A am a GM whi is new to shadowrun, and my Matrix skills are a little shacky. Can a decker design a computer virus, and how does that work mechanically.
Thanks.
| QUOTE (Reighnhell) |
| A am a GM whi is new to shadowrun, and my Matrix skills are a little shacky. Can a decker design a computer virus, and how does that work mechanically. Thanks. |
the current tech of ice is based on the most nasty virus the world have ever seen...
So, can a Decker engineer his own ICE and unlease it on unsuspecting systems?
The Matrix book includes rules on (including how to program) worms that are often hidden on hosts to infect the cyberdecks of unsuspecting intruders.
One of them secretly logs your activities and occasionaly sends a message back to the host.
a sufficiently badass decker could create a command script that damages the system he plants it on. basically, instruct the script to create and validate a user account, and then find and delete--or edit, or move, or whatever--all the data it can access. you might even be able to have your large script write smaller scripts, validating accounts for them and giving them instructions like "whenever a user saves his work, edit the data and scramble it."
| QUOTE (Reighnhell) |
| So, can a Decker engineer his own ICE and unlease it on unsuspecting systems? |
| QUOTE (Reighnhell) |
| So, can a Decker engineer his own ICE and unlease it on unsuspecting systems? |
The Black Hammer (aka Jackhammer) program is basically a black IC attack program. Works on the same principles, but can be used by a decker rather than just being an automated function of the host. Thank you Mr. Fastjack.
The Abstrosue One
as is the tracker utility. those are utilities based on IC, though, not actual IC.
if a decker had a copy of an IC program, he could theoretically insert it into the security sheaf with a read/write data and a control test (control because he's messing with how the system works). there's no real rules for it, though; in general, there's no real rules for messing with the operating system of a host--just the data it contains, and certain functions.
So, if there are white and black combat utilities, what about grey ones?
Right now, all you can do to a decker is dump or kill him. Conceivably, a utility could be created that targets his deck just like gray IC.
But... what happens if you use this against a host? Right now, the worst thing you can do to a host is delete all its date and cause a crash and/or shutdown.
But you cant damage the physical host. Considering how expensive these mainframes must be, the matrix war between corps would turn a lot uglier - as would the retaliation against deckers that pull such stunts.
Back on the subject of viri: What I am missing with what you have suggested so far for viri that infect hosts is the basic quality of every virus: Itīs ability to self-replicate and spread to other systems.
| QUOTE (Blip) |
| Back on the subject of viri: What I am missing with what you have suggested so far for viri that infect hosts is the basic quality of every virus: Itīs ability to self-replicate and spread to other systems. |
that's exactly what you do. "it samples the instruction alogrithms of the targeted icons and tries to induce fairly coarse memory faults into the icon's most frequently accessed code segments," straight out of the description.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)