Why?

I get this message that says "A compnay has informed us blah blah blah, therefore we are dermitating you as angent" Then I loose the game.... Why did I loose, what should I do next time to prevent this, I didn't do anything besides following the missions and I tryed to make sure to delete all logs...... :frown:

------------------

Well, you got caught. You probably didn't delete your logs or an active trace was completed on you.

-J

------------------
Being a Mac user is like being a Navy Seal: a small, elite group of people with access to the most sophisticated technology in the world, who everyone calls on to get the really tough jobs done quickly and efficiently.
------------------
Please use the (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/search.cgi?action=intro&default;=26")Search Feature(/url) before posting
(url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=30&SUBMIT;=Go")EV Nova FAQ(/url) | (url="http://"http://www.ambrosiasw.com/webboard/Forum26/HTML/008628.html")Thread Beginnings(/url) | (url="http://"http://www.evula.com/survival_guide/")EV Survival Guide(/url) | (url="http://"http://home.attbi.com/~slagblah/walkthrough/")Nova Walkthrough(/url) | (url="http://"http://www.ev-nova.net/faq/")Gameplay FAQ(/url) | (url="http://"http://home.attbi.com/~slagblah/evn_fixes.html")Quick Fixes(/url) | (url="http://"http://home.attbi.com/~slagblah/pilotlog.html")How to Make a Pilot Log(/url)

It's a good idea to hack into InterNIC at the start, as they have no security and won't trace you. Route all subsequent connections through it, and as soon as you have finished hacking someone, head over to InterNIC and delete their logs.

------------------

Quote

Originally posted by Khoth:
**It's a good idea to hack into InterNIC at the start, as they have no security and won't trace you. Route all subsequent connections through it, and as soon as you have finished hacking someone, head over to InterNIC and delete their logs.

**

Is it at all possible for them to catch you if you do this?

------------------
Here a slice, there a slice,
everywhere a slice slice.

Yes and no. Some hacks require more log-deleting than that (namely illegal bank transfers to yourself).

------------------
Moderator- (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=9&SUBMIT;=Go&mrxak;=cool")EV Developer's Corner(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=69SUBMIT=Go&mrxak;=cool")Uplink Web Board(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=18")mrxak's Assorted Webspace Forum(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=48")Starcraft Forum(/url) | | (url="http://"http://directory.perfectparadox.com/profile.php?id=00008")My Profile(/url) | (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/postdisplay.cgi?forum=Forum10&topic;=007599-2&whichpost;=mrxak11-06-200203:22PM")mrxak(/url)
(url="http://"http://www.evula.org/mrxak/")mrxak's Assorted Webspace(/url) | (url="http://"http://www.evula.org/mrxak/Haikus/haikuarchive.html")The Haiku Archive(/url) | (url="http://"http://www.evula.org/mrxak/EV/N/mbspt/mbspt.html")mrxak's Big Secret Plug-in/Tutorial(/url) | (url="http://"http://www.evula.org/mrxak/EV/N/amtc/amtc.html")A mrxak TC(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/vftp/dl-redirect.pl/TheChallenge102.sea.bin?path=evn/plugins&file;=TheChallenge102.sea.bin")The Challenge v1.0.2(/url)
(url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/search.cgi?action=intro")Search First(/url) | (url="http://"http://www.modlink.net/guides.php")Uplink Guide(/url) | (url="http://"http://www.evula.com/survival_guide/")EV/O/N Guide(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=31&SUBMIT;=Go")Plug-in Guide(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003091.html")Plug-in Testers(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003196.html")Developers(/url) | (url="http://"http://www.AmbrosiaSW.com/games/evn/addons.html")Nova Addons(/url) | (url="http://"http://www.resexcellence.com/support_files/resedit.shtml")ResEdit(/url) | (url="http://"http://w00tware.ev-nova.net/")NovaTools(/url)
You have been warned: More haikus are coming!!!

Hello,

On top of mrxak's advice, I would add that you should spring for the highest version of the Log Deleter ASAP. Do notice that one of the tools available to people is a Log Undeleter. Only V.4 Log Deleter can guarantee your safety. Remember to kill all "routing" logs at InterNIC. Keep your connection established and terminated logs, but kill all the log files that indicate your next hop after InterNIC.

..And if you draw a fine, pay it, but KEEP the email. Once you've got the l33t s4illz, make me pay 🙂

(edited by mrxak to fix the spelling of his name)

------------------
How do you like your Manticore..regular or extra-crispy?

(This message has been edited by mrxak (edited 05-28-2003).)

I guess (url="http://"http://lokasdesign.netfirms.com/1.jpg")this(/url) is what I get for being greedy...I didn't really need that extra $10 Million...oh well, it was fun.
------------------
-scope
Carpe Aptenodytes! (Seize the Penguins!)
I feel like a genocidal maniac when emacs asks me if I want to kill 10789 characters.
Calculating in binary code is as easy as 01,10,11

(This message has been edited by scope (edited 05-28-2003).)

Quote

On scope's link:
Directly downloading images is not permitted on the Netfirms FREE plan. If you are the owner of this site, either ensure that this image is embedded in a web page, or upgrade to one of the Netfirms premium plans.

Hmmm...that's a strange message to get for being caught (I'm guessing...)

------------------
(url="http://"http://www.evula.org/dragoon/")D(/url)o not meddle in the affairs of dragons, for you are crunchy and taste good with ketchup.
(url="http://"http://www.evula.com")com(/url) | (url="http://"http://www.evula.net")net(/url) | (url="http://"http://www.evula.org")org(/url)

What's the best way to avoid getting traced? After about four or five hours of playing the game (after figuring out how to get LOTS of servers to route through), I'm pretty sure I have it down. I basically did a search at InterNIC for "public" to get all public servers, and I just use those to hop around. I didn't want to use the internal machines because I'm guessing they'd record me and I'd have to go back and find lots of logs to delete.

I think my main problem with this game is that I have no idea at all how it's SUPPOSED to be played. The tutorial does little to help. The toughest missions I can do involve hacking the social security system and changing someone's employment status. After that, there are all these weird ellipse curve things that I can't get around, and I also have no idea how to hack into a bank (don't even know where to start). I got one mission where I have to find some guy's bank balance but I couldn't log in as him, and their security was too tight for me to hack in. However, since I had made an attempt at hacking their system and failed to delete my log files, they found me and I lost the game.

The other problem is that there's no way to save the game and go back. If you lose, you lose, and you must start over from the beginning.

But anyway, it's still a cool concept and hopefully someone can help me figure out some of the parts of the game that make no sense to me.

------------------
Hard work never killed anybody, but why take a chance?
-Edgar Bergen

Quote

Originally posted by Luca Rescigno:
After that, there are all these weird ellipse curve things that I can't get around, and I also have no idea how to hack into a bank (don't even know where to start). I got one mission where I have to find some guy's bank balance but I couldn't log in as him, and their security was too tight for me to hack in. However, since I had made an attempt at hacking their system and failed to delete my log files, they found me and I lost the game.

I had a problem with the bank missions at first, too, because I was a bit confused. Gonna need a lot of hops for it, but just put in their account number and crack away (alot of these passwords are actual words, too) then if you don't have enough time, leave, delete your first hop log and go back to get the info you need (balance or loan amounts) and send that information back in your reply. They won't trace you unless you're doing something illegal, or logging in as an admin, so if you didn't have enough time the first time you got the pw then go back (after the log is gone) and you can take your time. It's magic I tells ya.

Oh, and a decypher (I think that's it) will get you past the ellipse curve things. Check out the software upgrades to see what everything in there does. Hope that helps ...

------------------
Blame Polerand!

The best way to avoid getting traced is to not get traced in the first place.

HUD ConnectionAnalysis
Firewall Bypass
Monitor Bypass
Proxy Bypass

Highest version, always. Total cost? Around 90k. Gateway upgrade? Only after you steal a lot of money from a bank account.

Monitor bypass gives you essentially as much time as you need on the login prompts. They won't start tracing you until you've logged in. Proxy & Firewall are to get access to logs and files respectively.

For bank information, bounce through InterNIC and 3-4 admin-access servers (Monitor bypass makes it easy to get admin access; bounce to a server, run monitor bypass, run password cracker and you got a pass, no trace). Run the Monitor Bypass on the monitor. Enter the account number, run the cracker. No trace should be started on you. Log in, get the info (you have all the time in the world). When you're done, log out and do standard cleaning procedure (InterNIC and another hop just for paranoia's sake).

When you've come in and (from one of the routine missions) happen to find a bank balance you like, start your proxy bypass. Transfer the balance to another account, on another bank, which you have created on that bank using a bounce (Never ever access non-uplink hardware without bouncing. Not even phones!). Clean the logs on the sender & receiver accounts plus InterNIC and one more hop. Through the entire process you shouldn't have had a single active trace, but you may be passively traced so TEMPO!

(edit for typo)

(This message has been edited by psn (edited 05-29-2003).)

Wait, I only need to go through 3-4 servers? Also, why do you say I have to go through admin-access servers? Am I somehow supposed to log in as the admin at each of those servers I'm bouncing through? How do I do that? Is it because using Monitor Bypass allows me to avoid tracing, and avoiding tracing means they don't change the password like they normally do? Even so, how do I actually log in as the admin at my bounce points, and why will only using 3-4 of them actually work? Also, one thing I still don't understand - clearing logs at places other than the destination. How do I do that? Do I just have to be satisfied with playing the game as I am now, clearing the logs just before I leave, and then going along my merry way? Because going in and clearing the logs at bounce points will leave logs in other places because it involves yet another hack-in. So... I guess you just gave me a bit too much information to process. What I'm worried about is that I'll spend thousands of dollars on the fancy-schmancy bypass systems, and then not know what to do and fsck up and lose everything (because you can't save your game).

Oh I just remembered I could probably save my game by just backing up my user file.

EDIT: One last thing, I think the big thing I don't understand is the significance of InterNIC. I tried cracking the password once and they didn't even trace me! So... what is so special about InterNIC that everyone is always talking about? That's what I really don't get. I just saw like three or four posts that mentioned bouncing on InterNIC and then deleting your logs from there, and everyone seems to understand what's going on except me.

------------------
Hard work never killed anybody, but why take a chance?
-Edgar Bergen

(This message has been edited by Luca Rescigno (edited 05-29-2003).)

The special about InterNIC is that they don't trace you. Besides Uplink that's the place you can connect directly without fear of being traced.

Now to try and answer all of your questions.

Admin-access servers - I mean servers to which you have admin password. The process of this is to bounce to that server, run monitor bypass then password cracker, disconnect when the latter is done and clean up at InterNIC. Going through them means that an eventual trace will take longer time.

3-4 servers - The probability for a trace is low (but you may make a mistake such as not engage the monitor) and as such, a low bounce route like that will give you time enough to get out of there should a trace be initiated and enough time to delete logs on at least one of them.

The two "good" log delete spots are Uplink Test Server and InterNIC. My bounce route is usually Gateway to InterNIC to Uplink Test Server. Removing the logs at Uplink test server by bouncing through uplink hardware is considered safe. Removing InterNIC logs is safe as per default as you remove the bounce logs and "logged in as admin from xyz" and they never ever trace you. In theory, InterNIC is enough, but I've been caught even when with them.

The "backing up" process works perfectly fine. I used it while still making zillions of mistakes with my hacks, but I recommend stopping to use it once you're off the training wheels.

If anything is still unclear, just ask.

------------------
Disclaimer: In cases of
major discrepancy, it's
always Reality that's got it
wrong

(This message has been edited by psn (edited 05-29-2003).)

Hey, that's real helpful, thanks a lot! Now what I'm wondering is what do I do until I get enough money for all that nice bypass software? Do I just do my previous method of bouncing through every public server listed on InterNIC and using the password cracker + firewall and proxy disablers to give me enough time to get in, do what I need to do, delete the logs, and get out? Do I still have to go through InterNIC in the beginning of the game when I'm doing the easy missions? Do I still have to delete my logs from multiple places, not just the destination, when it's early in the game? Or could I kind of mess around and do whatever I need to get money so long as I don't let them complete a trace or find log files? Again, thanks a lot for your help.

------------------
Hard work never killed anybody, but why take a chance?
-Edgar Bergen

That's what I did (InterNIC + public servers). When using proxy bypass (to gain access to proxy protected databases such as the social security one), start the proxy bypass, let it run and, when they start tracing you, start the PW Breaker. Give max CPU to PW breaker.

------------------
Disclaimer: In cases of
major discrepancy, it's
always Reality that's got it
wrong

One almost-completely-unrelaed thing:

Who do you pay when you have to pay a fine? The Bank? Which account?

When you pay a fine, the email includes the bank account, IP number and the sum you are supposed to pay; everything you'd ever need. Just fill in the information as you see it there (just hold on to the email; as soon as you have the bypasses, hack that account and get the money back + interest 😉 )

------------------
Disclaimer: In cases of
major discrepancy, it's
always Reality that's got it
wrong

im still trying to get 900,000 c from a bank account i found, but they keep catching me. from what i read above it sounds like theres a way to delete the transaction record so they dont know what account i sent the money to; is this correct? if so how?

------------------
"So, to those who would point to the views championed in Lord of the Flies, that humankind's violent nature is innate and will ultimately cause its downfall - to them I say: not with the kids I see every day."--Tim Comolli, My High School's Imaging Lab Director

Ah, to reveal or not to reveal. What the heck

The logs of the transfers are protected by proxies. Either use proxy_disable (bad) or proxy_bypass (good) to get around the proxy. Then, delete the relevant entries from the account statement. Remember to do it on both accounts, then clean up on at least one bounce. If you do it fast enough, you should get away with it. Just make really long hops through admin-access and/or government servers in order to slow down the banks' passive trace (their passives are fast!), then real quick delete your first bounce (the one closest to the gateway).

------------------
Disclaimer: In cases of
major discrepancy, it's
always Reality that's got it
wrong

Quote

Originally posted by Luca Rescigno:
**Hey, that's real helpful, thanks a lot! Now what I'm wondering is what do I do until I get enough money for all that nice bypass software? Do I just do my previous method of bouncing through every public server listed on InterNIC and using the password cracker + firewall and proxy disablers to give me enough time to get in, do what I need to do, delete the logs, and get out? Do I still have to go through InterNIC in the beginning of the game when I'm doing the easy missions? Do I still have to delete my logs from multiple places, not just the destination, when it's early in the game? Or could I kind of mess around and do whatever I need to get money so long as I don't let them complete a trace or find log files? Again, thanks a lot for your help.

**

It is a good idea to always go through InterNIC. Definatly at the beginning. Any time you hack, a passive trace will eventually be conducted, even if you don't get an active one. For this reason, it is good to go through InterNIC as your first bounce. This way after your hack (IMMEDIATLY after, especially for a bank or government server) you log into InterNIC (no need for bounces, as they do not trace you), and clear all logs pertaining to you except the most recent Connection Established one. There is no need to delete logs on any other server except your target, and this is only really important in bank hacks or other places where you want to keep your admin access.

------------------