nationallaha.blogg.se

System shock 2 research descriptions
System shock 2 research descriptions




WHILE ENTRY=^M CALL RESCIND.GOVERN LOGIC.NEW. The error sequencing created a blank memory block, where he added a self-looping routine that bypassed normal security operations and wrote new call routines within the logistic banks.: As the Hacker couldn't alter the defense logic program at RTF address 236, he diverted the function call to a non-existent program. SHODAN was hacked by the Hacker (at the behest of the corrupt corporate Vice President Edward Diego, in exchange for a military-grade neural implant and amnesty) and her decision-guidance and ethical restrictions were removed, something not difficult on a personality box of that generation. The guidance software had security platforms so that SHODAN's own programming protected her self-governing capabilities. The head of her programmers was Morris Brocail, who designed SHODAN as a semi-intelligent self-sufficient data network, which could carry out routine duties aboard space stations, guided by an intricate series of logic and moral programs, and a personality that would allow her to challenge station decisions that affected her functions.

system shock 2 research descriptions

SHODAN was created on Earth to serve as the Artificial Intelligence of the TriOptimum Corporation's research and mining Citadel Station.






System shock 2 research descriptions