Jump to content

Toa Kovolta

Members
  • Posts

    227
  • Joined

  • Last visited

Everything posted by Toa Kovolta

  1. Good one Lev! Really had me fooled with that fake sig too.
  2. So that's why I can only hear those parts out of my left earphone... I would just like to point out that it's only like that for the Skype parts, not the intros and stuff. Don't know if that'll help you solve the problem or not.
  3. By the way, whatever happened to that Takadox thing?
  4. OOC: This post starts just after the internet went down.IC / Awk / CKC / Virtually inside his personal computer:Inside the virtual space that was Awk's home directory, little sparks of white and black light floated aimlessly among the dull grey "buildings" that were the home's sub-directories. Suddenly a electrical impulse was sent through the space as a command was entered into the system. The little sparks of light started amassing at the edge of the space. Thousands of them binding together in complex ways until finally a new program was formed where once there was nothing. This program was Awk himself.Awk walked between the various directories until he found the one he was looking for, the Network Directory. He opened the door and walked inside. The directory was empty aside from a console in the middle, and a huge hole in the side of one of the walls which appeared to be connected to a chute of some sort. Awk went over to the console and typed some commands into the keyboard.%awk_ic%//networks -> awkpassword: *******%awk_ic%//networks -> select connectionconnection: internetconnection selected%awk_ic%//networks -> bitChute openopening the bit chute...error: cannot connect to internetWhat? How could the internet be down? On Techna that was just something that never happened.Suddenly, a voice boomed throughout the directory as a signal came in from the hacker line: "Get to base Ermoi. Pronto."Awk was even more confused by this, the message was obviously from Enaltai, but what was so urgent it required all the hackers to gather in one spot. Something like that could be dangerous.Quickly he changed some of the settings on the console, then jumped into the hole in the wall. The bit chute was fast and in seconds he was where he needed to be, a secret offline database, that only Awk's computer was able to connect to. It was filled with stacks and stacks of files on info he had pulled off of Techna's systems with his double agent software. He walked over to the main console in the database and using his power over data manipulated the bits floating around him, the little sparks of white and black light. They immediately started swirling together, interconnecting, forming a small usb device.Awk pluged the newly formed usb into the console and typed in some commands.%%hawkerbase%% -> cd currentProject%%hawkerbase%%////currentProject -> download allpassword: ******************************************downloading...download complete.Awk unplugged the usb and jumped back into the bit chute.IC / Awk / Some time later / back in the literal world / Entering base Ermoi:Awk walked into the meeting room, as he passed Enaltai, he placed the usb on the table in front of him whispering: "The info you requested." Then went to go find a seat. As he walked through the crowd, he noticed the many of the people staring oddly at him, this was the first time many of the hackers were meeting each other. Another danger, he thought, revealing all our identities to each other like this increases the chances of someone giving us away to the authorities.He took a seat and looked around. He didn't see Amnchey anywhere, either his guess earlier was wrong, or she too realized the danger of congregating like this and decided not to... Or even worse, his efforts earlier hadn't been enough to keep her out of trouble and she had been caught.He then logged into the base recording system and skimmed over what had already been talked about at the meeting.
  5. Hey guy's, sorry I haven't posted in the past week or so. But my current plan was sort of interrupted when Legolover shut off the internet... So I guess I'll just go over and join the hacker meeting.
  6. Oh wow! This is simply a marvellous idea and a great project! To have the works of so many great artists, all gathered into one place is awesome.They all look great, and I mean all of them (though, how come February's not up yet?), though I have to say, "Schemes within Schemes" is particularly interesting. @Legolover: Yours does not look out of place, it looks great, perfect for its month too.But I guess I better only comment on the January one right now since that's the only one I'm supposed to be seeing right now( ).The Background is simply stunning, and the Dragon, or Ice Creeper, or Whatever you want to call it, also looks great, blending in perfectly with the icy environment. I really love the colouring on his scales. However, there's something about Tahu that looks a little off, almost like he doesn't quite belong. I think it might be that it doesn't look like he should be standing in such a way, almost like he's actually floating. I dunno, just something about the pose that seems awkward.My favourite part about it though is the subtly placed Miru on the Dragons head!
  7. OOC: I see what you did there. :PIC / Awk / Heading towards the CKC:With Torch gone, Awk began typing away at his computer as he walked down the street. Logging into the GPS system, he located the nearest Chute at ground level. He quickly walked over to it and jumped in.When he reached the CKC, he went to his office and sat down. He then called upon his elemental power, there was a faint glow around his body for a few seconds, then it slumped forward. Meanwhile a new program had appeared on his computer. Awk had entered the virtual world.OOC: Oh this is going to be fun!
  8. Would just like to add that I'm pretty sure Toa of Light can't move at the speed of light. Only character I know that can is Umbra, who does that by turning into light.
  9. Really? *Pumps Shotgun* Then we might have to remove competition. Said competition is co-host of the game, Shyrnn.
  10. As LL said, the download was already blocked by my character Awk, but whatever...
  11. IC / Awk / Outside S&D / With Torch:Awk bid Torch goodbye, and left walking back in the direction of the CKC.
  12. I seem to be inspiring a lot of people with that! XDI'm glad that I've been able to put my coding skills to good use! This rpg is truly the best one for someone in computer science, I'm so glad it won. :)And you should make a Hacker character Legolover, they're so fun!
  13. IC / Awk / Leaving S&D / With Torch:Awk followed behind Torch. Silent not because of what Torch had said, but because he was concentrating on his current connection with the SCPU. He needed to finish before his he left the building and his access to the public terminal's identity was lost. He was going to have to do without the help of whatever program Torch was working on, and he would have to make some executive assumptions.downloadStatus : 57% - beamPow : 70%file : tral.exe - fileLoc : c:/main/sresponses/trackProgtargetLocAdv : Pro Coding Corporation - typeID: BusageCPU : 0.1%no more information availableA B-Type ID at Pro Coding Corp., an attempted assassination of Amnchey. Awk had to assume one thing. It was Amnchey trying to attack the SCPU, meaning she was one of the Hackers. If the tracing program finished downloading, she would be discovered. Someone in that high a position was a valuable asset to the hackers. If this assumption was true, he had to try and stop the download, or maybe divert it...Using his second partition he opened up fifty new terminal windows and used them to hack into the fifty personal computers throughout Techna with the lowest security. And transferred a program he'd created which was designed to try and prod a systems most sensitive areas. He then connected to scpu.techna and ran the program on all fifty computers. Erasing all traces of his connection to the computers, he terminated his connection.The SCPU would not take kindly to being prodded by so many computers.Awk switced back to his first partition.> viewCurrentLog...unauthorized access from sst%1599unauthorized access from srt%1897unauthorized access from set%2846unauthorized access from aet%3491unauthorized access from adt%1001unauthorized access from aft%1357unauthorized access from sgt%2833unauthorized access from akt%4792unauthorized access from slt%1131unauthorized access from slt%2293unauthorized access from akt%2460unauthorized access from syt%1877preparing to launch trace program to 50 targetslog end> routeDecisionsThrough hereauthorization neededAwk paused. How would he get past this? Some sort of a pass was needed for this even though he was using an s&d identity... Maybe the s and d terminal had a file of passwords. He did a quick search... nothing. Maybe it had been used for such a transaction before...> abort> viewHistory thisabortrouteDecisionsThrough hereviewCurrentLogysignalOf o-threat%trackcontinue? %> ypublic_terminal@sandd.technaviewCurrentConnectionsexitnncontinue? %> yny115%Fulok h8_h@kr5routeDecisionsThrough hereviewCurrentProcessesBingo!continue %> n> routeDecisionsThrough hereauthorization needed> 115%Fulok h8_h@kr5decision routing commenced>*tral.exe currently being downloaded to 51 different targets*beam-Pow now at 40% and usageCPU now at 10%*estimated download time: 47 min.*would you like to cancel any of the downloads to speed things up?> y*which targets?> e-101-5-5&-!%^%$@&!# avr%1342 ... akt%2460*downloads canceled*targets still connected, would you like to dissengage targets?> y*connections terminated> clear history thishistory cleared> exitconnection terminatedOOC: Hopefully that was creative enough (and acceptable) Legolover, if not please tell me what you would like me to change.
  14. So Forcyte's leaving S&D, what's going to happen to Awk?
  15. I see your point, but I would sill have to disagree with you... whatever...
  16. ^ Great Idea! Your welcome! :DIn what did I inspire you? I wouldn't expect any less. OOC: Is Data alive?What do you mean? :SS-Toran were created pretty much in the same way as Matoran. What's this about data?@TX: I found this in the main rpg post as I was rereading it.
  17. @ ^ : Alright.Meant to say this a while ago. Oh lol.And in regards to Amnchey's Fiance: An-fell ... sorry X|
  18. OOC: Why wouldn't S-Toran have destinies? They're just as alive as real Matoran.IC / Awk / S&D / With the Toa Techna:"If I may add something there," Awk intejected, "though it is true that the Hackers appear to be completely disorganized, it is my thinking that they are divided into three categories or groups: the Chaotic, the Random, and the Silent. It's called CRS Syndrome, a commonly used phrase when referring to faulty programs in MCL Plus. There are those that end up corrupting certain pieces of data, those that produce seemingly random output, and those that seem to do nothing at all."Linking this to the hackers, the Chaotic are those run through the city brandishing weapons and can barely be separated from common criminals, the Random are those who go about uploading viruses to random computers such as 'You Are Here' signs, and the Silent are those who sit behind desks perfecting more advanced viruses or hacking into larger more important systems."I believe that Torch may be partially right in his assumption. The silent ones are probably somewhat coordinated, maybe not completely, but there may be some small pattern there somewhere, if we use the right set of data."Meanwhile, Awk's inner processes picked up on something else Forcyte had said. There was an assassination attempt on Amnchey. Isn't she the CEO of Pro Coding Corp? He opened up a third partition on his computer and did a scan of his hacker info to see if there was anything related... Nothing. Hmm... Why would someone have tried to assassinate her?OOC: Off to bed now.
  19. IC / Awk / S&D / With the Toa Techna:"Could I get a copy of that file?" Awk spoke up. "Perhaps I can help with coding it? And my mask could probably be useful there too." (OOC: It's just plans right, not an actual program yet?) He tapped his mask as he opened a new partition on his computer in order to receive the file without the possibility, of what he was currently working on to be noticed by the sender.In the other partition he was getting his results back from the scpu:analyzing signalsigType : beam - downloadRate : 2,498,127 b/stargetID : e-101-5-5&-!%^%$@&!# - targetLocation : Pro Coding Corporationmore information?> yIf he could look at this proposed program Torch was talking about, he might be able to use the info with his powers and skills to create a rough draft program to use to find out the identity of the attacker, and see if any action was necessary.He waited for his replies. From Torch and the SCPU.
  20. oh, must have missed that. This rp moes so fast.What about any electronic door systems?
  21. @those performing the rescue mission: hacking into the surveillance system and such might help.
  22. OOC: So you want some creativity...IC / Awk / S&D / With the Toa Techna / Secretly working on his internal computer, trying to find info on the recent attack on the SCPU:%awk_ic%>>public_terminal@sandd.techna -> srd scpu.technasecure remote distant connection to scpu establishedcurrently running on vistor.scpu - please enter a command> viewCurrentConnectionsidentification required for this action> public_terminal@sandd.technaidentification accepteddisplaying current connections to scpu111%Torch112%Forcyte114%Matrapolix115%Fuloke-289n&6e-890ms$5#o-threat%trackv-public_terminal@sandd.technae-101-5-5&-!%^%$@&!#> signalOf o-threat%trackOOC: LL, I'll let you continue as the scpu. My plan is to find out the broadcast signal of the tracking program being sent to Amnchey's computer, and then use that info to try and find out who sent the virus before the program. If that is successful, Awk, will find out that Amnchey's on the side of the hackers, and realize that this need to be kept secret, he will then try to redirect the track program to some other random computer.... or whatever. XPEdit: Would also like to note that I'm not currently inside the scpu so no passwords were required at the moment. And, the identity of the s and d public terminal worked cause normally only Toa Techna and other high clearence people would be using it.
  23. OOC: @LL: Nice job! A lot better than anything I would have come up with.IC / Awk / S&D / With Torch, Forcyte, Matra, and Foluk:As Awk watched the video of Takadox's interrogation with the others, he received the incoming message from Enaltai, and he promptly deleted it and all associated info. So Æon's gone and got herself captured eh. Good riddance if you ask me, hackers are supposed to be stealthy, not blatantly attacking everything in sight.He then proceeded to do some searches to see if he could find anything on this, attempted attack on the SCPU that Torch had mentioned. This time using his power over data to manipulate his internal computer rather than his fingers, so as not to give away anything that might be crucial to the Toa Techna.
  24. OOC: Would just like to point out that Torch could not have "looked hard at Shyyrn". :PIC / Awk / S&D / With Torch, Forcyte, Matra, and Fullock / Discussing Takadox:Awk listened intently as the Toa Techna informed each other of the Barraki situation. After Forcyte spit out the file on Takadox, he decided to do a little research of his own. His fingers spun in the air in front of him as he entered commands into his computer.%awk_ic% -> ssh public_terminal@sandd.technapassword:connecting...now logged in as public_terminallast login at 42:05:67 from 1.000.1007.3218%awk_ic%>>public_terminal@sandd.techna -> egrep "takadox|bomb"+audioRelevance < `ls -recur | egrep "takadox|bomb"+audioRelevance`Current_CKC_Projects.infoBarraki.infoDataBomb.infoTakadox.infoWhen his search was finished, Awk secretly made copies of the returned files and using his power over data stored them in his secret secure data bank.The Toa Techna having paused in there conversation when Awk's fingers seemed to disappear because of how fast he was typing, looked at him intently."I have found some files pertaining to the situation here in S&D's main system." He said the the expectant Toa. He then projected the contents of the files in a hologram from his eyes for them to see.OOC: Idk what's inside them, just felt like using Awks computer skills.
×
×
  • Create New...