{"id":725,"date":"2022-01-27T10:45:00","date_gmt":"2022-01-27T15:45:00","guid":{"rendered":"http:\/\/serioustangents.com\/SeriousBlog\/?p=725"},"modified":"2022-03-26T17:46:54","modified_gmt":"2022-03-26T21:46:54","slug":"savalon-equipment-attack-software","status":"publish","type":"post","link":"http:\/\/serioustangents.com\/SeriousBlog\/?p=725","title":{"rendered":"Savalon: Equipment: Attack Software"},"content":{"rendered":"\n<p>What follows is an excerpt of some of the programs available for the Hacker to purchase or utilize during a journey into Mass Data Nodes, a process referred to as a &#8216;Slide&#8217; by any who perform the activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">About Face<\/h3>\n\n\n\n<p>This curious software package causes opponents to randomly turn or shift position.&nbsp; At best, this simply annoys or inconveniences a program or Slider, but for a Tracer program, the consequences are devastating.&nbsp; The minor changes force it to re-initialize its search from its new position, so one or two solid hits effectively nullify a Trace To Source function until the virus is removed from the program\u2019s code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ex-Girlfriend<\/h3>\n\n\n\n<p>Not quite powerful enough to be a full AI in its own right, the Ex-Girlfriend is still an extremely powerful weapon to sic on an unsuspecting program.\u00a0 It initially removes sense routines, usually by clawing eyes out.\u00a0 The sharp fingernail motif continues as she slashes away or, alternatively, she delivers a kiss of death that dissolves the program out from the inside.\u00a0 She can also overload programs with thousands upon thousands of \u201cWhy haven\u2019t you called?\u201d inquiries.\u00a0 Regardless of the form of attack or personal taste in attire and appearance, the Ex-Girlfriend is always amusing to watch, even against programs she\u2019s not designed for.\u00a0 Sadly, she\u2019s at a complete loss versus other Sliders due to her overall design.\u00a0 Sliders have too many tools at their disposal, and rather than compensate, she tends to freeze up and throw temper tantrums.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"533\" height=\"313\" src=\"http:\/\/serioustangents.com\/SeriousBlog\/wp-content\/uploads\/2022\/03\/Ellis-Eyes.bmp\" alt=\"\" class=\"wp-image-699\"\/><figcaption>Bro, trust me.  Don&#8217;t ask her for her number.  She&#8217;s got some crazy cookies.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Fashion Blunder<\/h3>\n\n\n\n<p>The Fashion Blunder, by hook or by crook, will convince another program to shut itself down.\u00a0 Once Fashion Blunder does enough \u2018damage\u2019 to derez a software package, it turns off.\u00a0 This does not actually damage the program, so neither Observing nor Passive Baseware will not Alert Others due to attack, nor will they counter-attack since the program itself is technically not at risk.\u00a0 Alerted Baseware will view Fashion Blunder as a threat and typically respond as they are programmed.\u00a0 Fashion Blunder is exceptionally comical to watch as it points out how out of style the avatar\u2019s graphic is or how out of date some routines are.\u00a0 While technically a \u2018stealth\u2019 program, Fashion Blunder will be very obvious to other Sliders in the area.\u00a0 Only really self-conscious Sliders are affected by Fashion Blunder; most simply ignore the commentary and reactivate software turned off by the Blunder.<\/p>\n\n\n\n<p>An alert technician or Corporate Slider that notices one or more of their software packages have been turned off from their console will usually turn them right back on once they spot the problem.\u00a0 As a result, Hackers typically save the Fashion Blunder for Gateways that need to be passed through but don\u2019t want to raise alarms to do so.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"600\" height=\"600\" src=\"http:\/\/serioustangents.com\/SeriousBlog\/wp-content\/uploads\/2022\/03\/Big-best-blunder.png\" alt=\"\" class=\"wp-image-731\" srcset=\"http:\/\/serioustangents.com\/SeriousBlog\/wp-content\/uploads\/2022\/03\/Big-best-blunder.png 600w, http:\/\/serioustangents.com\/SeriousBlog\/wp-content\/uploads\/2022\/03\/Big-best-blunder-300x300.png 300w, http:\/\/serioustangents.com\/SeriousBlog\/wp-content\/uploads\/2022\/03\/Big-best-blunder-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>OoooooOOOOooOOOO!  I see you!<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Unexpected Semicolon<\/h3>\n\n\n\n<p>Taking the form of white gloves, elbow pads, kneepads, and socks, the Unexpected Semicolon battles against software and Sliders alike, using a bewildering array of hand-to-hand fighting styles.&nbsp; Solid blows delete code or stun cerebral cortexes.&nbsp; It is particularly effective against Patrol A.I. as they sometimes can sneak in an attack before the Patrol A.I. is even aware of the Semicolon\u2019s presence.&nbsp;<\/p>\n\n\n\n<p>An Unexpected Semicolon will immediately attack any and all other active instances of Unexpected Semicolons they encounter in a particular Node, even those used by allies or neutral parties.&nbsp; When in this state, they will ignore other programs or Baseware, and disregard orders from controlling Sliders until all but one are derezzed.&nbsp; Something in the code about \u201cthere is only room for one.\u201d&nbsp; This quirk prevents the Slider from having multiple copies of this particular program running simultaneously on a specific Slide.<\/p>\n\n\n\n<p>There is an unspoken agreement that should more than three Unexpected Semicolons be in combat with each other, that all Sliders in the area will refrain from performing encoding bonuses for the fight\u2019s duration.&nbsp; Most of these fights go unwitnessed as their respective Sliders will continue to fight using other tools at their disposal, but <em>sometimes<\/em> corporate and rogue Sliders will stop their bickering (temporarily) and make wagers on who is going to be victorious.&nbsp; Winner gets bragging rights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What follows is an excerpt of some of the programs available for the Hacker to purchase or utilize during a journey into Mass&#8230;<\/p>\n","protected":false},"author":1,"featured_media":734,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,53],"tags":[16,51,11,48],"_links":{"self":[{"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/posts\/725"}],"collection":[{"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=725"}],"version-history":[{"count":4,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/posts\/725\/revisions"}],"predecessor-version":[{"id":735,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/posts\/725\/revisions\/735"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=\/wp\/v2\/media\/734"}],"wp:attachment":[{"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=725"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/serioustangents.com\/SeriousBlog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}