Grace had to wonder if the choice of targets wasn't a bit on the intentional side. Why phone sex? Why 1-800-FAT-GRLS? But then, it was about the last place anyone would go looking for her. There was some comfort in that, even if she was sure Gadfly's own motives weren't quite so pure.
Ginger. She sounds like a ginger.
And there's such affection in that, that Grace is fairly certain that he's talking about the server, and not the pre-recorded voice messages. He's anthropomorphizing a 4 gig storage locale as 'Ginger'.
Grace sighed at the words on her screen, but came back with a, "You sound like you're in love already. Go ahead and call her what you want, you found her."
"Man, I haven't done anything like this in years," she added to her response. She hadn't needed to. Cracking into a remote server was a child's game to her mind, because that's what it had been for her. But this time, she was looking for freedom in a place and time where the crackdown on privacy was coming down hard. So take someone else's privacy, if you can't find your own...
First step, as Gadfly said, get your tools together. A good encryption protocol, this came first. Once they took over, it wouldn't do to hash everything out in plaintext. Next, a good vulnerability scanner. Tools of the not-so-legal trade.
The skill needed to crack a commercial server was, sadly, likely a lot less than that needed to point a fellow student's computer to Rick Astley videos. For one, it was a Microsoft shop. Pheh. But here, there was that pesky need for stealth.
Maybe a little something to modify the server access logs, clean up after themselves...
Paranoid? Maybe. A little. But if they really were out to get you...
-------------------------------------
Noel @ 8:13PM
Okay! I'm going to do rolls now!
Custom Cracking Software [Int 4 Creative + Comp 4, diff 8-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN7 (1, 2, 3, 5, 7, 7, 9, 10) ( success x 4 ) VALID
Noel @ 8:13PM
Rerolling 10!
Roll: 1 d10 TN7 (9) ( success x 1 ) VALID
Noel @ 8:16PM
Again, because like Grace is going to let Gadfly have all the cool toys...
Custom Cracking Software [Int 4 Creative + Comp 4, diff 8-1 (Ability Aptitude: Computer)]
Noel @ 8:16PM
Roll: 8 d10 TN7 (1, 3, 4, 5, 5, 6, 7, 9) ( success x 2 ) VALID
Noel @ 8:17PM
Crypto Security Software [Int 4 Creative + Comp 4, diff 7-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN6 (2, 3, 3, 4, 7, 7, 9, 10) ( success x 4 ) VALID
Noel @ 8:17PM
Rerolling 10!
Roll: 1 d10 TN6 (1) ( fail ) VALID
Noel @ 8:18PM
nooo. bad 10.
Noel @ 8:20PM
Data Cleanup Suite (hiding the evidence!) [Int 4 Creative + Comp 4, diff 7-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN6 (1, 1, 2, 3, 5, 8, 9, 10) ( success x 3 ) VALID
Noel @ 8:20PM
Rerolling 10!
Roll: 1 d10 TN6 (2) ( fail ) VALID
Cellatus @ 8:28PM
Witnessed!
Cellatus @ 8:29PM
Nice rolls!
Totals:
5 successes on Cracking Software
2 more successes on Cracking Software
4 successes on Encryption
3 success on Data Cleanup
Ginger. She sounds like a ginger.
And there's such affection in that, that Grace is fairly certain that he's talking about the server, and not the pre-recorded voice messages. He's anthropomorphizing a 4 gig storage locale as 'Ginger'.
Grace sighed at the words on her screen, but came back with a, "You sound like you're in love already. Go ahead and call her what you want, you found her."
"Man, I haven't done anything like this in years," she added to her response. She hadn't needed to. Cracking into a remote server was a child's game to her mind, because that's what it had been for her. But this time, she was looking for freedom in a place and time where the crackdown on privacy was coming down hard. So take someone else's privacy, if you can't find your own...
First step, as Gadfly said, get your tools together. A good encryption protocol, this came first. Once they took over, it wouldn't do to hash everything out in plaintext. Next, a good vulnerability scanner. Tools of the not-so-legal trade.
The skill needed to crack a commercial server was, sadly, likely a lot less than that needed to point a fellow student's computer to Rick Astley videos. For one, it was a Microsoft shop. Pheh. But here, there was that pesky need for stealth.
Maybe a little something to modify the server access logs, clean up after themselves...
Paranoid? Maybe. A little. But if they really were out to get you...
-------------------------------------
Noel @ 8:13PM
Okay! I'm going to do rolls now!
Custom Cracking Software [Int 4 Creative + Comp 4, diff 8-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN7 (1, 2, 3, 5, 7, 7, 9, 10) ( success x 4 ) VALID
Noel @ 8:13PM
Rerolling 10!
Roll: 1 d10 TN7 (9) ( success x 1 ) VALID
Noel @ 8:16PM
Again, because like Grace is going to let Gadfly have all the cool toys...
Custom Cracking Software [Int 4 Creative + Comp 4, diff 8-1 (Ability Aptitude: Computer)]
Noel @ 8:16PM
Roll: 8 d10 TN7 (1, 3, 4, 5, 5, 6, 7, 9) ( success x 2 ) VALID
Noel @ 8:17PM
Crypto Security Software [Int 4 Creative + Comp 4, diff 7-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN6 (2, 3, 3, 4, 7, 7, 9, 10) ( success x 4 ) VALID
Noel @ 8:17PM
Rerolling 10!
Roll: 1 d10 TN6 (1) ( fail ) VALID
Noel @ 8:18PM
nooo. bad 10.
Noel @ 8:20PM
Data Cleanup Suite (hiding the evidence!) [Int 4 Creative + Comp 4, diff 7-1 (Ability Aptitude: Computer)]
Roll: 8 d10 TN6 (1, 1, 2, 3, 5, 8, 9, 10) ( success x 3 ) VALID
Noel @ 8:20PM
Rerolling 10!
Roll: 1 d10 TN6 (2) ( fail ) VALID
Cellatus @ 8:28PM
Witnessed!
Cellatus @ 8:29PM
Nice rolls!
Totals:
5 successes on Cracking Software
2 more successes on Cracking Software
4 successes on Encryption
3 success on Data Cleanup