Advertisement

by South Estovakia » Sat Jul 30, 2011 1:00 pm

by Shnercropolis » Sat Jul 30, 2011 1:37 pm
South Estovakia wrote:Could you give us an open source version so we can modify it to suit our needs?


by Shnercropolis » Sat Jul 30, 2011 2:15 pm
maximum encryption

by Shnercropolis » Tue Dec 27, 2011 9:07 pm

by Shnercropolis » Mon Jan 14, 2013 8:19 pm

by Resource Extraction Solutions Inc » Mon Jan 14, 2013 9:07 pm

by Shnercropolis » Mon Jan 14, 2013 9:54 pm
Resource Extraction Solutions Inc wrote:To: Bitstrong software LTD
From: Resource Extraction Solutions Incorporated
Due to the recent incident at one of our nuclear reactors that was caused by a single hacker. Due to the crippling meltdown caused by the hacker we are in need of a program, one the likes of witch the world has never seen before. It needs to be able to hack into any computer connected to the internet and intelligently gather information, preferable the program will learn allowing us to identify potential threats before they become a problem. We are willing to pay a large amount of money for such a program.

by Resource Extraction Solutions Inc » Mon Jan 14, 2013 9:57 pm
Shnercropolis wrote:Resource Extraction Solutions Inc wrote:To: Bitstrong software LTD
From: Resource Extraction Solutions Incorporated
Due to the recent incident at one of our nuclear reactors that was caused by a single hacker. Due to the crippling meltdown caused by the hacker we are in need of a program, one the likes of witch the world has never seen before. It needs to be able to hack into any computer connected to the internet and intelligently gather information, preferable the program will learn allowing us to identify potential threats before they become a problem. We are willing to pay a large amount of money for such a program.
Our programmers got together and made three action points:
1) create an IP tracker/DONE
2) create a brute force algorithm for creating new admin profiles on a variety of OSes, and monitors all activity
3) make a system that identifies new targets based on people and websites targets contact frequently
4) keep a long-term tracker that keeps logs of all targets and their activity
5) condense this all into a virus

by YellowApple » Mon Jan 14, 2013 10:52 pm

by Shnercropolis » Wed Feb 13, 2013 7:38 pm
Advertisement
Return to Global Economics and Trade
Users browsing this forum: The Perfect Utopian Society, Tyrantio Land
Advertisement