Difference between revisions of "Megabyte"
m |
m |
||
Line 5: | Line 5: | ||
<div style="padding-right:0px; padding-left:0px; border: 4px Solid #BDBDBD; color:#BDBDBD; background-color: #ffffff"><div style="font-size:13px;color:#ffffff; background-color: #0B0B61">'''MEGABYTE.exe''' [[File:Megabyte_Taskbar.png|right]]</div><div style="font-size:13px;color:#81F781;font-family:{{{Font|Lucida Console}}};"><div style="font-size:13px;color:#000000; background-color: #BDBDBD">File Edit Options Help</div></div> | <div style="padding-right:0px; padding-left:0px; border: 4px Solid #BDBDBD; color:#BDBDBD; background-color: #ffffff"><div style="font-size:13px;color:#ffffff; background-color: #0B0B61">'''MEGABYTE.exe''' [[File:Megabyte_Taskbar.png|right]]</div><div style="font-size:13px;color:#81F781;font-family:{{{Font|Lucida Console}}};"><div style="font-size:13px;color:#000000; background-color: #BDBDBD">File Edit Options Help</div></div> | ||
<div style="padding-right:0px; padding-left:0px; border: 1px Solid #585858; color:#000000; background-color: #FAFAFA"> | <div style="padding-right:0px; padding-left:0px; border: 1px Solid #585858; color:#000000; background-color: #FAFAFA"> | ||
− | <div style="font-size:13px;font-family:{{{Font|Lucida Console}}};color: # | + | <div style="font-size:13px;font-family:{{{Font|Lucida Console}}};color: #10cc36;padding:5px; background-color: #000000"> |
[[Image:Megabyte_Logo.png|center]] | [[Image:Megabyte_Logo.png|center]] | ||
Line 11: | Line 11: | ||
{{ReldinBoxMini | {{ReldinBoxMini | ||
| header = #5FFF5F | | header = #5FFF5F | ||
− | | font = # | + | | font = #10cc36 |
| bg1 = #000000 | | bg1 = #000000 | ||
| bg2 = #000000 | | bg2 = #000000 | ||
Line 87: | Line 87: | ||
... | ... | ||
− | '''Hyper-intelligence:''' | + | <FONT COLOR="#5FFF5F">'''Hyper-intelligence:'''</FONT> |
− | • '''Artificial Intellect Rating:''' Unknown, exceeds established IQ scale. | + | <FONT COLOR="#5FFF5F">• '''Artificial Intellect Rating:'''</FONT> Unknown, exceeds established IQ scale. |
− | • '''Processing Capabilities:''' Peak processing speed of 1.15 EFLOPS when limited to few tasks. Processing speed reduced considerably with high task load. | + | <FONT COLOR="#5FFF5F">• '''Processing Capabilities:'''</FONT> Peak processing speed of 1.15 EFLOPS when limited to few tasks. Processing speed reduced considerably with high task load. |
− | • '''Learning Capabilities:''' Capable of accelerated learning and adaption of observed information. | + | <FONT COLOR="#5FFF5F">• '''Learning Capabilities:'''</FONT> Capable of accelerated learning and adaption of observed information. |
− | '''Safecracker Toolkit:''' Specialized series of programs used for system penetration and reprogramming. The following require the Safecracker Toolkit to be active in order to function. | + | <FONT COLOR="#5FFF5F">'''Safecracker Toolkit:'''</FONT> Specialized series of programs used for system penetration and reprogramming. The following require the Safecracker Toolkit to be active in order to function. |
− | • '''Disruption Beam:''' Code-disruption program, utilizes a concentrated beam of coding to scramble coding and inflict physical damage. Can be altered to follow a programmed trajectory to avoid unintended targets. | + | <FONT COLOR="#5FFF5F">• '''Disruption Beam:'''</FONT> Code-disruption program, utilizes a concentrated beam of coding to scramble coding and inflict physical damage. Can be altered to follow a programmed trajectory to avoid unintended targets. |
− | • '''Remote Technology Interface:''' Series of interface programs used for short and long range interface with technology, provided the technology is capable of receiving outside interference. Does not require physical contact or plug-in. Provides access to radio signals and wireless internet connections. | + | <FONT COLOR="#5FFF5F">• '''Remote Technology Interface:'''</FONT> Series of interface programs used for short and long range interface with technology, provided the technology is capable of receiving outside interference. Does not require physical contact or plug-in. Provides access to radio signals and wireless internet connections. |
− | • '''Surf the Web:''' Series of programs used to digitize physical form and to manifest digital form in physical form. Allows entrance into computer systems and travel through electronic connections. | + | <FONT COLOR="#5FFF5F">• '''Surf the Web:'''</FONT> Series of programs used to digitize physical form and to manifest digital form in physical form. Allows entrance into computer systems and travel through electronic connections. |
− | '''Maintenance Toolkit:''' Specialized series of programs used for system maintenance, reprogramming, and code-tampering protection. Provides high resistance to mind-altering effects. The following require the Maintenance Toolkit to be active in order to function. | + | <FONT COLOR="#5FFF5F">'''Maintenance Toolkit:'''</FONT> Specialized series of programs used for system maintenance, reprogramming, and code-tampering protection. Provides high resistance to mind-altering effects. The following require the Maintenance Toolkit to be active in order to function. |
− | • '''Protection Barrier:''' Code-disruption program, utilizes multi-layered code barriers to interrupt both coding and physical attacks. Capable of projection to other targets. | + | <FONT COLOR="#5FFF5F">• '''Protection Barrier:'''</FONT> Code-disruption program, utilizes multi-layered code barriers to interrupt both coding and physical attacks. Capable of projection to other targets. |
− | • '''System Repair:''' Code-repair program, used to actively repair recently damaged code. Provides accelerated healing of physical damage, but is much more effective when used digitally. | + | <FONT COLOR="#5FFF5F">• '''System Repair:'''</FONT> Code-repair program, used to actively repair recently damaged code. Provides accelerated healing of physical damage, but is much more effective when used digitally. |
− | • '''Gear Editor:''' Series of programs used to manipulate clothing and equipment. Toolkit has very limited use in combat scenarios. | + | <FONT COLOR="#5FFF5F">• '''Gear Editor:'''</FONT> Series of programs used to manipulate clothing and equipment. Toolkit has very limited use in combat scenarios. |
− | '''Navigation Toolkit:''' Specialized series of programs used to navigate through coding and to traverse long distances through utilization of GPS and sensory data. The following require the Navigation Toolkit to be active in order to function. | + | <FONT COLOR="#5FFF5F">'''Navigation Toolkit:'''</FONT> Specialized series of programs used to navigate through coding and to traverse long distances through utilization of GPS and sensory data. The following require the Navigation Toolkit to be active in order to function. |
− | • '''Havoc Sphere:''' Self-alteration program, grants massive speed and offense in the form of an energized sphere of coding. Other attack programs are unavailable during use due to power requirements. | + | <FONT COLOR="#5FFF5F">• '''Havoc Sphere:'''</FONT> Self-alteration program, grants massive speed and offense in the form of an energized sphere of coding. Other attack programs are unavailable during use due to power requirements. |
− | • '''Antigravity Boosters:''' Movement program, utilizes energy projection through hands and feet to grant flight. High speed flight requires the use of the Protection Barrier system to avoid physical damage from wind or debris. | + | <FONT COLOR="#5FFF5F">• '''Antigravity Boosters:'''</FONT> Movement program, utilizes energy projection through hands and feet to grant flight. High speed flight requires the use of the Protection Barrier system to avoid physical damage from wind or debris. |
... | ... |
Revision as of 21:40, 1 October 2013
Megabyte | ||||||||||
Player: @Vincyre | ||||||||||
[[Image:|300px|]] | ||||||||||
Biographical Data | ||||||||||
Real Name: | Megan Thompson | |||||||||
Known Aliases: | Meg, M659-217 | |||||||||
Gender: | Female | |||||||||
Species: | Synthetic Humanoid | |||||||||
Ethnicity: | Caucasian | |||||||||
Place of Birth: | Cyberspace | |||||||||
Base of Operations: | Cyberspace | |||||||||
Relatives: | None | |||||||||
Characteristics | ||||||||||
Age: | 15, according to forged birth certificate. | |||||||||
Height: | 5'11" | |||||||||
Weight: | 125lbs | |||||||||
Eyes: | Green | |||||||||
Hair: | Green, White Highlights | |||||||||
Complexion: | Fair | |||||||||
Physical Build: | Fit | |||||||||
Physical Features: | Odd Hair/Eye colors | |||||||||
Status | ||||||||||
Alignment: |
Chaotic Good | |||||||||
Reputation: |
Reputable | |||||||||
Identity: | Public | |||||||||
Years Active: | Unknown | |||||||||
Citizenship: | United States | |||||||||
Occupation: | Hacker/Programmer | |||||||||
Education: | Masters degrees in multiple fields | |||||||||
Marital Status: | Single | |||||||||
Known Powers and Abilities | ||||||||||
Hyper-intelligence, Energy Projection/Manipulation, Technopathy, Self-Reconstruction, "Surf the Web", Expert hacker/programmer. | ||||||||||
Equipment and Paraphernalia | ||||||||||
None | ||||||||||
ReldinBoxMini Template |
Greetings User. Please input User ID and Password.
...
Access granted, connection established.
Accessing AI file M659-217, codename Megabyte.
Loading profile.
...
...
Please select profile category.
• Background
• Abilities
• Media Interviews
• Relevant Sound Files
...
...
Load Background File? (Y/N)
Load Abilities File? (Y/N)
...
Loading.
...
Hyper-intelligence:
• Artificial Intellect Rating: Unknown, exceeds established IQ scale.
• Processing Capabilities: Peak processing speed of 1.15 EFLOPS when limited to few tasks. Processing speed reduced considerably with high task load.
• Learning Capabilities: Capable of accelerated learning and adaption of observed information.
Safecracker Toolkit: Specialized series of programs used for system penetration and reprogramming. The following require the Safecracker Toolkit to be active in order to function.
• Disruption Beam: Code-disruption program, utilizes a concentrated beam of coding to scramble coding and inflict physical damage. Can be altered to follow a programmed trajectory to avoid unintended targets.
• Remote Technology Interface: Series of interface programs used for short and long range interface with technology, provided the technology is capable of receiving outside interference. Does not require physical contact or plug-in. Provides access to radio signals and wireless internet connections.
• Surf the Web: Series of programs used to digitize physical form and to manifest digital form in physical form. Allows entrance into computer systems and travel through electronic connections.
Maintenance Toolkit: Specialized series of programs used for system maintenance, reprogramming, and code-tampering protection. Provides high resistance to mind-altering effects. The following require the Maintenance Toolkit to be active in order to function.
• Protection Barrier: Code-disruption program, utilizes multi-layered code barriers to interrupt both coding and physical attacks. Capable of projection to other targets.
• System Repair: Code-repair program, used to actively repair recently damaged code. Provides accelerated healing of physical damage, but is much more effective when used digitally.
• Gear Editor: Series of programs used to manipulate clothing and equipment. Toolkit has very limited use in combat scenarios.
Navigation Toolkit: Specialized series of programs used to navigate through coding and to traverse long distances through utilization of GPS and sensory data. The following require the Navigation Toolkit to be active in order to function.
• Havoc Sphere: Self-alteration program, grants massive speed and offense in the form of an energized sphere of coding. Other attack programs are unavailable during use due to power requirements.
• Antigravity Boosters: Movement program, utilizes energy projection through hands and feet to grant flight. High speed flight requires the use of the Protection Barrier system to avoid physical damage from wind or debris.
...
...
Load Media Interviews? (Y/N)
...
Loading.
...
Galactigal / Samantha "We do not like her sense of...humor...but we find that Meg is easier to...interact with...compared to the other members of New Vigil. She is not human, and as such...she understands where we come from." / "Meg is like...an internet girl. It's pretty awesome, though I imagine she's got to see some pretty messed up stuff on the web...all the time."
Taffi "Meg? Ooooh she is soo cool! She's very enthusiastic and pretty funny at times too. I really like her sense of fashion as well! Green hair is totally awesome! I worry for her though because she might get hurt by all that new technology out there."
Ghostbird "I guess we're dating now. It's hard to tell with her."
M.E.D.I.C. "01001001 01110100 01011100 0100111 01110011 0100000 01101110 01101001 01100011 01100101 0100000 01110100 01101111 0100000 01101000 01100001 01110110 01100101 0100000 01110011 01101111 01101101 01100101 01101111 01101110 01100101 0100000 01101001 01101110 0100000 01110100 01101000 01100101 0100000 01100111 01110010 01101111 01110101 01110000 0100000 01001001 0100000 01100011 01100001 01101110 0100000 01110010 01100101 01101100 01100001 01110100 01100101 0100000 01110100 01101111 0101110 0100000 0100000 01001001 0100000 01101000 01101111 01110000 01100101 0100000 01001101 01100101 01100111 0100000 01100001 01101110 01100100 0100000 01001001 0100000 01100011 01100001 01101110 0100000 01100010 01100101 0100000 01110100 01101000 01100101 0100000 01100010 01100101 01110011 01110100 0100000 01101111 01100110 0100000 01100110 01110010 01101001 01100101 01101110 01100100 01110011 0101110"
Load Relevant Sound Files? (Y/N)
Leaders: Mercy | ||
Senior Members: Arcane Squire • Bee | ||
Natural: Temudjin | ||
Magic: Cheapshot • Jinx • Kid Harrier • Red • Torrent • Virtuoso • Visage • Whitecloak | ||
Mutant: Bloodline • Boy Wonder • Celerity • Lionfish • Magnetar • Mineshaft • Skips • Turbo • Unstoppable | ||
Science: Ember • Prankenstein • Xenergy |