Difference between revisions of "Computer"

From Bit Phoenix Software
Jump to navigation Jump to search
(Created page with "A '''computer''' is a hackable item in The Peacenet. Computers can be owned by sentiences, companies, and other entities in the game's world. Al...")
 
(No difference)

Latest revision as of 18:34, 28 March 2019

A computer is a hackable item in The Peacenet. Computers can be owned by sentiences, companies, and other entities in the game's world. All computers in the hypervisor are simple virtual machines running Peacegate OS.

Components

Each computer in The Peacenet has a set amount of components that decide what the computer is capable of doing and what it will do.

RAM

Main article: Random Access Memory

The amount of RAM in the computer determines how many concurrent programs and commands can run on the computer. Each program or command takes up a set amount of RAM on the system.

Filesystem

Main article: Filesystem

The filesystem stores all the programs and commands installed on the computer as well as each user's Home Directory, documents, pictures, music, videos, downloads and desktop items. The file system also stores the system's log files.

Services

Services are programs that run in the background of Peacegate OS on the computer. These services typically expose some sort of functionality, such as a Peacenet site, that people within the world may utilize over the network. These services are typically exploitable by hackers to deploy payloads to the computer.

System files

Hostname file

The computer's hostname is always stored in /etc/hostname. This hostname is displayed in various areas of Peacegate OS, within the Terminal, and within Peacegate Desktop. Hostnames should not be confused with domain names, which are used to identify the computer in public, in place of an IP Address.

System logs

Actions performed on the computer by various users are logged in the /var/log directory. These logs can be used to identify the suspect in the case of a successful hack. In this case, the perpetrator of the hack can either be sent into a state of Alert, or counter-hacked.

Binaries folder

Everything in the /bin folder is capable of being run by a user. All installed programs and commands are found in this folder.

Home folders

Each user in Peacegate OS has a Home directory in /home. These directories allow the user to store files such as documents and pictures. The Root user has its own home folder as well, stored in /root.