![]() |
![]() ![]() |
![]() |
![]()
Post
#26
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
Funny thing is that this indicates a very Unix like system, where everything is a "file" (or icon in the case of SR). And likely backed by a system-wide database rather then a folder tree.
The low level code of it all must be very wonky indeed. Tho i think one of the corporate books indicate that Fuchi had some kind of storage tech that was incompatible with existing computing stuff, and that only with the crash where they able to push it as a market leader (likely with the claim that it was crash virus resistant or something). So in SR a "duck" may look like a duck, but put it under a microscope and the DNA appears to twist the other way or something. But who bothers to dive that deep unless they are work in a academic or corporate setting? I suspect that any failed perception check would come up with some random work file for a unrelated user, and produce some kind of access error when a read is attempted. That way it may look legit by perhaps corrupted, or in some other way messed up. So at best it may be flagged for cleanup once the digital triage crew reports for duty (you do not want to be arbitrary deleting a possible managers work files without getting it approved by someone first). Hell, a age old classic is to hide the naughty bits in the garbage file (IMG:style_emoticons/default/wink.gif) Edit: thinking about it a bit more makes me wonder if it is some kind of Plan9 FS. That when someone logs in they mount part of their local system into the folder tree of the remote system as part of the login process. Meh, i am thinking about it too much... |
|
|
![]()
Post
#27
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 ![]() |
And likely backed by a system-wide database rather then a folder tree. There is ongoing work about that: http://en.wikipedia.org/wiki/Logic_File_System There must be other similar projects, but I didn't work with the guys behind them (IMG:style_emoticons/default/nyahnyah.gif) |
|
|
![]()
Post
#28
|
|
Moving Target ![]() ![]() Group: Members Posts: 503 Joined: 3-May 08 Member No.: 15,949 ![]() |
SR4A 228 "Matrix Perception"- third paragraph 100% irrelevance. I mentioned no crunch beyond "If the Analyze test fails." That implies that the hacker's Hacking + Stealth hits exceeded the node's <whatever, I really don't care at this hour> + Analyze. TL;DR: The hacker won, that was the point of my post. I was talking from an assumption that whoever was doing the Analyzing scored fewer hits than whoever was doing the Stealthing. |
|
|
![]()
Post
#29
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,019 Joined: 10-November 10 From: Annapolis Valley, Nova Scotia Member No.: 19,166 ![]() |
100% irrelevance. I mentioned no crunch beyond "If the Analyze test fails." That implies that the hacker's Hacking + Stealth hits exceeded the node's <whatever, I really don't care at this hour> + Analyze. TL;DR: The hacker won, that was the point of my post. I was talking from an assumption that whoever was doing the Analyzing scored fewer hits than whoever was doing the Stealthing. I apologize, on my first read, it looked to me as though you were disagreeing with the opposed test part of tthe post you were responding to. It was my mistake. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 9th May 2025 - 02:04 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.