User:Aquatics/Slave hack

From Wikipedia, the free encyclopedia

This page is a user's work in progress page, not an article, and may be incomplete and/or unreliable. The current version of this article is, or will be located at Slave hack.
Slave Hack
Image:Slave Hack.jpg
Developer(s) M2H
Version January 18, 2007
Platform(s) Computer, Mobile
Release date June 4, 2006
Genre(s) Real Time MMOG
Mode(s) Multiplayer
System requirements Web Browser, Internet (Broadband Recommended)
Input methods Keyboard, mouse

[edit] Description

Slave Hack is a browser based Massive Multiplayer Online Game. It is free to play, and driven by advertisements and donations.
Players start with low-tech computers, which can be upgraded later. The in-game currency is the Euro. Upon starting, you must download some basic "hacking" tools, such as a password cracker, a spam virus, and a remote controller for this virus. Other types of virii available include warez distribution software, and DDOS software. Like the spamming software, these both require a controller application. You can then use said software to "hack" into other players' computers, or in game NPC servers. Once installed with a virus, you can use the controller application to collect money, in the form of Euros, from the controlled computer, denoted in-game as a "Slave". The eventual goal of the game is assumed to be the achievement of the rank "Architecht". This rank denotes that a user has become first on the list of high scores.


[edit] Game play

Game play consists of each individual user having a computer. Each individual’s computer has an Internet Protocol Address assigned to it that acts as its identifier and the method of "finding" the computer on the internet. A new player must investigate IPs starting with a WHOIS server in order to find possible tools to allow them to gain access to various other computers and servers. Although software can't be purchased from a central server like in Uplink by Introversion Software, hardware upgrades are possible that allows for better performance.

Part of a good defense, is a good offense as they say. In order to make money a player must turn a computer or server into a Zombie or "Slave" to do various things ranging from sending marketing e-mails, preparing and engaging in DDoS attacks, and sharing warez. By sending spam, and sharing warez, a player can make euros to help upgrade his or her hardware. This allows for easier access to other player's and even NPC servers and computers.

A player must take the following steps in order to successfully "slave" a machine:

  * A player must first obtain the computer or server's Internet Protocol Address
  * A player must then break the administrator password protection and firewall.

Afterwards the particular server or computer is added to a players "Slave" list. In order for that "Slave" to be a benefit to the player, the player must also upload one of three types of viruses. The first one being a backdoor to allow for spam to be sent by the player's computer, second a DDoS virus designed to attack other player's computers and cause physical damage to the CPU, hard disk (resulting in data loss), and internet connection. Third is a virus that works similar to a spam virus, but instead of using a backdoor to the system to share warez to other people.


A virus can be removed (after it is installed) only by using an Anti-Virus to clear the infection out. The revision number of the anti-virus determines what revision of the virus the program can delete. Disinfecting a computer takes time, and that time is dependent on the clock speed of the CPU on the user's computer.

Some other people say that the best offense is a good defense. In this case a player has access to various tools to help secure his or her computer's security from being compromised, ranging from passwords, firewalls, and external hard disks.

Even with those tools, the best way for a player to protect him or herself is to make sure that his or her machine's IP address is not recorded by other players. The easiest way to obtain these IP addresses is through logs left on every computer in the game.

Examples Include:

  *09-02-2007 04:21  admin scanned for virusses on [localhost];  found and deleted
  *09-02-2007 05:11 slave XX.XXX.X.X earned 1.06 euros, funds transferred to bank account 
              XXXXX at [XXX.XXX.XXX.XXX]
  *09-02-2007 05:20 admin logged in from [XX.XXX.XXX.XXX]

With these logs, a player can easily pick out IP addresses and bank accounts. Any player that has the hardware and software required can hack another player's computer, and even another player's bank account. With that said, these logs can be deleted, or even edited to frame other players if so desired.

The main goal of Slave Hack is to reach the number one position through the use of spamming, DDoS attacks, the sale of warez, and theft from banks.