05-31-2014, 11:38 PM
I'm fairly new and have been trying to figure out what I can do with terminals in the past few days after someone logged into my AI core, so maybe relevant observations -
Having 2-3 systems working at once that look pretty similar is damn confusing, having that also work across network and networked with things seeming to handle slightly differently (or I'm a dumbass but I had massive issues doing things over wireless) make it pretty confusing to get into, and once you figure out how to do the basics I'm kind of at a loss where to go.
Connecting to other machines seems fairly straightforward but once you do that...well I couldnt find anything to do, like the above I think a little kind of network security book in the tech storage with like..I dunno Nanotransens short manual for the IT security guy or something.
what I did find immediately useful was being able to check access logs etc. I think with some more promotion that those terminals do something beyond looking kickin' 80's it might even help with making out of the blue accusations (can the logs be faked also? no idea)
Having 2-3 systems working at once that look pretty similar is damn confusing, having that also work across network and networked with things seeming to handle slightly differently (or I'm a dumbass but I had massive issues doing things over wireless) make it pretty confusing to get into, and once you figure out how to do the basics I'm kind of at a loss where to go.
Connecting to other machines seems fairly straightforward but once you do that...well I couldnt find anything to do, like the above I think a little kind of network security book in the tech storage with like..I dunno Nanotransens short manual for the IT security guy or something.
what I did find immediately useful was being able to check access logs etc. I think with some more promotion that those terminals do something beyond looking kickin' 80's it might even help with making out of the blue accusations (can the logs be faked also? no idea)