Samantha von Zeppffenhain: Difference between revisions
BattlerNonna (talk | contribs) (Created page with "{{Infobox military person |honorific_prefix = |name = Samantha von Zeppffenhain |honorific_suffix = |image = SamanthaVonZeppffenhain.png |image_uprigh...") |
BattlerNonna (talk | contribs) mNo edit summary |
||
Line 27: | Line 27: | ||
|rank_label = | |rank_label = | ||
|servicenumber = | |servicenumber = | ||
|unit = [[SS-Totenkopfaufsichtsbehörde Division]]<br/>[[Department 7B2]] | |unit = [[Der Totenkopf Unternehmen]] - [[SS-Totenkopfaufsichtsbehörde Division]]<br/>[[Department 7B2]] | ||
|commands = | |commands = | ||
|battles = | |battles = |
Latest revision as of 04:55, 20 June 2021
Samantha von Zeppffenhain | |
---|---|
Birth name | Samantha Cecilien Isabelle von Zeppffenhain |
Nickname(s) | "Woodpecker" (Department 7B2 codename) |
Born | Biesenwald, Trossingen, Autocratic East Europan Imperial Alliance | 12 February 1995
Rank | SS-Scharführerin und Obersicherheitssoftware-Ingenieur der DTU Offensive Cyberwarfare Operator, First Class (OCO1) |
Unit | Der Totenkopf Unternehmen - SS-Totenkopfaufsichtsbehörde Division Department 7B2 |
Relations |
|
Samantha Cecilien Isabelle von Zeppffenhain (12 February 1995) is an East Europan hacker who worked for the Die Totenkopf Unternehmen and Department 7B2 subsequently. Programming since the age of 10, Zeppffenhain proved a skilled and diligent programmer who was employed in the SS-Totenkopfaufsichtsbehörde Division to develop the Unternehmen's firewall and security software. However, she would later become disillusioned with the Unternehmen's unethical and horrendous experiments, and defected to the Gneisenau Circle. She later offered her services to Department 7B2 upon recommendation of Friedrich Albricht, and enlisted in the Offensive Cyberwarfare Division as Offensive Cyberwarfare Operator, First Class in an effort to try a new endeavor. Her notable contribution to the Department is DTUPortCrusher, which bypasses the Unternehmen's firewall and opens their dedicated ports using three zero-day exploits.