But I've been browsing through Liminality 1 (in an attempt to find those special liminality only areas) and I decided to examine the computer screens in more detail.
1. Obviously the first time Mai accesses the net (when looking up Tokuoka), she searches a Google parody (Gooogle), but she uses a browser that looks suspiciously like IE in XP, except with a toolbar that looks like the normal My Computer toolbar in the same. Strange, considering how insecure Microsoft's software is.
2. The second time one comes up, again we see the XP theme, but this time, it's a login to Delta Server. In this case, the peculiar thing is that the IP address for Delta Server: 210.195.126.48.255 is neither a valid IPv4 address (the current major address type for Internet addresses, which comes in the form xxx.xxx.xxx.xxx, where xxx is any number between 0 and 255) nor a valid IPv6 addess (the next version of IPv4, in which addresses come in the form fe80:0000:0000:0000:0xxx:xxxx:xxxx:xxxx (typically written fe80::xxx:xxxx:xxxx:xxxx, but the long form can actually be any number) where xxxx is a hexidecimal number from 0000 to ffff.)
Obviously, they chose not to use an IPv4 address (for fear of getting actually inspected), but they also chose not to use an IPv6 address (Not particularly amazing. 1. They probably couldn't get the IP, and 2. they would have to purchase access on the 6bone.). Obviously though, IPv6 doesn't make much progress by the time .hack is placed (or perhaps it is, and an IPv4 like layer has been placed on top of IPv6? I don't know.
Further research in trying to resolve the two parts of the IP address however:
210.195.126.48: is in a block allocated by the IANA to TMnet Telekom Malaysia. (The particular address does not resolve, and has no computer on it.)
195.126.48.255: is in a block allocated by the IANA to Walter Verwaltungs GmbH (in Germany) (The particular address does not resolve, but has a computer on it.)
More info: Seig's computer is: 155.142.126.56.48
155.142.126.56: is in a block allocated by the IANA to Pharmacia Corporation in Kalamazoo, MI (The particular address does not resolve, and has no computer on it.)
142.126.56.48: is in a block allocated by the IANA to Bell Canada in Ontario. (The particular address does not resolve, and has no computer on it.)
3. When pulling up the "chat client," while looking for "logs," Tokuoka first makes a call to a UNIX command: ifconfig 192.168.10.24 eth0 /xLw3KT3Rs85stcpaAk (the last part may not be correct, but it is what I read on the TV screen)
This command, however, is not valid (once again). Firstly, however, it would seem to indicate that Tokuoka managed to get root privileges on Seig's machine (unless he didn't put ifconfig in /sbin) Secondly, though this could be interpreted as initializing the ethernet card "eth0" to the internal network ip 192.168.10.24, the order of these two words should be reversed to work correctly. The last part I cannot identify (some sort of hash. MD5? or WEP?)
4. The hard drive that xxxx inserts into the computer he is working on during the flashback after Mai meets Tokuoka outside the school in the night time has at least 24 pins. It is likely that it has 30 pins, if the camera's distortion is ignored (The fact that they put distortion in the camera for this shot potentially is interesting). It is most likely IDE with 40-pins if distortion is taken into account.
5. The following is the full text of the source code that scrolls when they are hacking into the computer the second time:
Note that this is only the first portion. The second and third portions are too zoomed to get too much useful information.(indecipherable 4 characters. Possible "#inc")
#include "cdvd.h"
#include "stream.h"
#include "data.h"
#define FUKU_DEBUG_OUT
//static ccFilelist2 *[];
//static int fileNum;
void ccInitFileList(void);
void ccAddFileList(ccFileList *);
void ccAddFileListOne(ccFileList *);
void ccAddFileListName(int, char *);
void ccsAllDeleteExceptCMN(void);
void ccsAllDeleteExceptGCMN(void);
void ccFileListDelete(ccFileList*);
int ccFileListDeleteOne(ccFileList *);
void ccsAllDelete(void);
void ccLoadResourceFL(void);
void ccLoadFLAdd(ccFileList* );
void ccLoadFLAddOne(ccFileList* );
static void ccLoadFLStart(void);
void ccAddRequestFileListTEST(void);
static void ccAddFileListName2(int,char*);
FILEDATA* searchFname(FILELIST*);
static int fileConflictCheck(ccFileList*);
//static void fileExistCheck(int);
void ccFileExistCheck(int);
static void ccFileListLoad(void *);
/*--- debug & test ---*/
static int addFileCheck;
/*--- FILEDATA TABLE ---*/
extern FILEDATA pcCCSTbl[];
extern FILEDATA spcCCSTbl[];
extern FILEDATA npcCCSTbl[];
extern FILEDATA townCCSTbl[];
extern FILEDATA gimmickCCSTbl[];
extern FILEDATA enemyCCSTbl[];
extern FILEDATA desktopCCSTbl[];
extern FILEDATA toppageCCSTbl[];
extern FILEDATA fieldCCSTbl[];
extern FILEDATA menuCCSTbl[];
extern FILEDATA cmnCCSTbl[];
extern FILEDATA gcmnCCSTbl[];
extern FILEDATA equipCCSTbl[];
extern FILEDATA effectCCSTbl[];
extern FILEDATA dungeonCCSTbl[];
extern FILEDATA eventCCSTbl[];
extern FILEDATA bossCCSTbl[];
extern FILEDATA skillCCSTbl[];
(Note: I need to double check if they read "FILEDATA" or "FILEDATA *")
/*-----------------------------*/
static const int FILELIST_DIRECT_MAX = 16;
static FILEDATA directCCSTbl[];
static int directNum;
/*---------------------------------------------------*/
static char *categoryPathTbl[]= {
{DATA_FILE_DIR"cmn.bin"},
{DATA_FILE_DIR"gcmn.bin"},
{DATA_FILE_DIR"demo.bin"},
{DATA_FILE_DIR"desktop.bin"},
{DATA_FILE_DIR"toppage.bin"},
{DATA_FILE_DIR"menu.bin"},
{DATA_FILE_DIR"effect.bin"},
{DATA_FILE_DIR"equip.bin"},
{DATA_FILE_DIR"skill.bin"},
{DATA_FILE_DIR"spc.bin"},
{DATA_FILE_DIR"pc.bin"},
{DATA_FILE_DIR"npc.bin"},
{DATA_FILE_DIR"gimmick.bin"},
{DATA_FILE_DIR"enemy.bin"},
{DATA_FILE_DIR"boss.bin"},
{DATA_FILE_DIR"town.bin"},
{DATA_FILE_DIR"field.bin"},
{DATA_FILE_DIR"dungeon.bin"},
{DATA_FILE_DIR"event.bin"},
{DATA_FILE_DIR""}
(Note: I need to check if it's DATA_FILE_DIR"" or DATA_FILE_DIR for the last entry.)
};
More to come.