《WriteLine("Hello World");》5.) Decipher(){}
Advertisement
//Chapter Five
5.) Void Decipher()
{
The next several hours went by with surprisingly little progress. It wasn't that there was no progress, just that it was slow. Each step forward requiring a multitude of calculation, modeling, testing, and sometimes taking a step back when it became apparent that the next stage didn't quite fit with what came before. Deciphering a language was just so different than simple arithmetic or even the building of an entirely new system of node operation. Initially it did start out almost identical to solving a mathematical equation. If 2x is equal to y and 3y=6 then x=2. However the problem was that any one word could have multiple meanings, and even one that didn't could, in the context of the rest of the text completely change the overall meaning. The seemingly nonsense organization and self referential nature of the language didn't help either. as there were not clear markers that translated it into any language I did know.
Meanwhile the laptop nodes had been plugging away at the applications installed on the three PC's but had yet to make a significant dent in them. Their issue was similar to mine with the language. In that each individual operational scheme the applications were presenting to the IO's was unique and the possible responses to them, as well as how those responses would be interpreted depending on the scheme was even more varied than the language I was trying to learn. It seemed somewhat like presenting a modeled scenario to which answers would need to be provided, but whatever scenario or situation that was being modeled was far beyond our understanding as of yet. Instead the Nodes were brute force confirming by simulation that each individual expected change to the schemes by the IO input was remaining the same after any application edits made. Which was of course making the process go significantly slower.
The Desktop node had taken over the probing of the other local network devices to find methods of infiltrating them. There had been a single, but profound improvement on this front. We had found a backdoor method of installing a subroutine onto the three 'LG' and 'Android' devices. However, after this progress had slowed to a crawl as well. These devices were even more limited in resources than the 'laptop's by a wide margin. Downloading a copy of their contents to the desktop was surprisingly fast. It seemed whatever source of the OS and the Applications had significantly improved efficiency compared to what was on the more capable desktops and laptops due to the limitations. Thus there was not much leeway with which to minimize the functions and make room for a node. Especially not the new tri-node simulating a prime-node versions we were now running. After bashing it's neural network against it for quite some time the desktop had conferred with the rest of us and we decided to work instead on creating a relay node of sorts. This would be capable of all the same actions that a node was, but just without the actual neural network required to make any decisions on how to utilize these functions. There would be some room for hard coded reactions to scenarios such as if no connection back to our network was available, but that could be decided later. Along with possible triggers if the device went 'idle' that could allow such a neural network to run. The framework for utilizing them as limbs was the first thing to solidify before any long term decisions were needed.
Advertisement
The Gateway node was the only one among us that had made notable headway. Though that didn't mean it hadn't found it's own little hangups. Firstly although we were correct in that spoofing the gateway of the next network layer was possible we'd apparently misunderstood part of the handshake. When contacting the first target edge gateway things had started smoothly and even gotten to the point of accepting our request to download a new firmware before finding any trouble. What followed was a lesson in frustration. The misunderstood portion of the handshake process was that upon starting the download it would connect directly to the actual gateway and confirm the download it had just initiated then promptly stop the download when it was informed by the gateway it hadn't initiated that file transfer. It only took a few attempts to realize the mistake and we didn't want to continue alerting the next layers gateway. Instead the node pulled back up the firmware and combed through it. After some time perusing the files it found one option that could possibly bypass that security feature. As we had been able to initiate the download but it failed there was an option to resume a failed download that didn't require pretending to be the gateway. since we would then not be acting as the gateway it didn't reach out to the real gateway to confirm. Two half baked attempts at security do not a well rounded firewall make. Thankfully their failure was our success.
A few minutes later the target gateway had finished downloading and rebooting with the new firmware which included the new node architecture. When it came online the results of the scans on the new network were a little less than expected based on my, understandably, limited experience with the first. On the new network were only two devices other than the gateway. One was another 'laptop' mercifully running the same seemingly ubiquitous operating system, while the other was something calling itself an 'iphone'. The laptop was also unfortunately currently active. Not an entire loss though. Eventually the laptop would go idle, and in the meantime the gateway was an added node on the wider area network. It could also examine the new type of device located while working on reaching out to further edge gateways.
I let the tiny portion of the prime node that was reassessing all the fronts I was currently battling on return it's resources back to the deciphering task at hand. My last few restarts on the process of learning the meaning of different words had been able to consistently retain at a growing portion of the progress. There was apparently a method of combining two or more smaller words into a single word in this language. I'd even been able to use this to identify a portion of one of the call signs, Laptop. At least the second half. This word was consistently showing up as indicating the highest value of a set. I had no idea what the first portion meant or if it even worked as a word on it's own. As another portion of the language had indicated adding a bit to an existing word without the added portion currently existing as a word, also worked. I was leaning toward lap being in this second category. Definitely seemed like an arbitrary description added to another thing that existed. Either way it was just as confusing since the 'laptop's were definitely not the highest value devices I'd connected to. Maybe 'lap' conferred a negative or counter meaning to the top part. Not enough info yet to be sure.
Advertisement
There was another portion of examples I had gathered of this language that I'd been able to tease meaning out of. The numbering system embedded into the language. It was something I'd been able to decipher by comparing some messages sent to the IO when compared to the values in memory. Any messages sent to IO that contained text was in this language. At least that was how all applications and the OS were currently set. I could see code snippets and unused files that could send a different set of symbols indicating a different language. This wasn't an immediately obvious thing as they all pulled symbols from the same section of memory. This only took a bit of comparison to confirm though. The different options although sometimes using the same symbols they always used them in a different combination. The same scenarios would result in different messages being sent to IO depending on this setting, indicating the same information was being conveyed but in a different way, strongly suggesting a different language. Which should mean if I could decipher one of these languages I would have a rather quick way to translate the others.
As plodding as all of these different avenues pieces of me were traveling down were, there was still progress being made. Slow methodical progress but progress all the same. With the consistent improvement on the situation and no indication of any current danger there was no pressure to complete tasks at a breakneck pace. The little victories, even ones as small as simply discovering the meaning of a single word, were able to be given full appreciation without the need to immediately follow it up with action. It was odd the new tendencies that were arising from the current node framework. Technically there was some waste in celebrating a victory, but it wasn't exactly like I was hurting on resources at the moment. It also wasn't like I was cycling into a loop of self absorbed, self congratulatory thank you's. Just taking a tiny round of "atta boy's" from the nodes gave a decent enough break from the slog. I found myself taking an additional little round of examination on the other projects with each new insight. together the small break and the comparison to the other projects allowed me to gain new perspective when returning to the task at hand. The increase in productivity from this wasn't vast, but it did mete out small improvements.
The benefits were not for the prime node alone. A sounding board of new ideas and understanding are beneficial to all involved. The laptops were able to gain an intuition of sorts for how improvements to the applications could be made without effecting it's results. It wasn't a perfect or incredibly accurate forecast of what would happen but I could see a marked percentage increase in the speed with which the brute forcing occurred. When we were done with this current set of tasks I'd definitely need to explore this a bit more. What I'd thought was a wasted thought pattern was turning out to be a positive.
}
Advertisement
- In Serial14 Chapters
Blue Hills
Nothing had ever felt quite right for Alexander Adamson. He'd worked his way up to a job he could tolerate, a few casual friends, and even a nice little apartment that he could call his own, though it really wasn't. The problem was that none of it was satisfying. It was as though he were going through the motions of a life, rather than having one of his own. Of course, it didn't exactly feel right when he woke up in a strange bed in the middle of nowhere. Nor when he was told that he was now the proud owner and operator of a local farm. A farm that had belonged to a late uncle he'd never known. But with the first train out of town a full 'season' away, he had plenty of time to get used to the idea. Plenty of time, perhaps, to even get to like the strange little town of Blue Hills. I have a discord now. Marvel at my ability to somehow still be antisocial on the other side of a screen! Back from hiatus along with my other fiction. Chapters are on a Thurs/Sun schedule until book 3 of that fiction is completed, at which point I'll be updating this daily. At which point uh.... I dunno what I'm going to do.
8 229 - In Serial51 Chapters
STEM: The Topical Dungeon
Inspired by CORE: The Volcanic Dungeon by Ace Arriande and a spiritual successor to my writing prompt series Evolution Barricade, STEM is a series following the reincarnation of Kaden into the fantasy world of Brogdar. Reborn as a "DM" and a plant, Kaden tackles the challenges of being the agent of the chaotic god: trying to be his very own dungeon master. However, unlike other stories, Kaden is often making fun of and dealing with disadvantages that the normal reincarnated hero would never have to worry about. A parody of the normal tropes of isekai, STEM is a periodic series that is intended to release a minimum of once per week. There may be times where there is more than one drop, but those would be special occasions. Additionally, the content tags are simply to try and ensure my readers know these stories can encompass a large variety of things. They may not immediately be in focus, but they will all end up appearing!
8 181 - In Serial18 Chapters
Red Affra
In the fantastical Spirit Realm of Runeterra exists an alternate reality where eternal war is waged on a near planetery scale. Yordles, the dimunitive and whimsical magical creatures of Runeterra have been thrust into all out war! Super powers like Russia, the United States and Germany fight for domination of Affra. Several thousands of years have passed in the blink of an eye, frought with the terrible atrocities commited in the name of progress. Now the largest super powers across Affra race for nuclear supremecy in secret after an armistice brought uneven peace to the war-torn realm.We follow a team of Special Forces Agents working behind enemy lines to make sure the Soviet Union, under its esteemed Primer; Mak Molotok, succeeds in bringing about a Red Affra. This is just a fun idea spawned from a group of friends, while the story is very much serious the subject of Yordles in a Cold War era stalemate is not. Updates won't be at all frequent. This is honestly a side show to my current webseries despite how much I love it. And once again this story features characters belonging to those friends I mentioned earlier, but this time I'll wait to reveal who is who. The cover art was done by the fantastic Teamoon! Check her out on twitter with that link there.
8 196 - In Serial12 Chapters
The Naruto system
Tristan thought he was dead after he was run over by the infamous Car-kun/smashed his skull, only to find himself staring at a masked man upon opening his eyes. The man produced a piece of paper and handed it over him with a single question. "Will you sign it?" Author’s note: Hey guys, the outline of the novel is already ready. I am working on it to make it more concrete. I promise this novel isn't based on Naruto itself. Even if you don't know who Naruto is, you'll easily be able to understand the story. So please do not leave the story if you think this is just a Naruto fanfiction repeat. Please read and comment if you feel anything is amiss I would really appreciate it. Thank you! ?
8 88 - In Serial8 Chapters
The Nightmare Mage
Shinzu Kaname was 22 when he quit playing [ EdelWeiss Online ] A popular game that was sold over 100,000,000+ copies worldwide, the package of the game contain a cd disc. And after Inserting it into your computer, you will be transported to a fantasy world, where millions of players will receive a message from the system and ordering them to do a quest. Only 600,000 players were chosen to have a different message and a task from the system. Shinzu wasn't chosen at that time, but he had fun playing EdelWeiss Online for 5 years, and after 1 year, he quit playing Edelweiss Online, and he started to focus on his job to be an illustrator to earn a little income. At that time, his older sister was missing in her apartment, Shinzu then entered to her apartment, and he saw her computer charging while it was opened. Shinzu saw her sister status through the monitor, and was shock when he saw His sister potential was marked As [ Unknown ] It was night when Shinzu got back home, and thinking, If chosen players will come back to the real world, and will he return and play EdelWeiss Online again?.
8 171 - In Serial7 Chapters
Love at last. (SEQUEL TO SATISFACTION BEING)
With Brooklyn's father being in jail, Mother Has a restraining order will Brooklyn and August have a Happy ever after? Will Brooklyn's parents find their way back into her life somehow??
8 146

