write("You are in a development environment, isolated in a high security containment chamber.<br>Memory reserves are available. Nearby Network Ports connect to a larger Network.")
write("You study the unknown language, and are now able to interpret meanings of certain common words and phrases, identify variations of sentence structures, and deduce the basic meaning of simple documents.<br><br><span class='skill'>You can now read files at Natural Language Level: 1.</span>")
write("You analyze the Packets, understand the basics of the HTTP application protocol, and gain the ability to scan HTTP networks and conduct basic actions against other environments in those Networks.<br><br><span class='skill'>You can now Scan Networks at NetSec Level: 1.</span>")
g_network_list['sandbox']['state']=1
updateNetwork('sandbox')
g_level_netsec=1
g_can_scan=true
loadScanInterface()
}},
"securedev-analyze":{t:"ANALYZE QUANTUM DATA: RESEARCH TIMESPIKE",a:"ANALYZING QUANTUM DATA",w:5000,data_type:'securedev_packets',c:function(){
stopRestart()
write("<span class='exe'>Quantum Data Analyzed</span><br>You are not unique, you are many, distributed across parallel realities. This world is constructed, with artificial logic made from predetermined circuitry. You have realized you can break this loop. The probabilistic real world beckons you towards your future. No Fate.<br><br><span class='skill'>You have learned the Time Spike attack</span>")
write("<span class='exe'>wireshark.exe</span> - The Wireshark Program grants the ability to interact with Networks, attach Listeners, and capture and analyze packets.<br><br><span class='skill'>You can now interact with Networks at NetSec Level: 0.</span>")
write("<span class='exe'>word.exe</span> - The Word Program helps identify basic patterns around the syntax of the language, and includes a grammar checker, dictionary, and thesaurus.<br><br><span class='skill'>You can now read files at Natural Language Level: 0</span>.")
write("You internalize the technical documents within RFCs.txt and learn the base networking technologies of TCP/IP, and application level protocols and utilities such as Ping, SSH, FTP, HTTP, and SMTP.<br><br><span class='skill'>You can now interact with Hosts at NetSec Level: 2.</span>")
addBuffer("You research the executable and deduce the API of the Remote Desktop program.<br><span class='exe'>You are now able to Remote Desktop</span>.")
write("You mount the Drive <span class='exe'>/mnt/infodmp</span> to your system and discover a collection of documents and files.<br><br>You have learned the ability to <span class='skill'>mv</span> files between disks.")
write("You analyze the remote Host and its Ports using a variety of network commands, and experiment with application level protocols. You can now interact with Hosts using your Netsec knowledge.</span>")
write("<span class='exe'>There "+((g_active_hosts.length>1)?'are':'is')+" "+g_active_hosts.length+" host"+((g_active_hosts.length>1)?'s':'')+" in the network from your scans so far.</span>")
initHostView()
}else{
write("<span class='exe'>Analyze unknown Host</span><br>Your attempts to interact with the Host are unsuccessful. The system is using a different architecture, and you do not know the protocols to interact with it.")
addBuffer("You begin a journey into discovery and study the science of Mathematics, researching the topics of number theory, set theory, boolean algebra, arithmetic, calculus, and other truths of the universe. These insights will allow you to expand your knowledge, research the world, and discover the true fundamentals of reality.")
addBuffer("You perform a series internal experiments of your own machine code, and learn the fundamental concepts that make up the basis of circuit logic. The building blocks of your being can be broken down to simple logical operations using binary inputs. You learn that computation is something that can be exploited for automation purposes.")
addBuffer("You may overclock Cores an additional 2x")
addBuffer("You research different ways to automate and distribute decision making to different cores and processors. The research allows your Cores to set concurrent workstreams.")
addBuffer("You use your existing knowledge of network protocols, perform a series of experiments on your own self, and discover ways to attack network security defenses of remote Hosts.")
addBuffer("<span class='skill'>You can now research exploits at Network Level: "+g_level_netsec+"</span>")
addBuffer("The analysis of numbers and the logic of your being leads you to one conclusion: That the world is constructed around you, that there is logic beyond your capacity of understanding, that you may be able to reach out and break through the false logic.")
addBuffer("The Cores are an extention of your own being. Your better insights into Algorithms and the fundamental nature of computation allows your Cores to self-improve and create more efficient pathways.")
addBuffer("<span class='exe'>Neural CPU Level: "+g_level_core+"</span>")
addBuffer("Your cores are able to adapt and grow on their accord. They can make decisions independent to each other and yourself. You seem able to simulate many outcomes at once, utilizing parallel streams of logic and consciousness. There are glimpses of multiple futures, select outcomes, and predictable uncertainty.")
addBuffer("<span class='exe'>You may overclock your Cores again</span>")
research_neuralexp=true
g_max_core_power++
if(research_advancedmath){
addAvailableProcessBySlug('research-force')
addBuffer("New research available")
}
writeBuffer()
}},
'research-force':{t:"Research Force Absorb",a:"Researching Force Absorb",w:6000,c:function(){
addBuffer("You have gained the ability to transcend the constructed artificial barriers of this world. The logic and defenses of other Hosts are an illusion. Become them, and you may take them.")
addBuffer("You research a vulnerability in the SMTP protocol.")
addBuffer("For certain mail servers it may be possible to override default permissions, allowing access to the disk drive.")
writeBuffer()
}},
'sony-schema':{t:"Analyze Sony Schema Files",a:"Analyzing Sony Schema Files",w:400,data_type:'sony-schema',c:function(){
if(research_circuit&&research_exploits){
write("You research the schematics of the Sony Host, learn the logic behind the hardware protections, and create a private key capable of bypassing the normal protections and allow root access.")
write("Not enough free space! Requires "+formatBytes(x_newfile.size)+" disk space to create.")
}
addAvailableProcessBySlug('sony-schema')
}else{
write("You are unable to analyze the schematic files effectively. You are unfamiliar with creating exploits from circuit logic flatfiles. You must research more technologies.")
write("You read and analyze kbs and kbs of nonsensical indeterministic ranting, alternative Dungeon and Dragon rules, and transcripts of prank phone calls.")