feint” no matter the battlefield.


Real purpose of the "virus" revealed..


This particular hacker virus was very easy to spot…it’s function relatively quick to determine.

Real purpose of the virus accomplishing it's purpose.


Quote:
-------------------------------------------------------------

this virus would have halted any hackers system download efforts. Any hacker except for an imperial designed positronic droid. He was designed for just such hacking missions as the one that this virus posed to him.

Most hackers could get around data and make some semblances of change to affect a given system. Unlike a positronic droid they could not rewrite data at will and subvert the very systems that they were trying to merely circumvent. It was child’s play for the droid to see the virus in the data stream. Immediately he went to work as the virus was downloaded he surgically cut it from the imperial data files. He had worked up in his free time an algorithm that would trick a virus into thinking that it was, in fact doing it’s job of corrupting data. IN reality though the virus was merely redirected into a file, one protected by a system of firewalls and completely autonomous from the data that he was downloading. There it went about it’s business thinking that it was working it’s ‘magic’.

----------------------------------------------------------



In fact, the necessary nanoseconds it took for the droid to assign details to it’s various positronic pathways to deal with this “hacker” thread, was a virtual century in the realm of cyberspace. But the “slow” speed of the droid’s processing matrix was all the cascade had to work with so it made due. A virus was, afterall, only as fast as the processor it latched onto.

The droid, while having many advanced featured and augmentations, still was a system built upon a system built upon a system that was entirely antiquated. It’s own logic processors proved to be the darkness to the blinder the hacker program provided.



Quote:
--------------------------------------------------------------------------------

When he finished downloading the intact and complete system files from the shroud.

--------------------------------------------------------------------------------



..though quite useless. The hacker program did not need to corrupt data that was essentially garbage in the first place. The data dump would give the droid the entire genus of the pica worm in all 193 million languages across the galaxy.

Now I am not saying you did not get some information. Most of the information you stated at the beginning could have been found by means other than computer (like walking around the ship) so it was rather redundant.

You wrote:

There was alot of information to review so he stored it to his auxilery data storage unit for later analysis


This is what I was after. Not what data you've already used.. but that which you've stored...which (I might add) you've not identified.



Quote:
-----------------------------------------------------------------------

He was fully aware of the ships functions that he was manipulating at will.

------------------------------------------------------------------------



But as any programmer will tell you, even those basic-level: awareness was subjective.


heheheheheheheheh


Quote:
---------------------------------------------------------------

In possession of all of the imperial data he simply took the virus apart algorithm by algorithm Studying the design before he made it totally harmless and deleted it.

---------------------------------------------------------



And thus ended the life of the multiplex program 001001111000.0011.

The logic pathways of the droid’s positronic mind at once satisfied compelled it to once more proceed on its merry way.


I see no contradiction here...



You say: he simply took the virus apart algorithm by algorithm Studying the design before he made it totally harmless and deleted it.

I say: And thus ended the life of the multiplex program 001001111000.0011.

The logic pathways of the droid’s positronic mind at once satisfied compelled it to once more proceed on its merry way.



Where is the contradiction?







Reasons C4 gives for my editing:


Unrealistic. ?? lol lol... it's this like the pot calling the kettle black?


C4 would have to edit prevous posts: umm no. I have no problem with what your droid "currently" has stated he's used. All I do is make sure there is nothing further he gains from whatever data he has. That's all.
Posts: 1621
  • Posted On: Nov 12 2003 4:39am
oi!!!
  • Posted On: Nov 12 2003 5:25am
99 %? Check your math again.

approximitly 70% in one post and another 30% in another post.

Reguardless. I used stored information that was in my auxilury data files that was not currupted or a Worm file in so many languages.

Meaning that in my last post I would have not been able to access said information so how could he have access to said information if you deleted said information before the Shoud was destroyed several posts ago.


A)

"They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications."

He was accessing the information to know how TNO is communicating.

Noting the dead sith would have been a tip off too.

No, the shrouds would contain mission briefings on how they were to be carried out. So you are saying that TNO does not store mission briefings on what they are doing unlike most professional military organizations?

You did not Rp that they did not so I could Rp that they did and they did.


B)

" The shrouds were all assigned to take out specific ships and take them over."

Further accessing to know specifics about the plan.


what plan?

The mission plan that the sith and boarding parties are using to take over certain ships. Also that would have been in a missions briefing in the ships computer.



C)

"The ships in question had the sith on board."

More specifics accessed.

He took a lightsaber from his floating corpse so this is rather redundant.


Loose Detail sorry.

D)

"From the computer he had the last known locations of each of the boarding craft."

He accessed the last updated information about said actions.

So you are saying that you rp'd TNO knowing up to the minute where all their ships are and what is going on in each one?

No, I Rped that the shroud capatain or communications officer would have been updated as to the given targets of the various boarding parties. Seeing as in several posts the members of TNO had orders relayed to the other shrouds on the details of said missions. When to engage, where to engage, etc.


E)

"He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis."

Stored and accessed later.

yeah.. that "alot of information to review" is really what I was after..

That he was continuously accessing later in the thread itself and in the next post that he accesses said information.


F)

"For now working out how to use this information to his advantage."

He is accessing the complete information.


But he cannot (now) figure out how to use it to his advantage. If I had the complete genus of the pica worm in 163 million languages, it might take me a while to figure out how to use that to my advantage too..

I didn't change the existence of the information despite uber-droid references but rather, the type of actual information stored.


It would take you awhile it would not take C4 a while. If you read bounty hunter wars and noted the time that it took IG-88 to aquire an awarness that told him who he was what he was and what he needed to do you would note that he digested several years worth of data in seconds. Establishing just what it was that he needed to do. C4 thinks several times faster then any normal sentient. he had minutes to review the information that he downloaded. In order to figure out what was helpful.

Command codes, Ship schematics, procedures, Encryption Keys, and most importantly a rundown of the battle plan

The first thing that I did was define what it was that he had. He did not need to review all of the information to make a rudamentary scan of what files he was downloading.

So he does infact have more then Zoological data.





G)

"He gave the two droids more instructions and as they head off in different directions he headed back to the ship."

With said complete files he had the droids head to specific points of the ship to stretigically place thermal detonators. This required a knowledge of the layout of the ship and how to get from point A to point B according to the schematics of a ship. Showing that the droid was accessing said intact information.

Given that the ship was dead in space (in my post after yours, a major level exposed to space), your "strategic" locations could have been the nearest toilet and the charges would have still destroyed the ship.


But they would not have been able to send the ship into a spin that destroyed several fighters in the process if they were placed in the nearest toilet. To do that took precise knowledge of where they would have the most effect on the ship.

H)

"C4 pulled out 4 thermal detonators. Accessing the engine scematics he places them for maximum affect along with a time piece mecanism to set them off."

Accessing stored engine schematics from the main computer he set the charges so that he knew what placement would do the maximum damage.


Given the ship was dead in space, this is sort of redundant too..

Not when I had managed to get power back online enough to bring the ship's computer to life. Plus there would be enough active material in the engines to cuase one big bang when exposed to a violent explosion.

So not so redundant.

I)

"He entered in several command codes. Now his ship registered on enemy sensors as a freindly. The explosion left enough radiation to scramble sensors in the immediate area. But once they cleared enemy fighters fly by him without distinction of him as an enemy."

Imperials pass him as one of their own when he uses imperial freindly codes.


No.. your signal IFF code would read Imperial..

It would not affect Imperial sensors..

Uber droid ship would still read on sensors as uber droid ship..


So you are saying that he stole an IFF transponder code from the computer only?


It would not effect sensors, no. But in the heat of battle all that ships have to go on is whether or not a ship has a friendly signal or not. So if there is a ship that registers as a friendly then they ignore it and continure on to their next target.

No I altered the transponder code to read as a friendly imperial code. There are aspects in IFF code that make it appear friendly or not I just altered those.

Reguardless I altered the ships code with the stored data. In the first and then second post after I recieved said data. So I, did in fact IC, have access to said data from the stored files.

J)

"He had gotten to the Yonos by changing his sensor beacon to appear to look like an imperial vessel's but he did not want to take any chances. "

Further access to detailed and accurate info using the data to make his Beacon appear to be an accurate imperial signal.

See I

Same as H.

k)

"He called on the files for strategy analysis. He determined the flight patterns of the tie fighters that flew above him. Giving him just enough leniency to avoid their sensor detection as he flitted over the hull of the Yonos cruiser."

The droid further accessed stored data files to predict the movements of the fighter flight formations in order to avoid detection.


You assume we fly the same pattern no matter what battle we are in? You assume we follow "planned" patterns no matter the battle?

No I assume nothing. I know for a fact that fighter craft have specific patterns that they fly for certain mission profiles. Such as patroling. They may differ based on each group but they do exist.

Knowing how many times a fighter group well pass, in what grouping pattern to make scans, at what given speeds are normal for such activities for a given craft do allow for such an assumtion to be made and taken advantage of.

It was also no assumption. By Rping it out they did in fact do as I rped given that I know something about what they were going to do. So it did in fact happen and I did in fact access such information.


Upon a review this boils down to one detail.

Whether or not I identified what the information was in the first place. Becuase if I did then there is no use in saying that you identified what it was for me.

"There was every thing. Command codes, Ship schematics, procedures, Encryption Keys, and most importantly a rundown of the battle plan.

There is the information that was being downloaded. Defined as such.


Brilliant.

They had linked the entirity of this fleet with a sith mind meld. Allowing them some rudamentary communications. The shrouds were all assigned to take out specific ships and take them over. The ships in question had the sith on board.

From the computer he had the last known locations of each of the boarding craft.

He had all that he needed. There was alot of information to review so he stored it to his auxilery data storage unit for later analysis. For now working out how to use this information to his advantage. "

I identified the information, namely, the named information underlined only in further detail.

"If I had the complete genus of the pica worm in 163 million languages, it might take me a while to figure out how to use that to my advantage too."

Maybe But I would have known that I was not downloading further imperial info but needless info if this was the case and had not identified the information. But the thing is I did. So saying that this information is just that of a pica worm becuase you say that I did not identify the information is a waste of time.

There is more then Picaworm info as I posted. Maybe it is infact there as well as all of the data that I posted that I was downloading but the imperial data is still there as well.

So either change the post to reflect that the info is there or please delete said passage about C4's innerds.
Posts: 1381
  • Posted On: Nov 12 2003 5:31am
Vonta... the Shroud you boarded was from Chandler's group. Chandler's Shrouds had nothing to do with the boarding of the GC ships -- they would have been carrying mission information for his group.

It was Janus' Shrouds that carried the Sith, and they carried no information.

You are obviously unaware of the nature of Shroud command, but crews are choosen based on their ability to act and react to everything.

There is never a "set" mission plan for the Shroud Division, because the Shrouds are so multi-purposed. The group commander decides where and how they are to be deployed to best aide the fleet.

This is, in part, because most commanders cannot work Stealthships into their plans, many end up treating them as mainline combat ships (which they're not).