System Shock Wiki
System Shock Wiki
(Adding categories)
(Adding categories)
(One intermediate revision by the same user not shown)
Line 1: Line 1:
'''Intrusion Countermeasures Electronics''' are [[cyberspace]] security systems that serve as an electronic barrier to intruders trying to scam restricted data.
+
'''Intrusion Countermeasures Electronics''' are [[Cyberspace]] security systems that serve as an electronic barrier to intruders trying to scam restricted data.
   
 
[[I.C.E. Barrier]]s act to prevent unauthorized users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others.
 
[[I.C.E. Barrier]]s act to prevent unauthorized users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others.
   
[[I.C.E. Drill]]s are specialized tools designed to cut through the defensive I.C.E. walls. For years, hackers considered the I.C.E. protocol (adopted by the Corporate Computer Protection Conference) impregnable. But that was before the computer piracy gang [[RazorFinger]] developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ''ice''.
+
[[I.C.E. Drill]]s are specialized tools designed to cut through the defensive I.C.E. barriers. For years, hackers considered the I.C.E. protocol (adopted by the Corporate Computer Protection Conference) impregnable. But that was before the computer piracy gang [[RazorFinger]] developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ''ice''.
   
Older I.C.E. utilities can sometimes be bypassed by various forms of the [[Fake ID]] infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.
+
I.C.E. utilities can sometimes be bypassed by various forms of the [[Fake ID]] infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.
   
 
==See Also==
 
==See Also==
  +
*[[I.C.E. Barrier]]
 
*[[I.C.E. Drill]]
 
*[[I.C.E. Drill]]
 
*[[ICE Pick]]
 
*[[ICE Pick]]
Line 13: Line 14:
 
[[Category:Cyberspace Items]]
 
[[Category:Cyberspace Items]]
 
[[Category:Cyberspace Objects]]
 
[[Category:Cyberspace Objects]]
  +
[[Category:Items]]
  +
[[Category:System Shock Items]]
  +
[[Category:Technology]]
  +
[[Category:Software Programs]]

Revision as of 05:20, 22 June 2019

Intrusion Countermeasures Electronics are Cyberspace security systems that serve as an electronic barrier to intruders trying to scam restricted data.

I.C.E. Barriers act to prevent unauthorized users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others.

I.C.E. Drills are specialized tools designed to cut through the defensive I.C.E. barriers. For years, hackers considered the I.C.E. protocol (adopted by the Corporate Computer Protection Conference) impregnable. But that was before the computer piracy gang RazorFinger developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ice.

I.C.E. utilities can sometimes be bypassed by various forms of the Fake ID infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.

See Also