arcreact: (casually hacks the united states gov't)
Tony ❝ι've мade a нυge мιѕтaĸe❞ Stark ([personal profile] arcreact) wrote2016-05-28 08:10 pm
Entry tags:

( savrou ) ic contact


// outbox;
→ 10/27; tali'zorah
→ 10/21; marian hawke
→ 09/21; adrien arbuckal
→ 09/21; nathan drake
→ 08/15; marian hawke
→ 08/01; bruce banner
→ 07/11; elena fisher
→ 07/07; trish walker
→ 06/21; adrien arbuckal
→ 06/20; bruce banner
→ 06/20; bucky barnes
→ 06/19; elena fisher
→ 06/15; steve rogers
→ 06/08; bruce banner


text | video | audio

You know what to do.
alan_1: (really?)

[personal profile] alan_1 2016-06-14 02:47 pm (UTC)(link)
[He ignores it at first. With everything else going on at the moment, it isn’t like Alan doesn’t have bigger things to worry about than a blip of suspicious activity on the ship servers. However, it quickly becomes clear that these aren’t the fumblings of an amateur hacker. Probably not even those of a human judging by the simultaneous nature of the unexplained connections. A hacking program, then? A very subtle one judging by how it had attempted to cover its tracks, shuffling and relabeling log file entries to disguise its intrusions as normal network traffic. If Alan didn’t specialize in system security, he might not have noticed at all.

Being as that does happen to be his specialty, the first thing he does is trace the connections back to their source. The origin ends up being a single MID, newly registered, a fact that gives Alan pause. But something tells him this isn’t Clu’s doing. The sophistication of the hacking program reads “import,” not something that was created in the past few days, which means its creator is almost certainly someone accustomed to being on the user’s side of the screen.

That settled, his approach his more conversational than aggressive. A single, tantalizingly unguarded access point, which terminates in a plain, unencrypted text file.]


Looking for something?
alan_1: (fair enough)

[personal profile] alan_1 2016-06-15 02:40 am (UTC)(link)
[At first Alan thinks the hacker hasn’t gotten the message. There’s no attempt to change strategy, no new measures to hide their program’s tracks. But investigating further, the minute differences he finds are… interesting. Deliberate, even. Piecing together the pattern, that instinct proves correct. The evasive answer gets a slight smile out of Alan. Someone afraid he’ll bring the hammer down on them, then?

He chooses another access point this time. There are no firewalls in place or anything that could potentially detach their program from the system. Just a few layers of encryption to chew on. A low-stakes game. There’s another text file at the end of it.]


Someone interested in system security. Found any vulnerabilities I should know about?
alan_1: (you know who i am)

[personal profile] alan_1 2016-06-20 08:38 pm (UTC)(link)
[Another text file in the same location a few seconds later. They might as well be texting.]

Good to hear. [Alan can’t take much credit for the network’s security himself. The bulk of its defenses seem to have been put in place well before he ever set foot on the ship.] Can I at least know if I’m speaking with a program or a user? Need to know who I should compliment for the trick with the log file entries. [With the kind of AI Alan’s seen on this ship, it could honestly be either.]
alan_1: (is that so)

[personal profile] alan_1 2016-06-26 09:28 pm (UTC)(link)
That explains a lot. [Namely the very human style of expression filtered through a labyrinthine organization of clues embedded in the system files.] Are you two snooping for a reason? Or are you just getting a feel for the place?
alan_1: (really?)

[personal profile] alan_1 2016-07-02 07:31 am (UTC)(link)
[For all he’s supposed to be one of the stewards of the ship’s network and computer systems, Alan can’t say he’s exactly opposed to crewmembers learning what they can from what they might find nestled among the system’s files. He's just as interested to know what they might hide.]

I’d be interested to know what you find. So long as you look and don’t touch.

[And even then, it might be a good idea to put something in place to at least keep tabs on the mysterious intruder...]
alan_1: (fair enough)

[personal profile] alan_1 2016-07-08 03:09 am (UTC)(link)
If it’s not too much to ask.

You know how to get in touch.


[In the meantime, Alan will start working on something to let him know if the visitor oversteps his bounds.]