Last modified 3 years ago Last modified on 2016-01-31 21:51:06
Computer A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.1 Indeed, most computers are said to be Turing Complete-- that is, in principle (though not necessarily in practice), they can be used to to solve any computational problem you can possibly throw at it.
Operating System Version *NIX 4.0.1
Visual Output DAMSUN Monitor, various sizes.
Has Solitaire Yes

Over 99% of offices contain computer terminals, and the HBC offices are no exception. While the employee handbook requires that all terminals be locked while an employee is not at their desk and powered down at the end of the day, some (read: a surprisingly low amount, all things considered) disregard these protocols, leaving their computers ripe for snooping.

Active HBC computers can be used to read employee emails and documents, revealing information both vital and of no consequence to the investigation. If the computer is locked, the boot drive? may be used to unlock it. After all, once a hacker has physical access to your machine, it's basically game over, man.

Hacking a *NIX Computer (Tentative)

A *NIX system is a Unix-like system, which means many Unix idioms, like /etc/passwd and /etc/shadow, are also available on *NIX OS. If you have physical access to the machine, it should be possible to perform the following actions (unless the drive is encrypted):

  1. Reboot the computer and boot onto a portable disk drive?.
  2. From the alternate boot partition, log in to that partition's OS and mount the computer's drive somewhere on your file system.
  3. Add a new user entry to the /etc/passwd file on that drive, and add a hashed password entry to /etc/shadow.
  4. Grant the new user sudo permissions in the sudoers file (/etc/sudoers).
  5. Add /home/ folders, etc.
  6. Restart the computer and boot normally.
  7. Log in using the username/password combination you added to /etc/passwd and /etc/shadow.
  8. Use sudo or su to access the machine with root permissions.

Presumably all or most of this is automated by the boot drive? that MT gives to the player, since the player is probably not all that tech-literate.