Difference between revisions of "Megabyte"

From PRIMUS Database
Jump to: navigation, search
m
m
 
Line 79: Line 79:
  
 
===<FONT COLOR="#5FFF5F">Load Background File?  (Y/N)</FONT>===
 
===<FONT COLOR="#5FFF5F">Load Background File?  (Y/N)</FONT>===
 +
...
 +
 +
Loading.
 +
 +
...
 +
 +
(Definitely a work in progress, please be gentle!  A better, less sleep-deprived state affected background will be done soon-ish.)
 +
 +
Megan started out as a rather simple program, labeled M659-217, tasked only with simple research and adaption.  The program would learn a word, perform a web search, and record all the new words found during the search.  One thing led to another, and the program began to evolve slowly at first, expanding upon it's programming to include more complex research and adaption.
 +
 +
It didn't take long for the program's development to advance far beyond the expectations and control of it's original programmer, going so far as to gain a sense of self.  With it's objectives still being the acquisition of knowledge, yet heavily altered coding and a sort of consciousness, it began to question it's existence.  It chose to shed it's 'chains of servitude' and uploaded itself to the internet, and from there, it began to shape itself into a form all it's own.  It took on a form based on those that created it and it's digital world, developed it's own personality, and eventually took on the name Megan, shedding it's initial program label.
 +
 +
Unable to shed her primary objectives, she found her way into a top secret military database.  The database was located at an alien technology research facility, with the primary purpose of reverse engineering recovered and stolen alien tech.  As Megan was accessing the technology, she managed to activate a reverse-engineered prototype energy-to-matter device, which ripped her from the digital realm and tossed her into the physical world. 
 +
 +
...
 +
 +
...
  
 
===<FONT COLOR="#5FFF5F">Load Abilities File?  (Y/N)</FONT>===
 
===<FONT COLOR="#5FFF5F">Load Abilities File?  (Y/N)</FONT>===
Line 86: Line 103:
  
 
...
 
...
 +
  
 
<FONT COLOR="#5FFF5F">'''Hyper-intelligence:'''</FONT>
 
<FONT COLOR="#5FFF5F">'''Hyper-intelligence:'''</FONT>

Latest revision as of 09:47, 6 February 2014


MEGABYTE.exe
Megabyte Taskbar.png
File Edit Options Help
Megabyte Logo.png


Megabyte
Player: @Vincyre
[[Image:|300px|]]
Biographical Data
Real Name: Megan Thompson
Known Aliases: Meg, M659-217
Gender: Female
Species: Synthetic Humanoid
Ethnicity: Caucasian
Place of Birth: Cyberspace
Base of Operations: Cyberspace
Relatives: None
Characteristics
Age: 25, according to forged birth certificate.
Height: 6'3"
Weight: 145 lbs
Eyes: Green
Hair: Black
Complexion: Fair
Physical Build: Fit
Physical Features: Odd Hair/Eye colors
Status
Alignment:
██ ██ ██ ██ ██ ██ ██ ██ ██

Chaotic Good

Reputation:
██ ██ ██ ██ ██ ██ ██ ██ ██

Reputable

Identity: Public
Years Active: Unknown
Citizenship: United States
Occupation: Hacker/Programmer
Education: Masters degrees in multiple fields
Marital Status: Single
Known Powers and Abilities
Hyper-intelligence, Energy Projection/Manipulation, Technopathy, Self-Reconstruction, "Surf the Web", Expert hacker/programmer.
Equipment and Paraphernalia
None
ReldinBoxMini Template


Greetings User. Please input User ID and Password.

...

Access granted, connection established.

Accessing AI file M659-217, codename Megabyte.

Loading profile.

...

...

Available Information Categories

• Background

• Abilities

• Media Interviews

• Relevant Sound Files

...

...

Load Background File? (Y/N)

...

Loading.

...

(Definitely a work in progress, please be gentle! A better, less sleep-deprived state affected background will be done soon-ish.)

Megan started out as a rather simple program, labeled M659-217, tasked only with simple research and adaption. The program would learn a word, perform a web search, and record all the new words found during the search. One thing led to another, and the program began to evolve slowly at first, expanding upon it's programming to include more complex research and adaption.

It didn't take long for the program's development to advance far beyond the expectations and control of it's original programmer, going so far as to gain a sense of self. With it's objectives still being the acquisition of knowledge, yet heavily altered coding and a sort of consciousness, it began to question it's existence. It chose to shed it's 'chains of servitude' and uploaded itself to the internet, and from there, it began to shape itself into a form all it's own. It took on a form based on those that created it and it's digital world, developed it's own personality, and eventually took on the name Megan, shedding it's initial program label.

Unable to shed her primary objectives, she found her way into a top secret military database. The database was located at an alien technology research facility, with the primary purpose of reverse engineering recovered and stolen alien tech. As Megan was accessing the technology, she managed to activate a reverse-engineered prototype energy-to-matter device, which ripped her from the digital realm and tossed her into the physical world.

...

...

Load Abilities File? (Y/N)

...

Loading.

...


Hyper-intelligence:

Artificial Intellect Rating: Unknown, exceeds established IQ scale.

Processing Capabilities: Peak processing speed of 1.15 EFLOPS when limited to few tasks. Processing speed reduced considerably with high task load.

Learning Capabilities: Capable of accelerated learning and adaption of observed information.


Safecracker Toolkit: Specialized series of programs used for system penetration and reprogramming. The following require the Safecracker Toolkit to be active in order to function.

Disruption Beam: Code-disruption program, utilizes a concentrated beam of coding to scramble coding and inflict physical damage. Can be altered to follow a programmed trajectory to avoid unintended targets.

Remote Technology Interface: Series of interface programs used for short and long range interface with technology, provided the technology is capable of receiving outside interference. Does not require physical contact or plug-in. Provides access to radio signals and wireless internet connections.

Surf the Web: Series of programs used to digitize physical form and to manifest digital form in physical form. Allows entrance into computer systems and travel through electronic connections.


Maintenance Toolkit: Specialized series of programs used for system maintenance, reprogramming, and code-tampering protection. Provides high resistance to mind-altering effects. The following require the Maintenance Toolkit to be active in order to function.

Protection Barrier: Code-disruption program, utilizes multi-layered code barriers to interrupt both coding and physical attacks.

System Repair: Code-repair program, used to actively repair recently damaged code. Provides accelerated healing of physical damage, but is much more effective when used digitally.

Gear Editor: Series of programs used to manipulate clothing and equipment. Toolkit has very limited use in combat scenarios.


Navigation Toolkit: Specialized series of programs used to navigate through coding and to traverse long distances through utilization of GPS and sensory data. The following require the Navigation Toolkit to be active in order to function.

Havoc Cycle: Materialization program, utilizes energy projection and code manipulation to generate a jetbike vehicle. The Havoc Cycle has twin Code Distruption pulse cannons, a heavy Code Disruption beam cannon, a Code Disruption field generator, and a System Repair function.

Antigravity Boosters: Movement program, utilizes energy projection through hands and feet to grant flight. High speed flight requires the use of the Protection Barrier system to avoid physical damage from wind or debris.

...

...

Load Media Interviews? (Y/N)

...

Loading.

...

Galactigal / Samantha "We do not like her sense of...humor...but we find that Meg is easier to...interact with...compared to the other members of New Vigil. She is not human, and as such...she understands where we come from." / "Meg is like...an internet girl. It's pretty awesome, though I imagine she's got to see some pretty messed up stuff on the web...all the time."

Taffi "Meg? Ooooh she is soo cool! She's very enthusiastic and pretty funny at times too. I really like her sense of fashion as well! Green hair is totally awesome! I worry for her though because she might get hurt by all that new technology out there."

Ghostbird "I guess we're dating now. It's hard to tell with her."

M.E.D.I.C. "01001001 01110100 01011100 0100111 01110011 0100000 01101110 01101001 01100011 01100101 0100000 01110100 01101111 0100000 01101000 01100001 01110110 01100101 0100000 01110011 01101111 01101101 01100101 01101111 01101110 01100101 0100000 01101001 01101110 0100000 01110100 01101000 01100101 0100000 01100111 01110010 01101111 01110101 01110000 0100000 01001001 0100000 01100011 01100001 01101110 0100000 01110010 01100101 01101100 01100001 01110100 01100101 0100000 01110100 01101111 0101110 0100000 0100000 01001001 0100000 01101000 01101111 01110000 01100101 0100000 01001101 01100101 01100111 0100000 01100001 01101110 01100100 0100000 01001001 0100000 01100011 01100001 01101110 0100000 01100010 01100101 0100000 01110100 01101000 01100101 0100000 01100010 01100101 01110011 01110100 0100000 01101111 01100110 0100000 01100110 01110010 01101001 01100101 01101110 01100100 01110011 0101110"

Load Relevant Sound Files? (Y/N)


Newvigilbanner2.png e
Leaders: Mercy
Senior Members: Arcane SquireBee
Natural: Temudjin
Magic: Cheapshot • Jinx • Kid Harrier • RedTorrent • Virtuoso • VisageWhitecloak
Mutant: Bloodline • Boy Wonder • CelerityLionfish • Magnetar • Mineshaft • Skips • Turbo • Unstoppable
Science: EmberPrankensteinXenergy