Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Chucks 1E Eclipse Phase Wiki
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Mesh
(section)
Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Hackers == Whether individuals who are genuinely interested in exploring new technologies and seeking ways to break them in order to make them better, hacktivists who utilize the mesh in order to undermine the power of authorities, or “black hats” who seek to circumvent network security for malicious or criminal intent, hackers are a permanent fixture of the mesh. Unauthorized network break-ins, infiltration of VPNs, muse subversion, cyberbrain hijacking, data theft, cyber-extortion, identity fraud, denial of service attacks, electronic warfare, spime hijacking, entoptic vandalism—these are all common occurrences on the mesh. Thanks to smart and adaptive exploit programs and assisting muses, even a moderately skilled hacker can be a threat. In order to counter hacking attempts, most people, devices, and networks are protected by a mix of access control routines, automated software intrusion prevention systems, encryption, and layered firewalls, typically overseen by the user’s muse who plays the role of active defender. Extremely sensitive systems—such as space traffic control, life support, power systems, and hypercorporate research facilities—are usually limited to isolated, tightly-controlled, heavily-monitored, hard-wired networks to minimize the risk of intrusion from snoopers and saboteurs. Various countermeasures may be applied against such intruders, ranging from locking them out of the system to tracking them back and counterhacking.
Summary:
Please note that all contributions to Chucks 1E Eclipse Phase Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Chucks 1E Eclipse Phase Wiki:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width