||= '''Computer''' =|| ||[[Image(http://i.imgur.com/87Mx3jh.jpg, 128px, left)]]|| A '''computer''' is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.[https://en.wikipedia.org/wiki/Computer 1] Indeed, most computers are said to be [https://en.wikipedia.org/wiki/Turing_completeness Turing Complete]-- that is, in principle (though not necessarily in practice), they can be used to to solve any computational problem you can possibly throw at it. ||= '''Operating System Version''' =|| [wiki:nix *NIX] 4.0.1 || ||= '''RAM''' =|| 16GB || ||= '''Visual Output''' =|| [wiki:damsun DAMSUN] Monitor, various sizes. || ||= '''Has Solitaire''' =|| Yes || [[BR]] Over 99% of offices contain computer terminals, and the [wiki:hbc HBC] offices are no exception. While the employee handbook requires that all terminals be locked while an employee is not at their desk and powered down at the end of the day, some (read: a surprisingly low amount, all things considered) disregard these protocols, leaving their computers ripe for snooping. Active HBC computers can be used to read employee emails and documents, revealing information both vital and of no consequence to the investigation. If the computer is locked, the [wiki:boot_drive boot drive] may be used to unlock it. After all, once a hacker has physical access to your machine, it's basically game over, man. == Hacking a *NIX Computer (Tentative) == A *NIX system is a Unix-like system, which means many Unix idioms, like {{{/etc/passwd}}} and {{{/etc/shadow}}}, are also available on *NIX OS. If you have physical access to the machine, it should be possible to perform the following actions (unless the drive is encrypted): 1. Reboot the computer and boot onto a [wiki:bootdrive portable disk drive]. 2. From the alternate boot partition, log in to that partition's OS and mount the computer's drive somewhere on your file system. 3. Add a new user entry to the {{{/etc/passwd}}} file on that drive, and add a hashed password entry to {{{/etc/shadow}}}. 4. Grant the new user {{{sudo}}} permissions in the sudoers file ({{{/etc/sudoers}}}). 5. Add {{{/home/}}} folders, etc. 6. Restart the computer and boot normally. 7. Log in using the username/password combination you added to {{{/etc/passwd}}} and {{{/etc/shadow}}}. 8. Use {{{sudo}}} or {{{su}}} to access the machine with root permissions. Presumably all or most of this is automated by the [wiki:bootdrive boot drive] that MT gives to the player, since the player is probably not all that tech-literate.