Wookieepedia

READ MORE

Wookieepedia
Wookieepedia
m (Robot: Automated text replacement (-[[Edge of Victory I +[[The New Jedi Order: Edge of Victory I))
(6 intermediate revisions by one other user not shown)
Line 4: Line 4:
 
The term '''"slicer"''' was used to describe computer experts, often self-taught, who excelled at working within a complex computer network, and were able to extract information from this network with great skill. Often, this information was secured by any number and manner of encryption and lockout systems, and a skilled slicer was able to circumvent these systems without triggering alarms.
 
The term '''"slicer"''' was used to describe computer experts, often self-taught, who excelled at working within a complex computer network, and were able to extract information from this network with great skill. Often, this information was secured by any number and manner of encryption and lockout systems, and a skilled slicer was able to circumvent these systems without triggering alarms.
   
The [[Galactic Empire]], [[Alliance to Restore the Republic]], [[New Republic]], and assorted law-enforcement and criminal organizations{{Fact}} as well as several members of the [[Jedi Order]] during the [[Old Republic]]<ref name="itsc">{{LFC|Into the Storm Clouds}}</ref> employed computer experts to write and slice code. While most code slicing could be performed by [[droid]]s, the "personal touch" was often required for special jobs.
+
The [[Galactic Empire]], [[Alliance to Restore the Republic]], [[New Republic]], and assorted law-enforcement and criminal organizations{{Fact}} as well as several members of the [[Jedi Order]] during the [[Old Republic]]<ref name="itsc">''[[Into the Storm Clouds]]''</ref> employed computer experts to write and slice code. While most code slicing could be performed by [[droid]]s, the "personal touch" was often required for special jobs.
   
 
==Equipment==
 
==Equipment==
Line 30: Line 30:
 
*''[[Star Wars: Knights of the Old Republic II: The Sith Lords]]''
 
*''[[Star Wars: Knights of the Old Republic II: The Sith Lords]]''
 
*''[[Star Wars: The Old Republic]]''
 
*''[[Star Wars: The Old Republic]]''
*{{LFC|A Revelation}}
+
*''[[A Revelation]]''
*{{LFC|Into the Storm Clouds}}
+
*''[[Into the Storm Clouds]]''
 
*''[[Star Wars: Jedi Starfighter]]''
 
*''[[Star Wars: Jedi Starfighter]]''
 
*''[[Star Wars: Republic Commando]]''
 
*''[[Star Wars: Republic Commando]]''
Line 46: Line 46:
 
*{{Journal|9|Slaying Dragons}}
 
*{{Journal|9|Slaying Dragons}}
 
*''[[Under a Black Sun]]''
 
*''[[Under a Black Sun]]''
*''[[Star Wars: X-wing Alliance]]''
+
*''[[Star Wars: X-Wing Alliance]]''
 
*''[[Mara Jade: By the Emperor's Hand 1]]'' {{Mo}}
 
*''[[Mara Jade: By the Emperor's Hand 1]]'' {{Mo}}
 
*''[[The Mandalorian Armor]]
 
*''[[The Mandalorian Armor]]
Line 55: Line 55:
 
*''[[Dark Force Rising]]
 
*''[[Dark Force Rising]]
 
*''[[The Last Command]]''
 
*''[[The Last Command]]''
*''[[X-wing: Rogue Squadron]]''
+
*''[[X-Wing: Rogue Squadron]]''
*''[[X-wing: Wedge's Gamble]]''
+
*''[[X-Wing: Wedge's Gamble]]''
*''[[X-wing: Wraith Squadron]]''
+
*''[[X-Wing: Wraith Squadron]]''
*''[[X-wing: Iron Fist]]''
+
*''[[X-Wing: Iron Fist]]''
*''[[X-wing: Solo Command]]'' <!---7ABY-->
+
*''[[X-Wing: Solo Command]]'' <!---7ABY-->
*{{WEG|The Kathol Outback|Little Empires}} <!---8ABY-->
+
*{{DarkStryder|Little Empires|Kathol Outback}} <!---8ABY-->
*''[[X-wing: Isard's Revenge]]'' <!---9ABY-->
+
*''[[X-Wing: Isard's Revenge]]'' <!---9ABY-->
 
*''[[Darksaber (novel)|Darksaber]]''
 
*''[[Darksaber (novel)|Darksaber]]''
*''[[X-wing: Starfighters of Adumar]]''
+
*''[[X-Wing: Starfighters of Adumar]]''
 
*''[[Star Wars: Jedi Knight: Jedi Academy]]''
 
*''[[Star Wars: Jedi Knight: Jedi Academy]]''
 
*''[[Specter of the Past]]''
 
*''[[Specter of the Past]]''
Line 69: Line 69:
 
*''[[The New Jedi Order: Agents of Chaos II: Jedi Eclipse]]'' {{Mo}}
 
*''[[The New Jedi Order: Agents of Chaos II: Jedi Eclipse]]'' {{Mo}}
 
*''[[The New Jedi Order: Edge of Victory II: Rebirth]]''
 
*''[[The New Jedi Order: Edge of Victory II: Rebirth]]''
*''[[Force Heretic II: Refugee]]''
+
*''[[The New Jedi Order: Force Heretic II: Refugee]]''
 
*''[[Dark Nest I: The Joiner King]]''
 
*''[[Dark Nest I: The Joiner King]]''
 
*''[[Dark Nest III: The Swarm War]]''
 
*''[[Dark Nest III: The Swarm War]]''
*''[[Conviction]]''
+
*''[[Fate of the Jedi: Conviction]]''
*''[[Ascension]]''
+
*''[[Fate of the Jedi: Ascension]]''
 
*''[[Crucible (novel)|Crucible]]'' {{Mo}}
 
*''[[Crucible (novel)|Crucible]]'' {{Mo}}
 
}}
 
}}
Line 110: Line 110:
 
|de=Hacker
 
|de=Hacker
 
|es=Hacker
 
|es=Hacker
  +
|ru=Ледоруб
 
}}
 
}}
   

Revision as of 10:14, 11 July 2014

Click here for Wookieepedia's article on the Canon version of this subject.  This article covers the Legends version of this subject. 
Slicer TofG

A slicer working with a datapad

"Never use your pet's name as a password, Lord Vader."
―Unidentified slicer[src]

The term "slicer" was used to describe computer experts, often self-taught, who excelled at working within a complex computer network, and were able to extract information from this network with great skill. Often, this information was secured by any number and manner of encryption and lockout systems, and a skilled slicer was able to circumvent these systems without triggering alarms.

The Galactic Empire, Alliance to Restore the Republic, New Republic, and assorted law-enforcement and criminal organizations[source?] as well as several members of the Jedi Order during the Old Republic[1] employed computer experts to write and slice code. While most code slicing could be performed by droids, the "personal touch" was often required for special jobs.

Equipment

"Good thing you didn't keep me waiting. I don't like to be kept waiting. If you had kept me waiting, I would have charged you triple overtime."
D/Crypt technician[src]
File:Slicer SWG5.jpg

A slicer at work

Slicers used specialized computers, many built by the slicers themselves, to eke out a living in the digital world. These computers were carefully guarded and constantly modified and upgraded by the slicer, who rarely discussed its specs except with like-minded individuals. Complex access codes and even self-destruct mechanisms were often used to prevent a slicer's computer from falling into the wrong hands.

Many freelance slicers charged their clients for these "necessary" modifications as part of the requirements for the job in question.

Identities

File:Creepy slicer.jpg

Another slicer at work.

Slicers essentially had two, or sometimes more identities. In place of their true identity, slicers generally used code names; even regular business associates would not know a slicer's true identity. Keeping their true identity a secret was very important to successful slicers; they would rather not have to spend their time evading law-enforcement personnel, bounty hunters, and fringers with personal vendettas. Criminal slicers tended to use flashy pseudonyms, while government and corporate slicers often had militaristic code names or alphanumeric designations.

Socketguards were specially designed to combat slicers.

Slicer droids were intelligent automatons that excelled at sifting through mounds of useless data for the one needed factoid.

Behind the scenes

A slicer or the verb slicing are all equal to the real life term hacker or hacking, along with the stereotyped appearance.

Appearances

Sources

See also

Notes and references

In other languages