Cyber-warfare in CC is by far possible. It involves the use of servers, turtles and networking to disrupt or damage the enemy. This will be a brief guide of what I have discovered as Cyber-warfare inside of CC.
Glossary:
Networking:
Server - A computer that runs software that broadcasts messages or data.
Server Sync - When a server syncs, it sends out it's next wave of data.
Server Sync Rate - The rate of which every server syncs. A typical rate is 10.
Attacking Computer - The computer of which controls the attacks, and may launch attacks.
Sponge Computer - The computer that absorbs all data, useful for spying.
Manager Computer - The computer of which the hacker uses to manipulate the others.
Hack-Line or Hack-Buss - The bundled cable of which the manager computer controls the others from.
Tools:
Boot-Disk - A boot disk contains a blank, clean copy of your computer.
Xeno - A xeno, or xeno-program is a program of which is hostile to a computer. Not quite a virus as they do not always reproduce, more like simple mal-ware.
Hell-Wall - A large wall of wireless mining turtles all activated at the same time and they demolish any terrain that they come across. A method of physical destruction by way of computer.
Master Remote - A cannon managing computer.
ID Spoofer - An extra computer, typically manipulated by bundled cable that does the work, so that then the hacker isn't caught on their normal computer. The computer used to spoof an ID is typically destroyed after the operation.
Defenses:
Anti-Virus - A program filter that searches for malicious code.
Selective Networking - Filtering out which messages are accepted by way of ID.
Grid Tracking - Using a large grid of sponge computers to get an approximate location of a server.
Examples:
Example A >> The enemy communicated over RedNet. You use a spam-bot to take out their network.
Example B >> The enemy negotiates or trades, and you ID Spoof and promise to sell them lots of fake product for cheap, then when they arrive to pick it up you attack them.
Example C >> The enemy has a hidden server somewhere and it's interrupting you. You grid-track to find them.
Example D >> The enemy is not using much technology, so you set up a hell wall and send it after them.
Example E >> You make a filter for your trade or communication networks that filters out all known enemy IDs.
Example F >> You use a master remote to control your cannons, so that then you have immediate control of them.
Example G >> You set turtles out to dig massive tunnels through their obsidian lined walls to let your army through.
Example H >> You sponge on their network and get vital data.
Technique:
1. Spam - Sending repetitive data.
2. Sponge - Retrieving and storing data.
3. Grid Tracking - Using a grid of computer to track a particular server.
4. Hell-Walling - Using a large wall of wireless mining turtles to demolish terrain.
5. ID Spoofing - Using and disposing of another computer to keep your ID hidden.
6. Server Hosting - Using server software to host a server.
7. Xeno - A foreign, malicious piece of software. Sending a fake program that is actually a xeno is an example of attack.
Recommended Tools:
1. CoreNet - A good networking tool.
2. Custom server software, or if you're just doing broadcasts use CoreNet.
3. RedWord for word processing for creation of the programs.
4. Tomasss' StringUtilAPI for encryption/decryption.
Any ideas of what else I should put on here? Please comment :unsure:/>/>.
- Sledger721/SirDerpsAlot.