System Shock Wiki
System Shock Wiki
(Created page with "'''Intrusion Countermeasures Electronics''' are cyberspace security systems that serve as an electronic barrier to intruders trying to scam restricted data. [[I.C.E. Barr...")
 
No edit summary
Line 1: Line 1:
 
'''Intrusion Countermeasures Electronics''' are [[cyberspace]] security systems that serve as an electronic barrier to intruders trying to scam restricted data.
 
'''Intrusion Countermeasures Electronics''' are [[cyberspace]] security systems that serve as an electronic barrier to intruders trying to scam restricted data.
   
[[I.C.E. Barrier]]s act to prevent unauthorised users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others. Older I.C.E. utilities can sometimes be bypassed by various forms of the [[Fake ID]] infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.
+
[[I.C.E. Barrier]]s act to prevent unauthorised users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others.
  +
  +
[[I.C.E. Drill]]s are specialised tools designed to cut through the defensive I.C.E. walls. For years, hackers considered the I.C.E. protocol (adopted by the [[Corporate Computer Protection Conference]]) impregnable. But that was before the computer piracy gang [[RazorFinger]] developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ''ice''.
  +
  +
Older I.C.E. utilities can sometimes be bypassed by various forms of the [[Fake ID]] infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.
   
 
== See also ==
 
== See also ==
   
* [[ICE Pick]]
+
* [[I.C.E. Drill]]
  +
* [[I.C.E. Pick]]

Revision as of 18:02, 7 July 2013

Intrusion Countermeasures Electronics are cyberspace security systems that serve as an electronic barrier to intruders trying to scam restricted data.

I.C.E. Barriers act to prevent unauthorised users from accessing the information or software protected within the I.C.E. Some I.C.E. walls are better than others.

I.C.E. Drills are specialised tools designed to cut through the defensive I.C.E. walls. For years, hackers considered the I.C.E. protocol (adopted by the Corporate Computer Protection Conference) impregnable. But that was before the computer piracy gang RazorFinger developed a program that could dissolve the I.C.E. shield like a blowtorch cutting through ... ice.

Older I.C.E. utilities can sometimes be bypassed by various forms of the Fake ID infiltration program. More recent I.C.E. constructs, once they have registered a Drill attack, can actually counter-attack the user.

See also