While waiting for Jane's reply, Jerry searched for the Atlantean foundation and took a closer look at the team members equipment.
The nodes looked fairly standard, off the shelf Novatech, Erika, Hermes. The OS on Novatech felt strange, certainly not off the shelf one, but he left it for now feeeling sleepy already.
Assuming that if you have encrypt program, the node is having standard encrypt running.
Hmm Erika isn't encrypted what was his name ... Lost.
@All: We need to setup the communications.
@All: Step one: You'll find attached credentials for the user accounts on my 'link. You need to maintain the subscription to access encrypted communication. I'll maintain the encryption. on my link
It means that on top of all programs I am running I'll have to run additional copy of encryption program.
@All: Step two: make sure Analyze program is running and linked with Firewall,
@All: Step three: setup ARC to scramble my persona program on intrusion detection. This mean you need to setup admin account for me on your links. I'll slave your links to my own. That way they won't accept commands from any other source. actually it just give the firewall additional +2 to treshold on hacking. Block the possibility of removal admin accounts without manual access.
@All: Step four: run encryption program to hard encrypt your nodes. make sure it is working all the time. And for the starter set them to six hours interval.
@Iceblade, Hyena: With the analyze and encryption running in the backyard this means that your commlinks will slow down if you run anything else including mapsoft so beware if you run too many programs your links will froze and you'll be out of communication.
@All: if you access my link do it via AR. I'll be setting up databombs on the encryptions as additional layer of protection. If you go in VR and glitch on the password, you will fart out your brain, on AR it will just crash your link.
@Jane: You too unless you want to be out.
@All: any questions?
Jerry's own commlink is usually running at Response 4(reduced from 5 due to overload): Analyze 5, Encrypt(rating 5, databombed with rating 5, node encryption, interval 24hours), Encrypt(rating 5, communication encryption, interval 1 CT) and Stealth 5. Then there is Exploit 5, Spoof 5, Command 5, ECCM 5, Biofeedback filters 5. There is still space for another program such as Browse during the data search.