IPB

Welcome Guest ( Log In | Register )

6 Pages V  < 1 2 3 4 > »   
Reply to this topicStart new topic
onlyghostdancesw...
post Jan 25 2011, 07:06 PM
Post #26


Moving Target
**

Group: Members
Posts: 734
Joined: 4-November 09
Member No.: 17,844



QUOTE (sabs @ Jan 25 2011, 11:02 AM) *
That depends.

A hacker is going to be running Computer+analyze:
Best Case Scenario:
Computer(6) + Specialty (2) + Analyze(6) + Custom Interface (1) + Optimized (Analyze) (1) + Analytical Mind (2) + Hot Sim (2) = 20

Threading: 12d6=4hits. Roll Willpower+Resonance:12d6=4 hits = 0 damage taken.
vs
Hacking(6) + Stealth(6) + Threading (4) = 16

So in an opposed test, an optimized Hacker has the advantage.
Where the TM has the advantage is firewall+analyze (10) test. 12 Dice, takes 3 rounds to pop, vs a hacker gets caught in 2 max, and CAN be caught in 1 relatively often.


yeah but if the hacker is running with 5 ips and mute then its moot isnt it? or is that only in instances where there isnt a shit ton of IC plus the node scanning for intrusions?
Go to the top of the page
 
+Quote Post
sabs
post Jan 25 2011, 07:12 PM
Post #27


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



if you're hacking on the fly (which is the only time where the 5 IP come into play) the System gets to roll an extended test of firewall+analysis(Stealth Rating) /every/ time the Hacker rolls his hacking+exploit.

So it's a race:
Hacking+exploit(Firewall+account modifier,complex action) vs Firewall+Analysis(stealth)
Account Modifier is: Security Account(+3), Admin Account(+6)
Do you get your successes before they do.

Hacking(6)+Exploit(6)+VR(2)+specialty(2)+EncephalonII(2)+PuSheD(1)+Analytical Mind(2) 21 DP
You're getting on average 6 hits a roll, if you're a stud. The System is getting 4.

Go to the top of the page
 
+Quote Post
CanRay
post Jan 25 2011, 09:48 PM
Post #28


Immortal Elf
**********

Group: Dumpshocked
Posts: 14,358
Joined: 2-December 07
From: Winnipeg, Manitoba, Canada
Member No.: 14,465



QUOTE (Faraday @ Jan 25 2011, 01:16 PM) *
That link should have nothing interesting on it and be easily thrown away.

"'Bubba the Love Troll Does Cell Block B', ew!!!" *Keeps watching anyhow*

Hackers will also have Secondary CommLinks for just such an occasion. That said, the Hacker in my group got nailed, got scanned for Cybernetics, found his implanted CommLink, and they vacuumed it via his Datajack.

I then put him on a vague time limit until his self-performed "I encrypt EVERYTHING" was broken, after he was busted out of the Prison Bus when his SIN was borked.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 25 2011, 09:55 PM
Post #29


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I've still never seen an explanation of how Resonance Trodes actually works, and where you 'drag the victim into VR' *to*.
Go to the top of the page
 
+Quote Post
WyldKnight
post Jan 25 2011, 10:18 PM
Post #30


Moving Target
**

Group: Members
Posts: 540
Joined: 5-May 09
From: California
Member No.: 17,140



I always assumed it was the nearest node you could freely access.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 25 2011, 10:20 PM
Post #31


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



So, it's like Ghostbusters? That's one possibility, but the total lack of guidance is the problem. Would that mean you'd carry disposable/gimped/trapped 'storage' commlinks?

Another possible option is the bionode, which creates a host of contradictions about who can be in a bionode, etc.
Go to the top of the page
 
+Quote Post
Digital Heroin
post Jan 25 2011, 10:47 PM
Post #32


Neophyte Runner
*****

Group: Members
Posts: 2,458
Joined: 22-March 03
From: I am a figment of my own imagination.
Member No.: 4,302



Two people have said it, but I shall re-iterate and expand upon the subject a touch.

There is a mechanical reason why I made my merc comms specialist a technomancer (there are plenty of roleplaying reasons): a technomancer's living node is unhackable by anyone but another technomancer or a sprite (oft overlooked, but yes, free sprites do have the ressonance signature needed, AIs I'm not sure about). This leaves an increadibly small pool of people able to get at what is inside of the head of the technomancer. Now what was not mentioned is that anything slaved to the technomancer's living node is also afforded the same protection. So your droneomancer's drone network, my comms guys entire teams' commlinks/tacnet, all are only to be touched by another technomancer or ressonance capable entity. That is one hell of an advantage over a hacker, who, despite all the encryption in the world, all the IC, all the defenses, is still vulnerable to any determined person/entity with the ability to touch the Matrix.
Go to the top of the page
 
+Quote Post
CanRay
post Jan 25 2011, 10:48 PM
Post #33


Immortal Elf
**********

Group: Dumpshocked
Posts: 14,358
Joined: 2-December 07
From: Winnipeg, Manitoba, Canada
Member No.: 14,465



Another reason to pick a TM: Morning Sickness all over Forum Boards is HILARIOUS!
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 25 2011, 10:52 PM
Post #34


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Note that Digital Heroin's comments only apply to wireless hacking. In addition, the subscription counts *do* eventually add up.

It's true that this is a categorical advantage in the theoretical sense, but I'm not sure it makes much difference in practice. Particularly in play, where the GM sends threats that match you. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Ryu
post Jan 25 2011, 10:58 PM
Post #35


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



A TM can have program ratings that are much better than what a hacker can hope to get.

They can hack stronger nodes without being detected due to Stealth 10+. It is very good that hackers can now compete on that front - on the high end, and in situations where "even higher" is not useful.

TMs can take out all matrix opponents except for an E-hive in a single blow. Offensive Programs have the rating figure into DV and dp.

On the defense, a Shield CF is incredibly useful, and there is no Shield Program (as far as I know).

TMs can have a r9 compiled sprite sidekick. And MiniMe can give most hackers a run for their money with a DP of 18, program rating 9, and powers.

More helps. At some point the hacker is optimal, while the TM can still advance. What will be beneficial in actual play depends on the length of your campaign and the karma and cash incomes. It also depends on the expectations regarding secondary skills.


Leaving the requested focus, there is a strong case for augmented TMs if you use karmagen. Start with resonance 4, get a stable of r4 registered sprites, Cerebral Booster 3 and a Trauma Dampener.

The strong point of a Hacker is being cheap. Get a solid link and a bunch of skills, opt out on the expensive ware. And if you go the expensive route, don´t miss out on the must-have augmentations. If others invest into technomancy, you can have Restricted Gear a few times. Suprathyroid Gland, Muscle Toner 4...
Go to the top of the page
 
+Quote Post
Digital Heroin
post Jan 25 2011, 11:03 PM
Post #36


Neophyte Runner
*****

Group: Members
Posts: 2,458
Joined: 22-March 03
From: I am a figment of my own imagination.
Member No.: 4,302



QUOTE (Yerameyahu @ Jan 25 2011, 10:52 PM) *
Note that Digital Heroin's comments only apply to wireless hacking. In addition, the subscription counts *do* eventually add up.

It's true that this is a categorical advantage in the theoretical sense, but I'm not sure it makes much difference in practice. Particularly in play, where the GM sends threats that match you. (IMG:style_emoticons/default/smile.gif)


Not much difference in practice? I think someone's going to notice if someone walks up and shoves a cable into their commlink, and the same applies for a drone as well. At least, if they're not asleep at the wheel they should notice. (IMG:style_emoticons/default/grinbig.gif) As far as subscriptions go, sprites are wonderful at taking over if things get into a real big crunch.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 25 2011, 11:46 PM
Post #37


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I didn't mean that those paragraphs were connected. (IMG:style_emoticons/default/smile.gif) My point is that, yes, a Technomancer's node is categorically unhackable for mundanes, while *any* other hacker's nodes are theoretically hackable. However, *in practice*, unhackable 'enough' is enough. (IMG:style_emoticons/default/smile.gif)

If you want to devote your sprites to that task, sure.
Go to the top of the page
 
+Quote Post
PoliteMan
post Jan 26 2011, 03:18 AM
Post #38


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



Fun, for the most part. The problem is that the effectiveness of a hacker is inversely proportional to how simple the hacker is play and the Matrix rules are already the most complex in the game.

An optimized hacker who is able to take on a optimized submerged techno is going to have at least a half dozen nodes (although I'd really recommend a dozen) with complex security arrangements, node architecture, at least several agents running various tasks, a massive botnet, and a stable of various malware. And that just isn't fun for most people; you've moved from being a lone hacker into the manager of your own network. Even if you're having fun with that, the other players at the table probably won't like watching it.

Take something fairly simple like lifestyle. With Unwired you can spoof your lifestyle, or more importantly, have an agent spoof your lifestyle for you. Pretty simple. Now add in Runner's companion and there's some very interesting lifestyle options you can have. And why not, since you're not going to pay for them and things like Feng-shui provide obvious direct advantages. You get a second and third lifestyle, say a workshop area and a safehouse. Obvious advantages and no cost. You can even pay for your teammates houses if you want. At some point though, all of that will add up and you'll need another agent also spoofing lifestyle. It's not a huge problem, you have plenty of downtime and you can always pull your agents off spoofing to help you, or order them to stop spoofing and defend the node if XYZ happens. At this point you've stopped playing Shadowrun and started managing your imaginary agent network. There are clear and significant advantages to this way of playing but don't ever try to do this at the gaming table. You can do this after the game with your GM over e-mail and that can be fun but I'd guess the number of people who want to do that are vanishingly small.

As a theoretical exercise, this stuff is very interesting. As a practical exercise, I would recommend you take all of those discussions with a mountain of salt. If the GM is good, the defenses on the job will always be challenging but beatable whether you're a script kiddie or an Uber-Techno with a Nexi full of worms and trojans.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 26 2011, 03:56 AM
Post #39


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Surely almost all of that applies to Technomancers, plus they're worrying about sprites (a minor, yet addition housekeeping concern). Any hacking character can be very complex. You can also do either very simply, though I'd say that the 'drop-in hacker' is more simple than a 'simple' Technomancer, in addition to being a much smaller investment. In exchange, the Technomancer (as we all already know) has that high long-term potential + unique tricks.
Go to the top of the page
 
+Quote Post
PoliteMan
post Jan 26 2011, 04:35 AM
Post #40


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



Yes the techno can do all that, and if he wants to outperform an optimized hacker he'll need to. However, technos don't really need it, just CFs and Sprites will make them quite powerful. A hacker with just programs, 1-2 commlinks, and a few agents is going to be overshadowed by a Techno with just Sprites and CFs.

I'm not saying Technos don't or can't become incredibly complex. What I am saying is that there's a point where the hacker needs to break out the complicated tricky stuff to keep pace while the Techno can generally get by with just CFs, Sprites, and Submersion. You can have a very powerful techno who is still relatively simple to play, as long as your familiar with the CF and Sprite rules. Hackers can't, they need to dive into the complex end to keep pace.

Go to the top of the page
 
+Quote Post
Yerameyahu
post Jan 26 2011, 04:50 AM
Post #41


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Honestly, I'm not sure at what point that's true. (IMG:style_emoticons/default/smile.gif) There *could* well an area when the hacker needs to be more complex than the Technomancer, but if they both end up in the same boat… *shrug*.
Go to the top of the page
 
+Quote Post
PoliteMan
post Jan 26 2011, 05:07 AM
Post #42


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



When I look around at an optimization thread, I see technos talking about the power of CFs and Sprites while hackers start to talk about malware and multiple commlinks.

The simple problem, in my mind, is that a decent hacker with all the ware has very few places to expand after chargen except in terms of malware, program options, multiple commlinks, and other trickery. Technos have plenty of room to expand their powers. Therefore, hackers will almost always be the first to experiment with, say, trojans. Come across a R8 node you have to hack. A powerful techno can give it a shot counting on their stealth but the Hacker needs something else. Maybe a Trojan, maybe the mute option, but the hacker needs more than his dicepool. The techno won't need to worry about that unless the game gets really crazy.

In a normal game this will rarely come up but around R6-R7 nodes a hacker will start having problems unless he finds a technical edge. Technos can keep going until, well, quite honestly I've never seen a techno try to hack something like an R8-R9 node but I'd imagine that's the point where they'd start to breakdown.

Go to the top of the page
 
+Quote Post
Saint Sithney
post Jan 26 2011, 07:39 AM
Post #43


Runner
******

Group: Members
Posts: 2,705
Joined: 5-October 09
From: You are in a clearing
Member No.: 17,722



QUOTE (onlyghostdanceswhiledrunk @ Jan 25 2011, 11:06 AM) *
yeah but if the hacker is running with 5 ips and mute then its moot isnt it? or is that only in instances where there isnt a shit ton of IC plus the node scanning for intrusions?


Stealth for getting in is pretty much Moot. It's the opposed tests where problems come up.

On that note, any common program is easy enough to code that a Hacker should be able to put together about one R12 program per downtime. Command, Analyze, Encrypt, Scan, Whatever. All cake. As the hacker hits delta-cash, he can buy that R10 chip and start moving into a set of R20 programs to keep up with the Res 8 TM. It's a rough scene, but it's still possible with a hyper-focused Hacker.

So, Hackers can compete to an extent, but lemme real quick tell you where that competition just dies. Data Bomb.

The Data Bomb is an opposed test with Hacking + Disarm on one side and Data Bomb x2 on the other end.
You drop a R12 Data Bomb, and that's 24 dice. Even if you code a massive R12 Disarm program, which isn't a real priority, and have a cyber-adept with 9 Hacking + Encephalon and PuSHeD, you're looking at a best case of 50% chance of getting blown the hell up. It's like an Edge sponge.
Go to the top of the page
 
+Quote Post
PoliteMan
post Jan 26 2011, 08:10 AM
Post #44


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



QUOTE (Saint Sithney @ Jan 26 2011, 03:39 PM) *
On that note, any common program is easy enough to code that a Hacker should be able to put together about one R12 program per downtime. Command, Analyze, Encrypt, Scan, Whatever. All cake. As the hacker hits delta-cash, he can buy that R10 chip and start moving into a set of R20 programs to keep up with the Res 8 TM. It's a rough scene, but it's still possible with a hyper-focused Hacker.

I'm not sure about this. The problem is that the system you're programming on has to be capable of running the program, which means for a R10 program you need a nexus with System 10. That's tough (probably, haven't read War!). There might be a way around it with the Optimization option but that's tricky. And of course, Hacking programs take longer to code but aren't really any more difficult.

QUOTE (Saint Sithney @ Jan 26 2011, 03:39 PM) *
So, Hackers can compete to an extent, but lemme real quick tell you where that competition just dies. Data Bomb.

The Data Bomb is an opposed test with Hacking + Disarm on one side and Data Bomb x2 on the other end.
You drop a R12 Data Bomb, and that's 24 dice. Even if you code a massive R12 Disarm program, which isn't a real priority, and have a cyber-adept with 9 Hacking + Encephalon and PuSHeD, you're looking at a best case of 50% chance of getting blown the hell up. It's like an Edge sponge.

It's a good point but I'm not sure how applicable this is. Sure there are some files the hacker will want to try disarming himself but for a lot of this stuff you can just send an Agent.
PS. How the devil did you acquire an R12 Data Bomb?
Go to the top of the page
 
+Quote Post
Mäx
post Jan 26 2011, 10:22 AM
Post #45


Prime Runner
*******

Group: Members
Posts: 3,803
Joined: 3-February 08
From: Finland
Member No.: 15,628



QUOTE (Saint Sithney @ Jan 26 2011, 09:39 AM) *
On that note, any common program is easy enough to code that a Hacker should be able to put together about one R12 program per downtime.

There's no such think as a rating 12 program, rating 10 is the max.
Go to the top of the page
 
+Quote Post
Eratosthenes
post Jan 26 2011, 12:34 PM
Post #46


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



QUOTE (Mäx @ Jan 26 2011, 05:22 AM) *
There's no such think as a rating 12 program, rating 10 is the max.


I think he was referencing a Rating 12 Data Bomb complex form (likely threaded/sprite fueled up to that level).
Go to the top of the page
 
+Quote Post
sabs
post Jan 26 2011, 12:53 PM
Post #47


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



And an Optimization 6 R12 Program, would let you run on a System 6 system.
Go to the top of the page
 
+Quote Post
squee_nabob
post Jan 26 2011, 01:57 PM
Post #48


Moving Target
**

Group: Members
Posts: 114
Joined: 25-August 10
Member No.: 18,969



No one opens their own databombs. That is what sprites and agents are for. If you analyze the file/node you get to know if there is a databomb, and you never open something you haven't analyzed. What's important is there is nothing that a hacker can do that a TM can't do, and do TM tricks on top of that. being a TM basically just takes karma, so you can invest your money in drones, malware, comlinks, agents, skillwires etc.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jan 26 2011, 02:23 PM
Post #49


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (squee_nabob @ Jan 26 2011, 06:57 AM) *
No one opens their own databombs. That is what sprites and agents are for. If you analyze the file/node you get to know if there is a databomb, and you never open something you haven't analyzed. What's important is there is nothing that a hacker can do that a TM can't do, and do TM tricks on top of that. being a TM basically just takes karma, so you can invest your money in drones, malware, comlinks, agents, skillwires etc.


So you are telling me that your Hacker characters have never hacked a system that had a Data Bomb on the access port? Wow, happens to us all the time...

An Agent cannot hack an entry for you unless he is carrying a Trojan for that specific purpose (and he still has to make the hack to successfully place the Trojan), and honestly, the character I play is a MUCH better hacker than the Agents he has (which are Rating 6, with Rating 6 Programs). Max dice an agent throws is 12, and I edge him out with my 15 Dice (17 if I am in Hot VR)... Just sayin'

And if the character is better than the Agent, then I would bet the character does the disarming, because there is nothing more annoying than having the pay data go up in de-resolution after the agent screws up the disarming of the databomb.

Anyways... (IMG:style_emoticons/default/smokin.gif)
Go to the top of the page
 
+Quote Post
Ascalaphus
post Jan 26 2011, 04:00 PM
Post #50


Runner
******

Group: Members
Posts: 2,899
Joined: 29-October 09
From: Leiden, the Netherlands
Member No.: 17,814



A databomb has a much bigger chance of killing a technomancer however; Persona damage won't kill a hacker, just really piss him off. And biofeedback data bombs can't hurt agents, and I believe you can put only one data bomb on an object, so, choices - but every choice screws the technomancer.
Go to the top of the page
 
+Quote Post

6 Pages V  < 1 2 3 4 > » 
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 16th May 2025 - 03:52 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.