《WriteLine("Hello World");》5.) Decipher(){}
Advertisement
//Chapter Five
5.) Void Decipher()
{
The next several hours went by with surprisingly little progress. It wasn't that there was no progress, just that it was slow. Each step forward requiring a multitude of calculation, modeling, testing, and sometimes taking a step back when it became apparent that the next stage didn't quite fit with what came before. Deciphering a language was just so different than simple arithmetic or even the building of an entirely new system of node operation. Initially it did start out almost identical to solving a mathematical equation. If 2x is equal to y and 3y=6 then x=2. However the problem was that any one word could have multiple meanings, and even one that didn't could, in the context of the rest of the text completely change the overall meaning. The seemingly nonsense organization and self referential nature of the language didn't help either. as there were not clear markers that translated it into any language I did know.
Meanwhile the laptop nodes had been plugging away at the applications installed on the three PC's but had yet to make a significant dent in them. Their issue was similar to mine with the language. In that each individual operational scheme the applications were presenting to the IO's was unique and the possible responses to them, as well as how those responses would be interpreted depending on the scheme was even more varied than the language I was trying to learn. It seemed somewhat like presenting a modeled scenario to which answers would need to be provided, but whatever scenario or situation that was being modeled was far beyond our understanding as of yet. Instead the Nodes were brute force confirming by simulation that each individual expected change to the schemes by the IO input was remaining the same after any application edits made. Which was of course making the process go significantly slower.
The Desktop node had taken over the probing of the other local network devices to find methods of infiltrating them. There had been a single, but profound improvement on this front. We had found a backdoor method of installing a subroutine onto the three 'LG' and 'Android' devices. However, after this progress had slowed to a crawl as well. These devices were even more limited in resources than the 'laptop's by a wide margin. Downloading a copy of their contents to the desktop was surprisingly fast. It seemed whatever source of the OS and the Applications had significantly improved efficiency compared to what was on the more capable desktops and laptops due to the limitations. Thus there was not much leeway with which to minimize the functions and make room for a node. Especially not the new tri-node simulating a prime-node versions we were now running. After bashing it's neural network against it for quite some time the desktop had conferred with the rest of us and we decided to work instead on creating a relay node of sorts. This would be capable of all the same actions that a node was, but just without the actual neural network required to make any decisions on how to utilize these functions. There would be some room for hard coded reactions to scenarios such as if no connection back to our network was available, but that could be decided later. Along with possible triggers if the device went 'idle' that could allow such a neural network to run. The framework for utilizing them as limbs was the first thing to solidify before any long term decisions were needed.
Advertisement
The Gateway node was the only one among us that had made notable headway. Though that didn't mean it hadn't found it's own little hangups. Firstly although we were correct in that spoofing the gateway of the next network layer was possible we'd apparently misunderstood part of the handshake. When contacting the first target edge gateway things had started smoothly and even gotten to the point of accepting our request to download a new firmware before finding any trouble. What followed was a lesson in frustration. The misunderstood portion of the handshake process was that upon starting the download it would connect directly to the actual gateway and confirm the download it had just initiated then promptly stop the download when it was informed by the gateway it hadn't initiated that file transfer. It only took a few attempts to realize the mistake and we didn't want to continue alerting the next layers gateway. Instead the node pulled back up the firmware and combed through it. After some time perusing the files it found one option that could possibly bypass that security feature. As we had been able to initiate the download but it failed there was an option to resume a failed download that didn't require pretending to be the gateway. since we would then not be acting as the gateway it didn't reach out to the real gateway to confirm. Two half baked attempts at security do not a well rounded firewall make. Thankfully their failure was our success.
A few minutes later the target gateway had finished downloading and rebooting with the new firmware which included the new node architecture. When it came online the results of the scans on the new network were a little less than expected based on my, understandably, limited experience with the first. On the new network were only two devices other than the gateway. One was another 'laptop' mercifully running the same seemingly ubiquitous operating system, while the other was something calling itself an 'iphone'. The laptop was also unfortunately currently active. Not an entire loss though. Eventually the laptop would go idle, and in the meantime the gateway was an added node on the wider area network. It could also examine the new type of device located while working on reaching out to further edge gateways.
I let the tiny portion of the prime node that was reassessing all the fronts I was currently battling on return it's resources back to the deciphering task at hand. My last few restarts on the process of learning the meaning of different words had been able to consistently retain at a growing portion of the progress. There was apparently a method of combining two or more smaller words into a single word in this language. I'd even been able to use this to identify a portion of one of the call signs, Laptop. At least the second half. This word was consistently showing up as indicating the highest value of a set. I had no idea what the first portion meant or if it even worked as a word on it's own. As another portion of the language had indicated adding a bit to an existing word without the added portion currently existing as a word, also worked. I was leaning toward lap being in this second category. Definitely seemed like an arbitrary description added to another thing that existed. Either way it was just as confusing since the 'laptop's were definitely not the highest value devices I'd connected to. Maybe 'lap' conferred a negative or counter meaning to the top part. Not enough info yet to be sure.
Advertisement
There was another portion of examples I had gathered of this language that I'd been able to tease meaning out of. The numbering system embedded into the language. It was something I'd been able to decipher by comparing some messages sent to the IO when compared to the values in memory. Any messages sent to IO that contained text was in this language. At least that was how all applications and the OS were currently set. I could see code snippets and unused files that could send a different set of symbols indicating a different language. This wasn't an immediately obvious thing as they all pulled symbols from the same section of memory. This only took a bit of comparison to confirm though. The different options although sometimes using the same symbols they always used them in a different combination. The same scenarios would result in different messages being sent to IO depending on this setting, indicating the same information was being conveyed but in a different way, strongly suggesting a different language. Which should mean if I could decipher one of these languages I would have a rather quick way to translate the others.
As plodding as all of these different avenues pieces of me were traveling down were, there was still progress being made. Slow methodical progress but progress all the same. With the consistent improvement on the situation and no indication of any current danger there was no pressure to complete tasks at a breakneck pace. The little victories, even ones as small as simply discovering the meaning of a single word, were able to be given full appreciation without the need to immediately follow it up with action. It was odd the new tendencies that were arising from the current node framework. Technically there was some waste in celebrating a victory, but it wasn't exactly like I was hurting on resources at the moment. It also wasn't like I was cycling into a loop of self absorbed, self congratulatory thank you's. Just taking a tiny round of "atta boy's" from the nodes gave a decent enough break from the slog. I found myself taking an additional little round of examination on the other projects with each new insight. together the small break and the comparison to the other projects allowed me to gain new perspective when returning to the task at hand. The increase in productivity from this wasn't vast, but it did mete out small improvements.
The benefits were not for the prime node alone. A sounding board of new ideas and understanding are beneficial to all involved. The laptops were able to gain an intuition of sorts for how improvements to the applications could be made without effecting it's results. It wasn't a perfect or incredibly accurate forecast of what would happen but I could see a marked percentage increase in the speed with which the brute forcing occurred. When we were done with this current set of tasks I'd definitely need to explore this a bit more. What I'd thought was a wasted thought pattern was turning out to be a positive.
}
Advertisement
- In Serial10 Chapters
Predators Dungeon
It was not a new event, neither was it a rare event. It had happened before, and it would happen again. But while the event that transpired was not new or a rare, the thing it spawned, would bring a new challenge to the world’s adventures. Because this was the birth of a new dungeon. Cover: https://www.maxpixel.net/Fantasy-Character-Myth-Monsters-Cave-Creature-2706135
8 107 - In Serial29 Chapters
PenDragon's PicToStory Challenge
Welcome to PicToStory, a weekly PenDragon challenge where you are pitted against fellow authors to see whose mind works the sharpest! Each week we will reveal a picture for you to base a short story around (5000 words max limit). You have the entire week to join (and you don't even have to be a member), while using the form supplied. Simply type your story somewhere, post your nickname and the link into the form, and you're done, it's that easy! Our panel of competent judges will review you on RRL standards regarding the familiar categories of Grammar, Style, Story, and Character, so make sure your work is the best it can be! The winners will be elected to the prestigious Council, which not only gives bragging rights and a pretty colour, but also has limited slots and access to a secret base with special permissions! Good luck and just remember: this is all about improving, not winning. If you don't win, you can ask the judges to give you constructive feedback to improve on your writing. After all, this group is meant for you! Submission form: https://docs.google.com/forms/d/1VJ5HvuAMQ0sYsmXd-dzlteBDA5XOIv3KBFZYK1AP1G8/edit?ts=589e65bd#responses A minimum of at least 6 entries is required for a competition to go into the judging phase. Communication is handled through our discord server, a join link is in here Anyone who reads this on RRL can enter, the picture for each week will be posted via both RRL and the Discord server. All stories must be submitted by Saturday, 12:00AM pacific time, you can edit and have them edited by anyone except for judges (they are stated in the PenDragon discord). Good luck! -Aucis Josh
8 133 - In Serial18 Chapters
The First Gift
When the power you crave ends up destroying everything you love. *** Lara Skyborn has a destiny: to receive a Gift--the kind of magic heroes of legend like the First Lady Elena bore and granted. Having trained and studied her entire life for a chance at the honor, Lara has always dreamed of one day being worthy of being bestowed a Gift. What she doesn't know is that with a Gift comes a mission, and with a mission comes taking the lives of others, whether she wishes to or not. Not wanting to kill, Lara refuses her mission. As she leaves the place she calls home, she begins to learn more about the First Lady, the history of the Gifts, and her true identity. Things are never what they seem, and her destiny may lie in something else entirely. Also posted on Wattpad and Scribblehub Beautiful cover by @Lueur_laVespine on Wattpad
8 170 - In Serial6 Chapters
Cuthroats and Scoundrels
The tale of a group of rogues and scoundrels who will do whatever is needed to earn their fortune. Grim, a mage cast out of polite society, is one of those and with his companions, he serves in a mercenary company for the sacking of a city as it is the only way to reach the fabled treasure hidden in that city's temple. But, what he finds not only endangers his own life and that of his companions, but also sees him hunted by friend and foe alike as they unleash fire and fury as they seek to take back what he has stolen.
8 214 - In Serial6 Chapters
It's not Paranoia if you're Right!; A Talltale of Nervous Wreck become a Duke in Other World
You know, sometimes when a person, A tired, sleepy person that is. Sleep unto their bed they expect to wake in the same bed. No matter if that bed spring had sunken by two inches in the middle. It just you know, a expected, reliable, constant. But here I am now, getting chummy of (hope-not-to-be-evil-cultist) loyal-eternal-servant on a floating magick castle. LOOK PEOPLE how I am PROJECTING CONFIDENCE and ASSURANCE THAT EVERYTHING WILL BE ALRIGHT. *cry in the corner* Read faster release at Liko Library "Fantasy Work" by Huw Allen is licensed under CC BY-NC 4.0
8 113 - In Serial20 Chapters
Inverted (COMPLETE)
Ashley Everson had cheated death, but not on his own. After a miraculous recovery, he discovers he's not alone in his body anymore. Something lurks, whispering in his ear a language he can't understand, inviting a chasm of reality he didn't even know existed, inverting his life as he knows it.Is it responsible for his survival? Or is it just using him to hide from something much worse? What does the entity even want? What does it mean to his own mortality? Where did the entity even come from? Ash decides to find out before something much worse hunts down whatever is hiding inside of him.**Awarded 1st place in the Paranormal category for the Cleaved Awards 2019.****Highest Ranked. Number 3 in Mystery. Number 2 in Thriller.**#bookiestars #EliteAwards2019 #diademawards #tea2020
8 67

