Cade Calrayn (talk | contribs) m (→Sources) |
|||
(37 intermediate revisions by 15 users not shown) | |||
Line 1: | Line 1: | ||
{{Eras|old|imp|reb|new|njo|leg}} |
{{Eras|old|imp|reb|new|njo|leg}} |
||
− | [[File:Slicer TofG.jpg|thumb|right| |
+ | [[File:Slicer TofG.jpg|thumb|right|200px|A slicer working with a [[datapad]]]] |
+ | {{Quote|Never use your pet's name as a password, Lord Vader.|Unidentified slicer|Agents of Deception}} |
||
⚫ | The term '''"slicer"''' was used to describe computer experts, often self-taught, who excelled at working within a complex computer network, and were able to extract information from this network with great skill. Often, this information was secured by any number and manner of encryption and lockout systems, and a skilled slicer was able to circumvent these systems without triggering alarms. |
||
⚫ | The [[Galactic Empire]], [[Alliance to Restore the Republic]], [[New Republic]], and assorted law-enforcement and criminal organizations{{Fact}} as well as several members of the [[Jedi Order]] during the [[Galactic Republic|Old Republic]]<ref name="itsc">''[[Into the Storm Clouds]]''</ref> employed computer experts to write and slice code. While most code slicing could be performed by [[droid]]s, the "personal touch" was often required for special jobs. |
||
⚫ | |||
− | |||
⚫ | The term '''"slicer |
||
− | |||
⚫ | The [[Galactic Empire]], [[Alliance to Restore the Republic]], [[New Republic]], and assorted law-enforcement and criminal organizations{{Fact}} as well as several members of the [[Jedi Order]] during the [[Old Republic]]<ref name="itsc"> |
||
==Equipment== |
==Equipment== |
||
⚫ | |||
− | [[File:Slicer SWG5.jpg|thumb|left| |
+ | [[File:Slicer SWG5.jpg|thumb|left|150px|A slicer at work]] |
Slicers used specialized computers, many built by the slicers themselves, to eke out a living in the digital world. These computers were carefully guarded and constantly modified and upgraded by the slicer, who rarely discussed its specs except with like-minded individuals. Complex access codes and even self-destruct mechanisms were often used to prevent a slicer's computer from falling into the wrong hands. |
Slicers used specialized computers, many built by the slicers themselves, to eke out a living in the digital world. These computers were carefully guarded and constantly modified and upgraded by the slicer, who rarely discussed its specs except with like-minded individuals. Complex access codes and even self-destruct mechanisms were often used to prevent a slicer's computer from falling into the wrong hands. |
||
Many freelance slicers charged their clients for these "necessary" modifications as part of the requirements for the job in question. |
Many freelance slicers charged their clients for these "necessary" modifications as part of the requirements for the job in question. |
||
− | {{Clear}} |
||
==Identities== |
==Identities== |
||
+ | [[File:Creepy_slicer.jpg|thumb|Another slicer at work.]] |
||
Slicers essentially had two, or sometimes more identities. In place of their true identity, slicers generally used code names; even regular business associates would not know a slicer's true identity. Keeping their true identity a secret was very important to successful slicers; they would rather not have to spend their time evading law-enforcement personnel, [[bounty hunter]]s, and [[fringer]]s with personal vendettas. Criminal slicers tended to use flashy pseudonyms, while government and corporate slicers often had militaristic code names or alphanumeric designations. |
Slicers essentially had two, or sometimes more identities. In place of their true identity, slicers generally used code names; even regular business associates would not know a slicer's true identity. Keeping their true identity a secret was very important to successful slicers; they would rather not have to spend their time evading law-enforcement personnel, [[bounty hunter]]s, and [[fringer]]s with personal vendettas. Criminal slicers tended to use flashy pseudonyms, while government and corporate slicers often had militaristic code names or alphanumeric designations. |
||
Line 21: | Line 20: | ||
[[Slicer droid]]s were intelligent automatons that excelled at sifting through mounds of useless data for the one needed factoid. |
[[Slicer droid]]s were intelligent automatons that excelled at sifting through mounds of useless data for the one needed factoid. |
||
− | |||
− | ==Notable slicers== |
||
− | [[File:MainframeSlicing-GOI.jpg|thumb|right|200px|Slicers breaking into a computer mainframe]] |
||
− | *[[Aeron Azzameen]]<ref name="X-wing Alliance">''[[Star Wars: X-wing Alliance]]''</ref> |
||
− | *[[Baylan]]<ref name="A Revelation">{{LFC|A Revelation}}</ref> |
||
− | *[[Filli Bitters]]<ref name="The Rise of Darth Vader">''[[Dark Lord: The Rise of Darth Vader]]''</ref> |
||
− | *[[Winter Celchu]] |
||
− | *[[Goure Conor]]<ref name="Refugee">''[[Force Heretic II: Refugee]]''</ref> |
||
− | *[[Astri Oddo Divinian]]<ref name="A Tangled Web">''[[The Last of the Jedi: A Tangled Web]]''</ref> |
||
− | *[[Castin Donn]]<ref name="Iron Fist">''[[X-wing: Iron Fist]]''</ref> |
||
− | *[[Zakarisz Ghent]] |
||
− | *[[Sha'a Gi]] |
||
− | *[[IMPEREVI]] |
||
⚫ | |||
− | *[[Mako (slicer)|Mako]] |
||
− | *[[Moegid]] |
||
− | *[[Ferus Olin]] |
||
− | *[[Gara Petothel]] |
||
− | *[[Atton Rand]]<ref name="KotOR:TSL" /> |
||
− | *[[RC-3222]] |
||
− | *[[RC-1140]] |
||
− | *[[Jaing Skirata]] |
||
− | *[[Mereel Skirata]] |
||
− | *[[Eurrsk Thri'ag]] |
||
− | *[[Mission Vao]] |
||
− | *[[Shannon Voorson]]<ref name="Slaying Dragons">{{Journal|9|Slaying Dragons}}</ref> |
||
− | |||
− | ==Notable slicer droids== |
||
− | *[[R2-D2]] |
||
− | *[[T3-M4]]<ref name="KotOR:TSL" /><ref name="KotOR">''[[Star Wars: Knights of the Old Republic]]''</ref> |
||
− | *[[T7-O1]] |
||
− | *[[Whistler]] |
||
− | *[[Blue Max]] |
||
− | *[[Ig 88 A]] |
||
==Behind the scenes== |
==Behind the scenes== |
||
Line 61: | Line 26: | ||
==Appearances== |
==Appearances== |
||
{{Scroll box|content= |
{{Scroll box|content= |
||
− | *''[[Star Wars Knights of the Old Republic 26: Vector, Part 2]]'' {{Mo}} |
+ | *''[[Star Wars: Knights of the Old Republic 26: Vector, Part 2]]'' {{Mo}} |
*''[[Star Wars: Knights of the Old Republic]]'' |
*''[[Star Wars: Knights of the Old Republic]]'' |
||
*''[[Star Wars: Knights of the Old Republic II: The Sith Lords]]'' |
*''[[Star Wars: Knights of the Old Republic II: The Sith Lords]]'' |
||
*''[[Star Wars: The Old Republic]]'' |
*''[[Star Wars: The Old Republic]]'' |
||
+ | *''[[Star Wars: The Old Republic: Rise of the Hutt Cartel]]'' |
||
⚫ | |||
+ | *''[[Star Wars: The Old Republic: Galactic Starfighter]]'' |
||
⚫ | |||
+ | *''[[Star Wars: The Old Republic: Shadow of Revan]]'' |
||
⚫ | |||
⚫ | |||
*''[[Star Wars: Jedi Starfighter]]'' |
*''[[Star Wars: Jedi Starfighter]]'' |
||
*''[[Star Wars: Republic Commando]]'' |
*''[[Star Wars: Republic Commando]]'' |
||
*''[[Star Wars: Battlefront II]]'' |
*''[[Star Wars: Battlefront II]]'' |
||
− | *''[[Star Wars |
+ | *''[[Star Wars Battlefront: Renegade Squadron]]'' |
*''[[Dark Lord: The Rise of Darth Vader]]'' |
*''[[Dark Lord: The Rise of Darth Vader]]'' |
||
*''[[Coruscant Nights I: Jedi Twilight]]'' {{Mo}} |
*''[[Coruscant Nights I: Jedi Twilight]]'' {{Mo}} |
||
Line 76: | Line 44: | ||
*''[[The Last of the Jedi: A Tangled Web]]'' |
*''[[The Last of the Jedi: A Tangled Web]]'' |
||
*''[[A Boy and His Monster: The Rancor Keeper's Tale]]'' |
*''[[A Boy and His Monster: The Rancor Keeper's Tale]]'' |
||
− | *{{SWG|An Empire Divided}} |
+ | *{{SWG|An Empire Divided}} <!---0ABY--> |
*{{SWGTCG|The Price of Victory}} {{C|''Double Trouble'' promotional scenario}} {{Mo}} |
*{{SWGTCG|The Price of Victory}} {{C|''Double Trouble'' promotional scenario}} {{Mo}} |
||
− | *''[[ |
+ | *''[[Crisis on Cloud City]]'' |
+ | *[[Star Wars: Episode V The Empire Strikes Back|''Star Wars'': Episode V ''The Empire Strikes Back'']] |
||
*{{Journal|9|Slaying Dragons}} |
*{{Journal|9|Slaying Dragons}} |
||
− | *''[[ |
+ | *''[[Under a Black Sun]]'' |
+ | *''[[Star Wars: X-Wing Alliance]]'' |
||
+ | *{{WEGCite|book=Shadows of the Empire Sourcebook|text=''Shadows of the Empire Sourcebook''|story=The Weekly Luncheon|stext=''The Weekly Luncheon''}} {{Mo}} |
||
+ | *{{WEGCite|book=Shadows of the Empire Planets Guide|text=''Shadows of the Empire Planets Guide''|story=Ion Cannon Parts|stext=''Ion Cannon Parts''}} |
||
*''[[Mara Jade: By the Emperor's Hand 1]]'' {{Mo}} |
*''[[Mara Jade: By the Emperor's Hand 1]]'' {{Mo}} |
||
*''[[The Mandalorian Armor]] |
*''[[The Mandalorian Armor]] |
||
Line 89: | Line 61: | ||
*''[[Dark Force Rising]] |
*''[[Dark Force Rising]] |
||
*''[[The Last Command]]'' |
*''[[The Last Command]]'' |
||
− | *''[[X- |
+ | *''[[X-Wing: Rogue Squadron]]'' |
− | *''[[X- |
+ | *''[[X-Wing: Wedge's Gamble]]'' |
− | *''[[X- |
+ | *''[[X-Wing: Wraith Squadron]]'' |
− | *''[[X- |
+ | *''[[X-Wing: Iron Fist]]'' |
− | *''[[X- |
+ | *''[[X-Wing: Solo Command]]'' <!---7ABY--> |
+ | *{{DarkStryder|Little Empires|Kathol Outback}} <!---8ABY--> |
||
− | *''[[X- |
+ | *''[[X-Wing: Isard's Revenge]]'' <!---9ABY--> |
*''[[Darksaber (novel)|Darksaber]]'' |
*''[[Darksaber (novel)|Darksaber]]'' |
||
− | *''[[X- |
+ | *''[[X-Wing: Starfighters of Adumar]]'' |
*''[[Star Wars: Jedi Knight: Jedi Academy]]'' |
*''[[Star Wars: Jedi Knight: Jedi Academy]]'' |
||
*''[[Specter of the Past]]'' |
*''[[Specter of the Past]]'' |
||
*''[[Vision of the Future]]'' |
*''[[Vision of the Future]]'' |
||
− | *''[[Agents of Chaos II: Jedi Eclipse]]'' {{Mo}} |
+ | *''[[The New Jedi Order: Agents of Chaos II: Jedi Eclipse]]'' {{Mo}} |
− | *''[[Edge of Victory II: Rebirth]]'' |
+ | *''[[The New Jedi Order: Edge of Victory II: Rebirth]]'' |
− | *''[[Force Heretic II: Refugee]]'' |
+ | *''[[The New Jedi Order: Force Heretic II: Refugee]]'' |
*''[[Dark Nest I: The Joiner King]]'' |
*''[[Dark Nest I: The Joiner King]]'' |
||
*''[[Dark Nest III: The Swarm War]]'' |
*''[[Dark Nest III: The Swarm War]]'' |
||
− | *''[[Conviction]]'' |
+ | *''[[Fate of the Jedi: Conviction]]'' |
+ | *''[[Fate of the Jedi: Ascension]]'' |
||
+ | *''[[Crucible (novel)|Crucible]]'' {{Mo}} |
||
}} |
}} |
||
==Sources== |
==Sources== |
||
+ | *''[[Galaxy Guide 2: Yavin and Bespin]]'' |
||
− | {{Scroll box|content= |
||
*''[[Cracken's Rebel Operatives]]'' |
*''[[Cracken's Rebel Operatives]]'' |
||
*''[[Heroes & Rogues]]'' |
*''[[Heroes & Rogues]]'' |
||
Line 117: | Line 92: | ||
*''[[The Thrawn Trilogy Sourcebook]]'' |
*''[[The Thrawn Trilogy Sourcebook]]'' |
||
*''[[Shadows of the Empire Sourcebook]]'' |
*''[[Shadows of the Empire Sourcebook]]'' |
||
+ | *''[[Shadows of the Empire Planets Guide]]'' |
||
*{{GamerCite|5|Special Ops: The Slicer}} |
*{{GamerCite|5|Special Ops: The Slicer}} |
||
*{{GamerCite|7|Secrets of Mos Eisley}} |
*{{GamerCite|7|Secrets of Mos Eisley}} |
||
+ | *''[[Coruscant and the Core Worlds]]'' |
||
*''[[Star Wars Galaxies: An Empire Divided Quick Reference Guide]]'' |
*''[[Star Wars Galaxies: An Empire Divided Quick Reference Guide]]'' |
||
⚫ | |||
*{{InsiderCite|89|So You Want To Be A Criminal? An Underworld Primer}} |
*{{InsiderCite|89|So You Want To Be A Criminal? An Underworld Primer}} |
||
*''[[Threats of the Galaxy]]'' |
*''[[Threats of the Galaxy]]'' |
||
Line 125: | Line 103: | ||
*''[[Scavenger's Guide to Droids]]'' |
*''[[Scavenger's Guide to Droids]]'' |
||
*''[[Galaxy of Intrigue]]'' |
*''[[Galaxy of Intrigue]]'' |
||
− | *''[[The Jedi Path: A Manual for Students of the Force (real-life book)|The Jedi Path: A Manual for Students of the Force]]' |
+ | *''[[The Jedi Path: A Manual for Students of the Force (real-life book)|The Jedi Path: A Manual for Students of the Force]]'' |
+ | *''[[Star Wars: The Old Republic Explorer's Guide]]'' |
||
− | }} |
||
+ | *''[[Star Wars: The Old Republic Encyclopedia]]'' |
||
+ | *''[[Star Wars: Edge of the Empire Core Rulebook]]'' |
||
+ | *{{TORweb|url=info/news/blog/20131001-0|text=The Search for Oricon}} |
||
+ | *''[[Star Wars: Age of Rebellion Core Rulebook]]'' |
||
==See also== |
==See also== |
||
Line 140: | Line 122: | ||
|de=Hacker |
|de=Hacker |
||
|es=Hacker |
|es=Hacker |
||
+ | |ru=Ледоруб |
||
}} |
}} |
||
Revision as of 01:23, 17 January 2015
- "Never use your pet's name as a password, Lord Vader."
- ―Unidentified slicer
The term "slicer" was used to describe computer experts, often self-taught, who excelled at working within a complex computer network, and were able to extract information from this network with great skill. Often, this information was secured by any number and manner of encryption and lockout systems, and a skilled slicer was able to circumvent these systems without triggering alarms.
The Galactic Empire, Alliance to Restore the Republic, New Republic, and assorted law-enforcement and criminal organizations[source?] as well as several members of the Jedi Order during the Old Republic[1] employed computer experts to write and slice code. While most code slicing could be performed by droids, the "personal touch" was often required for special jobs.
Equipment
- "Good thing you didn't keep me waiting. I don't like to be kept waiting. If you had kept me waiting, I would have charged you triple overtime."
- ―D/Crypt technician
Slicers used specialized computers, many built by the slicers themselves, to eke out a living in the digital world. These computers were carefully guarded and constantly modified and upgraded by the slicer, who rarely discussed its specs except with like-minded individuals. Complex access codes and even self-destruct mechanisms were often used to prevent a slicer's computer from falling into the wrong hands.
Many freelance slicers charged their clients for these "necessary" modifications as part of the requirements for the job in question.
Identities
Slicers essentially had two, or sometimes more identities. In place of their true identity, slicers generally used code names; even regular business associates would not know a slicer's true identity. Keeping their true identity a secret was very important to successful slicers; they would rather not have to spend their time evading law-enforcement personnel, bounty hunters, and fringers with personal vendettas. Criminal slicers tended to use flashy pseudonyms, while government and corporate slicers often had militaristic code names or alphanumeric designations.
Socketguards were specially designed to combat slicers.
Slicer droids were intelligent automatons that excelled at sifting through mounds of useless data for the one needed factoid.
Behind the scenes
A slicer or the verb slicing are all equal to the real life term hacker or hacking, along with the stereotyped appearance.
Appearances
Sources
- Galaxy Guide 2: Yavin and Bespin
- Cracken's Rebel Operatives
- Heroes & Rogues
- Galaxy Guide 2: Yavin and Bespin, Second Edition
- "Cracken's Rebel Field Guide: Slicing Aids" — Star Wars Adventure Journal 10
- Cynabar's Fantastic Technology: Droids
- The Thrawn Trilogy Sourcebook
- Shadows of the Empire Sourcebook
- Shadows of the Empire Planets Guide
- "Special Ops: The Slicer" — Star Wars Gamer 5
- "Secrets of Mos Eisley" — Star Wars Gamer 7
- Coruscant and the Core Worlds
- Star Wars Galaxies: An Empire Divided Quick Reference Guide
- Knights of the Old Republic II: The Sith Lords: Prima Official Game Guide
- "So You Want To Be A Criminal? An Underworld Primer" — Star Wars Insider 89
- Threats of the Galaxy
- Scum and Villainy
- Scavenger's Guide to Droids
- Galaxy of Intrigue
- The Jedi Path: A Manual for Students of the Force
- Star Wars: The Old Republic Explorer's Guide
- Star Wars: The Old Republic Encyclopedia
- Star Wars: Edge of the Empire Core Rulebook
- The Search for Oricon on The Old Republic's official website (backup link)
- Star Wars: Age of Rebellion Core Rulebook