Stats for this track
In 9 Sets
- 21 Tracks, 1.33.45
- 32 Tracks, 3.15.35
- 13 Tracks, 1.15.14
- 88 Tracks, 6.29.19
- 16 Tracks, 1.33.09
The story is based on two "protagonists": The source computer (it's us!) and a destination network. We're trying to hack this network and steal some datas from it.
The title is a reference to the first stage of a connection establishment in networking. The song starts with 3 seconds of a very subtle sample from "Boucle Infinie", the last song from my last demo.
2. bouncing dot
A simple wiki search tells you that Bouncing Dot (aka 'Ping-Pong virus') is a virus designed to attack boot sectors of a computer. It's also a reference to the synchronization process of a server and a client, when the handshake is done. It's a virus old virus, and it really hard to make it work. It actually is impossible with modern OS. So? Well, the attack did not work. Let's try something else.
You know that one! I added some bass and edited some parts a bit. A trojan is a virus designed to open ports on the targetted computer, so the source can access to all of its contents. Does the attack worked? Well:
4. access granted
I really prefer that title haha. The song is too different for the first access denied and I don't want to confuse people. (Is this a problem with the sick drummer video?)
This is a reference to the fact the trojans exploit worked well! The network is ours, let's steal some cool datas, yay!
5. logic bomb
(aka fork bomb) it's a very simple compiled code (an infinite loop calling the same function again and again, if you ask me) designed to make the targetted computer freeze and reboot. It's a really easy code to write, but it's really hard to implement. Unless you have a trojan going on. ;)
6. warp gate exploit
This one is kinda different, and google will tell you it's a reference to Starcraft 2. In this game, a warp gate is used to "quickly warp in a gateway unit anywhere on the battlefield". So, what does it mean? Well, it sounds like the source computer (that evil pirate!) just copied itself onto the destination network. How? The router just
So: We used different viruses so that we can access some computers' networks, and we teleported into that network. So what is going on now? Nothing. The destination is a trap, there's nothing to see here, no datas, nothing. Everything is "null".
A panic function is computer science is used when a computer encounter a fatal error and then reboot itself. It's the worth thing that can happen to a running computer (or worse: a running server).
It means: Ok, the destination was a trap, we did'nt get the datas we wanted. Let's suicide, it may be a trap.
But at the very last time, something happens: Intruders? We're getting hacked! The shoe in on the other foot. This network attack was a trap, only meant so the source computer can be hacked, twist ending!
It's a bit complex to understand just with the titles and the audio, but I'm thinking of writing some short french novels in a blog, directly inspired by this universe. I think it can create another dimension to my works, like a real sci-fi story going on, based on the idea of the "technological singularity", with robots trying to steal human consciousness in an apocalyptic/paranoid-ish world where the internet is a gigantic brain controlling politics, economics and human identities. I already gathered a bunch of cool ideas to expand this universe.
Here, some human rebels realized that an evil robot just duplicated itself into "the network" (as in "the gigantic brain that is the internet, controlled by the corporations (are the corporations robots? hmm hmm)"), but we're in the future and robots are better than humans, especially one called "the algorithm" : A polymorphic entity which can duplicate itself to infinity, the first robot in history which developped consciousness. This will lead the readers to ask themselves some questions: Will technology replace the human kind? How can we use the technology to keep our creative minds, as opposed to the pre-calculated computer mechanics? Can robots have consciousness? What's the future of social networks, controlling humans behaviours? If so, who will control that, robots? etc...
Sorry for the huuuuuge text, I don't want to bother you with that as it's a personal idea (not directly linked to the algorithm, even if it is. Hmmm) but if i can create some kind of "art-crossover" project by throwing in at the same time: music, litterature, abstract designs, and maybe more... This will please my "crossover-based state of mind". Just wanted to let you know my plans. ;)
Anyway, hope you like the album!