Technical Aspects of .hack (As Viewed From Liminality)

Inactive threads from other boards are stored here.
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Technical Aspects of .hack (As Viewed From Liminality)

Post by Pipian »

Yes yes, we all know about the major technology that's used with the World. Altimit, the new network, the VR headsets, etc.

But I've been browsing through Liminality 1 (in an attempt to find those special liminality only areas) and I decided to examine the computer screens in more detail.

1. Obviously the first time Mai accesses the net (when looking up Tokuoka), she searches a Google parody (Gooogle), but she uses a browser that looks suspiciously like IE in XP, except with a toolbar that looks like the normal My Computer toolbar in the same. Strange, considering how insecure Microsoft's software is.

2. The second time one comes up, again we see the XP theme, but this time, it's a login to Delta Server. In this case, the peculiar thing is that the IP address for Delta Server: 210.195.126.48.255 is neither a valid IPv4 address (the current major address type for Internet addresses, which comes in the form xxx.xxx.xxx.xxx, where xxx is any number between 0 and 255) nor a valid IPv6 addess (the next version of IPv4, in which addresses come in the form fe80:0000:0000:0000:0xxx:xxxx:xxxx:xxxx (typically written fe80::xxx:xxxx:xxxx:xxxx, but the long form can actually be any number) where xxxx is a hexidecimal number from 0000 to ffff.)

Obviously, they chose not to use an IPv4 address (for fear of getting actually inspected), but they also chose not to use an IPv6 address (Not particularly amazing. 1. They probably couldn't get the IP, and 2. they would have to purchase access on the 6bone.). Obviously though, IPv6 doesn't make much progress by the time .hack is placed (or perhaps it is, and an IPv4 like layer has been placed on top of IPv6? I don't know.

Further research in trying to resolve the two parts of the IP address however:

210.195.126.48: is in a block allocated by the IANA to TMnet Telekom Malaysia. (The particular address does not resolve, and has no computer on it.)
195.126.48.255: is in a block allocated by the IANA to Walter Verwaltungs GmbH (in Germany) (The particular address does not resolve, but has a computer on it.)

More info: Seig's computer is: 155.142.126.56.48

155.142.126.56: is in a block allocated by the IANA to Pharmacia Corporation in Kalamazoo, MI (The particular address does not resolve, and has no computer on it.)
142.126.56.48: is in a block allocated by the IANA to Bell Canada in Ontario. (The particular address does not resolve, and has no computer on it.)

3. When pulling up the "chat client," while looking for "logs," Tokuoka first makes a call to a UNIX command: ifconfig 192.168.10.24 eth0 /xLw3KT3Rs85stcpaAk (the last part may not be correct, but it is what I read on the TV screen)

This command, however, is not valid (once again). Firstly, however, it would seem to indicate that Tokuoka managed to get root privileges on Seig's machine (unless he didn't put ifconfig in /sbin) Secondly, though this could be interpreted as initializing the ethernet card "eth0" to the internal network ip 192.168.10.24, the order of these two words should be reversed to work correctly. The last part I cannot identify (some sort of hash. MD5? or WEP?)

4. The hard drive that xxxx inserts into the computer he is working on during the flashback after Mai meets Tokuoka outside the school in the night time has at least 24 pins. It is likely that it has 30 pins, if the camera's distortion is ignored (The fact that they put distortion in the camera for this shot potentially is interesting). It is most likely IDE with 40-pins if distortion is taken into account.

5. The following is the full text of the source code that scrolls when they are hacking into the computer the second time:
(indecipherable 4 characters. Possible "#inc")
#include "cdvd.h"
#include "stream.h"
#include "data.h"


#define FUKU_DEBUG_OUT


//static ccFilelist2 *[];



//static int fileNum;



void ccInitFileList(void);
void ccAddFileList(ccFileList *);
void ccAddFileListOne(ccFileList *);
void ccAddFileListName(int, char *);
void ccsAllDeleteExceptCMN(void);
void ccsAllDeleteExceptGCMN(void);
void ccFileListDelete(ccFileList*);
int ccFileListDeleteOne(ccFileList *);
void ccsAllDelete(void);
void ccLoadResourceFL(void);
void ccLoadFLAdd(ccFileList* );
void ccLoadFLAddOne(ccFileList* );
static void ccLoadFLStart(void);


void ccAddRequestFileListTEST(void);
static void ccAddFileListName2(int,char*);
FILEDATA* searchFname(FILELIST*);
static int fileConflictCheck(ccFileList*);
//static void fileExistCheck(int);
void ccFileExistCheck(int);
static void ccFileListLoad(void *);
/*--- debug & test ---*/
static int addFileCheck;
/*--- FILEDATA TABLE ---*/
extern FILEDATA pcCCSTbl[];
extern FILEDATA spcCCSTbl[];
extern FILEDATA npcCCSTbl[];
extern FILEDATA townCCSTbl[];
extern FILEDATA gimmickCCSTbl[];
extern FILEDATA enemyCCSTbl[];
extern FILEDATA desktopCCSTbl[];
extern FILEDATA toppageCCSTbl[];
extern FILEDATA fieldCCSTbl[];
extern FILEDATA menuCCSTbl[];
extern FILEDATA cmnCCSTbl[];
extern FILEDATA gcmnCCSTbl[];
extern FILEDATA equipCCSTbl[];
extern FILEDATA effectCCSTbl[];
extern FILEDATA dungeonCCSTbl[];
extern FILEDATA eventCCSTbl[];
extern FILEDATA bossCCSTbl[];
extern FILEDATA skillCCSTbl[];

(Note: I need to double check if they read "FILEDATA" or "FILEDATA *")

/*-----------------------------*/
static const int FILELIST_DIRECT_MAX = 16;
static FILEDATA directCCSTbl[];
static int directNum;
/*---------------------------------------------------*/
static char *categoryPathTbl[]= {
{DATA_FILE_DIR"cmn.bin"},
{DATA_FILE_DIR"gcmn.bin"},
{DATA_FILE_DIR"demo.bin"},
{DATA_FILE_DIR"desktop.bin"},
{DATA_FILE_DIR"toppage.bin"},
{DATA_FILE_DIR"menu.bin"},
{DATA_FILE_DIR"effect.bin"},
{DATA_FILE_DIR"equip.bin"},
{DATA_FILE_DIR"skill.bin"},
{DATA_FILE_DIR"spc.bin"},
{DATA_FILE_DIR"pc.bin"},
{DATA_FILE_DIR"npc.bin"},
{DATA_FILE_DIR"gimmick.bin"},
{DATA_FILE_DIR"enemy.bin"},
{DATA_FILE_DIR"boss.bin"},
{DATA_FILE_DIR"town.bin"},
{DATA_FILE_DIR"field.bin"},
{DATA_FILE_DIR"dungeon.bin"},
{DATA_FILE_DIR"event.bin"},
{DATA_FILE_DIR""}

(Note: I need to check if it's DATA_FILE_DIR"" or DATA_FILE_DIR for the last entry.)

};

More to come.
Note that this is only the first portion. The second and third portions are too zoomed to get too much useful information.
Last edited by Pipian on Tue Apr 22, 2003 3:20 am, edited 2 times in total.
User avatar
Zippy Zion
Player Character
Posts: 115
Joined: Tue Mar 18, 2003 11:01 pm

Post by Zippy Zion »

Impressive ^_^ You just poked holes in technology 5 years more advanced than ours. I see your point... but how accurate can an anime be? There is always some flaw in everything. Beside... how much do you think the creators know about it.... and how much do you think they think the average fan knows about it?

I thought the whole Cel phone/PDA thing was right on though ^_^... but don't you think they might have full color screens on em?
Image
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

Zippy Zion wrote:but how accurate can an anime be?
Well, I'll tell you this: The code in Liminality 1 is in C++.
User avatar
j00f00
Lowbie
Posts: 42
Joined: Fri Apr 04, 2003 1:35 am

Post by j00f00 »

Wow O.O, it looks like someone did their homework....

So, what they're trying to suggest in LIMINALITY is that Microsoft has such a great monopoly over the OS market, is that the ALTIMIT Operating System would have a look or would function similar to the Windows OS'es?
Scary thought...

Windows is a big seller for one reason: It appeals to the first-time computer user, as well as some veterans, for it's simplicity (well, in some cases, it's ability to be stubborn...) and it's flexible functionality. Flexibility=Major security problems and vunerabilities. Especially nowadays, with hackers and malicious viruses crawling all over the internet and on networks o.o;;;.
Image
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

This in tandem with the ifconfig command leads me to believe that It is either a BSD or Linux variant with a much more stabilized GUI that allows for emulating a Windows environment nearly perfectly.
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

First portion of code transcribed. Couple more pieces to go.

5. (Addendum 1) Interestingly enough, the only major hit for "cdvd.h" is in the library of code Sony released in their Linux development kit. (Further evidence in support for Linux being the base for Altimit (Running on a Sony PS4?) Who knows.)
User avatar
. H A C K // S O R A
Player Character
Posts: 312
Joined: Tue Apr 15, 2003 6:05 pm

Post by . H A C K // S O R A »

the code could be actually sorce of the main .hack//engine or could just be doctored for the sake of making the hacking look real? in reality if you where to look at the code of a compiled program you would see static. i know of no way to instenly decompile to clean C++ sorce, decompiling to Asembly is easer but still takes some time.

as for the os, suposidly ALTIMIT has taken over all other operating systems and is the ONLY OS. also as to the driver being for a sony linux dev kit, if you look at the headsets they are idencicle to the SONY PS2 HEADSET that i have in my little art thread.
Image
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

. H A C K // S O R A wrote:as for the os, suposidly ALTIMIT has taken over all other operating systems and is the ONLY OS. also as to the driver being for a sony linux dev kit, if you look at the headsets they are idencicle to the SONY PS2 HEADSET that i have in my little art thread.
Your points being?
User avatar
. H A C K // S O R A
Player Character
Posts: 312
Joined: Tue Apr 15, 2003 6:05 pm

Post by . H A C K // S O R A »

i dont know just trying to ad to the conversation, geesh its not like i am spaming or anything :cry: anyways if all Operating systems are altimit, then we would not see a windows like interface anyware insted we would see the sleek desktop from infection on evory computer.

and in refrence to the code its setting up a big program with lots of varibuls and functions

but my question is this why would there be a IE like browser in the library and Unix codes within altimit?
Image
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

. H A C K // S O R A wrote:anyways if all Operating systems are altimit, then we would not see a windows like interface anyware insted we would see the sleek desktop from infection on evory computer.
False. There are many GUI-shells that exist TODAY that make it appear as if a Windows computer is running a Mac, or a Unix computer is running Windows XP, etc.
. H A C K // S O R A wrote:and in refrence to the code its setting up a big program with lots of varibuls and functions
That should be rather obvious.
. H A C K // S O R A wrote:but my question is this why would there be a IE like browser in the library and Unix codes within altimit?
I repeat, it's quite likely that it is simply Altimit's browser (Mozilla-based? Or KHTML-based? Not enough known at this point to make a guess I think) that's SKINNED to look like IE... (How hard is that to understand?)
User avatar
RayJNT
Player Character
Posts: 261
Joined: Tue Apr 22, 2003 8:14 pm

Post by RayJNT »

hey pipian not to pressure u or anything but when are the mozilla/ALTIMIT skins gonna be finished? i'd love to have look like the Altimit browser.

BTW good job on your research of the altimit thing in liminality. u should send that to the creators to see what's their reaction. hehehe
"Say hello to my lil' friend!"- Scarface/ Possible Viagra commercial
User avatar
Xeno
Player Character
Posts: 491
Joined: Tue Mar 11, 2003 8:41 pm

Post by Xeno »

Not hard at all....skins can be found anywhere and even come with the OS software.
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

RayJNT wrote:hey pipian not to pressure u or anything but when are the mozilla/ALTIMIT skins gonna be finished? i'd love to have look like the Altimit browser.
Right now I have to wait until I have the time. Sorely lacking at this point...
RayJNT wrote:BTW good job on your research of the altimit thing in liminality. u should send that to the creators to see what's their reaction. hehehe
*shrug* It's not the first time that I've discovered an almost impossibly obscure thing in a game/DVD. A couple years ago, I found proof as to what all the little symbols on the signs in Ocarina of time meant. Amazingly enough, they are Japanese...
User avatar
RayJNT
Player Character
Posts: 261
Joined: Tue Apr 22, 2003 8:14 pm

Post by RayJNT »

*shrug* It's not the first time that I've discovered an almost impossibly obscure thing in a game/DVD. A couple years ago, I found proof as to what all the little symbols on the signs in Ocarina of time meant. Amazingly enough, they are Japanese..
:shock: Wow, I'm officially starting a fan club in your name. Well I'm gonna download those sounds you got on the site from the game. I've got Windows 98, is there any program u can recommend me to de-code the sounds.

Thx in advance!

edit: BTW i really loved those wallpapers on your site. kudos to Rhyste on that.
Oh and how about investigating what the symbols on the sword in the login screen to the world mean. If u decipher that, you'll be my hero. :)
"Say hello to my lil' friend!"- Scarface/ Possible Viagra commercial
User avatar
Pipian
Player Character
Posts: 264
Joined: Sun Feb 09, 2003 7:08 pm

Post by Pipian »

Um... It says Key of the Twilight. In English no less.. ^_^;;;
Locked