This is a read-only snapshot of the ComputerCraft forums, taken in April 2020.
Jmn610's profile picture

Server Cyber War

Started by Jmn610, 21 January 2013 - 07:19 PM
Jmn610 #1
Posted 21 January 2013 - 08:19 PM
Hello, im new to the fourms but i joined to ask a very dire question, is there a way to protect my Super Bunker from a turtle attack? I currently am a member of a Tekkit server and have build a super bunker due to recent hostilitys with a neabye nation, i now know they are deep into research with Computer warefare and i need to know how to prevent it. They have developed a program called Carlos from what i can tell and i want to be at the ready to from the comfort of my super bunker be able to take down there entire computer network. Also i want to send a spyware into there system so i can collect all of the data they are creating so i may ajust the funciton of my virus. Secondly my current setup for my Bunker is 2 Invisible Zapper forcefields, 1 layer of obsidian and 1 layer of reinforced stone, now i know turtles can get through all my defences so i want a way to sent a malicious code into any turtle that comes within a radius of my base that will cause it to stop and die instantly. I have as many resources as i need to get and i want to make shure my bunker can never be penitrated. Can someone please give me some advice or even a program and insructions on how to make all this reality? Also if you can please explane how i can paste programs into the computer on a multiplayer server. Thank you :D/>.
grand_mind1 #2
Posted 21 January 2013 - 09:00 PM
I don't think computercraft was really designed for this sort of thing. As far as I'm aware, you would already need to know some of the code from the turtles. If you know what messages they are responding to then you could just send them those messages at the wrong time, causing the to mess up what they were doing. Although you said that they knew a lot about computercraft then they could tell their computers only to respond to their own central computer.

You could also just build your bunker out of personal safes, seeing as turtles can't break them. Lol
jewelshisen #3
Posted 21 January 2013 - 09:34 PM
Turtles can't tunnel through the MFFS barriers and so long as you have them set to only allow you to teleport through them then you are safe. If you really want defence though, go for the EMP tower from the ICBM mod. Knocks out all electronics.
ChunLing #4
Posted 21 January 2013 - 10:48 PM
You can also create turtle traps, a computer programmed to send an os.shutdown command to any turtle that comes in contact with it. You use something like:
while true do
    _,side = os.pullEvent("peripheral")
    if peripheral.getType(side) == "turtle" then
        peripheral.call(side,"shutdown")
        rednet.send(1,"Got one!")
    end
end
This is kinda expensive for defending a large area from turtles, but it is pretty good for collecting a few enemy turtles and finding out how they're programmed.
Jmn610 #5
Posted 22 January 2013 - 06:00 AM
Well thank you all for responding but the thing is they are VERY early in any programs and i want to have a virus program that i can send to their network to first send me information and then if need be wipe out everything on it with a single command. Also is there a way i can turn that computer program into like a field of computers using wireless servers to send it to the turtles insted of having a wall of them? Also please specify how i can set my forcefield to stop anything but me from comming through, keep in mind im in tekkit and not voltz cause that sounds like that is what you are talking about.
ChunLing #6
Posted 22 January 2013 - 07:56 AM
You can't really turn off a turtle remotely (absent something like an EMP burst from another mod) unless it is programmed to be turned off remotely by a computer ID that you own. The peripheral method only works when the turtle moves next to the computer.
Jmn610 #7
Posted 22 January 2013 - 10:51 AM
So today i finaly found my way into their base and found that they litteraly only have one computer, due to lokket i cannot get into it but i was wondering if someone could program a virus that could be transmited over rednet to any wirelsss device that would then work its way into the programming and delete all the files?
Leo Verto #8
Posted 22 January 2013 - 10:58 AM
ComputerCraft is about doing it yourself! And if they only have one computer and you'Ve got a quite secure bunker, I wouldn't care about offensive attacks and instead set up computers to keep listening for rednet messages and write them to a file so you can find out which commands they use to control their turtles.
grand_mind1 #9
Posted 22 January 2013 - 12:04 PM
ComputerCraft is about doing it yourself! And if they only have one computer and you'Ve got a quite secure bunker, I wouldn't care about offensive attacks and instead set up computers to keep listening for rednet messages and write them to a file so you can find out which commands they use to control their turtles.
Well if they are using rednet.send there isn't gonna be much to listen to.
theoriginalbit #10
Posted 22 January 2013 - 12:26 PM
Well if they are using rednet.send there isn't gonna be much to listen to.
Unless they are using rednet.send( "Do this!" ) … since its essentially a broadcast…

Also the idea of capturing a turtle is a good one… you could make a script so that if they do use rednet.send your script tells you the exact message that was sent, maybe even append it to a file…
grand_mind1 #11
Posted 22 January 2013 - 01:00 PM
Well if they are using rednet.send there isn't gonna be much to listen to.
Unless they are using rednet.send( "Do this!" ) … since its essentially a broadcast…

Also the idea of capturing a turtle is a good one… you could make a script so that if they do use rednet.send your script tells you the exact message that was sent, maybe even append it to a file…
I was under the impression that when using rednet.send(computer to send to, "Do this!") it would only send the message to that computer.
Jmn610 #12
Posted 22 January 2013 - 01:10 PM
Ok so i discovered to day that the server actualy nerfs turtles so they cannot destroy blocks, but i still would like to know how to use this virus some guy sent me that loops the reboot sequence and make it wireless so i can transmit it to them to wipe out their computer banks since they would have to destroy it. Also can you explane more how to use the rednet program and how to track it use through the entire server?
ChunLing #13
Posted 22 January 2013 - 01:32 PM
You cannot, in any way, control a computer or turtle remotely over rednet unless the computer/turtle is already programmed to allow this. If they are using rednet to send code updates to their one computer, and haven't programmed that computer to reject messages from unauthorized IDs, then you're in luck. But otherwise, there is zero chance of reprogramming the computer by rednet.
theoriginalbit #14
Posted 22 January 2013 - 02:10 PM
I was under the impression that when using rednet.send(computer to send to, "Do this!") it would only send the message to that computer.
Read the Description on rednet.send ( http://computercraft.info/wiki/Rednet_(API) )
Jmn610 #15
Posted 22 January 2013 - 02:19 PM
So your basicaly saying that if i sent a rednet message with a malicious code that would **** up the computer for good that it would not work at all? and if so is there an alternative message and again how would i find a program that i could insert into their computer that would send me any data or commands put into it? Also i see that there is a broadcast command would this send the message to any computer with a modem so i could spy on any computer activitys? Also using broadcast could i find the IDs, location and existance of any other computers in range?
Jmn610 #16
Posted 22 January 2013 - 03:57 PM
Ok i have run into another problem my "peer" on the server claims to have perfected the "perfect virus" i am likely able to reaquire the copy of his virus but if so how would i be able to read the disk and use the program to my own benifit?
NeverCast #17
Posted 22 January 2013 - 05:40 PM
I realize that the server has now nerfed turtles attacking, but in future, what I would have done is surrounded my bunker in RP block breakers, they are easy to make in bulk, and pulsing them with a 200ms interval will mean that the turtle wont be able to move in to position, and then break block in time before the breaker grabs it.

That's how I'd defend my base anyway :)/>
theoriginalbit #18
Posted 22 January 2013 - 05:42 PM
200ms interval
0.4 seconds is the time for a block to move… so reduce strain/lag on the server by increasing the tick rate…
Jmn610 #19
Posted 22 January 2013 - 05:46 PM
First of all the server dosent allow timers below 1 sec and also can we get back to answering my questions?
theoriginalbit #20
Posted 22 January 2013 - 05:49 PM
can we get back to answering my questions?
Firstly, I would, if it made sense and secondly wasn't the case.
Secondly, the moderators normally don't like it when people are asking for help with malicious scripts.
D3matt #21
Posted 22 January 2013 - 05:56 PM
Your question has been answered. There is absolutely no way you can send a virus by rednet unless they're doing something extremely stupid with their computer. This isn't Windows 95.

As for the 1-second timer thing, use multiple timers. Come on, be creative and use your brain, just a little tiny bit. It won't hurt. I promise.
theoriginalbit #22
Posted 22 January 2013 - 05:59 PM
As for the 1-second timer thing, use multiple timers.
Or 2 rows of breakers so that it gets it either way.
NeverCast #23
Posted 22 January 2013 - 06:02 PM
I never said 1 second timer, I said 200ms. Though using a computer you could probably get that down to 50ms.

And two rows shouldn't be needed, but you could use it if you wish. Though how do you stop one breaker breaking the other xD
theoriginalbit #24
Posted 22 January 2013 - 06:06 PM
I never said 1 second timer, I said 200ms. Though using a computer you could probably get that down to 50ms.

And two rows shouldn't be needed, but you could use it if you wish. Though how do you stop one breaker breaking the other xD
And having breakers around your base would cause lag… also the move time of a block is also relevant for the speed of all Eloraams blocks… the breaker wouldn't function fast with any less than 400ms….

Ummm… don't face them into each other?! o.O
NeverCast #25
Posted 22 January 2013 - 06:32 PM
Breakers would cause lag yes, and I believe you are indeed right. They don't function if you pulse then faster than 200ms high/low ( 400ms per cycle )

But I would not mind the lag if it meant my base was secure from hungry hungry turtles!
ChunLing #26
Posted 22 January 2013 - 07:46 PM
Computers using peripheral methods are less expensive and laggy than breakers for an absolute turtle defense. Because they can turn off a turtle on any side, each blocks five blocks, so the wall doesn't have to be solid.

Also, they can easily be set to notify a central computer of any turtles captured. That means that you actually know what the heck is going on.
Edited on 22 January 2013 - 06:47 PM
theoriginalbit #27
Posted 22 January 2013 - 07:56 PM
Computers using peripheral methods are less expensive and laggy than breakers for an absolute turtle defense. Because they can turn off a turtle on any side, each blocks five blocks, so the wall doesn't have to be solid.

Also, they can easily be set to notify a central computer of any turtles captured. That means that you actually know what the heck is going on.
AND if a label isn't set with the breaker you loose the programs… with the computers, data is preserved… ;)/>
NeverCast #28
Posted 22 January 2013 - 08:25 PM
That is true!

I never said my idea was the best ( i don't think ), Just offered one :D/>
But capturing the turtle by shutting it down would give you the opportunity to interrogate it for answers and secrets!
Leo Verto #29
Posted 23 January 2013 - 05:19 AM
Ok i have run into another problem my "peer" on the server claims to have perfected the "perfect virus" i am likely able to reaquire the copy of his virus but if so how would i be able to read the disk and use the program to my own benifit?
If they've got a "perfect" virus (which is impossible) I suggest not trying to steal programs from them or you may risk infecting your system.
Also you seem to be technologically more advanced then them and so I see no point in stealing their programs or deleting all their files. You should learn how to use computers yourself.
ChunLing #30
Posted 23 January 2013 - 07:58 AM
Just use a startup disk to override the programming of the captured device and copy all it's programs. Then put the disk next to an isolated terminal (should already be running a clean environment) and look at the files at your leisure to figure out how they do anything they do, and how to avoid/exploit their tricks.
Jmn610 #31
Posted 23 January 2013 - 02:51 PM
You all still did not answer my question, can i (in 1.2.5 since that is what tekkit runs) send a rednet.broadcast like a radar and have it return to me the ID and location of any computer it can pick up? Also how would i make a startup disk to over ride the virus? Thirdly i am only looking into malicious programs for in the event of a war or self defence i have no other use for it anyways, other than keeping it away from people who would use it for evil.
ChunLing #32
Posted 23 January 2013 - 04:49 PM
You can only get the ID and distance, and only from computers that respond to your message (which will only be those that are programmed to respond to a message from an unauthorized ID, unless you physically access an enemy network computer).

Simply have the startup program print a message confirming that the /disk/startup was used rather than any existing startup, it doesn't really need to do anything else as long as the virus isn't built into the server rom (and if the server admins are permitting stuff like that, then you should just ask them to give you the files of the enemy computers).

A virus cannot run if nothing calls it. Everything about virus design comes down to getting someone to permit the virus to run in some way. In CC, users have a lot of control over what gets run. So all you have to do is not run the virus files, but edit them instead so you can see their code.

Also, stop saying that nobody has answered your question. Every question you've asked has been answered repeatedly, even if you do not like the answers. Obviously there are questions you have not asked, and not all of these have been answered. But you're just going to irritate people if you insist on sounding like you're complaining about them no answering questions you haven't asked.
Edited on 23 January 2013 - 03:51 PM
Jmn610 #33
Posted 23 January 2013 - 07:33 PM
So your basicaly saying that if i sent a rednet message with a malicious code that would **** up the computer for good that it would not work at all? and if so is there an alternative message and again how would i find a program that i could insert into their computer that would send me any data or commands put into it? Also i see that there is a broadcast command would this send the message to any computer with a modem so i could spy on any computer activitys? Also using broadcast could i find the IDs, location and existance of any other computers in range?
No one replys to the last question in any post and you all go on about laggy block breakers until the post where you complain about it.
You can only get the ID and distance, and only from computers that respond to your message (which will only be those that are programmed to respond to a message from an unauthorized ID, unless you physically access an enemy network computer).

Simply have the startup program print a message confirming that the /disk/startup was used rather than any existing startup, it doesn't really need to do anything else as long as the virus isn't built into the server rom (and if the server admins are permitting stuff like that, then you should just ask them to give you the files of the enemy computers).

A virus cannot run if nothing calls it. Everything about virus design comes down to getting someone to permit the virus to run in some way. In CC, users have a lot of control over what gets run. So all you have to do is not run the virus files, but edit them instead so you can see their code.

Also, stop saying that nobody has answered your question. Every question you've asked has been answered repeatedly, even if you do not like the answers. Obviously there are questions you have not asked, and not all of these have been answered. But you're just going to irritate people if you insist on sounding like you're complaining about them no answering questions you haven't asked.
Want to say that again?
ChunLing #34
Posted 23 January 2013 - 10:24 PM
Not particularly. I'm not the one that has to deal with the consequences if you manage to alienate people on the forum.
3ydney #35
Posted 24 January 2013 - 01:05 AM
I have a great idea for this… Check out this link! http://tinyurl.com/9stdeh7
ChunLing #36
Posted 24 January 2013 - 09:02 AM
True. But this discussion generally has centered on general principles of defense against malicious scripts/turtles, not actual malicious code. Of course, understanding how to protect yourself against malicious scripts involves knowing how you would go about making a malicious script…which is just a script that the user thinks ought to be allowed to run but is designed to do something very different from what the user thinks it will do.
Jmn610 #37
Posted 24 January 2013 - 12:59 PM
Well i have looked into their base again and this time they seem to have made more computers and they have modems on them, i know they are not very good at what they are doing so do i have to wait until they do a broadcast command or something to pick up on them and get their ID or is there a way i can use an unlocked disk drive they have there to get me the ID number somehow? Also i dont mean to alienate anyone i simply was showing that i had a logical argument.
NeverCast #38
Posted 24 January 2013 - 01:08 PM
I believe you can get the id of a computer that a computer is next to by wrapping it as a peripheral and using getID()

If you could sneak a turtle in there to wrap the computers and use getID(), You could have it send the id to your base.
Reason I'd suggest rednetting the answers is because they might capture the turtle, don't want that do we :P/>
ChunLing #39
Posted 24 January 2013 - 08:18 PM
If you're able to get into their base so easily, why not just shutdown a computer, place a drive, and then use a startup disk that copies everything in there? Grab copies of everything and go.

Unless they've set up a fake base to trick you into trying just that, and when you shut anything off you get a nice hot lava bath. Which is a possibility.
UP844 #40
Posted 26 January 2013 - 01:52 PM
If you really want to attack them still you could send a turtle over to their disk drive and have it put a virus onto it that way, or at least if they have one. I can't remember how without manually doing it, but I'm pretty sure theres a way.