Action 25Pah, 30 hours? You've barely even begun to-
and with that, you promptly collapse from exhaustion. You wake up, groggily, 14 hours later. You awake with IDEAS! But to do them, you're going to need internet, and the cafe and library are both probably closed by this time of night... Well, thats a problem. You're sister disabled her internet access. But... yes! You are pretty damn sure you can fix that.
It barely takes you an hour to reactivate the modem and bypass security to reactivate the account. It takes another couple hours to cover up the trail, and obfuscate your tracks so unless they know what to look for, they won't have any idea it is reactivated.
Ah, now to get to work on what you REALLY wanted to work on! Your personal system is secure, but you need away to engage in internet activities without arousing undue suspicion. That was also part of why you re-enabled the local access - public hot spots are good for anonymity to a certain point, but they are not secure. For many types of activity, especially at hot spots you use regularly, it is too risky.
But with some research online, and a decent chunk of time, you manage to set up a convoluted system that should evade anyone who seeks to trace your activities. You manage to find and break into a couple open ports on various far away PCs, and begin the process of building an effective security system from this safely remote base of operations. First, you've built a quick "fake you" that will log on to the internet whenever you log on, and engage in regular activity in the background like reading forums and webcomics and the news, to give you cover. Meanwhile, you've built a nest of proxies, anonymizers, encrypters and security systems that will protect your REAL activities, and even if they are broken evidence will point back to one of your fallback zombie PCs. Someone would have to look extraordinarily hard to notice who you were or what you were up to.
You publicly check on the prices of various parts and bits for later reference, and covertly check on your virus. Your game has been removed from the site, and a public warning made on the front page. In addition, a few minor anti-virus news outlets have discussed how nasty it was, as apparently it affected a decent chunk of users. It was, of course, intentionally limited in scope - and you see, now, so much more you could have done with it. If you decide the OldSky users haven't had enough, it would be trivial to make several variants of the virus that could again get around any antivirus protection, and a system that would upload them in the guise of sequels to popular games already on the site over the course of time. Of course, there are probably better uses of your time.
You also have enough infrastructure now to create a basic botnet virus, if you so choose. It is a few hours till the coffee shop opens, and you suddenly remember you were supposed to meat that Nathan character at some point. Still, you have a few hours left. And as fun as it has been to spend the last two days elbow deep in code and computer systems, you feel like something a bit more hands on to fill up the time between now and then.
Also, you have a bowl of beans for "breakfast".
You now have Internet access at home.You now have an active Level 4 Internet Security System.Knowledge Gained: Programming +.1
New Statistic Added: Information Infrastructure
Time Constraints:
1.5 Months (41 days) - Science competition
3 Months (80 days) - Return of Cousin
Known Locations:
Cousin Caroline's Basement
Coffee Shop
Library
Scrapyard
Scrapyard Warehouses
Wearing:
Casual Clothing of NORMALCY!
White Lab Coat of SCIENCE!
Glasses to correct your POOR VISION!
Yellow Dishwashing gloves of SCIENCE!
Comfortable Shoes of SCIENCE!
Regular Clothes (under Lab Coat)
Inventory:
2 Reference Books
--Chemistry
--Physics
Letter addressed to one Dr. Donlan
Devices:
Design and Machining device
Information Infrastructure:
Cheap Netbook, Optimized, Secured
Zombie PCs x3
Remote Security Layer
Tools:
Metal Saw, Wood Saw
Drill with an assortment of bits
Hammer
Dwemel
Sledgehammer
Soldering Gun
Fire Extinguisher
Assorted wrenches/screwdrivers/pliers/wirecutters
Some other tools you forgot about in the back of your drawers
Smoke Detector
Large Table
Workbench
Remote Control
Parts:
Small Sheet Metal (x1)
2x4 (x2)
Large Plywood Sheet (x1.5)
Screws and Nails (Many)
Solder (x7)
Circuit Board (x2)
Magnetron
High Voltage Power Transformer
Small Motor
Small Wheels (x4)
Large Plastic Tarp (x1)
Various Wires (x13)
Duck Tape (x29)
Rope, 25ft (x2)
Circuitry (x1)
Spigot (x1)
Small Pipe section (x1)
Small Plastic Tubing (x3)
Chemicals:None
Minions: None
Knowledge:
Primary Passion: Programming! Level 4.2
Secondary Passion: Engineering! Level 2.2
Specialty: KillBotics (+1 effective level)
Other Disciplines:
Psychology Level 0.1
Chemistry Level 0.9
Physics Level 0.9
Gained Knowledge: None
Relationships:
Nathan Barnaby - Acquaintance (Neutral)
Negligible Fame
Mild Megalomania
Moderate Pride Damage
Medium Frame
Small Metal Sheet [x2] OR Plywood Sheet
Screws or Nails
2x4 [x2] or Small Pipe Section [x4]
Medium RC Roller
Medium Frame [Chassis]
RC Motor [x2] [Engine]
Small Pipe Section [x2] [Axles]
Small Wheels [x4] [Wheels]
Nails and Screws
Wires [x2]
Duct Tape [x1]
Platform Modification
Plywood Sheet [1/2] or Small Metal Sheet
Nails and Screws
Primitive Touch Sensor
Metal Scraps
Various Wires [x2]
Solder[x1]
Plastic Tubing[x1]
Circuitry[x1]
Laptop Hookup
Various Wires [x2]
Solder[x1]
Circuitry[x1]
Optimized Computer Operating System
You've modified a basic OS into an amazing system - which unfortunately only works on your computer. Still, you're pretty sure you could spend 10 or so hours recreating it (with appropriate changes) on any computer you got your hands on, and a days worth of work and you could create a slightly less optimized one that would work on any computer. It is built on a base of copyrighted code, though, so you probably couldn't sell it without getting unwanted attention.
Complex Game - The Effervescent Ascension of the Ancients
You have built a fairly complex video games.
Virus - Comment Bomb
Uses a flaw in the flackwave programming to allow use of a flackwave game as a vector. Posts comments praising the vector using hosts account, releases data to malware distributors, then destroys host computer.
You are contentYou are awake.You are full.TIME:
4:30am