IPB

Welcome Guest ( Log In | Register )

17 Pages V  « < 9 10 11 12 13 > »   
Reply to this topicStart new topic
Falconer
post Mar 5 2013, 07:26 AM
Post #251


Neophyte Runner
*****

Group: Validating
Posts: 2,283
Joined: 12-October 07
Member No.: 13,662



A node with a choke point in front of it is a system map. Just a very simple one.

System maps should have never gone away.
Even if you don't always need them for simple setups.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 5 2013, 02:18 PM
Post #252


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Cain @ Mar 4 2013, 11:57 PM) *
That really doesn't answer the question. What's the advantage to jacking in from inside, if you don't have a system map? For that matter, since each node is technically independent of each other, is there any advantage to jacking in elsewhere at all?


Really depends upon how you jack in from the inside.
My Hacker has gone to the extremes of being hired to gain access to a system from the inside.

Sometimes being on the inside means that you do not have to actually Hack. There are advantages that you may not have hacking from the outside.
If you are hacking a complex system, with many interdependant nodes, Hacking from the inside may be your only option. Some systems have much more lax security on the inside than they do for penetration purposes. There are potentially lots of reasons to hack from inside a system over coming in from the outside. Problem is that you likely need to be Socially aware to do so from the inside (much more so than just Hacking from without), or really, really good at hiding once you penetrate the target system's infrastructure.

I Agree with Falconer... System Maps should never have gone away (and they have not for me, at least). You just do not need them for simple systems. *shrug*
Go to the top of the page
 
+Quote Post
Cain
post Mar 8 2013, 09:41 AM
Post #253


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



Okay, fine, where is that reflected in the rules? As far as I can tell, stealing legal accounts is given little to no word count, as is jacking in from the inside.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 8 2013, 02:57 PM
Post #254


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Cain @ Mar 8 2013, 02:41 AM) *
Okay, fine, where is that reflected in the rules? As far as I can tell, stealing legal accounts is given little to no word count, as is jacking in from the inside.


If you are on the outside, you Hack... If you are on the inside (or you have a valid link from the outside), you use Computer (as you have valid access accounts) becasue you are not doing anything obviously illegal. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Cain
post Mar 9 2013, 11:32 AM
Post #255


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



QUOTE (Tymeaus Jalynsfein @ Mar 8 2013, 06:57 AM) *
If you are on the outside, you Hack... If you are on the inside (or you have a valid link from the outside), you use Computer (as you have valid access accounts) becasue you are not doing anything obviously illegal. (IMG:style_emoticons/default/smile.gif)

That could actually be a disadvantage. Since most deckers focus on the hacking skill, odds are their Computer skill is weaker.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 9 2013, 03:31 PM
Post #256


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Cain @ Mar 9 2013, 04:32 AM) *
That could actually be a disadvantage. Since most deckers focus on the hacking skill, odds are their Computer skill is weaker.


This is true... But can they really call themselves Hackers/Deckers at that point, then? (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Cain
post Mar 10 2013, 12:33 AM
Post #257


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



QUOTE (Tymeaus Jalynsfein @ Mar 9 2013, 07:31 AM) *
This is true... But can they really call themselves Hackers/Deckers at that point, then? (IMG:style_emoticons/default/smile.gif)

Yes.

Look, there's only two ways the skills can be allocated at start. One at six, the other at four; or both at 5. That's the character generation rules. Both at 5 isn't a good choice, because you use Hacking a lot more than Computer. Do it your way, though, and suddenly they're punished for not having skills at levels not allowed at character creation.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 10 2013, 01:00 AM
Post #258


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Cain @ Mar 9 2013, 05:33 PM) *
Yes.

Look, there's only two ways the skills can be allocated at start. One at six, the other at four; or both at 5. That's the character generation rules. Both at 5 isn't a good choice, because you use Hacking a lot more than Computer. Do it your way, though, and suddenly they're punished for not having skills at levels not allowed at character creation.


That is strictly your opinion and nothing more.
AS for how to allocate skills, you are so wrong I cannot even find the words. There are many ways to allocate skills.
Hell, I rarely allocate even a 5/5 in my starting characters, let alone a 6/4 split. *shrug*

I currently have 2 Hacker characters.

My Cyberlogician (not a True Hacker, per se) rolls 12 Dice for Computer and 13 for Hacking (extra dice for Specialties). Both skills are at a 3 Rating. So, Professional. He has 340 Karma.

My Professional Hacker has 15 Dice for Computer and 16 for Hacking (also extra Dice for Specialties)... He is a Veteran Hacker, and both skills started at a Rating 4. He raised Hacking to 5 in Play. He has 27 Karma.

Note: All the Skill levels are allowed at Character Creation, contrary to your post above.

I don't see a need to have Best of the Best in the World level of Skill when Professional or Veteran levels will suffice (My charactres are Not Fastjack, after all). And my Skills for both characters were allocated in such a way as to cover the concept of the character. You CAN make a good hacker that can cover both Computer use and Hacking, I have done it on more than one occasion. And if you do it "My way" (as you call it), there is no punishment, either, becasue both skills are pretty close to each other. Imagine that.

The only time that you have issues is when you absolutely MUST be the best in the world, with no peers. And that is so very boring to me. *shrug*

My Cyberlogician is really good at his job, but if he had to fill in in another primary position, he can do so. And do so very well. After all, he has 340 Karma.
The Hacker, well, he Hacks. Be he does not really fill much in the way of other primary roles. At best, he is a backup for a few roles.

Point, though, is that they are both capable in their primary field. And if you cannot tell, I have a firm belief that the Hacker better damn well be able to use a computer about as good as he can hack, and even work with the Hardware and Software involved. Otherwise, he really isn't really much of a Hacker.
Go to the top of the page
 
+Quote Post
Grinder
post Mar 10 2013, 04:50 PM
Post #259


Great, I'm a Dragon...
*********

Group: Retired Admins
Posts: 6,699
Joined: 8-October 03
From: North Germany
Member No.: 5,698



TJ & Cain: is this the usual back-and-forth between you? The back-and-forth that simply proves that you won't ever agree on anything?
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 11 2013, 02:28 PM
Post #260


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



Not to my Knowledge, Grinder. I was under the impression we were having a civil discourse. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Grinder
post Mar 11 2013, 06:43 PM
Post #261


Great, I'm a Dragon...
*********

Group: Retired Admins
Posts: 6,699
Joined: 8-October 03
From: North Germany
Member No.: 5,698



If that's the case, my apologies to you and Cain. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 11 2013, 07:34 PM
Post #262


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Grinder @ Mar 11 2013, 11:43 AM) *
If that's the case, my apologies to you and Cain. (IMG:style_emoticons/default/smile.gif)


No worries. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Cain
post Mar 11 2013, 07:54 PM
Post #263


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



TJ, I think you missed the point: characters seldom have equal pools in hacking and computer, and their hacking pool tends to be higher. Forcing them to use the Computer skill actually discourages them from trying legitimate access tricks.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 11 2013, 07:59 PM
Post #264


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Cain @ Mar 11 2013, 12:54 PM) *
TJ, I think you missed the point: characters seldom have equal pools in hacking and computer, and their hacking pool tends to be higher. Forcing them to use the Computer skill actually discourages them from trying legitimate access tricks.


I really do not see it that way, though. Why would using the rules be a punishment? It is not like they do not know that legitimate access uses Computer rather than Hacking (Says so in the rules, after all). If they choose to have a huge disparity in those skills, that is their choice that they must live by; they did not HAVE to make that choice.

That would be like saying I am being punished for having a lower Pistol Skill vs. Heavy Weapons Skill. It just simply is not true. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Cain
post Mar 12 2013, 07:20 AM
Post #265


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



No offense, but you still seem to be missing it. Fact is, most characters will have a disparity between their hacking and computer dice pools, and usually it's in favor of hacking. Saying that hacking from the inside means you get to use a skill you're worse at isn't encouraging. In fact, it slightly discourages characters from hacking from the inside.

If the goal is to get more characters to hack from the inside, the rules need to show an advantage for doing so. Your suggestion isn't an advantage-- it's actually a disadvantage.
Go to the top of the page
 
+Quote Post
DMiller
post Mar 12 2013, 07:32 AM
Post #266


Moving Target
**

Group: Dumpshocked
Posts: 681
Joined: 23-March 10
From: Japan
Member No.: 18,343



Please correct me if I am mistaken, but if using Hacking you are likely to attract the attention of the Spider or IC, whereas using Computer you are a legitimate user and will not attract that attention. So having a high Hacking and moderate Computer makes sense as Computer is pretty safe to use where Hacking can cause alerts.

Just my 2¥
-D
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Mar 12 2013, 01:23 PM
Post #267


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (DMiller @ Mar 12 2013, 12:32 AM) *
Please correct me if I am mistaken, but if using Hacking you are likely to attract the attention of the Spider or IC, whereas using Computer you are a legitimate user and will not attract that attention. So having a high Hacking and moderate Computer makes sense as Computer is pretty safe to use where Hacking can cause alerts.

Just my 2¥
-D


Indeed...
Assuming you have a legitimate account, you are not worrying about the security at all, unless you use your Hacking skill to do something you are not allowed to do with the legitimate account; at which point, you have drawn attention. *shrug*

QUOTE (Cain)
If the goal is to get more characters to hack from the inside, the rules need to show an advantage for doing so. Your suggestion isn't an advantage-- it's actually a disadvantage.


As for hacking from the inside, it is an advantage (assuming you have a legitiamet account). Unless you have a Legitimate Account (through hook or crook), then you are still Hacking (which I still prefer to do on-site when I can, though long-range hacks are still viable). It is not about trying to get more people to use legitimate accounts when they can (though I prefer that method, personally, because it DOES have a lot of upside, especially if you can get that remote VPN access), it is about having the Decker/Hacker on-site with you.
Go to the top of the page
 
+Quote Post
Millamber
post Mar 13 2013, 12:55 AM
Post #268


Target
*

Group: Members
Posts: 4
Joined: 11-November 05
From: Brisbane, Australia
Member No.: 7,945



I have heard that there are some simplified hacking rules by someone named Serbiter called "Serbitars Guide to the Matrix", however the links to the pdf all appear to be dead.

Does anyone know where to obtain a copy of this pdf as I am relatively new to GMing Shadowrun and am having some issues with leaning the hacking rules.
Go to the top of the page
 
+Quote Post
Cain
post Mar 15 2013, 08:46 AM
Post #269


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



QUOTE
As for hacking from the inside, it is an advantage (assuming you have a legitiamet account). Unless you have a Legitimate Account (through hook or crook), then you are still Hacking (which I still prefer to do on-site when I can, though long-range hacks are still viable). It is not about trying to get more people to use legitimate accounts when they can (though I prefer that method, personally, because it DOES have a lot of upside, especially if you can get that remote VPN access), it is about having the Decker/Hacker on-site with you.

Again, there's no difference between a legitimate user operating from home or on site. So, there's still no reason for the decker to come on site with you.
Go to the top of the page
 
+Quote Post
DMiller
post Mar 18 2013, 05:54 AM
Post #270


Moving Target
**

Group: Dumpshocked
Posts: 681
Joined: 23-March 10
From: Japan
Member No.: 18,343



QUOTE (Cain @ Mar 15 2013, 05:46 PM) *
Again, there's no difference between a legitimate user operating from home or on site. So, there's still no reason for the decker to come on site with you.

Unless the legitimate user is not authorized to telecommute.

-D
Go to the top of the page
 
+Quote Post
Draco18s
post Mar 18 2013, 05:42 PM
Post #271


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (DMiller @ Mar 18 2013, 12:54 AM) *
Unless the legitimate user is not authorized to telecommute.

-D


That's what VPNs are for. By accessing a network via VPN, the target machine can't distinguish a legitimate user on the local network vs. one telecommuting.
Go to the top of the page
 
+Quote Post
kzt
post Mar 18 2013, 08:00 PM
Post #272


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Draco18s @ Mar 18 2013, 10:42 AM) *
That's what VPNs are for. By accessing a network via VPN, the target machine can't distinguish a legitimate user on the local network vs. one telecommuting.

The VPN host can. If you are not supposed to VPN in it won't let you.
Go to the top of the page
 
+Quote Post
Draco18s
post Mar 18 2013, 08:32 PM
Post #273


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (kzt @ Mar 18 2013, 03:00 PM) *
The VPN host can. If you are not supposed to VPN in it won't let you.


True, but any other machine won't be able to tell.
Go to the top of the page
 
+Quote Post
Falconer
post Mar 18 2013, 11:03 PM
Post #274


Neophyte Runner
*****

Group: Validating
Posts: 2,283
Joined: 12-October 07
Member No.: 13,662



Not true... normally VPN have reserved address blocks and there are commonly security policies in place stopping VPN blocks from being able to access critical systems.

VPNs are also utterly reliant on strong encryption.... which shadowrun pointedly doesn't use.


A VPN in shadowrun terms is simply two computers each running an encryption program on both side with an open subscription between them. We all know how quickly that gets compromised in SR terms.
Go to the top of the page
 
+Quote Post
Errant
post Mar 18 2013, 11:16 PM
Post #275


Target
*

Group: Members
Posts: 16
Joined: 11-February 13
Member No.: 73,643



If the administrator isn't sensible enough to have any externally-accessible devices run back to the VPN host to confirm those credentials, he probably deserved to have his system hacked.
Go to the top of the page
 
+Quote Post

17 Pages V  « < 9 10 11 12 13 > » 
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 4th June 2025 - 02:49 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.