I decided to make this in dedication to my brother. Mainly he's always interested in knowing what's it like in the life of a 1337 h4x0r. Mainly just an excuse to mess around with Maya's lighting effects. I have been thinking about how a geeks network would work. I know you can't see it very well but I don't want to mess with the render time too much or make a flash sideshow of individual parts.
The two leftmost computers and the two rightmost computers are on separate networks, so each has their own service providers, both on ADSL2+ lines. The story goes, this geek likes to hack himself, in order to test for several variables. The reason for this is to hack himself in an over the network ie. WAN scenario. Hear is what each computer has inside
Blue: Holds several OS's with clients to act as an enterprise workstation or a terminal to the server. Each is partitioned on a 500GB drive. It also acts as a target when the other network tries to exploit certain services over the web.
Holds the Intel Nehalem-EX processors, with 32GB RAM. Server and Database software includes Apache, SQL Server, IIS, Netware, Oracle, DB2, etc with several different OS'. Each is partitioned on6 500GB drives. This can also be used to test encryption breaking programs made by the hacker to support 8 core and SSE4.
Red: Holds several OS' with several tools and services. This act's as the Target computer in most attacks when it comes to LAN attacks on certain services. There's also a 500GB drive. It also acts as a target when the other network tries to exploit certain services over the web.
White(Right): This is the main desktop. It holds several OS' with several tools and services while acting as an attacking computer. A powerful desktop supporting a watercooled Intel Westmere desktop processor (Bloomfeild core with 32nm transistors) with 4GB of DDR3 1600 RAM. It' is also used for breaking encryptions. It also provides Blu-Ray movies, and miscellaneous software like Photoshop, Maya, or whatever he feels like. There are two 1TB drives. One for Miscellaneous and expendable software and the other for favored programs.
Drive(on white computers): Hammer Network drives each support 2TB of storage.
Switch(middle bottom): This is used to bridge the two computers into one network (when the hacker feels like setting it up that way). It's also useful to test it's security and services. 24 Port switches usually has more features than 4-6 port switches because they mean business.
KVM-Switch(above switch): Switches input signals between computers. Input signals being monitors, mouse and keyboard.
Laptops: Two laptops are used to simulate wireless security and be the third computer when it comes to a man in the middle attack or anything involving a thee way handshake.
Routers: Two wireless routers for two separate networks
Display: Three 30" 2560x1600 monitors for a ton of workspace. He doesn't have a wallpaper for memory reasons.
Wall: Posters of awesome stuff! And of course, the basement idea.