This is the physical link to the wired network. You can use this allow a ThinkDOS computer to act like a TermOS terminal, i.e. Bear in mind that the Research Mainframe is very occasionally on a physically separate network from the rest of the station. Send to transmit the packet through the computer's network card.Īllows you to ping and connect to other terminals in a manner similar to DWAINE.View to view your current packet in its entirety.Remove If you make a mistake, you can't simply overwrite a line, you need to delete it, then add it back.You need to have the right keys for other machines to understand what you're sending them. Add is the core to setting up your packets.Once you've started deciphering packets, you can begin to make your own using SigPal. quit will get you out of the program, but keep it running in the background.save will save the current signal as a file to your computer.auto will grab the first packet it receives, then stops monitoring traffic, ensuring the packet is not overwritten by subsequent network activity.on will display the last packet received.It can run as a program in the background while you mess with other things. The program only has a buffer for one signal at a time though, so you may need to check it frequently. SigCatcher will snag any packet that the computer can detect- either wired packets sent directly to that computer, or wireless packets when the wireless card is in mode free. The best way to find signals to decipher is with the program SigCatcher, available on the Network Tools disk. the Captain's spare ID), or commit other borderline Grief acts, you can be yelled at by an Admin or even banned from the game for a while, especially if you make a habit of doing it. AI Upload, Security in general, Armory specifically), steal vital job equipment (e.g. In addition, if you use packet-hacking to break into sensitive places (e.g. using packets to break into the Research Sector, then crew are well within their right to try to stop you, and Security is allowed to punish you for it. However, if you use packet-hacking to commit crime, e.g. It is not considered Grief in the same way, say, bombing something could be, and you do not need to be antagonist to use packets. Like mechanical hacking, packet-hacking is not in of itself a violation of the rules or a crime Security could persecute you for. 5.11 Robot patrol beacons (many frequencies).5.4 Wireless network adapters (114.9, variable).4.14 Area Power Controllers (PNET_PWR_CNTRL).4.11 Artlab test apparatus (PNET_TEST_APPT).4.8 GuardBuddy docking station (PNET_PR6_CHARG).4.3 Communications Dish (PNET_COM_ARRAY).3.6 Controlling a terminal with MechComp.3.2 Sending packets using the mainframe's radio.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |