10-03-2020, 04:38 PM
(This post was last modified: 10-03-2020, 04:39 PM by Boxta. Edited 1 time in total.)
Along with my other post on this same thread, I think packets should be able to control lots of things, because lots of things have computers in them. Basically, some ideas for making the network more secure
Lockers: Make them require Netpass_security, brung up in another thread. There should be a few ways to get this netpass, Im thinkin A, the authdisk, Which should always have all the codes on it. B, Wireless cracking, where you use the ping tool, and the packet sniffer to get a encrypted packet which has to be cracked, C, and wired cracking, Basically, take X locker or crate to a data terminal, wrench it down, then, send the current packet to open lockers to it, just on the wired network. B should be the second hardest, with c being the easiest
Doors: Make each door require differnt things: I think afts post on doors is a good way to do it
I also think we should draw from the game of hacknet { https://en.wikipedia.org/wiki/Hacknet }, Ive played it before and it does a really good job of making a compleing story and making it actually seem like your hacking through computers and not just entering a few commands to get SU access
Lockers: Make them require Netpass_security, brung up in another thread. There should be a few ways to get this netpass, Im thinkin A, the authdisk, Which should always have all the codes on it. B, Wireless cracking, where you use the ping tool, and the packet sniffer to get a encrypted packet which has to be cracked, C, and wired cracking, Basically, take X locker or crate to a data terminal, wrench it down, then, send the current packet to open lockers to it, just on the wired network. B should be the second hardest, with c being the easiest
Doors: Make each door require differnt things: I think afts post on doors is a good way to do it
I also think we should draw from the game of hacknet { https://en.wikipedia.org/wiki/Hacknet }, Ive played it before and it does a really good job of making a compleing story and making it actually seem like your hacking through computers and not just entering a few commands to get SU access