Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-23-2018, 12:05 AM
(This post was last modified: 12-23-2018, 11:34 PM by KeepOnRolling.)
Something wicked hath arose in the Internet, and it’s more dangerous than any other seen before.
Cyberspace is under attack by an incredibly infectious, malevolent, and dangerous Virus, one that seeks the destruction of the Internet itself!
In a daring and viciously effective attack, it has multiplied itself to create dozens of weaker copies of itself, though they are still much stronger than a normal virus. These copies have attacked almost every cyber security agency in the world, keeping them constantly distracted and unable to focus on the Main Virus, allowing it to begin its crusade of corruption in peace. It has chosen the forum of eagle-time as it’s launch pad for the invasion of the World Wide Web, and has already begun the process of corrupting it!
To combat this threat, you, a group of players, have entered Cyberspace itself, to directly combat The Virus! Being humans directly interacting with Cyberspace, you have powers to affect it in ways no other human outside it can. From creating and utilizing powerful attacks, to creating and summoning a variety of entities, these powers are nothing short of extraordinary! Now, it’s up to you to use these powers to stop the Virus once and for all? Or maybe, some will choose to help it….
The mission is clear, but it’s not an easy one. Do you have what it takes, to save the net, and Delete The Virus?!
Virus Health: 100/100
CORRUPTION: 25%
Rules:
1) You can use almost any attack against the Virus, however, it is incredibly resistant to damage and is capable of manipulating cyberspace on a scale never seen before, so many attacks may not succeed. In addition, the Virus can adapt to the attacks thrown against it. Just because it works once, doesn’t mean it will twice.
2) The more creative, well thought out, or humorous an attack is, the more likely it will go through and cause at least some damage.
3) You can perform up to three actions in a single post, if you go over this limit, only your first action will be counted.
- An Action is almost always styled in a manner similar to this: “I summon a barrage of deadly Fireballs at The Virus, which cannot be hacked or modified in anyway, and have to cause some damage!”
4) One way to use these actions and to increase the strength of attacks and entities (which will be covered in their own rules) is through charging. Charging is essentially using multiple posts to ready an attack or entity, and giving them extra health or strength by doing so. Because charging can be complicated, there are some sub rules to this system that are put into their own section down below.
5) No double posting! please wait for at least a few other users to get their actions in before posting again.
6) Corruption is a stat that indicates how much The Virus has infected the current battlefield. The more corruption there is, the stronger the Virus and the Entities under its control become. The Virus can perform actions for the purpose of increasing corruption, while Players can do the opposite.
7) Though not advised, players can assist The Virus. This can be done by summoning Pro-Virus entities, healing Pro-Virus entities, or by giving The Virus buffs.
8) There are 3 different factions that both players and entities can belong to:
- The [Anti-Viral] faction aims to weaken and destroy the Virus, by attacking it, attacking its entities, giving it debuffs, or summoning other Anti-Virus entities.
- The [Neutral] factions are entities that have no allegiance to any of the other factions. They will either be hostile to both factions, or can be persuaded/corrupted to join one of their sides.
- The [Pro-Viral] side seeks to aid the Virus and see it succeed. They do this by creating other Pro-Virus entities, attacking Anti-Virus entities, or protecting the Virus and giving it buffs.
Charging sub-rules:
1) The limit of posts you can use for charges is 30. (This will increase as the game goes on)
2) Even if you use two of your three post actions to charge, you must still perform another action as well. The reason for this is to prevent the game from becoming boring by not having it where everyone is charging something, but not actually doing anything outside of that.
3) You can only increase a charge by 1 per post action, unless another user helps you. Do not attempt to cheat this by double posting, which is against the rules in of itself.
4) Finally, while charging increases the chance of an attack working, it does not guarantee it. Extremely overpowered attacks are unlikely to go through, regardless of how long they’re charged
Entity Rules:
First, what are entities? Well, let me explain:
1. Entities are the creatures and characters summoned by both Players and The Virus. At the end of every turn, the entities of various factions will battle and deal damage to each other, and attempt to damage the virus. Somewhat less complicated than Charging, I’ve still put the important entity specific rules for convenience.
2. Entities summoned using only one post, while not completely disposable, will be weaker than ones who are summoned through charged posts. Additionally, they are more susceptible to being taken under The Viruses control.
Certain entities summoned by the Virus will act as protectors and shields for it. These entities will redirect damage meant for The Virus to themselves, and will also attack other entities as well. Due to this, it’s important that they are beaten.
3. You are allowed to create stats for the entities you summon, however, I retain the right to nerf these entities if I find them overpowered.
4. Technological entities are much more susceptible to being taken over by The Virus, due to their nature. This can be prevented either by having them be protected by other entities, or specifically installing ways to prevent The Virus from taking over. Usually, the Virus will take longer to fully corrupt an entity the longer it has been charged, so it’s best to attempt to prevent this during the process.
Finally, the most important rule, and the one everyone who plays this game MUST understand completely……
Have fun!!!!!!
Posts: 32
Joined: Dec 2018
Pronouns:
Location:
12-23-2018, 12:19 AM
(This post was last modified: 12-23-2018, 01:15 AM by FlamingFlapjacks.)
I tell the Virus that this sentence is false.
I then kick it with my fist.
The Beginning of Something Really Excellent 1/5
Elsewhere, a figure enters the field. They look around, and just sit down.
Posts: 13
Joined: Dec 2018
Pronouns: Why not?
Location: Middle of Nowhere
12-23-2018, 12:42 AM
A cat jumps through a wall of code and meows. As it meows, a text bubble appears next to it.
"Hi, I am Kit the Kat. I am here to retain my control over the interwebs. Mwahahahahaha!"
Kit then rolls onto his back (yes, he) and just looks cute.
Action 1: Kit pulls out a keyboard and starts typing around. It looks like he's playing on a piano, but he's actually doing something. Suddenly, a computer mouse appears right next to Kit. After trying to eat it for a few seconds, he starts nudging it with his head. As he does this, a pointer randomly appears. Kit keeps nudging it until it's right in front of the nearest virus piece. Kit then, somehow, right clicks it and then has the pointer go over to undo. Kit then left clicks, undoing the virus chunk. Technically, this only fuses it with another virus piece, but less things to shoot at helps.
Action 2: Kit meows:"Now, as my first second order of business, I need to upgrade my cat powers." Kit keeps messing with his keyboard and mouse ends up pulling up a search browser. In it, Kit types "Ninja Cat". Suddenly, thousands of windows appear around Kit, filled with ninja cat videos. He slowly absorbs all of the information, learning to be the true Ninja Cat.
Summoning Cat God: 1/30
Posts: 66
Joined: Dec 2018
Pronouns: he/him/his
Location: Orlando
12-23-2018, 01:05 AM
2:20 AM, NATO Cyber Defense Center of Excellence
"Any updates on the situation?"
"So far, the Virus has only penetrated low-hanging fruit, so to speak. Websites that have little-to-no protection against cyberattacks. It's made its current base of operations in some kind of... roleplaying forum hosted in America that is one such low-hanging fruit. However, we suspect that it will use its position to launch cyberattacks on more secure websites."
"How are the counterattack efforts going?"
"Sir, this Virus is unprecedented in the history of cyberspace. It's almost like a distributed artificial intelligence, able to adapt and alter its code with human-like sophistication. We've tried the usual countermeasures: quarantines, DDOS attacks, dark web nests, but the Virus always finds a way around them. Before we can launch an effective counterattack, we need to study the nature of the Virus more closely."
"Very well. Sam, lead a team of IT experts into Cyberspace where the Virus is operating. We need you to scout the nature of the Virus and its corruption of the Internet. To carry out this mission, we are giving you access to our state-of-the-art quantum encrypted secure channels that will protect this operation."
"Well, thank you, sir!"
"Goodbye, Sam, and good luck."
(Action 1)
In the heart of a NATO Installation in the former Soviet Republic of Estonia, a quantum-encrypted channel connects to the Internet. It accesses the Tor network, creating a chain of darkweb nodes that will make any attempt at tracing it rather difficult. Then, it finally penetrates the obscure forum known as Eagle Time.
(Action 2)
A scout team of IT experts emerges on the Battlefield, led by a dark-haired man wearing a pair of virtual sunglasses and looks to be in his early thirties.
"Incredible... the Virus has somehow created an entire virtual world out of a mere forum!"
"Alright, now that we're here, we need to get to work. I'll try to counteract the Virus while you begin examining it and the forum."
The Scout Team begins to analyze the nature of the Battlefield, searching through the logs of the Eagle Time forum to track down the Virus's origin server. The first two actions were spent on summoning the Scout Team as an entity. Sam is my PC, and they are both Anti-Viral. As the Scout Team is composed of human operators, they are resistant to corruption.
(Action 3)
Sam turns to the glitchy, sinister mess that comprises the Virus's representation on the Battlefield. He points to the ground around him. Suddenly, a number of virtual nodes materialize in the direction of his pointing. The nodes link to a mainframe computer back at the base. The mainframe then begins monitoring the situation. If the Virus moves against the Scout Team, the mainframe will use the nodes to launch a DDOS attack against the Virus, blocking its attack. This functions as a one-shot shield that will protect the Scout Team from attack, not as a summon.
Meanwhile...
A general stands in a conference room. On the screen ahead of him lies several people, all of whom appear to be in important positions.
"How quickly can we activate Project FAITH?"
"The program is still quite deficient in adaptability and is therefore not currently suited for deployment against the Virus. However, studying the Virus's sapience may allow us to bestow a similar intelligence upon our program. This makes your scouting efforts even more critical to our efforts. We will be focusing on laying the groundwork for the activation of FAITH."
"Now, while some of you may have some reservations about Project FAITH, I currently see it as the only practical way to counter the Virus. With this technology, we will defeat this enemy and save the Internet from destruction. I will present a status update later. For now, goodbye."
Posts: 1,260
Joined: Feb 2018
Pronouns: it/its
Location: ohio
12-23-2018, 01:25 AM
A bird with Suspiciously/Ambiguously Birdlike Bird Arms of Bird Bumbling swoops in, so as to wreak havoc in alliance with the Virus. (Action 1)
For it's first order of business, it begins to fabricate a fortress, so as to allow the Virus to exert its will from the safety of a safe spot. (Action 2) (1/5)
It then produces a flamethrower, fire-walling in the Scout Team, disallowing them to see anything or move outside of it. (Action 3)
Posts: 1,146
Joined: Dec 2016
Pronouns:
Location:
12-23-2018, 01:54 AM
Action 1: Booting up the latest edition of Doors99. This may take a while.
(+1 Charge/Boot-progress, 0/30 -> 1/30)
Action 2: Reading Hackermans guide to programming to pass the time. Exciting!.. But not very helpful.
Action 3: Attempting to hollywood hack some chaff programs via the already booted Doors95.
Quiet. Good for an unusual opinion. Doesn't talk much.
Posts: 979
Joined: Jun 2018
Pronouns: She/Her
Location: England
12-23-2018, 02:33 PM
The first action: A dragon swoops downward, eyes burning like matchsticks, illuminating the area. Who dares threaten this domain, in which she shares her hoard of art for all to see?
...oh. It appears I grabbed the wrong dragon. Ah well, too late to change that.
A second action: The Marshmallow-Dragon uses Nihilism!
"look at you, you're not even real. you're corrupting a fake internet just for the amusement of those watching from the real one. even I am stuck fighting you, for I am being controlled by a nerd at a computer. the words I speak and the actions I do? they are mere letters on a screen that I cannot even see. and so are yours."
Final action: A small flickering noise can be heard, and is just as quickly extinguished. (Charge Progress 1/30)
owo whats this???
Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-23-2018, 04:24 PM
Quote:I tell the Virus that this sentence is false.
I then kick it with my fist.
The Beginning of Something Really Excellent 1/5
The Virus, rather than focusing solely on attempting to calculate the paradox you’ve given it, creates a subroutine to do it, and continues focusing on its main goal.
It then creates a miniature firewall in front of itself right before you “fistkick” it, blocking the attack!
Quote:A cat jumps through a wall of code and meows. As it meows, a text bubble appears next to it.
"Hi, I am Kit the Kat. I am here to retain my control over the interwebs. Mwahahahahaha!"
Kit then rolls onto his back (yes, he) and just looks cute.
Action 1: Kit pulls out a keyboard and starts typing around. It looks like he's playing on a piano, but he's actually doing something. Suddenly, a computer mouse appears right next to Kit. After trying to eat it for a few seconds, he starts nudging it with his head. As he does this, a pointer randomly appears. Kit keeps nudging it until it's right in front of the nearest virus piece. Kit then, somehow, right clicks it and then has the pointer go over to undo. Kit then left clicks, undoing the virus chunk. Technically, this only fuses it with another virus piece, but less things to shoot at helps.
Action 2: Kit meows:"Now, as my first second order of business, I need to upgrade my cat powers." Kit keeps messing with his keyboard and mouse ends up pulling up a search browser. In it, Kit types "Ninja Cat". Suddenly, thousands of windows appear around Kit, filled with ninja cat videos. He slowly absorbs all of the information, learning to be the true Ninja Cat.
Summoning Cat God: 1/30
The Virus looks on in confusion to the new interloper, before confusion turns to anger at another obstacle in its goal!
The Virus Pieces, when fused, cancel each other out, causing them to be destroyed and slightly reducing corruption!
Kit begins learning the arts Catjitzu, which is....useful? I guess?
Quote:2:20 AM, NATO Cyber Defense Center of Excellence
"Any updates on the situation?"
"So far, the Virus has only penetrated low-hanging fruit, so to speak. Websites that have little-to-no protection against cyberattacks. It's made its current base of operations in some kind of... roleplaying forum hosted in America that is one such low-hanging fruit. However, we suspect that it will use its position to launch cyberattacks on more secure websites."
"How are the counterattack efforts going?"
"Sir, this Virus is unprecedented in the history of cyberspace. It's almost like a distributed artificial intelligence, able to adapt and alter its code with human-like sophistication. We've tried the usual countermeasures: quarantines, DDOS attacks, dark web nests, but the Virus always finds a way around them. Before we can launch an effective counterattack, we need to study the nature of the Virus more closely."
"Very well. Sam, lead a team of IT experts into Cyberspace where the Virus is operating. We need you to scout the nature of the Virus and its corruption of the Internet. To carry out this mission, we are giving you access to our state-of-the-art quantum encrypted secure channels that will protect this operation."
"Well, thank you, sir!"
"Goodbye, Sam, and good luck."
(Action 1)
In the heart of a NATO Installation in the former Soviet Republic of Estonia, a quantum-encrypted channel connects to the Internet. It accesses the Tor network, creating a chain of darkweb nodes that will make any attempt at tracing it rather difficult. Then, it finally penetrates the obscure forum known as Eagle Time.
(Action 2)
A scout team of IT experts emerges on the Battlefield, led by a dark-haired man wearing a pair of virtual sunglasses and looks to be in his early thirties.
"Incredible... the Virus has somehow created an entire virtual world out of a mere forum!"
"Alright, now that we're here, we need to get to work. I'll try to counteract the Virus while you begin examining it and the forum."
The Scout Team begins to analyze the nature of the Battlefield, searching through the logs of the Eagle Time forum to track down the Virus's origin server. The first two actions were spent on summoning the Scout Team as an entity. Sam is my PC, and they are both Anti-Viral. As the Scout Team is composed of human operators, they are resistant to corruption.
(Action 3)
Sam turns to the glitchy, sinister mess that comprises the Virus's representation on the Battlefield. He points to the ground around him. Suddenly, a number of virtual nodes materialize in the direction of his pointing. The nodes link to a mainframe computer back at the base. The mainframe then begins monitoring the situation. If the Virus moves against the Scout Team, the mainframe will use the nodes to launch a DDOS attack against the Virus, blocking its attack. This functions as a one-shot shield that will protect the Scout Team from attack, not as a summon.
Meanwhile...
A general stands in a conference room. On the screen ahead of him lies several people, all of whom appear to be in important positions.
"How quickly can we activate Project FAITH?"
"The program is still quite deficient in adaptability and is therefore not currently suited for deployment against the Virus. However, studying the Virus's sapience may allow us to bestow a similar intelligence upon our program. This makes your scouting efforts even more critical to our efforts. We will be focusing on laying the groundwork for the activation of FAITH."
"Now, while some of you may have some reservations about Project FAITH, I currently see it as the only practical way to counter the Virus. With this technology, we will defeat this enemy and save the Internet from destruction. I will present a status update later. For now, goodbye."
Scout Team added! There will be 6 of them, each with 70 HP.
The Virus will now be unable to directly attack the Scout Team without being blocked at first by the DDOS Attack , or the attack is deactivated.
Quote:A bird with Suspiciously/Ambiguously Birdlike Bird Arms of Bird Bumbling swoops in, so as to wreak havoc in alliance with the Virus. (Action 1)
For it's first order of business, it begins to fabricate a fortress, so as to allow the Virus to exert its will from the safety of a safe spot. (Action 2) (1/5)
It then produces a flamethrower, fire-walling in the Scout Team, disallowing them to see anything or move outside of it. (Action 3)
(For clarification, you didn’t need to use the action to introduce your character)
The Virus at first is pissed that another intruder has interrupted it, but is soon satisfied to learn that this new interloper is on its side!
You begin charging the fortress! When it is finished, it will defend the Virus from attacks until is destroyed, and increase corruption. However due to the low charge time, it’s Health will be relatively low, around the same as the Scout Teams.
The Scout Team has been fire-walled in! It will be stunned for this turn and the next, and will not be able to attack the Virus.
Quote:Action 1: Booting up the latest edition of Doors99. This may take a while.
(+1 Charge/Boot-progress, 0/30 -> 1/30)
Action 2: Reading Hackermans guide to programming to pass the time. Exciting!.. But not very helpful.
Action 3: Attempting to hollywood hack some chaff programs via the already booted Doors95.
Your attempt to Hollywood hack fails, because all programs related to The Virus have Hollywood Encryption! It’s constantly changing, meaning cracking it is nigh impossible!
Quote:The first action: A dragon swoops downward, eyes burning like matchsticks, illuminating the area. Who dares threaten this domain, in which she shares her hoard of art for all to see?
[Image: 1wtzLPV.jpg]
...oh. It appears I grabbed the wrong dragon. Ah well, too late to change that.
A second action: The Marshmallow-Dragon uses Nihilism!
"look at you, you're not even real. you're corrupting a fake internet just for the amusement of those watching from the real one. even I am stuck fighting you, for I am being controlled by a nerd at a computer. the words I speak and the actions I do? they are mere letters on a screen that I cannot even see. and so are yours."
Final action: A small flickering noise can be heard, and is just as quickly extinguished. (Charge Progress 1/30)
The Virus is confused by your statement, and attempts to create another subroutine to calcuate it, but doing so would take up too much processing power, forcing it to calculate it directly! The Virus will now be stunned for the next turn!
The Battlefield
Virus Health: 100/100
CORRUPTION: 21%
Scout Team: 70-70-70-70-70-70
Posts: 32
Joined: Dec 2018
Pronouns:
Location:
12-23-2018, 04:48 PM
(This post was last modified: 12-23-2018, 11:27 PM by FlamingFlapjacks.)
Oh well.
I eat the wall, turning myself into Wall Kirbydoof!
The Beginning of Something Really Excellent 3/5 (two actions for charge)
Posts: 13
Joined: Dec 2018
Pronouns: Why not?
Location: Middle of Nowhere
12-23-2018, 05:37 PM
(This post was last modified: 12-23-2018, 05:38 PM by O.R.I.G.I.N..)
Action 1: Kit meows. "PV players... Why?" He then proceeds to catjitsu into the fort, unnoticed. He pulls out five cat face shaped shurikens and throws them at the virus. As the fly, due to their cat shape's high surface area, they spin forward at different angles. The first goes for a direct straight shot, arriving at the virus first. The second and third curve around to each of the virus's flanks, making their way to the virus simultaneously right after the first. The last two fly under and over, each one not going directly to the virus, but instead going right past the virus and curving around to hit it in the back. Shurikens 4 and 5 pass the virus at the same time as the second and third ones, but they arrive at the virus's back last.
Action 2: Continuing his assault, Kit takes out his Catana and takes a standard fighting stance. He then dashes forward, slicing around at the strange virus. While this may seem futile, Kit isn't aiming for the virus. He instead aims for any link to the subroutine, trying to cut it off. This forces it to calculate FlamingFlapjacks's question as its main process instead of as a subroutine.
Summoning Cat God: 2/30
What's the point if it isn't wierd? ©
Posts: 66
Joined: Dec 2018
Pronouns: he/him/his
Location: Orlando
12-23-2018, 06:02 PM
Scouting Efforts 1: 2/5
(Action 3)
Sam turns to the Hollywood Encryptions.
"This stuff is immune to most conventional attempts at decryption. However, our technology is by no means conventional. Activate the Heisenberg Processor!"
Back at the NATO headquarters, another device is brought online. It is no ordinary digital computer, but instead a supercooled 16-qubit quantum processor. It connects to the Battlefield using the Tor server chain established in my previous post. Once it has established a connection, it begins to break through the Hollywood Encryption that protects the Virus. Unlike conventional computers, quantum computers are able to process and optimize thousands of values at once. This allows it to instantaneously solve certain problems that would take trillions of years to solve for a conventional computer. However, in this case, cracking through the Hollywood Encryptions will still take a few turns for the wave functions of the qubits inside the Heisenberg Processor to collapse.
This is a summon that will function just like Criticsquid's summon in DTG1. The Heisenberg Processor is an entity that needs to be defended for 5 turns, but will cause guaranteed damage against the Virus once those turns are up. Of course, if it is destroyed, the attempt to damage the Virus will fail.
Posts: 1,260
Joined: Feb 2018
Pronouns: it/its
Location: ohio
12-23-2018, 08:27 PM
(This post was last modified: 12-23-2018, 08:34 PM by Numbers.)
The bird goes to FlamingFlapjacks, answering the question with a simple, but effective, "Since you stated, in your command, that you told the virus 'This sentence is false', yet you didn't separate the phrase from the verb, you rather yelled it as you went in for a punch, therefore fulfilling the statement that you told the Virus that the sentence was false. You'll have to try harder to mess with the virus." (1)
Then, the bird resumes building the fortress. (2/5) (2)
The bird then swoops down to the Heisenberg Processor and begins to subject it to the hot blaze from its flamethrower's maw. This will heat it up very quickly and therefore muck about with the structural integrity. (3)
Posts: 1
Joined: Dec 2018
Pronouns:
Location:
12-23-2018, 11:34 PM
I make the virus infect itself. And then I wave hello.
Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-24-2018, 12:18 AM
Gah, I lost the update right I was typing it. It’s still coming soon, don’t worry.
Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-24-2018, 12:40 AM
(This post was last modified: 12-24-2018, 12:43 AM by KeepOnRolling.)
Quote:Action 1: Kit meows. "PV players... Why?" He then proceeds to catjitsu into the fort, unnoticed. He pulls out five cat face shaped shurikens and throws them at the virus. As the fly, due to their cat shape's high surface area, they spin forward at different angles. The first goes for a direct straight shot, arriving at the virus first. The second and third curve around to each of the virus's flanks, making their way to the virus simultaneously right after the first. The last two fly under and over, each one not going directly to the virus, but instead going right past the virus and curving around to hit it in the back. Shurikens 4 and 5 pass the virus at the same time as the second and third ones, but they arrive at the virus's back last.
Action 2: Continuing his assault, Kit takes out his Catana and takes a standard fighting stance. He then dashes forward, slicing around at the strange virus. While this may seem futile, Kit isn't aiming for the virus. He instead aims for any link to the subroutine, trying to cut it off. This forces it to calculate FlamingFlapjacks's question as its main process instead of as a subroutine.
Summoning Cat God: 2/30
The fort is not yet complete, thus, you simply launch towards The Virus and attack it.
The Virus recognizes Kits impressive CATJITZU skills, and that it can’t possibly avoid all of the shurikens Kit has thrown at it! However, it knows a perfect loophole!
As all things are made of matter in our world, all things in Cyberspace are made of code. Among the Virus’s greatest powers is to manipulate this code like putty. It hacks into the source code of the shurikens, and decreases the strength and damage they would cause him exponentially. By the time they all hit him, the hacking has caused the damage they caused as a group to equal 1!
You manage to cut the link from the subroutine and The Virus, forcing it to use its main systems to calculate the paradox, and stunning it in pain and agony! How can it possibly get past such a paradox?!
Quote:Scouting Efforts 1: 2/5
(Action 3)
Sam turns to the Hollywood Encryptions.
"This stuff is immune to most conventional attempts at decryption. However, our technology is by no means conventional. Activate the Heisenberg Processor!"
Back at the NATO headquarters, another device is brought online. It is no ordinary digital computer, but instead a supercooled 16-qubit quantum processor. It connects to the Battlefield using the Tor server chain established in my previous post. Once it has established a connection, it begins to break through the Hollywood Encryption that protects the Virus. Unlike conventional computers, quantum computers are able to process and optimize thousands of values at once. This allows it to instantaneously solve certain problems that would take trillions of years to solve for a conventional computer. However, in this case, cracking through the Hollywood Encryptions will still take a few turns for the wave functions of the qubits inside the Heisenberg Processor to collapse.
This is a summon that will function just like Criticsquid's summon in DTG1. The Heisenberg Processor is an entity that needs to be defended for 5 turns, but will cause guaranteed damage against the Virus once those turns are up. Of course, if it is destroyed, the attempt to damage the Virus will fail.
Heisenberg Processor added! It will have 115 health, and if it completes its charge in the next 5 turns, it will cause great damage to the Virus and it’s encrytpions!
Quote:The bird goes to FlamingFlapjacks, answering the question with a simple, but effective, "Since you stated, in your command, that you told the virus 'This sentence is false', yet you didn't separate the phrase from the verb, you rather yelled it as you went in for a punch, therefore fulfilling the statement that you told the Virus that the sentence was false. You'll have to try harder to mess with the virus." (1)
Then, the bird resumes building the fortress. (2/5) (2)
The bird then swoops down to the Heisenberg Processor and begins to subject it to the hot blaze from its flamethrower's maw. This will heat it up very quickly and therefore muck about with the structural integrity. (3)
Oh, that’s how it gets past such a paradox.
The Virus stops being stunned, no longer having a need to calculate the paradox. It also begins installing anti-paradox software, to prevent this from happening again.
The Heisenberg Processor is damaged by the attack, losing 7 health! The full effects of the flames aren’t yet noticeable, but might approach soon if nothing is done about them.....
Quote:I make the virus infect itself. And then I wave hello
By infecting things, The Virus grows stronger, and this strength can increase depending on how strong the item it infects is. Due to the power of The Virus itself, combined with the logical paradox, infecting its own body causes an increase corruption by a good amount! Great job!
The Battlefield:
Virus Health: 99/100
Corruption: 32%
Scout Team: 70-70-70-70-70-70
Heisenberg Processor: 108/115. 5 turns remaining
Posts: 66
Joined: Dec 2018
Pronouns: he/him/his
Location: Orlando
12-24-2018, 01:24 AM
(Focused)
Sam quickly summons a set of fire extinguishers rated to extinguish electronic fires, and uses them to extinguish the fire on the Heisenberg processor. I think other people should try to help defend this.
Posts: 1,146
Joined: Dec 2016
Pronouns:
Location:
12-24-2018, 01:28 AM
Action 1: Booting up the latest edition of Doors99. This may take a whi- Is that a popup preventing it from booting?
Action 2: Click through the popups. Yes, I want to boot Doors99. No, I don't want to install more programs.
(+1 Charge/Boot-progress, 1/30 -> 2/30)
Action 3: Load up a trojan horse with all kinds of malware, and leave it near the virus. Let's see the virus resist that, eh?
Quiet. Good for an unusual opinion. Doesn't talk much.
Posts: 13
Joined: Dec 2018
Pronouns: Why not?
Location: Middle of Nowhere
12-24-2018, 01:51 AM
Meow!: Catjitsu FTW!
Action 1: Realizing that corruption is bad, Kit prowls back over to his keyboard. With his new ninja cat dexterity, it looks as if he is actually typing. "What is he typing?" you may ask. Well, it is a little known fact that cats have low attention spans. This means that, since Kit was E-Mailing the Virus a very, very important message, it eventually got very confusing, filled with tons of random videos and pictures that really had nothing to do with anything. It's like that one guy you know that starts talking and then doesn't stop until you point out that he's totally off topic, but, unfortunately, Kit still won't stop. Kit then, after using his highest gigabyte memes, sends it to the virus. Kit meows, "Hey Virus, tell me once your done reading that!
Action 2: Kit puts on a party hat. But, this is no ordinary cone shaped party hat. On the hat, there is one big star. The star is made of five streamers and a pentagon. Each streamer comes to a point. At each of those points, there are three pieces of glitter. Each piece of glitter has a small speck of dust on it. The dust particles of each set of three glitters make a line. If you connect these five lines, it makes a decagon. And do you know how many letters there are in "decagon"? 7. Now, how many letters are there in the words "party" and "hat" together? 8. Now, what do you get when you subtract decagon from party hat? 1. Now, how many letters are there in one? 3. Illuminati Confirmed! Now, to know any of this, you would have to look very closely at the hat, which Kit allows the Virus to do. While the Virus is examining the hat, Kit uses the party hat's pointed top to stab the Virus.
Summoning Cat God: 3/30
What's the point if it isn't wierd? ©
Posts: 1,260
Joined: Feb 2018
Pronouns: it/its
Location: ohio
12-24-2018, 02:00 AM
Firstly, the bird, due to it not being stated that they were being held by something, puts the fire extinguishers in its B.I.R.D. (Bird Inventory/Recycler/Defender), allowing it to recycle the fire extinguishers into their constituents, allowing it to use these constituents to give something an aspect or just make something else.
The bird then firewalls in the Processor, both heating it further and preventing anything from getting to it.
The bird then uses the scrap metal from the aforementioned BIRDed extinguishers to help with building the fortress. (3/5)
Posts: 74
Joined: Nov 2018
Pronouns: He
Location: Philippines
12-24-2018, 08:05 AM
It seems...we have a problem here.
Action 1:
Create a program capable of slowing down the processing power of the virus, infecting the virus, if you will.
Action 2:
Rewrite code of reality to separate cyberspace to specific subroutines, forcing the virus to only be able to corrupt one thing at a time.
Action 3:
Rewrite the bird of Numbers into a birb, cute, adorable, and harmless.
Posts: 979
Joined: Jun 2018
Pronouns: She/Her
Location: England
12-24-2018, 09:38 AM
The dragon goes to sleep! (Action 1)
The dragon puffs some smoke into the air! (Action 2)
(Charge progress 2/30)
owo whats this???
Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-26-2018, 06:09 AM
Due to Christmas and family, update was unforunately pushed aside. Will be coming tomorrow, I assure you.
Posts: 23
Joined: Dec 2018
Pronouns:
Location:
12-27-2018, 01:07 AM
(This post was last modified: 12-27-2018, 02:20 AM by KeepOnRolling.)
Quote:(Focused)
Sam quickly summons a set of fire extinguishers rated to extinguish electronic fires, and uses them to extinguish the fire on the Heisenberg processor. I think other people should try to help defend this.
The fire is extinguished! The Processor will not take anymore damage from the previous fire this turn, and will take less damage this turn as well.
Quote:Action 1: Booting up the latest edition of Doors99. This may take a whi- Is that a popup preventing it from booting?
Action 2: Click through the popups. Yes, I want to boot Doors99. No, I don't want to install more programs.
(+1 Charge/Boot-progress, 1/30 -> 2/30)
Action 3: Load up a trojan horse with all kinds of malware, and leave it near the virus. Let's see the virus resist that, eh?
The Virus quickly detects the Malware hidden within the Trojan, and manages to assimilate them into its code! It spreads the Malware through the forum, and corruption increases!
Quote:Meow!: Catjitsu FTW!
Action 1: Realizing that corruption is bad, Kit prowls back over to his keyboard. With his new ninja cat dexterity, it looks as if he is actually typing. "What is he typing?" you may ask. Well, it is a little known fact that cats have low attention spans. This means that, since Kit was E-Mailing the Virus a very, very important message, it eventually got very confusing, filled with tons of random videos and pictures that really had nothing to do with anything. It's like that one guy you know that starts talking and then doesn't stop until you point out that he's totally off topic, but, unfortunately, Kit still won't stop. Kit then, after using his highest gigabyte memes, sends it to the virus. Kit meows, "Hey Virus, tell me once your done reading that!
Action 2: Kit puts on a party hat. But, this is no ordinary cone shaped party hat. On the hat, there is one big star. The star is made of five streamers and a pentagon. Each streamer comes to a point. At each of those points, there are three pieces of glitter. Each piece of glitter has a small speck of dust on it. The dust particles of each set of three glitters make a line. If you connect these five lines, it makes a decagon. And do you know how many letters there are in "decagon"? 7. Now, how many letters are there in the words "party" and "hat" together? 8. Now, what do you get when you subtract decagon from party hat? 1. Now, how many letters are there in one? 3. Illuminati Confirmed! Now, to know any of this, you would have to look very closely at the hat, which Kit allows the Virus to do. While the Virus is examining the hat, Kit uses the party hat's pointed top to stab the Virus.
Summoning Cat God: 3/30
The Virus, while being forced to sift through all of those memes, has had his processing power slowed down! It will be stunned for the next turn!
Unable to properly compute the data Kit has given it due to still processing memes, the Virus foolishly approaches the party hat, and is stabbed straight in the face! 1 damage!
Quote:Firstly, the bird, due to it not being stated that they were being held by something, puts the fire extinguishers in its B.I.R.D. (Bird Inventory/Recycler/Defender), allowing it to recycle the fire extinguishers into their constituents, allowing it to use these constituents to give something an aspect or just make something else.
The bird then firewalls in the Processor, both heating it further and preventing anything from getting to it.
The bird then uses the scrap metal from the aforementioned BIRDed extinguishers to help with building the fortress. (3/5)
The bird recycles the fire extinguishers! The Processor has been firewalled, and takes 4 damage! it cannot be interacted with next turn!
Quote:It seems...we have a problem here.
Action 1:
Create a program capable of slowing down the processing power of the virus, infecting the virus, if you will.
Action 2:
Rewrite code of reality to separate cyberspace to specific subroutines, forcing the virus to only be able to corrupt one thing at a time.
Action 3:
Rewrite the bird of Numbers into a birb, cute, adorable, and harmless.
The Virus is unable to stop your program or subroutines due to Kit slowing it’s processing power, and it is rendered incapable of any direct corruption for the next 3 turns!
You cannot directly interfere with others players unless they have given permission or have summoned themselves as an entity!
Quote:The dragon goes to sleep! (Action 1)
The dragon puffs some smoke into the air! (Action 2)
(Charge progress 2/30)
The Dragon does these things!
The Battlefield
The Virus attempts to launch an attack on the Processor, but the Scout Team gets in its way and interrupts, causing the DDOS attack to launch and nullifying The Virus efforts!
Virus Health: 98/100 (Stunned for next turn)(Cannot corrupt for 3 turns)
CORRUPTION: 37%
Scout Team: 70-70-70-70-70-70
Heisenberg Processor: 104/115. 4 turns remaining (Cannot he interacted with next turn)
Posts: 66
Joined: Dec 2018
Pronouns: he/him/his
Location: Orlando
12-27-2018, 02:02 AM
Scouting Efforts 1: 4/5
(Action 3)
Sam quickly sets up a temporary Tor Node to protect the Heisenberg Processor. It will block the next attack against the Processor.
Posts: 13
Joined: Dec 2018
Pronouns: Why not?
Location: Middle of Nowhere
12-27-2018, 02:05 AM
Action 1: Satisfied with his conspiracy hacking skills, Kit ninjas into the fort again. Staring down the Virus, Kit pulls out a simple ball of yarn. Kit then pulls out some knitting needles and starts knitting. It ends up being a thin but warm blanket, with a reasonable amount of extra yarn attached to it. Kit throws it at the Virus, but holds onto the extra yarn. He then Naruto runs around the virus, wrapping the extra yarn around the Virus. Then, he stops and pulls out a strange array of knitting needles. Each one is of different length, and a few have strange holes in their tips as opposed to solid tips. He restarts his sprint, but this time spending his time stabbing these needles at the virus. He makes sure to stab them into the blanket at different angles to prevent them from dislodging themselves.
Action 2: Since the Virus is distracted, Kit decides to attach a cookie to the Virus. Now, this is not your regular cookie. It is a computer cookie, which is normally used to track how long you are on a website. However, this cookie is a universal cookie. Instead of tracking how long you are on one website, it tracks what website you are on. To attach the cookie, all Kit has to do is slap it onto something. Kit also makes sure to avoid anything attached to the virus that isn't virus. Meow: I will learn where you live!
Summoning Cat God: 4/30
What's the point if it isn't wierd? ©
|