Shop Mobile More Submit  Join Login
Hacker's Room by sythis Hacker's Room by sythis
I decided to make this in dedication to my brother. Mainly he's always interested in knowing what's it like in the life of a 1337 h4x0r. Mainly just an excuse to mess around with Maya's lighting effects. I have been thinking about how a geeks network would work. I know you can't see it very well but I don't want to mess with the render time too much or make a flash sideshow of individual parts.

The two leftmost computers and the two rightmost computers are on separate networks, so each has their own service providers, both on ADSL2+ lines. The story goes, this geek likes to hack himself, in order to test for several variables. The reason for this is to hack himself in an “over the network” ie. WAN scenario. Hear is what each computer has inside

Blue: Holds several OS's with clients to act as an enterprise workstation or a terminal to the server. Each is partitioned on a 500GB drive. It also acts as a target when the other network tries to exploit certain services over the web.

Holds the Intel Nehalem-EX processors, with 32GB RAM. Server and Database software includes Apache, SQL Server, IIS, Netware, Oracle, DB2, etc with several different OS'. Each is partitioned on6 500GB drives. This can also be used to test encryption breaking programs made by the hacker to support 8 core and SSE4.

Red: Holds several OS' with several tools and services. This act's as the Target computer in most attacks when it comes to LAN attacks on certain services. There's also a 500GB drive. It also acts as a target when the other network tries to exploit certain services over the web.

White(Right): This is the main desktop. It holds several OS' with several tools and services while acting as an attacking computer. A powerful desktop supporting a watercooled Intel Westmere desktop processor (Bloomfeild core with 32nm transistors) with 4GB of DDR3 1600 RAM. It' is also used for breaking encryptions. It also provides Blu-Ray movies, and miscellaneous software like Photoshop, Maya, or whatever he feels like. There are two 1TB drives. One for Miscellaneous and expendable software and the other for favored programs.

Drive(on white computers): Hammer Network drives each support 2TB of storage.

Switch(middle bottom): This is used to bridge the two computers into one network (when the hacker feels like setting it up that way). It's also useful to test it's security and services. 24 Port switches usually has more features than 4-6 port switches because they mean business.

KVM-Switch(above switch): Switches input signals between computers. Input signals being monitors, mouse and keyboard.

Laptops: Two laptops are used to simulate wireless security and be the third computer when it comes to a “man in the middle attack” or anything involving a thee way handshake.

Routers: Two wireless routers for two separate networks

Display: Three 30" 2560x1600 monitors for a ton of workspace. He doesn't have a wallpaper for memory reasons.

Wall: Posters of awesome stuff! And of course, the basement idea.
Add a Comment:
JS-Cereal-Killer Featured By Owner May 12, 2013
to tell you the 100% truth. True hackers never work from home 
septzombie Featured By Owner Nov 14, 2008
haha i forget this :P

nice work !!
sythis Featured By Owner Nov 16, 2008
septzombie Featured By Owner Nov 14, 2008
soo sexy
being hacker its my frustrated dream u.u xD!!
hvhaxor2 Featured By Owner Jun 12, 2008
if i had a setup i wouldn't ever leave it and either those are HUGE ASS monitors or little ass laptops
sythis Featured By Owner Jun 14, 2008
intending on 30". I was shooting for something like this

hvhaxor2 Featured By Owner Jun 14, 2008
i have sli 8800GTS graphics cards and i still wouldn't be able to push those to the limit ... nice one
demonman119 Featured By Owner Mar 31, 2008
Add a Comment:

:iconsythis: More from sythis


Submitted on
March 31, 2008
Image Size
88.3 KB


4 (who?)