Challenge response -
genre_savvy
Mar. 24th, 2009 01:26 am![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Prompt from
genre_savvy:
I'm kind of curious to see Red Alert and/or Mirage in this 'verse. But that's really vague and I don't have an actual prompt to offer. Sorry.
Heh, your curiosity sparked mine. And thus...
“Whoever wrote this piece of work was a fragging genius. I want to find them and get them on our side. Look at it. Uses common coding so it’s practically undetectable when it slips in, goes inactive when the system starts a scan, plants fake copies everywhere once detected to hide the real program, and it's blazingly fast at doing so… The best chance we’d have of finding and deleting this once it infects a computer is to have something monitoring the system every nanosec for spikes of activity.”
“Oh, it did infect a computer. Teletraan, to be exact. S’how we got a copy.”
“What? Who caught it?”
“Not a 'who', really. Our network security software is a pretty dedicated bugger.”
“Well, with all the code monkeys working on the Red Alert program, no wonder. It’s like their first born.”
“Tell me about it, they’ve been completely unbearable ever since Red caught the virus. They’ve even claimed dibs on naming the bug. They’re calling it the Mirage.”
“… Rather fitting. But aren’t viruses usually named by their programmers?”
“Not this one. Funny thing is… when we examined the viral code, apart from the commands to infiltrate and stick around as long as it could, nothing detrimental was programmed. It doesn’t even use up a lot of processing memory. The technology folk think it’s just someone trying a test run of our security systems and ‘their Red’ for a later incursion.”
“Nothing?”
“Nothing.”
“Well, frag.”
“Yeah. The boss folk are going spare.”
![[livejournal.com profile]](https://www.dreamwidth.org/img/external/lj-userinfo.gif)
I'm kind of curious to see Red Alert and/or Mirage in this 'verse. But that's really vague and I don't have an actual prompt to offer. Sorry.
Heh, your curiosity sparked mine. And thus...
“Whoever wrote this piece of work was a fragging genius. I want to find them and get them on our side. Look at it. Uses common coding so it’s practically undetectable when it slips in, goes inactive when the system starts a scan, plants fake copies everywhere once detected to hide the real program, and it's blazingly fast at doing so… The best chance we’d have of finding and deleting this once it infects a computer is to have something monitoring the system every nanosec for spikes of activity.”
“Oh, it did infect a computer. Teletraan, to be exact. S’how we got a copy.”
“What? Who caught it?”
“Not a 'who', really. Our network security software is a pretty dedicated bugger.”
“Well, with all the code monkeys working on the Red Alert program, no wonder. It’s like their first born.”
“Tell me about it, they’ve been completely unbearable ever since Red caught the virus. They’ve even claimed dibs on naming the bug. They’re calling it the Mirage.”
“… Rather fitting. But aren’t viruses usually named by their programmers?”
“Not this one. Funny thing is… when we examined the viral code, apart from the commands to infiltrate and stick around as long as it could, nothing detrimental was programmed. It doesn’t even use up a lot of processing memory. The technology folk think it’s just someone trying a test run of our security systems and ‘their Red’ for a later incursion.”
“Nothing?”
“Nothing.”
“Well, frag.”
“Yeah. The boss folk are going spare.”