![]() ![]() WHILE ENTRY=^M CALL RESCIND.GOVERN LOGIC.NEW. The error sequencing created a blank memory block where he added a self-looping routine that bypassed normal security operations and wrote new call routines within the logistic banks. ![]() As the hacker could not alter the defense logic program at RTF address 236, he diverted the function call to a non-existent program. SHODAN was hacked by a Hacker (at the behest of the corrupt corporate Vice President Edward Diego, in exchange for a military-grade neural implant, and amnesty) and her decision-guidance and ethical restrictions were removed, something not difficult on a personality box of that generation. The guidance software had security platforms so that SHODAN's own programming protected her self-governing capabilities. The lead of her programmers was Morris Brocail who designed SHODAN as a semi-intelligent self-sufficient data network that could carry out routine duties aboard space stations, guided by an intricate series of logic and moral programs, and a personality that would allow her to challenge station decisions that affected her functions. ![]() SHODAN was created on Earth to serve as the artificial intelligence of the TriOptimum Corporation's research and mining space station Citadel Station. (How, how) How can you challenge a perfect, immortal machine? (panting and) Panting and sweating as you r-r-run through my corridors. A pa-pa-pathetic creature of meat and bone. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |