comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
the idiot’s Guide to the Matrix . . . . . . . . . . . . . .<br />
46<br />
In today’s Matrix, you don’t have to use VR at all. You really<br />
shouldn’t. But if you’re going to do it anyway, always do it in a safe<br />
place with people you trust. You might think that you can handle<br />
it, and you’re probably right, but you can be dead right.<br />
> I’ve seen a copy of this in a public school, except it had all of the<br />
information and warnings about DNI stripped out, as if not telling<br />
kids about it would keep them from doing it.<br />
> Butch<br />
You got the power<br />
There are plenty of hackers out there that might want to get<br />
into your commlink. They have different reasons: curiosity, data<br />
mining, marketing research, or they’re just mean or homicidal.<br />
They have tricksy ways of getting into your ‘link, too. It might look<br />
hopeless, but you’ve got an ace up your sleeve.<br />
Find your commlink’s power button or switch and make sure<br />
you can find it by touch. Hackers can’t hack what isn’t on. The<br />
moment your ‘link starts to act funny, or an icon shows up in your<br />
node without your permission, hit that power switch and report<br />
it to the authorities (your parents, a teacher, the police, whoever).<br />
Hopefully, by the time you reboot, the hacker will have gone to<br />
look for easier pickin’s.<br />
Unwired<br />
> They trained us on this in Knight Errant. If we thought<br />
we’d been hacked in a firefight, we called a “10-30,”<br />
found cover, and rebooted.<br />
> Sticks<br />
> If your OS has been hacked with a backdoor, this will<br />
only delay the hacker while you reboot. If it happens to<br />
you, and you can’t code, you can only fix it by reinstalling<br />
your OS.<br />
> The Smiling Bandit<br />
analyze this<br />
Use that Analyze program on everything. If it’s<br />
a strange icon, do it twice. Most of the icons in the<br />
Matrix are safe, but some are nasty and out to get you.<br />
The bad ones might have a “Stealth” program that will<br />
make them look like normal, safe icons, so be especially<br />
careful when you don’t know the person behind<br />
the icon.<br />
iconism<br />
The good news is that when the world only sees<br />
your icon, they can’t be prejudiced about your metatype,<br />
gender, race, age, or anything else. But folks will<br />
judge you on your icon. It’s like extreme class discrimination,<br />
except that it’s based on your software. What<br />
passes for acceptable or contemptible changes depending<br />
on which node you’re in, so don’t let yourself get<br />
ambushed by digital bigots.<br />
> The reverse is true, too. If you want to blend in, switch<br />
to an off-the-rack icon.<br />
> Puck<br />
Spam Spam Spam Spam<br />
Most of the time, spam is just annoying. But some of it can<br />
carry viruses and other buckets of digital nasty. Never run a program<br />
attached to spam, ever. Keep that firewall up, and whenever<br />
you can, drop to passive mode.<br />
Blog Smart!<br />
Keep your personal information out of the public eye. Don’t<br />
give it to anyone that isn’t a cop, teacher, or other person who will<br />
keep it safe. Once you put something onto the Matrix, it’s on the<br />
Matrix forever.<br />
get readY to rawk<br />
By now, you should be soaring through the Matrix like a<br />
natural. If you’re not, don’t worry; it’ll come. Now go out there<br />
and shake up that ‘Trix. You’ll have freedom that you’ve never had<br />
before. Enjoy it, but be careful. With great power comes great<br />
responsibility.<br />
Be good, and if you can’t be good, be safe!<br />
> And if you can’t be safe, name it after me!<br />
> Glitch<br />
Simon Wentworth (order #1132857) 9