![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Target ![]() Group: Members Posts: 12 Joined: 11-November 09 Member No.: 17,863 ![]() |
Good evening Before i ask my point blank questions i would like to explain my situation briefly.
I'm playing a techno in a gritty 325 pt campaign. i rely heavily on threading for anything but exploit and defense. I'm Puny (2 in all physical attributes). Typically I Ramp up my stealth hacking in with a 9 stealth. Locate then Disarm the Analyze program. Further look around the node Then so on. At the end of my run i always attempt to clean my datatrail, and reduce my signature (if time permits). So far Time hasn't permitted. Current point of reference. I'm in VR vs an AR Fixer. I OTF Hack his Pan with admin access. (2 rolls 7 then 6 successes). I enter and by my second IP I've caused an alert (of which i switched nodes to a companions node to make an edit then switched back I basically did nothing on the node itself. This AR User by my third IP loads an Ice. Fast forwarding to the end 5 more IP's and I'm rushing to DL paydata (no time to analyze) Set off a data-bomb as the user is shutting down his PAN. i wait around until he powers it back on... Log in and Erase my data trail with the system in full alert and again... shutting down. Continually i feel like I'm making major NOOB hacker errors. thus my 2 questions. First I'm sure i saw somewhere that i could erase my datatrail. and I've spent 2 hrs looking for it and no dice. I've found Reducing my signature, and Spoofing my datatrail to avoid being traced. but am coming complety dry for my datatrail quandary. Second Being that i'm feeling a Noob all over, is there a good 4th ed... hacking Standard Operating Procedures or FAQ? I'm not looking for catalysts FAQ here. Now that I'm done i thought of a third question. If a Comlink is powered off. does it hold the Techno's signature? Thanks for the help, Long time browser of these forums, First Time User. |
|
|
![]()
Post
#2
|
|
Moving Target ![]() ![]() Group: Members Posts: 419 Joined: 10-February 09 Member No.: 16,863 ![]() |
Far from being a noob, I'd say you understand the hacking rules a lot better than most. I've never heard of a hacking FAQ but maybe someone around here has some tips for you.
|
|
|
![]()
Post
#3
|
|
Target ![]() Group: Members Posts: 12 Joined: 11-November 09 Member No.: 17,863 ![]() |
I'd be happy to hear some tips. from especially with someone with experience under their belt. I'm more theory just starting to put to practice.
|
|
|
![]()
Post
#4
|
|
Street Doc ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 3,508 Joined: 2-March 04 From: Neverwhere Member No.: 6,114 ![]() |
You might be making noob mistakes or maybe your GM is just shootig for a more challenging level of Matrix security in his game. If you ask me the exchange you describe sounds pretty exciting and would make playing a technomancer a lot more fun. If this isn't bogging down your sessions I wouldn't worry too much about it. You'll pick up more 'skillz' as you go along.
As for your other question: I think what you are looking for might be the rules for "Editing the Access Log" in Unwired page 65. |
|
|
![]()
Post
#5
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 ![]() |
This AR User by my third IP loads an Ice. Did he have something that gave him extra IPs? Normally AR doesn't give you additional IPs. If he has wired reflexes or something, those do apply in AR. Consider shutting them down if you have Admin in the PAN. Or did I miss something? I thought IC etc. only got two IPs too, so even the node's automated defense script shouldn't react that fast... |
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 304 Joined: 29-October 09 From: Pittsburgh Member No.: 17,812 ![]() |
You can erase your access logs, I'll find a reference for it later today.
otherwise I'm surprised at how quickly you were discovered - double check to make sure your GM is only rolling against your icon without you taking action if he has active IC loaded, if it's just the passive system security then it should only roll against you when you actually do something to that node. |
|
|
![]()
Post
#7
|
|
Target ![]() Group: Members Posts: 12 Joined: 11-November 09 Member No.: 17,863 ![]() |
I'll check, i marked it up to "the mysterious GM make stuff up" and didn't complain at the time, makes for a worse game session when i point out how it should have gone during game time. I'll Look at the Access log editing.
I've never really gotten "in and out" in any hacking job. the closest one i had was some guy with last years cracked OS that had an analyze program that crashed when i tried to disarm it. User rebooted upon a warning and i logged back in... that was the most mundane so far. |
|
|
![]()
Post
#8
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
Aaron´s cheat sheets are always handy, even if you seem to have the matrix basics down.
As for your scene:
Can happen, will happen again. Be glad that your GM gives you action (like Method said). If you think that your TM gets too little stuff done, consider increasing stealth. (But talk to your GM so that you don´t start an arms race.) |
|
|
![]()
Post
#9
|
|
Street Doc ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 3,508 Joined: 2-March 04 From: Neverwhere Member No.: 6,114 ![]() |
You can erase your access logs, I'll find a reference for it later today. Unwired Page 65 (as I mentioned above). (IMG:style_emoticons/default/wink.gif) |
|
|
![]()
Post
#10
|
|
Street Doc ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 3,508 Joined: 2-March 04 From: Neverwhere Member No.: 6,114 ![]() |
Someone posted THIS recently. Not sure who the author is but its a pretty good (an more importantly concise) overview of the basics.
|
|
|
![]()
Post
#11
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,717 Joined: 23-March 09 From: Weymouth, UK Member No.: 17,007 ![]() |
At the end of my run i always attempt to clean my datatrail, and reduce my signature (if time permits). So far Time hasn't permitted. No need. Technomancers automatically spoof their access ID(Unwired, p.135 and your Resonance signature is only detectable by other Resonance entities(sprites, technomancers), so it's pointless to waste time reducing it. |
|
|
![]()
Post
#12
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,088 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
First I'm sure i saw somewhere that i could erase my datatrail. and I've spent 2 hrs looking for it and no dice. I've found Reducing my signature, and Spoofing my datatrail to avoid being traced. but am coming complety dry for my datatrail quandary. It is possible via a resonance realm search before the actual hack, but I guess that is outside your character's reach. The easier way would be to edit the logfiles QUOTE If a Comlink is powered off. does it hold the Techno's signature? The rules don't say anything to the contrary, but since it only lasts a couple of hours and can only be seen by other resonant beings I usually ignore it, while scrubbing the logs is always a good idea. |
|
|
![]()
Post
#13
|
|
Moving Target ![]() ![]() Group: Members Posts: 304 Joined: 29-October 09 From: Pittsburgh Member No.: 17,812 ![]() |
scrubbing the logs also makes it harder to detect that *any* incursion has happened. leaving a false trail is fine up until it makes the security harder next time around because they know they've been hit once before..
|
|
|
![]()
Post
#14
|
|
Target ![]() Group: Members Posts: 12 Joined: 11-November 09 Member No.: 17,863 ![]() |
Method, that indeed was what i was looking for. didn't get the chance to track it down myself tonight. and currently downloading the matrix basics that you just linked as well. Thanks.
QUOTE No need. Technomancers automatically spoof their access ID(Unwired, p.135 and your Resonance signature is only detectable by other Resonance entities(sprites, technomancers), so it's pointless to waste time reducing it. Even though i understand that technomancers are not a common phenomena... it's better to build good paranoid habits and live long, then get sloppy and have my killer GM... Kill me. QUOTE The rules don't say anything to the contrary, but since it only lasts a couple of hours and can only be seen by other resonant beings I usually ignore it, while scrubbing the logs is always a good idea. Sengir, i note that "scrubbing the logs" is a necessary thing. and while Resonant beings are less then common... still important as i just mentioned. QUOTE It is possible via a resonance realm search before the actual hack, but I guess that is outside your character's reach. The easier way would be to edit the logfiles Finally, absolutely correct, Resonance realm search is out of my characters reach at the moment, but I am getting ready to submerge. I've requested that the GM put together a "Great Hack" to help with submerging cost. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 18th June 2025 - 07:13 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.