Jump to content

Hicks

Administrator
  • Content count

    60
  • Joined

  • Last visited

About Hicks

  • Rank
    Hopper Bug

Recent Profile Visitors

351 profile views
  1. Hicks

    MeTro Medical Sealant Substance [Dr. Axby]

    That being said, if anyone feels like a mission runner is deviating from any sort of established times with medical roleplay "just because" or thanks to some sort of seemingly silly reason, feel free to raise this to an XA so that the situation can be correctly looked into. Just please don't argue with them in-game during their mission. PK appeals exist for a reason.
  2. Fixed that. Also added the sentry gun. APC is under MEC
  3. Mark 51 Remote Sentry Autogun The Mark 51 Remote Sentry Autogun is an automated sentry platform with a 360° arc of fire equipped with motion sensing infrared and thermal cameras. The cameras relay targetting information to the micro-actuators and servo motors to accurately track targets up to a range of five hundred meters. The weapon system itself is a 12.7mm caseless (.50 Cal) firing Spitfire Heavy Machine Gun fed from a 400 round box magazine. The Mark 51 also features a dedicated IFF system to ensure that friendly-fire incidents cannot take place. The Mark 51 system is definitely portable by a single engineer, weighing in at approximately 40kg (88lbs), however, the case it comes in can be unwieldy, weighing in at around 48kg (105lbs). The case comes with rugged all-terrain wheels but due to the circumstances the Infantry face on a regular basis, the wheels may not help. Some engineers tend to remove the Mark 51 from the case and carry it on its own, then deploy it immediately whenever they can. The system takes approximately fifteen seconds to fully deploy from a packed state to a firing position. The control unit for the Mark 51 system is attached directly to the turret itself. A small screen on the rear of the weapon provides information such as power levels, ammunition count, and targeting information. The sentry gun can also be linked to and controlled by the HCSI.
  4. The basics of electricity and You A fairly standard looking control panel. Basic interaction with electricity A combat engineer will generally come across a variety of voltages when working on electrical equipment during his career and it is a common misconception that all of them are dangerous. In fact, electricity is not dangerous so long as you are responsible while working with it. Typically, an engineer will work with the following voltages: Control circuit voltage (typically 12Vdc or 24Vdc). This voltage is found within control circuits and control panels, though the panel will still usually have a 110V or 230V supply which will be transformed down into the more usable 12/24V. This lower voltage is used as it is safer to work on and less likely to damage the sensitive components found within a control circuit. Example control circuits include keypads, control units for machinery such as elevators or cargo shuttles, and door panel control units Standard supply/mains voltage (typically 110Vac or 230Vac). These voltages are significantly more common than other voltages as they are used to supply practically everything in domestic and commercial settings. From lights to vacuum cleaners and computer consoles to water heaters, almost every stationary piece of equipment is powered by one of these voltages. Generally, 110V is used for industrial equipment where there is a chance that a cable may be damaged or a short circuit may occur due to damage to the equipment itself. 230V is more often found in stationary equipment where there it is rare for the position of the equipment to change and where there is little chance that such equipment can be damaged, such as offices. Higher voltages (415Vac/1000Vac and above). While not technically classed as high voltage until higher than 1000V, it is worth noting that these voltages require extra caution when working around them. These voltages are typically found supplying fixed industrial equipment with high power drain such as recharging stations or some of the larger pieces of machinery found in use on Federation vessels. Working with wiring - why soldering is not a soldier's job One of the most common tasks of a Systems Technician is having to remake connections and repair faulty wires. After all, the wiring and components are two of the most common faults in electrical systems. Changing out a damaged component is as simple as finding a replacement and switching the two, ensuring all of the connections and any polarities are matched correctly, however changing a damaged wire in its entirety can sometimes be too time-consuming to conduct in the field and so another method needs to be used. This method is known by many names; splicing, butting, crimping, and blocking, to name but a few. This method is characterized by a few key elements and pieces of equipment that shouldn't be left out of any self-respecting technician's toolkit: the butt connector and the terminal strip (chocblock). Both of these items require the wire to be stripped before use. To strip a wire, remove the outer sheathing from the internal conductors of the wire, leaving approximately 6-8mm (1/4 inch) of exposed conductor. If the conductors are thin enough, twist them together. This provides structural support as well as additional cross-sectional area which lowers resistance and therefore increases the cable's ability to transfer electricity effectively. Not only are these techniques quicker and easier to perform, but they are more secure too, and less dependant on skill with a soldering iron, which is quickly becoming a lost trade. The joints and connections created with these items also do not run the risk of accidental short circuits or other grounding/earthing problems. Butt connectors - color coded for various sizes of wire. They are plastic coated metal sleeves that are easily crushed by the specialized crimping tool. If the crimping tool is not available, pliers or teeth will create a sufficient clamping force though it may not be one-hundred percent secure. These connectors are easy to use: simply insert the stripped ends of the wires you wish to join into each end of the connector and crimp the connector closed. This will provide a joint, albeit temporary, allowing electricity to flow again. Terminal strip - The terminal strip, nicknamed the chocblock, is a slightly more permanent and reusable solution over the butt connectors. It takes a little longer to fit the connections, though this extra time is measured in seconds for an experienced engineer. Terminal strips are similar to butt connectors in function but differ in form slightly in that the conductor securing mechanism is a pair of clamping screws. These clamping screws hold the conductors in place and are releasable, allowing the chocblock to be used again and again.
  5. Meta-Stable Isomer - Americium-241 Multi-Source Nuclear Power Cell The Meta-Stable Isomer - Americium-241 Multi-Source Nuclear Power Cell is the standardized power cell used by every piece of portable equipment large enough to require more power than an internal battery could provide. As such, the MSI-AM241 and practically all portable military equipment has the same FED-STD connection port, meaning that any power cell is compatible with practically every piece of portable equipment, such as; the AEGIS MKII Marauder suit, the MA-96 Gargoyle Main Battle Tank, the GK-22 Gecko Armoured Personnel Carrier, and the standard issue Long-Range-Radio pack. Features of the MSI-AM241 Multi-Source Nuclear Power Cell The power cells are designed to be fully contained, modular units, allowing quick adaptability and easy maintenance. The cell is 233.68mm (9.2 inches) tall, 111.76mm (4.4 inches) in diameter, weighs 0.45kg (1.01lbs), and features a female power connection on the bottom of the cell. The top carrying handle doubles as the mechanism by which the inner workings of the cell are exposed. The outer casing of the cell is made from a thick titanium shell with a lead lining to prevent unwanted ionizing radiation from escaping. There are also both digital and analog read-outs on the cell that display current power levels, fuel levels, and internal temperatures. Operation of the MSI-AM241 Multi-Source Nuclear Power Cell The MSI-AM241 is technically a miniature reactor and not a traditional battery. The main bulk of the power is generated by a series of cold fusion reactions in the 36 chambers in the center of the cell using Palladium and Deuterium as reactants. A metastable isomer lattice of Americium sits atop a device at the top of the power cell with adjacent layers of P-type and N-type silicon where ionizing radiation penetrates the junctions and creates electron-hole pairs. This relatively small amount of energy generated is enough to be able to trigger decay as needed, effectively acting as an on/off switch for the cold fusion reactions going on elsewhere in the cell. It should also be noted that the MSI-AM241 is 100% safe and it is impossible for any of the reactants to enter a critical state due to the nature of the reaction taking place. DISCLAIMER: THE CELLS ARE CONSTRUCTED OUT OF MILITARY GRADE MATERIALS AND ARE DESIGNED TO BE PRACTICALLY INDESTRUCTIBLE. HOWEVER, IN THE EXTREMELY RARE CASE OF A CONTAINMENT UNIT BREACH, THE REACTANTS STORED INSIDE MAY STILL RELEASE HARMFUL, IONIZING RADIATION.
  6. OFFICE OF SPECIAL WARFARE 6th FLEET DETACHMENT ROSTER CALLSIGN: REVENANT COMMANDING OFFICER MAJOR ELLIOT SALEM EXECUTIVE OFFICER CAPTAIN OTTO DRESDNER MILITARY INTELLIGENCE/OFFICE OF SPECIAL WARFARE LIASION COLONEL MICAHEL RAMSEY MOBILE INFANTRY/OFFICE OF SPECIAL WARFARE LIASION CHIEF WARRANT OFFICER DARIUS HAWKE SQUAD LEADERSHIP STAFF-SERGEANT YAEL AVRAHAM STAFF-SERGEANT ARVI KJELLBÖRNE OPERATORS SERGEANT STONE O'SHEA SERGEANT MARVIN HALLSON SERGEANT GIOVANNY MARCELLO SERGEANT SAMUEL HARRINGTON SERGEANT MARCUS STONE SERGEANT JACOB FORZEN SERGEANT ASUKA HOLIDAY SERGEANT ALEXANDER DREXELL SERGEANT CHARLES FLINT
  7. The Handheld Computer Software Interface (HCSI) and You The Handheld Computer Software Interface (HCSI), nicknamed "The Brick", is a tablet computer used by Systems Technicians in their day to day work for a massive variety of tasks. The HCSI is a tablet computer with a 12-inch, capacitive touch-screen and a removable keyboard that doubles up as a protective screen cover, attaching via potent magnetic locks. Features Of The HCSI Full MIL-STD 811G compliant construction. Practically indestructible by all but the most adverse and direct conditions. TEMPEST level information/emission shielding, preventing accidental loss and leaking of potentially secret or otherwise volatile data. Dimensions: Height = 24.38mm (0.96"), Width = 312.42mm (12.3"), Depth = 203.2mm (8") Weight: 1.28 kg (2.82 lbs) without keyboard, 2.20kg (4.87 lbs) with keyboard. 128 core processor and a similarly powerful graphics processing unit, capable of performing at just over 400 petaFLOPS. 512 petabyte storage unit with data-transfer rates close to exceeding 300 terabytes per second. A comprehensive signal jamming device, capable of providing various facilities in order to hijack, alter, and completely jam most forms of electromagnetic signals. Also doubles as a signal broadcast device (and therefore wireless transmitter), capable of mimicking certain patterns and signals. A universal, micro-servo actuated, optical-fiber and silver-plated gold-core wire, dense wavelength digital multiplex connector, capable of interfacing with standard and proprietary connection ports. Four meters long. A custom-made operating system and suite of electronic warfare programs managed by a virtual intelligence designed to select the correct available facility and micro-manage processes at speeds quicker than the human user would be capable of. Capabilities And Operation Of The HCSI The device's primary function is interaction with hostile systems and, as such, is capable of performing operations such as full system cloning, brute-forcing entry to secured systems, full system wipes, and mass-distribution of malicious software such as malware, trojans and keylogging programs. It is also capable of full, on-the-spot data recovery operations when time is not an obstacle and a more delicate touch is needed than simply removing the physical drives themselves. Full system cloning - For smaller, isolated systems. For example, personal computers, laptops or PDAs. If it is possible, the indisputably best way of recovering data is by cloning the entire system. This is especially useful when it is suspected that complex data-denial techniques are in place that may compromise the target system. Generally, the only obstacle is space issues. Any systems with a larger size footprint than the HCSI is capable of holding are out of the realms of possibilities for this method. Brute-forcing - Once connected to the system, the virtual intelligence will begin scanning procedures to determine the level of security within the target. It will then select the perceived best way of cracking the system and pause. It will display details regarding the hostile system including the estimated time needed for the operation, the chance of failure, and the details of the security. The virtual intelligence will then prompt the user with a choice; whether the virtual intelligence should attempt to be "quiet" and avoid detection by any active security, or whether the virtual intelligence should just attempt to be as quick as possible. This kind of forcing access to a secure system can take anywhere between a few seconds and a few hours, depending on how strong the security is. Full system wipe - Given enough time, the device is capable of completely and totally wiping every trace of data on a system, just as thorough as any data destruction software. The device gives the user several levels of data destruction to choose from, ranging from surface level deletion (as simple as placing files in the recycle bin and emptying it), to complete and utter overwriting (ensuring the data is almost impossible to retrieve). Mass-distribution of malicious software - Used as a distraction technique, or by spiteful operators, this function floods the system the HCSI is connected to with whatever malicious software is requested by the user. The device has a designated, sandboxed section of the storage unit to house the malicious software and when this operation is activated, the rest of the HCSI locks itself down temporarily so that it cannot be compromised while the software is being transferred. The most useful function of this operation is to distract security systems, reducing their effectiveness while they deal with the flood of viruses, malware, and trojans. Data recovery - The opposite of the full system wipe, the data recovery function endeavours to use the HCSI's mighty processing power in an attempt to undo the work of data-deletion programs. This function also focuses on the removal, decryption (if necessary) and safe storage of potentially fragile and sensitive data. Use of the HCSI is fairly simple and follows a few steps. Connect the HCSI to the system that you which to interface with via the universal connection cable, or establish a wireless connection via the wireless connection wizard. Once the connection has been established, select the function you wish to engage via the GUI. Follow the prompts and provide input where necessary. Ensure the functions to be executed are fully complete before disconnecting the HCSI from the system. (WARNING: Disconnecting the HCSI from the system while a function is still in progress may cause data loss and corruption) DISCLAIMER: ANY UNAUTHORISED ACCESS TO SECURE FEDERATION SYSTEMS WILL TRIGGER AN AUTOMATIC MESSAGE SENT TO MILITARY INTELLIGENCE INTERNAL AFFAIRS AND WILL BE DEALT WITH AS ATTEMPTED ESPIONAGE. ANY ATTEMPT TO CIRCUMVENT THIS FEATURE WILL BE CLASSED AS DESTRUCTION/DAMAGE OF FEDERATION MILITARY PROPERTY AND WILL BE DEALT WITH AS SUCH.
  8. kinks are okay you judgemental asshole
  9. Hicks

    Ideas for Marauders

    I hastened Pathfinder training for Young to a 2 week TK and that's twice as long as Marauder training. There's precedent for it. I think having existing MI characters become Marauders would lessen the feeling of elitism and clique-ness. Also, changing the Marauder bay into just offices and a technical bay, or moving it closer to the normal MI barracks on the map itself, would change things a lot. Encouraging more integration, both on and off deployment is key. As for what the Marauders need to change into, I like Tony's idea a lot, especially because that's the kind of thing I had been trying to make happen a long time ago. A support suit with long-range weaponry, to fill a niche that the MI doesn't fill, is exactly what the doctor prescribed, I think. Advanced sensor suites for detection purposes, seismic probes to assist where a psychic cannot (considering MIPOD operatives are not powerful enough to map tunnels), and indirect fire capable weapons. None of these things are things that MI do and would produce countless opportunities for roleplay and good teamwork between the MI and Marauders.
  10. Hicks

    A suggestions to replace Chickenhawk?

    We've used the Combine Mech before. It's unbearably laggy. It's never worked before and I highly doubt it'll work now.
  11. Hicks

    MI Epaulettes Guide

    So it's not all on the wiki then... And it's not a bad thing that we have this in two places.
  12. Hicks

    im bad at making fast threads

    Import ants
  13. Hicks

    MI Epaulettes Guide

    You’re right. This is useful. Pinned.
  14. Hicks

    Darius Hawke Unmasked XXX

    MAH PAC. SHEMAGH SUPPOSED TO BE UP. WRYYYYYYY
  15. Hicks

    Concern for loss of playerbase.

    I’m curious as to what you’re referencing regarding the .net vs FAW situation. Because, let’s face it, that’s partially what this thread is about. I haven’t played on the other server myself, so I won’t make judgments, considering everything I have heard about it has almost certainly been biased. But what is it that they do that makes the server feel more like SST than this server? What makes you feel like this server is just “cod WW3”? As to the mission timings, a lot of the time we don’t run missions when there are that many people on because either a: we ran one not long ago and that’s WHY there are that many people on, or b: we have asked and people are happy RPing and don’t want a mission. But my question stands. Could you elaborate on your point?
×