Return to Unfiction unforum
 a.r.g.b.b 
 Calendar Calendar   FAQ FAQ   Search Search   Memberlist Memberlist   Usergroups Usergroups 
 Register Register   Log in Log in 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
This week sponsored by:

You?

Why do we need your help?
Announcements
What is an ARG?
Read imbri's Quickstart Guide
 
The time now is Wed Mar 29, 2017 11:16 am
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): General/Updates
[LOCKED] [SPEC] Analyzing the Computer Text
Post new topic   This topic is locked: you cannot edit posts or make replies. View previous topicMark the topic unreadView next topic
Page 1 of 5 [64 Posts]   Goto page: 1, 2, 3, 4, 5 Next
Author Message
Orikaeshigitae
Boot


Joined: 10 Jul 2004
Posts: 23
Location: In a place with no boundaries anyone can find

[SPEC] Analyzing the Computer Text

Looking at the computer snippets, I realized that it's some sort of console log. Thinking, "Perhaps we should be trying to put it together?", I made this thread.

Basically thinking out loud.

I think that
Quote:
HALT - MODULE CORE HEMORRHAGE

Control has been yielded to the
SYSTEM PERIL DISTRIBUTED REFLEX.

This medium is classified, and has a
STRONG INTRUSIVE INCLINATION.

In 11 days, network throttling will erode.

In 25 days this medium will metastasize.

COUNTDOWN TO WIDE AWAKE AND PHYSICAL:
38:13:32:25:505

Make your decisions accordingly.
should be the header, as the rest of the snippets are most likely actions taken by the distributed reflex (which I think is sort of a backup failsafe) in order to get the medium back up an running.

Perhaps the MAYDAY persona is the main consciousness, fading in and out whilst the Reflex repairs necessary systems?

PostPosted: Mon Jul 19, 2004 11:37 am
Last edited by Orikaeshigitae on Mon Jul 19, 2004 11:59 am; edited 1 time in total
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Orikaeshigitae
Boot


Joined: 10 Jul 2004
Posts: 23
Location: In a place with no boundaries anyone can find

Original text bolded
Analysis of the header:

HALT - MODULE CORE HEMORRAGE - memory leak? Somehow, data is being lost, causing the system to shut down.

Control has been yielded to the
SYSTEM PERIL DISTRIBUTED REFLEX.
- Control of main systems transferred to repair subsystem?

This medium is classified, and has a
STRONG INTRUSIVE INCLINATION.
- The medium (strange choice of words; a medium is usually the materials used to do something.. the internet?) is classified, and displays a strong tendency to invade other things.. probably servers/systems, since Dana's website has exploded.

In 11 days, network throttling will erode.
In 25 days this medium will metastasize.
- Question Network throttling? Metastasize means "to spread elsewhere in the body". Maybe the Reflex is degrading the website gradually, and in 25 days will be forced to move elsewhere.

COUNTDOWN TO WIDE AWAKE AND PHYSICAL:
38:13:32:25:505
- Begins to get a little confusing. This is no longer overtly referring to computer systems, but rather biological.. alertness?. Perhaps the MAYDAY persona will get all the sand out of her head at this point. OR.. Maybe the Reflex is some sort of nanotech healing array, restoring a crewmember (MAYDAY) after the shipwreck?

Make your decisions accordingly. - Perhaps a message to the Reflex? "This is what happened and what will happen soon, fix it according to the information"?

PostPosted: Mon Jul 19, 2004 11:51 am
Last edited by Orikaeshigitae on Mon Jul 19, 2004 12:01 pm; edited 2 times in total
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Orikaeshigitae
Boot


Joined: 10 Jul 2004
Posts: 23
Location: In a place with no boundaries anyone can find

Next in line is most likely
Quote:
system peril distributed reflex

!restore master-sector
recurse


This is probably the Reflex starting up, and telling the main system to restore the master sector, and keep trying.

After this is
Quote:

!system
peril
!init host
fail
!bkp init primary sector sec proc
fail
!bkp init primary sector
fail
!bkp init master-sector
fail
!bkp init master-sector cmd proc
empty


The Reflex queries the status of the system, tries to boot up the main system, and restore from backup. It doesn't work, probably because the master-sector processes are empty (e.g. not working.)

Quote:

!deploy
network
grope
surgical

The Reflex activates tools it will use to reconstruct the master sector, and get the system out of peril. These are the net:, grope:, and surg: headings we see in the rest of the log.

Quote:
net:
!attach
act | drop

surg:
!triage master-sector
broken

The master sector is triaged. It is, as feared, broken.


Quote:

!probe master sector
fail

surg:
!invntry primary sector proc
proc invntry 343
working 0
dmg 38
dmg unk 2
broken 102
abs 201
!invntry primary sector mem
mem invntry 678223072849
clear 0.0007
dmg 0.0014
frgm 1.41
abs 98.5879


The master sector is probed with a 'fail' result; likely means that it is crashed/hung/broken.

Next, the procedures on the master sector are inventoried; of 343 total, 0 are working. 38 are damaged, 2 are damaged in an unknown way, 102 are broken, and 201 are absent.

The primary sector memory is inventoried. Of 678223072849, 0.0007% of it is clear and working, 0.0014% is damaged, 1.41% is frgm (fragmented, thanks Sapagoo), and 98.5879% of it is completely gone.

Things are not looking good.

Quote:
net:
!attach
act | store recurse

surg:
!reconst master-sector
mem broken>>dmg recurse
!reconst master-sector
proc frgm>>dmg recurse

The Reflex tries to reconstruct the master sector. It fails, because the memory is broken. It retries it, but a fragmented process prevents the procedure.

Quote:

net:
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop
!attach
act | drop

grope:
!probe primary sector
sec proc 1
!probe primary sector
sec proc 2
!probe primary sector
sec proc 3
!probe primary sector
sec proc 4
!probe primary sector
fail

surg:
!triage sec proc 1
fail
!triage sec proc 2
fail
!triage sec proc 3
fail
!triage sec proc 4
dmg unk


I wonder what the string of "act|drop"s mean. They're spread out throughout the log. Perhaps it's like '(a)bort, (r)etry, (f)ail'? It seems likely, considering there is one for every command.


At any rate, the Reflex probes the primary sector. It gets back secondary processes 1 through 4, which it then triages.. It turns out that secondary process 4 has been damaged through some unknown means.

Quote:

net:
!attach
act | drop

grope:
!hndshk sec proc 4
fail msg: unk proc

The Reflex tries to handshake (attempt communication with) secondary process four, which fails, because the process is unknown.

Quote:
net:
!attach
act | drop
!attach
act | drop

surg:
!kill sec proc 4
kill confidence 100
!diag primary sector
clear

Having established that the process is unknown (read: foreign), the reflex kills it. This clears the primary sector.

Quote:

grope:
!probe master-sector
fail
!probe master-sector cmd proc
empty
!analyze magnetic
& si !extend
!spdr extend
si > magnetic
!probe master-sector cmd proc
master-sector

Having cleared up the problem, the Reflex probes the master sector again. It fails again, because there are no processes running/no command process running(unclear). Through diagnosis, the Reflex discovers that there is some problem with the master sector's magnetism. It fixes it (somehow, "!extend"?), and now the master sector responds.

PostPosted: Mon Jul 19, 2004 11:56 am
Last edited by Orikaeshigitae on Mon Jul 19, 2004 1:40 pm; edited 4 times in total
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
bgardner
Kl00

Joined: 17 Apr 2003
Posts: 42

Quote:
I wonder what the string of "act|drop"s mean. They're spread out throughout the log. Perhaps it's like '(a)bort, (r)etry, (f)ail'? It seems likely, considering there is one for every command.


It looks to me like the "net:" function is some type of networking function. The command run in "net:" is "attach". It sounds like the system is trying to contact some external resource (another computer system) and failing. In modem terminology, a lost connection also called a dropped connection. So "act" means try to activate the connection and "drop" means it can't connect.

On an unrelated note, 678223072849 bytes (assuming we're talking bytes) of storage translates into a hard drive size of 631.6 GB.

PostPosted: Mon Jul 19, 2004 1:12 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
alaranth
Decorated


Joined: 12 Apr 2004
Posts: 151
Location: Rochester, NY / Albany, NY

Just some random thoughts that I was spitting out in the channel today. Smile

In the first section posted on the wiki, where it seems like it's attaching to a network (or host), it's attaching net, grope, and sur. Proc for procedures (and proc is a real, unix command), and it later uses those particular procedures (only sur is used as surg later).

If it needs to go out on the network to get its commands, applications, or whatnot, it's not powerful(?) enough to do it itself. Kind of like a dummy terminal, it can't survive on its own.

Quote:
net:
!attach
act | drop
!attach
act | drop
!attach
act | drop
!route
proc attach proc net
!route
proc attach proc grope
!route
proc attach proc sur

In this snippet, it's going out on the network to attach the 3 procedures net, grope, and sur.

text: -- the procedure it's calling
!text -- the command it uses.
then the text that immediately follows is the reponse it gets

Quote:
net:
!attach
act | drop
!attach
act | drop
grope:
!probe host
crypt weak
!decrypt host
decrypt confidence 100

It seems to start out with following standard network reconnaissance. First it connects, then it probes to see what's out there. But then it moves beyond recon into intrusion and takes what measures it needs to get through (hence the probe to check for encryption, then it runs a decrypt command).

The spec that it can't attach to the desired host/network makes sense too. If it could get out, it'd probably do more advanced recon or intrusion work. However, since it's having problems, it does a system scan of itself and discovers problems (triage fails, probes fails).

Ponder, ponder.

PostPosted: Mon Jul 19, 2004 3:54 pm
 View user's profile Send private message AIM Address Yahoo Messenger
 ICQ Number 
 Mark this and the following posts unread Back to top 
Ponder
Guest


alaranth wrote:

If it needs to go out on the network to get its commands, applications, or whatnot, it's not powerful(?) enough to do it itself. Kind of like a dummy terminal, it can't survive on its own.
Ponder, ponder.


That sounds like this, especially the next to last paragraph. Would also explain why the bee people can't find it. It's tiny. Maybe someone should tell them to look for it.[/url]

PostPosted: Mon Jul 19, 2004 4:21 pm
 Mark this and the following posts unread Back to top 
Yliandra
Veteran


Joined: 19 May 2004
Posts: 114
Location: Quad Cities, IL, USA

After talking in chat last night, I double checked on the on/off section of the text. catherwood and novus determined the width was fixed, so the layout does provide three unique numbers when you make the on/off binary and convert it to decimal.

101010-42
1010101-85
01010-10

I don't know if it'll end up being anything, but I wanted to throw that out there.
_________________
Jordan Levin will be tarred and feathered, and The WB will be smote. I don't know exactly how something gets smote, but if there is a higher power then they have to smote them, A LOT!!!

PostPosted: Mon Jul 19, 2004 7:02 pm
 View user's profile Send private message AIM Address Yahoo Messenger
 ICQ Number 
 Mark this and the following posts unread Back to top 
RobMagus
Unfettered


Joined: 17 Jul 2004
Posts: 469
Location: Vancouver, BC

42! The answer of life, the universe, and everything! I must mean something!

Laughing

PostPosted: Mon Jul 19, 2004 7:06 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Nightmare Tony
Entrenched

Joined: 07 Jun 2004
Posts: 824
Location: Meadowbrook

Of course, do you know the REAL meaning of 42? what was going through the devious mind? from a friend hwo interviewed Adams for a magazine oh so many years ago, its quite ismple.

Count the spots on a pair of dice...
_________________
For this is the place where dreams and nightmares are birthed and bred
Nightmare Park


PostPosted: Tue Jul 20, 2004 1:13 am
 View user's profile Send private message Visit poster's website AIM Address
 Mark this and the following posts unread Back to top 
sapagoo
Charter Member


Joined: 25 Sep 2002
Posts: 1213
Location: Atlanta, GA

Chat room discussions

#beekeepers analyzed the computer snippet

Code:
net:
!attach
act | store recurse
!capture
chatter protocol ancestor packet
!analyze
time 2004,6,29,8,25,0
!put
time 2004,7,24,6,7,0
!put
warn


(see near the bottom of http://bees.netninja.com/wiki/index.php?title=Computer_Text )

We already knew that 2004,7,24,6,7,0 was in the source code on http://www.ilovebees.com for the counter.
Code:
<SCRIPT LANGUAGE="Javascript1.2">
 var chinatime = new Date(2004,7,24,6,7,0);
</SCRIPT>

We knew the counter had 33 days left (until August 24th).

We realized that 2004,7,24 was not July 24th, but August 24th, because Javascript has a zero-based "Month", but a 1 based "day".
So January = 0, February = 1, and August=7. January 1st has month=0,day=1.

We then tried to determine what was occurring in 8 days (2004,6,29), at which point we remembered/realized that Dana was leaving for China soon, and from her Delinquent blog entry on July 14th, she said she was leaving on the 29th (of July). http://ilovebees.blogspot.com/2004/07/delinquent.html
Quote:
Best case scenario: the delinquent site gets fixed before the 29th, when I'm flying to Beijing. There's no way I'm just going to bail and leave Aunt Margaret to deal with this until who knows when


So, the spec is that the computer snippet is where the virus changed Dana's china counter from the 29th of July (8:25am fyi) to the 24th of August (6:07am). QED[/code]

PostPosted: Wed Jul 21, 2004 12:38 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
fireball
Charter Member


Joined: 25 Sep 2002
Posts: 205
Location: living in a box under the stairs in the corner of the basement of the house half a block down the st

Cool. Any spec on what time zone that would be? Pacific (Dana & Margaret are in California), or Beijing (GMT +8 ) since it says "chinatime"?
_________________
And all through the night, they poured over the plans. Sometimes they poured on the table, sometimes they poured on the floor, but mostly they poured over the plans.

PostPosted: Wed Jul 21, 2004 12:45 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Ikkarus
Veteran


Joined: 25 Sep 2002
Posts: 87

The countdown itself is not specific to any timezone. It counts down to 6:07 am relative to your current timezone settings.

Example: I am EST and the counter reads 17 hours (plus whatever days). I change my time to Pacific and the counter is now at 20 hours.
_________________
"What do you think?"
"I think a plan is a list of things that don't happen."


PostPosted: Wed Jul 21, 2004 1:07 pm
 View user's profile Send private message AIM Address Yahoo Messenger
 ICQ Number 
 Mark this and the following posts unread Back to top 
dmon_man
Veteran

Joined: 20 Jul 2004
Posts: 140
Location: Sacramento, CA

[b]SPEC: [/b]why are these dates important

SPEC
why are the dates in the countdown important? I've looked at them but I have been unable to come up with anything except that these will be the dates when we will get more info. Everything we are doing now is in preperation for one of the three important dates.

When the unit metastisizes will it be Pacific time or Eastern time?[/b]
_________________
Graduate 2001
Handsome Boy Modeling School


PostPosted: Fri Jul 23, 2004 10:54 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
RobMagus
Unfettered


Joined: 17 Jul 2004
Posts: 469
Location: Vancouver, BC

dmonman, in regards to timezone, look at the post right above yours.

PostPosted: Fri Jul 23, 2004 11:45 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Alakath
Boot

Joined: 23 Jul 2004
Posts: 28

! in programming speak

Hey guys, new to the forum here... Just thought I'd add that in programming ! is synonomous with the word "not." That would change the interpretation of the code fragments radically, it seems... "!" is also often pronounced "bang" which is similar to the "blam" that bungie seems to enjoy using.

It seems to me like this is reading like a log, an automatic system is running which produces this output. Like it is checking its subsystems and finding that they are not working. Just as an example,
Quote:

grope:
!probe primary sector
sec proc 1
!probe primary sector
sec proc 2
!probe primary sector
sec proc 3
!probe primary sector
sec proc 4
!probe primary sector
fail


This seems to state that the program is in the "grope:" routine, and then cannot probe the primary sector in the normal way and then iterates through the other four backup ways of probing the primary sector and then logs that the primary sector check was failed.

Quote:

surg:
!triage sec proc 1
fail
!triage sec proc 2
fail
!triage sec proc 3
fail
!triage sec proc 4
dmg unk


Again, this is similar. In the "surg:" subroutine (surg meaning surgery) it logs that it cannot triage each sector as it iterates through and then the reason why ("fail") and then a conclusion that the damage is unknown.

Seems like we are dealing with a very broken program here, unable to fix or even run itself. Maybe this log is from whatever it is that is being attacked, rather than the attacker?

Of course, all of this is just speculation.
_________________
Regards,

-Alakath


PostPosted: Fri Jul 23, 2004 11:59 pm
 View user's profile Send private message
 Mark this and the following posts unread Back to top 
Display posts from previous:   Sort by:   
Page 1 of 5 [64 Posts]   Goto page: 1, 2, 3, 4, 5 Next
Post new topic   This topic is locked: you cannot edit posts or make replies. View previous topicMark the topic unreadView next topic
 Forum index » Archive » Archive: The Haunted Apiary (Let Op!) » The Haunted Apiary (Let Op!): General/Updates
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group