The Hacker Project - a free online game

April 17, 2024, 07:09:12 PM
Welcome, Guest. Please login or register.

Login with username, password and session length











"Hackers come and go, but a great hack is forever."
Pages: [1]
Print
Author Topic: new software types  (Read 1795 times)
N3hpy50X3
Full Member
***
Posts: 118


Deal With It. Don't Get


View Profile
« on: October 04, 2012, 02:21:46 PM »

FILE COMPRESSOR/DECOMPRESSOR
compressed files would be unusable and, if a player has a compressor of a high enough version, they can use their Password Protect in the compression process...then to uncompress the file, a player would be required to break it's password first (so it would be a [Password Protected] files untile broken, and then it would change to a [Compressed] file)
*higher version, will not compress by a greater percentage...you can only compress a file if the compressor is of the same or greater version
*there could be multiple types (one released by each faction) or maybe it would depend on which faction you where with and how much AbP you put towards the ability to depend on how much perctentages it will compresses by (say a maximum percentage of compression by 25%-50%)
OR
maybe Password Protected files could be a new feature in itself...

PASSWORD PROTECTED FILES
this already exists, it would just be expanding the capabilities/functionality of Password Protect

TRACKABLE SOFTWARE VIRUS (backdoor/trojan/andidunnowhatimtalkingaboutherelol)
so that if somebody steals it from you, then when they run it, you will get an email sent from the tracker embedded/encoded into the running software
*this would mean that we would need email functionality...say if the software was made trackable on a server, and you are using email-hosting software (another suggestion in itself) on said server, then the email would be sent to that server saying what IP it's transmitting from
and also gets an Anti-Virus version aswell so to make it untrackable (but only if version higher enough)

HIDDEN PROCESSES AND HIDDEN PROPERTIES
so same as the Password Protected Files one, it already exists in the form of Hide Files (just expanding it)
"Hide Process"
- would simply hide the process...maybe just by 0.2 or something (just like the cap on files is 0.2 above it's own level)
"Hide Properties"
- would hide *all* tags like:
[public]
[Virii]
[Installed]
[AV]
[Compressed]
[Password Protected]
[Tracked]
you could also use it to hide process properties (not just file properties)...possibly even the time to complete (useful for missions)
[localhost]
[xxx.xxx.xxx.xxx]
[virii]
*of course the Unhide Files should be made to reveal all hidden
*but now I'm thinking it should be that if a process is being hidden then there should be a hiding process running in it's place, or something...
*and if hiding a property, it will be replaced with [property hidden]? no I'm not sure about this one...

LOG DETECTION
when used, it will show a list of logs on selected server chosen (IP must have admin access) and will say if it was modified/deleted or not...would also say if it is new player protected (but only if it was changed)
higher version = higher number of logs detected (in order from newest to oldest)
...so 0.1 will show the first log, 0.2 will show the first two logs...or maybe with every "whole number" version it will detect a page of logs - so 1.0 will show page 1 and 2.0 will show 2nd page
OR it could be that higher version will detect in order of time...
*any logs that show up as to be modified, then they will be given the "log id" for them logs

DOWNLOAD PROCESS DISRUPTOR
doesn't kill the downloading process
gives chance (version dependant) to change the download process' bandwidth (thereby giving them a chance to beabel to get to use some of the bandwidth freed up by this)
there should be a maximum amount of times a Download Process Disruptor can be used on aech downloads process

encryptin keys so that you can crackit
« Last Edit: October 17, 2012, 02:21:47 AM by N3hpy50X3 » Logged

.,..,....,,....,.,,...,,.,,.,.,,.,,.,..,.,,.,,,..,,..,,,..,......,,.,..,.,,,..,,..,......,,....,..,......,,.,,.,.,,..,.,.,,.,,,..,,,.,...,,....,.,,.,,....,......,,..,,,.,,....,.,,.,,.,.,,..,.,.,.,,,.
Pages: [1]
Print
Jump to: