- Implements DoS traffic generator that is available via software downloads on emagged computers (computer emagging will be added separately)
- This generator sends DoS traffic to the NTNet relay. Amount of generated traffic is linked to connectivity (Wired: 5GQ/s, High Signal: 1GQ/s, Low Signal: 0.25GQ/s)
- NTNet relays dissipate this DoS traffic on their own (at 1GQ/s rate).
- Multiple devices running this program against one relay will have cumulative effect. For example, one wirelessly connected device would not be able to overload the relay, since it dissipates same amount of traffic as wireless device generates. On the other hand, two wirelessly connected devices would eventually result in overload and failure of relay.
- (D)DoS attacks may be stopped by manually shutting down the relay and reactivating it again
- DoS program will trigger an IDS(Intrusion Detection System) alert on execution, which will immediately show on the monitoring console. However, if IDS is disabled, only way to detect this is via the relay's UI (it will show increase in buffered traffic)
- Screenshots: http://i.imgur.com/q0gbWJm.pnghttp://i.imgur.com/NVobCWa.png (Visual note: 1s and 0s in the UI change over time, amount of 1s is equivalent to approximate percentage completion of DoS attack)
- NTNet Quantum Relays now have simple UI that allows users to manually toggle them on/off.
- Implements simplified Denial of Service handling for relays. This will be used by next commit that will add antagonist software.
- Relays can buffer and dissipate certain amount of DoS traffic. If this traffic exceeds certain level (configurable via varedit) the relay crashes temporarily.
- Relays may be manually reset by using specific button in the UI
- Relays are now buildable. They are relatively cheap (circuit board and some cables), but the board requires Data Theory 4 research.
- Adds simple NTNet P2P transfer client, that allows users to send files via NTNet.
- This client can act either as actual client (downloading files), or as a server, providing one file at time.
- This may (not guaranteed) be expanded in future, to allow sharing of multiple files at once, possibly even having some sort of dedicated server architecture
- Transfer speed is calculated as lower value of connection speed of both devices (weakest link in the chain)
- Server may be protected using rudimentary password that, if set, must be entered to download the file.
- Fixes#11621 by ensuring reference to analyzed object is nulled even if the analyzed object is not reliable enough
- Adds feedback message that warns the user that analyzed item wasn't reliable enough.
The blob no longer holds the entire obj process hostage while it sleeps.
The blob now respects its own growth limit. Fixes#11627.
Blobs still grow in an X-shape but this should now be much less distinct.