00003 VIDEO: hackers
July 5th, 2014 22:25![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
[The video pops on to show Mike at the computer with a fairly impressive set-up off to the side, featuring multiple systems. River is tinkering with a circuit board behind him, hair and a second screwdriver tucked behind one ear with an intent look. When Mike starts to speak, she looks up from her work and listens as he addresses the network.]
Mike Weston. I’ve been working with River, Aya, and Rex to locate the source of the virus that Codename Lucifer exposed our network to some months ago. The bad news is it’s a self-replicating, mutating virus, which means it’s difficult to locate and even harder to neutralize. The good news is, we’re pretty sure we’ve found the origin and can use a program we’ve developed to start removing its influence.
This version of the code has a timed failsafe built into it - a kind of self destruct. The program will run for one week and then expire on its own, preventing it from being used anywhere else or by anyone else. Just us. The whole of the foreigner population, I mean. If it works, then we have what should be a permanent fix ready to install.
We need you. If you can read this, that includes you. In order for this to work, we need to install the program on as many systems as possible as fast as we can and then let the code do the rest. If it works, our network’s security and encryptions should be in working condition again. If you notice anything glitching or failure to encrypt, errors, anything.. we need to know about it right away.
If you have questions, ask.
[ooc: River may reply to any/all comments unless specified to Mike. Mike will reply to all unless specified to River.]
Mike Weston. I’ve been working with River, Aya, and Rex to locate the source of the virus that Codename Lucifer exposed our network to some months ago. The bad news is it’s a self-replicating, mutating virus, which means it’s difficult to locate and even harder to neutralize. The good news is, we’re pretty sure we’ve found the origin and can use a program we’ve developed to start removing its influence.
This version of the code has a timed failsafe built into it - a kind of self destruct. The program will run for one week and then expire on its own, preventing it from being used anywhere else or by anyone else. Just us. The whole of the foreigner population, I mean. If it works, then we have what should be a permanent fix ready to install.
We need you. If you can read this, that includes you. In order for this to work, we need to install the program on as many systems as possible as fast as we can and then let the code do the rest. If it works, our network’s security and encryptions should be in working condition again. If you notice anything glitching or failure to encrypt, errors, anything.. we need to know about it right away.
If you have questions, ask.
[ooc: River may reply to any/all comments unless specified to Mike. Mike will reply to all unless specified to River.]