Update README.md
This commit is contained in:
45
README.md
45
README.md
@@ -1,3 +1,46 @@
|
|||||||
# Operation-Shadow-Watcher
|
# Operation-Shadow-Watcher
|
||||||
|
|
||||||
An operation to disguise and protect your own computer
|
An operation to disguise and protect your own computer.
|
||||||
|
|
||||||
|
<h2>Operation Briefing</h2>
|
||||||
|
|
||||||
|
<h3>Orientation</h3>
|
||||||
|
|
||||||
|
This mission's goal is to establish effective active camouflage and defense positions on the target computer IOT prevent reconnaissance from the enemy in daily school environments and establish a safe environment for discreet activities.
|
||||||
|
|
||||||
|
<h3>Situation</h3>
|
||||||
|
|
||||||
|
<b>Enemy</b>: Major reconnaissance units are located in classrooms and the Technician Office. The enemy uses Senso software to conduct surveillance of friendly computers, and is capable of conducting physical checks. The enemy prioritizes units that are gaming or viewing unregulated content.
|
||||||
|
|
||||||
|
<b>Friendlies</b>: Individuals among the student body that possess the Surveillance Detection Program (SDP) are capable of providing reconnaissance and assistance. However, in unknown environments, the unit must conduct this operation individually.
|
||||||
|
|
||||||
|
<b>Environment</b>: Indoor environment, flat grounds. Stairs and classrooms exist. The frontline is located in the desktops and file systems of computers.
|
||||||
|
|
||||||
|
<h3>Mission</h3>
|
||||||
|
The individual or squad must complete the disguise and relocation of all un-authorized software on the target computer, and establish continued monitoring capability IOT lower the effectiveness of enemy reconnaissance.
|
||||||
|
|
||||||
|
<h3>Execution</h3>
|
||||||
|
|
||||||
|
<b>Commander's Intent</b>: Maintain the target computer's "normal" look through the camouflage in file systems and real-time SDPs.
|
||||||
|
|
||||||
|
<b>Procedure</b>:
|
||||||
|
- <b>Deployment</b>: From a secure source (USB, this file), deploy the related files to the predetermined position on the target computer.
|
||||||
|
|
||||||
|
- <b>Configuration</b>: Ensure that Python 3.13 is installed. Launch the SDP ("SDP.py") through IDLE and ensure that it is running the background. This program will monitor the enemy's status and provide warning.
|
||||||
|
|
||||||
|
- <b>Camouflage</b>: Move target files and the icon file into the predetermined disguise folder (DF), and hide this folder deep behind directories. On the desktop, create a disguise shortcut (DS) pointing to the DF. Set the icon and name of the DS to notepad.
|
||||||
|
|
||||||
|
- <b>Emergency Procedures</b>: If the SDP gives out a warning (through notifications and the webcam LED), immediately execute the cleanup procedure: minimize or close all unnecessary windows and open a pre-determined school document.
|
||||||
|
|
||||||
|
<h3>Administration and Logistics</h3>
|
||||||
|
|
||||||
|
<b>Equipment</b>: A target school computer; a USB drive containing the SDP program (SDP.py), icon resources, and this order. If training for the program interceptor-aps was given, launch that program instead of the SDP.
|
||||||
|
|
||||||
|
<b>Support</b>: No additional logistical support. All operations must be done by the unit. When the mission is completed, the USB drive must be removed securely.
|
||||||
|
|
||||||
|
|
||||||
|
<h3>Command and Signal</h3>
|
||||||
|
|
||||||
|
The commander of the unit has full autonomy in action. They can interpret, halt, or adjust the movement plans without further indication. The translation codes for the SDP are attached.
|
||||||
|
|
||||||
|
The password for the SDP is Papa-Seven-Mike-Juliett.
|
||||||
|
|||||||
Reference in New Issue
Block a user