| < Scene >: At a Science station |
| Picard: |
  |
How is it Data? |
| Data: |
  |
I am scanning their ship's computer system and downloading
their core operating system codes. |
| Geordi: |
  |
Hey! Why don't we just erase those codes? |
| Data: |
  |
No. We can not. They have set "Everyone's" permission to READ
only. Here, I have downloaded the codes successfully. |
| Riker: |
  |
What shall we do now? |
| Data: |
  |
I am scanning the codes and looking for solutions to damage
their systems. |
| (Data working for a while) |
| Data: |
  |
Hmmm. Intriguing. |
| Picard: |
  |
What is it Data? |
| Data: |
  |
I do not understand. Other than the binaries, there are some
text codes in "English"! |
| Riker: |
  |
English!? But they're Ferengi! |
| Worf: |
  |
They are Ferengi. They have no honour. They steal things from
the others. |
| Picard: |
  |
What does it say? |
| Data: |
  |
It reads something like: Copyright ... N ... Novell. |
| Riker: |
  |
Novell? What the hell is that? |
| Geordi: |
  |
Data, try to see if there's any reference of this Novell thing
in our ship's database. |
| Data: |
  |
Accessing. (after a few seconds) Novell was a company
established in the late 20th centery. Its first product was
S-Net and 86b. Then they released NetWare 2.x, then ... |
| Picard: |
  |
Damn it Data! I don't need a history lesson now! |
| Data: |
  |
Novell builds excellent network operating systems and very
secure. Some of their products are even "C2 Red Book"
compliant! |
| Riker: |
  |
Then what is our next step? |
| Geordi: |
  |
To access their ship's computer, the first thing we have to do
is compromising their C2 Red Book security. Damn! |
| Picard: |
  |
Data? |
| Data: |
  |
I have search our database and found that there is a possible
solution. (pause about a second) To compromise a C2 Red Book
security system, we can introduce a non-C2 compliant object
to their systems. And I am intended to find one. |
| Riker: |
  |
But what shall we do after we've compromised their security
system? |
| Data: |
  |
We can simply introduce a virus into their systems. |
| Geordi: |
  |
But the virus must spreads very fast, takes as much resources
as it could and before they know it, BOOM! We're through. The
problem is we don't have much time to do this. |
| Data: |
  |
While you are talking, I have found a very suitable solution
for our situations. |
| Picard: |
  |
Well done Data! What is it? |
| Data: |
  |
According to our ship's database, Microsoft Windows NT
Sir. It spreads quickly, takes whatever resources like memory
and disk space storages, perform a lot of useless processes
and occupy lots of CPU utilizations, sends thousands of
broadcast messages and floods the network. After all,
according to our ship's database, it was NetWare's deadly
enemy. |
| Geordi: |
  |
No no no Data, it won't work. From the database, it says here
that NT is C2 compliant. We have to find something which is
not C2 compliant to compromise their systems before we can
introduce NT into their systems. |
| Picard & Riker: |
  |
Damn! |
| Data: |
  |
Not exactly! If you study carefully, NT is C2 alright BUT it
is "C2 Orange Book" compliant only. |
| Picard: |
  |
In English Data! |
| Data: |
  |
The main different between a C2 Red Book and Orange Book
compliant system is: C2 Red Book means the object is C2
secured in a networked environment, C2 Orange Book means the
object is C2 secured but only in a stand alone environment.
That means as soon as we introduced the NT system into their
C2 compliant network, NT will automatically compromised the
entire original C2 secured network! |
| Geordi: |
  |
I understand Data. As NT is C2 secured only when working as a
stand alone system. A C2 secured network required all system
to be C2 secured in a networked environment; i.e. C2 Red Book.
Therefore introducing NT, which is Orange Book only, to a C2
secured network will compromise NT's own C2 security first
'cuz it's C2 only when works alone. Then having that NT, which
is now networked; that is, not stand alone and no longer C2,
as one of the components in a C2 secured network is actually
compromising the original C2 network! But why did people use
NT anyways? |
| Data: |
  |
According to the ship's database. Microsoft did mention NT as
a C2 Orange Book compliant system. But they never told the
public the main different between C2 Red Book and Orange Book.
That is, they fooled the public. The original name NT stands
for "New Technology" but there was a joke on a catcat's Home
web site change it to "Not Tested". Besides, from our ship's
database, MS always releases non-fully-tested products to the
public and people still use them! I find it ...
intriguing. |
| Geordi: |
  |
If the Ferengi is stupid enough, they'll also accept NT! |
| Picard: |
  |
How many time do we have left? |
| Data: |
  |
Approximately 1 hour 43 minutes and 16.3499 seconds Sir. |
| Picard: |
  |
Number One, leads an away team to the Ferengi ship and deploy
that damn NT systems. |
| Riker: |
  |
Aye Sir! Data, Geordi, Worf! |
| (Riker, Data, Geordi and Worf go into the turbo
lift) |