[center][h1]HACKERS.CHATROOM[/h1] [hr] [img]https://media1.tenor.com/images/8be4efc0a8e5bc4903aae00db82cb982/tenor.gif?itemid=5648977[/img][/center] [mark]SYSTEM[/mark][color=lime][quote] Attempting connection to irc.secret.nš˜¦t (Standalone Servers) on port 1314 Looking up server host name (irc.secret.nš˜¦t)... Server has 16 IP addresses, random address selected Server host name resolved to 289.45.21O.21 Contacting IRC server irc.secret.nš˜¦t (289.45.21O.21) on port 1314 Connection established [irc.secret.nš˜¦t (289.45.21O.21:1314)] Local host address is 192.168.1.7 Login operations initiated Input value for username: [color=white]ā–‚[/color] [/quote][/color] [mark]CHATROOM_3[/mark][quote] [color=lime]User has joined #Chatroom_3[/color] [color=silver] Welcome, Traps.[/color] [color=plum] Hi[/color] [color=silver] Before you start, some simple questions to make sure that you are okay with the channel. Standard procedure, I hope that you understand.[/color] [color=plum] Go ahead[/color] [color=silver] Excellent. First, are you in any way affiliated with government bodies?[/color] [color=plum] Not at all[/color] [color=silver] Do you agree to discuss the contents of the channel with no one, and refrain from storing logs?[/color] [color=plum] Okay. I make deleting browser history a habit.[/color] [color=silver] Nice...[/color] [color=silver] That's actually all. You're good to go. [/color] [color=silver] Finally, do you have any questions for me? [/color] [color=plum] Yes, a serious one. About the server...[/color] [color=silver] I will see if I can answer that. [/color] [color=silver] Do note that some of the information are confidential for security purposes.[/color] [color=plum] So why is my name pink?[/color] [color=silver] ...[/color] [color=lime]User has logged off[/color] [color=plum][/color] Can you help me change it to something cooā–‚ [/quote] [center][h3]METAGAME[/h3][hr] The Roleplay will be about a secret chatroom on the internet only accessible to those talented in hacking. All kinds of anonymous hackers congregate here to discuss about hacking, form alliances, or sell and buy [i]"services"[/i]. There are a total of 16 chatrooms (Chatroom_0 to Chatroom_15) but this role play will take place mainly in Chatroom_3. Each chat room has a keeper that takes care and manages the channel to prevent leakage of information. The origin of the Hacker's Chatroom is a mystery. RPers post in the form of chat logs, hacking behaviors (for example if you hack into a bank there will be codes; you donā€™t need to understand programming, just be creative), and a bit of actions in roleplay charactersā€™ life. [/center] [center][h3]WORLD SETTING[hr][/h3] The role play is set in a universe very similar to ours. World events tie loosely to real world events. The date is Sunday, 24th December 2017 (GMT) and it is Christmas Eve. [/center] [center][h3]THE CHATROOM[hr][/h3] [img]https://s-media-cache-ak0.pinimg.com/originals/d1/35/c8/d135c84953d0961883ab30fc8051a7f4.gif[/img][/center] The Secret Net was an open-sourced software designed for traceless communications between criminals and people intending to keep their identities anonymous. Just like many other open-sourced codes before it, its origin was largely a mystery with its creator unknown. The Secret Net did not catch the public eye, until five years ago when a notorious group of seventeen hackers calling themselves "The Keepers" decided to alter the software's source code and designed it in a way that they have full control on the traffic of the Secret Net. The new software then became a popular social platform among hackers well-known for its impenetrable security, and hence the origin of what you know today as the Hackers' Chatroom. The main server of the Hackers' Chatroom does not occupy a specific physical location. In fact, every user device acts as a server to the chatroom upon first connection, making it near impossible to DDoS or shut down as long as any one of the users are still connected to it. Depending on individual chatroom keepers, some may host the channel's database in a well-maintained server room for additional security measures. Each keeper has a unique way of defending and managing their own channels. [center][h3]ROLEPLAY PLATFORMS[hr][/h3][/center] [b][u]Discord[/u][/b] [url=https://discord.gg/SE4HVj9](link)[/url] *Discord Logs will be posted regularly by GM to the IC post. 1. Chatroom_3: Public Channel 2. Chatroom_3: Users PM Channel 3. Chatroom_3: System Channel [u][b]Forum IC Posts[/b][/u] 4. Personal Device Interface (hacking jobs, notes keeping, program creations, etc.) 5. External Systems (Bank security servers for example) 6. Character Real Life (thought processes and real life behaviors) [center][h3]USERS[hr][/h3][/center] [b][u]1. The Keepers[/u][/b] The infamous hacker group consists of 17 team members each skilled in executing different types of hacks. Throughout the last decade, large-scale hacks have been performed by the group, inflicting widespread financial damage to the world. Nobody knows their exact identity, and what is the organization's ultimate intentions. The Keepers are the main managers of the 16 channels of the Hackers' Chatroom. [b][u]2. Hackers[/u][/b] Those who are talented enough to hack and access the secret net are mostly welcomed to mingle in the chatroom as long as they follow the keepers' rules. Hackers often befriend, chat and share about their hacking experiences with each other, forming a sense of bond within the hacker community. [b][u]3. Criminals[/u][/b] Non-hacker criminals may access the net through special means approved by the keepers. They make use of the chatroom to contact with clients that are looking for their special services, or collude with other criminals in performing illegal activities. [b][u]4. Clients[/u][/b] Through a cleverly designed security system, clients may be granted temporary restricted access to the Hackers' Chatroom to buy all kinds of services from other criminals. [b][u]5. Others[/u][/b] Sometimes secret agents, lost birds, and people who might cause trouble to the chat room may gain access to the platform. The keepers do not welcome this sort of people and will ban their IP address immediately upon exposure. [center][h3]CHARACTERS[hr][/h3] [hider=Character Sheet] Name: real name Username: your pseudo-name in the chatroom channel Age: 1-99 Appearance: [Optional] Image or Description. Chat color: pick a color to represent you. First come first serve (and pink is available, no worries) Device(s): laptops, computers used to access the chatroom and hack stuff. Occupation: Be it a spy, a freelance hacker, a computer science major, a police officer, a serial killer... Cyberskills: any skills related to computer or hacking. Personality: how you are like in the real world vs the cyber world. Background: what is your history in the real world and cyber world. [/hider] [hider=Keeper_3] [img]https://image.ibb.co/jATMn6/hacker_girl.png[/img] [color=peachpuff]Name[/color] Kelly Watson [color=peachpuff]Username[/color] Keeper_3 [color=peachpuff]Chat Color[/color] Peachpuff [HEX:#FFDAB9] [color=peachpuff]Device(s)[/color] [img]http://wallartpicture.com/wp-content/uploads/2017/06/Cute-Girly-Girls-Wallpaper-WallArt025-235x165.jpg[/img] [img]https://i.pinimg.com/170x/27/35/77/273577416acf83357fb9d396093191cf--iphone--plus-rose-gold-tumblr-iphone-rose-gold.jpg[/img] As a feverish Apple fan, she always has the brand new Mac and iPhone at her disposal. Although simple they may seem to be, Kelly is able to make use of the devices to perform quick and sneaky hacks whenever she needs to get a job done. [color=peachpuff]Occupation[/color] Magazine Bikini Model Youngest member of The Keepers [color=peachpuff]Cyberskills[/color] Keywords: quick dirty hacks [color=peachpuff]Personality[/color] Keywords: Playful, Sociable, Sympathetic [color=peachpuff]Background[/color] Kelly has become the new keeper of Chatroom_3 after mysterious disappearance of the previous keeper two years ago. Although not new to hacking, the girl is still new to the keeper's job. She still makes mistakes here and there -almost exposing the whole channel at times- and requires help from other keepers to help her in fixing her errors. [/hider][/center] [center][h3]RPER'S GUIDE[hr][/h3][/center] [quote=@Mattchstick] [b][u]BASELINE RULES:[/u][/b] 1. Follow all the Fundamental Rules of the Guild. Here's a [url=https://www.roleplayerguild.com/topics/163267-fundamental-rules-of-the-guild/ooc#post-4291608]link[/url] if you need a refresher: 2. For newcomers to discord CHATROOM_3, post in the #ooc channel first; we will assign you the correct roles. 3. Everything posted in the CHATROOM_3 discord channels is IC. You should be posing as your character. 4. The best place for OOC questions about the RP is in the forum's OOC; the one in discord is mainly for Discord-related questions. 5. Make sure your nickname in discord is your CS Username. You can change it by right-clicking your name on the bar tn the right and click "Change Nickname". [b][u]POST LIMIT:[/u][/b] The minimum for posts is three paragraphs once per week. The minimum for Discord activity is once per week. [b][u]SO WHAT'S THE DEAL WITH THE DISCORD?[/u][/b] The Discord is an extension of the RP. The RP itself is somewhat Slice of Life, and it is still an RP, so you need to be posting IC on the Guild. Try to make your IC activity match your Discord activity. If your character is unable to access the hacker.chatroom IC, don't post in the Discord until they are able. You can post OOC as frequently as you like, but Discord IC should match Guild IC. [b][u]SO WHAT IS THE WORLD/STORY LIKE?[/u][/b] Early game we are letting people do whatever they want in terms of story. It's a modern day open-world "write your own adventure" sandbox, where you'll have freedom to do what you want. Since we're hackers, you can be located anywhere in the world. Over time, the GM and I will be working in story elements, most likely in #bulletinboard or #public posts. They'll be a bit like optional missions, so if you aren't sure what to do, you can go to them and move the story forward. You can ignore them, or you can launch straight into them.[/quote] [center][h3]HACKING 101 (OPTIONAL)[hr][/h3][sup]On writing professional codes... or how to make up fake convincing ones[/sup][/center] [hider=HACKING 101] The essence about programming is to understand that machines are brainless, and all you are doing when you code is you are ordering it to perform precise tasks for you. There are countless programming languages out there, but the logic is always the same. Here are some simple steps on how to code a program (note the coding terms are not real, I made it more intuitive): [b][u]1. Define your goal[/u][/b] Lets say you want to program your robot to move from point A to point B which is 100 meters away, then you have to break down the goal into more objective and precise actions: move the robot forward for 100 meters. [b][u]2. Step by step[/u][/b] Every single command needs to be written down. In the previous case, the pseudo-code can look like the following: [mark]Robot[/mark] [quote][color=lime] move right_leg forward; move left_leg forward; move right_leg forward; move left_leg forward; .... [/color][/quote] [b][u]3. Group repetitive actions into functions[/u][/b] As you can see, actions can get too repetitive. In coding, you may define functions and loop them. Lets call the function "Walk", and we input "stepsLeft" into the function. The indentation is used to indicate that the coding lines are grouped under the same function. [mark]Robot[/mark] [quote][color=lime] define Walk(stepsLeft): [indent]if stepsLeft not equal 0: [indent]move right_leg forward; move left_leg forward; stepsLeft = stepsLeft - 1; Walk(stepsLeft);[/indent][/indent] Walk(100);[/color][/quote] What the code did there was first it defined a function named "Walk" with the input variable named "stepsLeft". Depending on the steps you input, the robot will walk for that exact amount of steps. Then finally, it calls out the function "Walk(100)" which means the robot will walk for 100 exact steps forward. You can also loop the actions without defining a function: [mark]Robot[/mark] [quote][color=lime] loop for 100 times: [indent]move right_leg forward; move left_leg forward;[/indent][/color][/quote] [b][u]4. Let your robot make binary decisions[/u][/b] Sometimes a decision cannot be made on the point of writing the software. This calls for decision making by the robot. For example, the distance of point B is undefined. The robot needs to sense whether it has reached the location every time before it makes the next step. Do note that robots can only make binary decisions (Things that are true or false): [mark]Robot[/mark] [quote][color=lime] define Walk: [indent]move right_leg forward; move left_leg forward;[/indent] loop if sense(location) not equal Point_B: [indent]Walk;[/indent][/color][/quote] [b][u]5. Be precise[/u][/b] Just remember that every single command needs to be precise and not ambiguous. For example, "walk for a long distance" is not precise enough as the word long is really subjective; "walk for 100 steps" is a better choice. [b][u]6. Be consistent and organized[/u][/b] Organize your codes with proper indentations, punctuation, and spaces. Be consistent with the word choices you are using. If you use the term "loop" to repeat your robot's actions, don't change it into words like "repeat" or "again" in the same program. Be consistent with how you organize the code as well. [u][b]7. Comments[/b][/u] Sometimes there is a need to put comments in your code so that you (or others) understand what each section of the program means at first glance. Here is one way to do it: [mark]Robot[/mark] [quote][color=lime] [color=silver][i]//This part defines a function to walk forward//[/i][/color] define Walk: [indent]move right_leg forward; move left_leg forward;[/indent] [color=silver][i]//This section senses if the robot has reached its location, and continue moving if it is not//[/i][/color] loop if sense(location) not equal Point_B: [indent]Walk;[/indent][/color][/quote] Comments are invisible to the robot upon execution. They are purely there for clarification purposes to the human programmer. [u][b]8. Use your creativity[/b][/u] The beauty of programming is there are always more than one solution to a problem. So use your creativity! As long as it gets the job done, it is a good code. In a role play, if you are creative enough, you may even express your character's personality through your codes. No single hacker approaches a single problem from the same perspective. [u][b]9. Extra Resources[/b][/u] [url=https://www.roleplayerguild.com/topics/164520-misc-cyber-and-information-security/ooc]Cyber and Information Security[/url] [/hider]