IPB

Welcome Guest ( Log In | Register )

21 Pages V  « < 4 5 6 7 8 > »   
Reply to this topicStart new topic
> The Idiot's Guide To The Matrix Thread, Support for the Matrix-challenged
TinkerGnome
post Sep 1 2003, 02:14 AM
Post #126


Dragon
********

Group: Members
Posts: 4,138
Joined: 10-June 03
From: Tennessee
Member No.: 4,706



QUOTE (Orient)
Does anyone have any good ideas for handling program allocation between Active Memory and Storage?

This shouldn't be a big issue. If a decker has to change programs mid-run, then he's seriously messed up somewhere along the line. If he does need to change up for an unusual situation (needing to load Purge or Defuse, for instance), then a simple running tally should be sufficient. 90% of runs will probably be done with the same or similiar payloads.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 1 2003, 03:53 AM
Post #127


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



True enough. I tend to set up with a "standard" set of programs, with some checked ahead of time as "non-vital". Stuff like Defuse, or Evaluate, or Validate, or the like. I mark each program with its Mp size, including those that I have in my Storage. Swapping out is a pretty simple matter, since I've done some groundwork ahead of time and know what can come in and what can go out.

For example, I typically have two different Attack programs loaded in storage memory for Lady Cheng. One's a single-shot Attack-D program (icon'd by a old-fashioned wheel-lock duelling pistol), which I use under the theory that I'm usually high-DF enough that I won't get noticed. Additionally, the single-shot option makes it small enough that I can reload the program without too much trouble. That one I keep in active memory. The other is a Attack-S program with Area (icon'd by a cutlass that she uses in sweeping attacks to strike more than one opponent at once), which I'll pull out (after a quick Evade Detection and Swap Memory) if I'm getting swarmed. Of course, I'll often have to drop some Operational Utility to do so, but when getting swarmed lowering my target number on removing a worm from a file usually isn't my first concern.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 1 2003, 10:58 PM
Post #128


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Synner? You planning the specifics of the Matrix overwatch still?
Go to the top of the page
 
+Quote Post
Synner
post Sep 2 2003, 08:45 AM
Post #129


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Finished with that, but since DSF was down most of yesterday I decided to wait.

Matrix Overwatch Walkthrough
To start off I need to know how/where you're going to be jacking in and what type of jackpoint you'll be using. Note that though the research facility is in Snohomish, you'll have to hack it through the Yamatetsu PLTG since it isn't linked directly to the open net.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 3 2003, 01:23 AM
Post #130


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



OK. Let's see... well, I'd probably go in through the Tukwila LTG having found a nice spot to set up my illegal high-speed jackpoint with my rating-8 dataline tap. I'd run a Redirect Datatrail op on the LTG, then Logon to the Seattle RTG (Green-5/6/9/6/6/6), where I'd do the same. (No harm in covering my tracks as well as I can, particularly with my DF high enough to help prevent the LTG or RTG from adding to my security tally.)

First, of course, is setting up the jackpoint. (I'm unable to find any details on TNs for setting up an illegal jackpoint in either SR3 or Matrix, so I'm presuming that it's a TN 4 Electronics B/R test.) Her B/R skill is 3 (+1 due to enhanced articulation), which adding in Task Pool (from the cerebral booster) gives me five dice to roll -- resulting in 10, 5, 5, 2, 1. Three successes should be more than enough to get me rolling in fairly short order.

Next, I perform a Logon to LTG operation to get onto the Tukwila LTG. It, like the Seattle RTG, will probably have a Green-5 Security Rating, with Access 6, Control 9, Index 6, Files 6, Slave 6. I prep my Deception-6 program and roll my Decking (7) against a TN of (6 - 6, minimum 2) 2 without bothering to use Hacking Pool for something this basic. -- 16, 11, 5, 5, 2, 2, 1. Six successes.

I then Redirect Datatrail on the local grid to confuse any Trace programs that may decide to come after me while I'm sitting in the target host. This one'll be tougher -- my Camo-4 program against the grid's Control value of 9 gives me a TN of 5. I roll 4 of my 8 Hacking Pool dice along with the 7 dice of Decking I have, and get 11, 5, 4, 3, 3, 3, 2, 2, 2, 1, 1 -- squeaking in with two successes. Both of them came from the extra Hacking Pool dice, so spending them was well worth it. What effect does this have? Since I performed the operation successfully (and it's something you can do on each particular grid you logon to), the TN for Trace IC or a Track utility to hit me in cybercombat is increased by 1.

After camoflauging my trail, I Logon to RTG to get to the Seattle regional telecom grid. No Hacking Pool dice this time, just a straight Decking roll against TN 2 -- and 11, 5, 4, 4, 3, 3, 1 gets me onto the RTG easily. I perform my Redirect Datatrail on the Seattle RTG, again with 4 Hacking Pool dice and against a TN of 5, and this time do substantially better than on the Tukwila LTG -- 11, 7, 5, 5, 4, 4, 4, 3, 2, 1, 1 -- with four successes. Of course, all you need is a single success, but hey, I did it with flair -- and the second successful Redirect Datatrail again raises my TN if I confront Trace IC. :D

I'd have done a bit of research ahead of time -- tracking down the Yamatetsu PLTG's address, for one thing -- which would allow me to go straight there and attempt to sneak in with a Logon to PLTG. (This presumes, of course, that the Yamatetsu PLTG is connected to the Seattle RTG -- which isn't unreasonable, since Yamatetsu does have a branch in the Seattle metroplex.)

I Logon to Host and enter the Yamatetsu PLTG.

And, of course, I'm in Masking mode -- which moves my Masking from 8 to 12 and decreases my Bod from 5 to 3, and makes my DF (12 + 5, divided by 2, rounding up) 9.
Go to the top of the page
 
+Quote Post
Synner
post Sep 3 2003, 12:37 PM
Post #131


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Kurukami - As this is meant as walkthrough aid for anyone unfamiliar with the Tests involved please try to identify System Operation Tests with italics and try to descriminate what is rolled, what are the modifiers, what Utilities come into play and what are the Target numbers (edit these into your previous post if you can).

Matrix Overwatch Walkthrough
And now back to the run...

You locate the Yamatetsu Corporate Eyecon floating over the Downtown grid at the LTG# you looked up. The sparkling eye leisurely opens and closes sending off sparks of neon pixels as it slowly rotates around it's vertical axis. The open iris is obviously the SAN point and since this is an open client support and routing Host you walk right in (GM rules that the Access Test doesn't count towards your Security Tally here).

Inside you find yourself standing in a massive two-level mall arcade with different stores for different Yamatetsu subsidiaries and affiliates lining the concourse (these are Online Stores for anyone who's interested - each is either a linked Host or a subsection of this big Host). Several other Personas and Icons are about windowshopping or floating up and down from the stores on the second level. Ocassionally a courier icon (that strangely resembles a speeding blue hedgehog) comes through the cycling iris door you came through and shoots down the concourse to the opposite end.

At the opposite end of the mall concourse stand a set of 3 elevator doors. These are obviously the Access subsystems for other PLTG Hosts and each is flanked by two Greek statues (roll Matrix Etiquette and has a plaque with undecipherable word printed on it over the sliding doors (probably the results of Scramble IC).

As you watch a courier Icon comes out of one such elevator door and shoots past you and out the iris leaving a blue streak afterimage behind him for a nanosecond.
Go to the top of the page
 
+Quote Post
Synner
post Sep 3 2003, 12:50 PM
Post #132


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Orient - As far as I know there is no other way to handle this, although you may want to check some of the Programming Options in Matrix for some tricks to change program size and I/O speeds. The other possible way to handle this is to use a Dumb Frame (it's a waste of a Smart Frame) to act as a bagcarrier for other programs.
Go to the top of the page
 
+Quote Post
satcong
post Sep 3 2003, 01:18 PM
Post #133


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Can we go back a couple of steps?

I'm interested in how this Redirect Datatrail works, it's benefits and such. Also, if it's a System Operation on a TG, does the TG still get to roll against it?

Also, how do you know that your DF is sufficiently high-enough to make you immune from an increasing security tally on the LTG and RTG - or is this just hope and statistics?

I also thought that we were going in through a satallite?
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 3 2003, 04:58 PM
Post #134


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Not a problem. I've updated my first post (further up on this page) to better reflect the details of what I've done so far. :)

Yes, Redirect Datatrail is a System Operation against a TG. Basically, I roll my Decking against the Control value (in this case, 9) minus any Camo program that I have. In this case, I have a Camo of 4 -- which means that I had to roll 5s or better to successfully camoflauge my datatrail. (An excellent example of why it's good to have high-rating utilities!)

You can only successfully perform Redirect Datatrail once on a particular TG. When I succeeded on the Tukwila LTG, I raised the future TN of any Trace IC or Track utility trying to attack me in cybercombat by 1, and when I did so on the Seattle RTG, I raised it again. Therefore, any Trace IC trying to lock onto me in the future of this run will need to add 2 to its TN to attempt to track me down.

As for my DF being "high enough" -- yup, it really is a matter of statistics. Since I'm running in Masking Mode (which effectively multiplies my Masking persona chip by 1.5, rounding down), my Masking goes from 8 to 12. My Sleaze-5 thus makes my DF (12 + 5 / 2, rounding up) 9. That's the TN that the grids and hosts need to roll to "see" anything suspicious... so the odds are on my side, particularly with such pushovers as the Tukwila and Seattle general-access grids.

And I think we're going in through just a standard telecom sneak, not a satellite.
Go to the top of the page
 
+Quote Post
satcong
post Sep 3 2003, 05:09 PM
Post #135


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Thanks kurukami, that clears things up.

I understand that you can only Redirect once/TG but is there a limit to the number of TGs that you can place a Redirect Datatrail on? For instance, If I wanted to, could I jump from RTG-to-RTG and leave a track around the world before dropping into the relavent LTG and thereby rack up a huge modifier for the TRACE IC?

What are the draw-backs to doing this?
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 3 2003, 05:36 PM
Post #136


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Now that I'm on the Yamatetsu PLTG, I need to track down the particular host I'm going to be providing Matrix overwatch for. But first, determining a few secrets about this particular PLTG might offer some insight. I roll my Etiquette (Matrix) 4 to see if I can puzzle out something about those Greek statues, and get 4, 4, 3, 2.

While Cheng is waiting for her grey matter to dredge up the recollection of just what that statuary might entail, she'll also try to determine whether or not those elevator doors are the key to accessing the host she wants to reach. Cheng reaches into an inner pocket of her greatcoat and pulls out a smoldering stick of incense. As she exhales upon it, the ember on its tip flares to life and puts out an ephemeral trail of lavender smoke. She sketches a somewhat complicated pictogram in midair with smoke as she faces the elevators, and as she completes the drawing the glyph briefly glows and (hopefully) transforms into a floating, translucent display of the data she requested. A brief moment later, she inhales sharply and the smoky data is drawn into her mouth, leaving no trace behind for the casual observer to see.

I attempt an Analyze Subsystem against the Access portion of this PLTG with my Analyze-6, hoping to determine just what might be unusual about the PLTG accesses and whether or not they are the path to my target. I throw in a pair of Hacking dice just to juice my luck. I do alright, but nothing special -- 5, 4, 4, 3, 3, 2, 1, 1, 1 -- I'm relying on my Analyze program to pull out any specific details.

And, just to remind you, my Analyze program has sneak-2 as a program option. That means that, while she's using it, her DF is raised by 2 -- from 9 to 11 -- making it substantially more difficult for the system I'm on to notice my action.

After I attempt to examine the elevators in that way (and, um "digest" the information :) ), Cheng would also consider whether one of the "stores" (hosts) in the mall might be the host she's looking for. It seems unlikely, since the target is likely to be fairly high security, but nonetheless she'll try to Locate Access Node.

After pinching the ember to mostly extinguish it, she replaces the stick of incense in her greatcoat and, from a pocket on the other side, brings forth a rice-paper scroll rolled around a sandalwood core. She cautiously unrolls it, whispering to it what she wants to find (in this case "the security and surveillance system for a Yamatetsu research facility in Snohomish", or just "a Yamatetsu research facility in Snohomish" if the first search fails to turn up anything), and watches with interest as a detailed map with landmarks and notations inks itself in on the scroll's smooth surface.

In game terms, I decide to attempt a Locate Access Node operation on the Yamatetsu PLTG with my Browse-6 utility. Just as with the Analyze utility, my Browse has sneak-2, raising my DF to 11 for purposes of being detected. I try to specify just what I'm looking for, as a specific inquiry will lower the TN (while a general one will probably raise it). Think of how Google will turn up an absolute ton of sites if you only give it a single, not unusual word or phrase to search by. :) I roll my 7 decking dice along with two more Hacking Pool dice, giving me 9 dice in all against an undetermined Index TN (after all, I probably haven't been on this system before, so I don't know just how hard this grid is to deck), minus 6 for my utility. Result? 5, 5, 4, 4, 3, 2, 1, 1, 1. Not a great roll. But unless this grid is bursting with security (unlikely) probably enough to find me what I need to know.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 3 2003, 05:43 PM
Post #137


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



QUOTE (satcong)
I understand that you can only Redirect once/TG but is there a limit to the number of TGs that you can place a Redirect Datatrail on? For instance, If I wanted to, could I jump from RTG-to-RTG and leave a track around the world before dropping into the relavent LTG and thereby rack up a huge modifier for the TRACE IC?

What are the draw-backs to doing this?

Well, if you were going after a target host on a distant LTG, then I suppose you could do quite a bit. The difficulty is that you risk racking up quite a security tally in the process. Additionally, for a host that's connected to the Seattle LTG/RTG system (or something that's similarly local, for those running outside Seattle), it could be more difficult than it's worth.

Mind you, it could probably still be done. Imagine that scene from Sneakers, where Whistler bounces his telephone signal off a dozen relays and three satellites in an attempt to keep the NSA from tracking them down. It's an incredibly detailed and difficult Redirect operation, but the NSA guys (being absolutely studly in telecommunications matters), still nearly managed to track him and the rest of the group down in perhaps a minute of real time.

Drawbacks? Well, as I mentioned earlier, you risk racking up a Security Tally. If I'm not terribly mistaken, any Security Tally you get on a RTG often accompanies you when you head into a host -- something about the regional security code raising a few flags on someone even though they may not have done anything wrong on that host yet. Other than that...? Not much that I can think of. It simply makes it quite a bit harder for Trace to track you down.
Go to the top of the page
 
+Quote Post
TinkerGnome
post Sep 3 2003, 07:03 PM
Post #138


Dragon
********

Group: Members
Posts: 4,138
Joined: 10-June 03
From: Tennessee
Member No.: 4,706



You should be able to bounce between RTGs and leave quite a trail without aquiring a tally. Tally gained on a grid don't carry past the RTG unless that RTG is a satellite RTG.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 3 2003, 07:14 PM
Post #139


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



QUOTE (TinkerGnome @ Sep 3 2003, 07:03 PM)
You should be able to bounce between RTGs and leave quite a trail without aquiring a tally.  Tally gained on a grid don't carry past the RTG unless that RTG is a satellite RTG.

Oh, I understand that. It doesn't carry between RTGs. I was thinking more along the lines of LTGs within an RTG.

(edit) ... although, upon reflection, maybe I've got it slightly wrong. Is it hosts within PLTGs? Hmmm... let me check to see what SR3 says.

Aha. Page 211, SR3:

QUOTE
GRID SECURITY TALLIES

Switching LTGTs within the same RTG does not affect the security tally against a decker.  For example, if a decker logs on to UCAS-SEA-2206 and incurs a tally of 2, then logs on to the UCAS-SEA RTG central system and picks up another point to his tally, then finally accesses UCAS-SEA-4206 and picks up another 2 points, his Security Tally stands at 5 and stays at 5 for as long as he is logged on to the UCAS-SEA grids.  However, the tally does not follow the decker if he logs on to another RTG.

PLTGs and Security Tallies

Because PLTGs maintain very active security routines, a security tally built up under a given RTG does remain in force if the decker logs on to a PLTG from the RTG.  This occurs because PLTGs pick up security "flags" from RTGs when the acknowledge logons.  This means that a decker who racks up a big tally working his way through the public grids may trigger IC as soon as he enters private dataspace.

The decker in our example, with a Security Tally of 5, would retain that tally when he enters a PLTG from the RTG.  If that tally is enough to trigger security responses in the PLTG, they go off as soon as he finishes the logon.  Whatever the immediate result, his Security Tally on this PLTG begins at 5, plus any points he incurs while logging on.

Presumably, though, one's tally drops back to the point it was at prior to one going in to a PLTG once one logs off.
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 4 2003, 05:59 AM
Post #140


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



*bumps thread to keep it on the first page for Synner's response*
Go to the top of the page
 
+Quote Post
Synner
post Sep 4 2003, 09:19 AM
Post #141


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Matrix Overwatch Walkthrough
Back to the Yamatetsu Eyecon Virtual Mall...

Cheng suddenly recalls the Hacker Hoosier House catalog she skimmed through back in '62, that introduced the Greek statuary iconography as a hallmark of the YamCore IC series. Mostly Whites and Greys if she recalls correctly but Cheng must have skimmed the file to fast because she cant remember the details. (Results of the Matrix Etiquette Test. Suffice it to say that more successes would have produced more information on specific IC types used in this particular non-custom series).

At almost the same time the incense-relayed data kicks in Cheng's eyes mist for a second as the information rearranges her Persona's perception of the scene. The elevator doors change colour, one to Red the other two to Orange while floating neon gothic calligraphy appears over each. Over the Red door the writing reads Local Branch Administration Host, over the first Orange door it reads North NorthAm IntraGrid and the second door reads International IntraGrid. All are locked with Scramble IC. The Host rolls only one success (a 15) against Cheng's net successes on the Analyze Subsystem Test.

The Locate Access Node analysis on the stores fronts however returns no hits on any of the search parameters and the effects of the incense vanish before they have time to take hold. The Host system rolls no successes.

Over to you.
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 4 2003, 12:39 PM
Post #142


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



hmm, i would have said that some sort of iconographics knowledge skill would be more fitting then ettiquette (matrix) when it comes to those statues but then again i may have the wrong image of what that skill does...

isnt it about what to say and what to do (and dont say and do) to get what you want from someone? how does that connect to identifying icons?
Go to the top of the page
 
+Quote Post
Gorath
post Sep 4 2003, 01:07 PM
Post #143


Moving Target
**

Group: Members
Posts: 128
Joined: 19-March 03
Member No.: 4,292



QUOTE (Matrix SB @ p. 24)

Etiquette (Matrix) Specialisation
The Matrix specialisation of the Ettiquette skill is used whenever interacting with other personas in virtual environments, whenever scouring for gossip, shopping for programs or talking your way into gaining access to a Shadowland node.
This specialisation encompasses an understanding of basic "netiquette" and avoiding behavior that would be improper or out of place. It also keeps the user current on who the major players are in cyberspace and lets them pick up the latest rumors in the global gossip of the Matrix.
[...]


The only connection i can see is, that if you have a good Etiquette Matrix, you must read those online cataloges for the newest programs...
Its a hard to decide, if you see the Etiquette (Street) specialization:
A player wants to identify a gang member by his colours. Do you only allow a Knowledge(Gang Identification) check or would you give him a Etiquette (Street) check (with mods) too?

Go to the top of the page
 
+Quote Post
Synner
post Sep 4 2003, 01:17 PM
Post #144


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



I should have explained better. In the absence of an appropriate Knowledge skill (ie. possibly Popular IC Configurations or ICspotting), I assumed that an experienced decker would have read something interesting when "shopping for programs" (hence the HHH reference in the use of the Etiquette Matrix Specialization) and might remember it (hence the vague recollection but no details).
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 4 2003, 01:27 PM
Post #145


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



ah, so details would require a knowledge skill while the vague recollection is more recalling that some corp or other have a connection to them :)

and to gorath:
iwould allow for ettiquete(street) as iding what gang your about to run into is a integrated part of street person to person interaction while i see iding a icon to be more of a software knowledge skill then a ettiquete skill as the person is trying to id what kind of security software a host is running, hardly a person to person interaction...
Go to the top of the page
 
+Quote Post
Gorath
post Sep 4 2003, 04:31 PM
Post #146


Moving Target
**

Group: Members
Posts: 128
Joined: 19-March 03
Member No.: 4,292



@ Hobgoblin:

I see your point. The question is could you know of this gang without every having a person to person interaction? So Etiquette Street represents time on street and learning/seeing facts about the street. So, if you are chatting in decker bar, you might get some informations about the newest hottest IC too. But we must not discuss this:
QUOTE (1. Rule)
Everything that is good for a player should not be questioned by him.
;-)
We should be glad that the GM decided to give some information and does not only include skill like Computer. So your characters background and experience can make a difference...

PS: Remember 1. Rule is not 2. Rule...

QUOTE (2. Rule)
Everything good that happens to your character should be questioned...
Go to the top of the page
 
+Quote Post
Kurukami
post Sep 4 2003, 06:58 PM
Post #147


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



QUOTE (Synner @ Sep 4 2003, 09:19 AM)
The elevator doors change colour, one to Red the other two to Orange while floating neon gothic calligraphy appears over each. Over the Red door the writing reads Local Branch Administration Host, over the first Orange door it reads North NorthAm IntraGrid and the second door reads International IntraGrid. All are locked with Scramble IC. The Host rolls only one success (a 15) against Cheng's net successes on the Analyze Subsystem Test.

Hmmm. OK, then. I'm guessing that, as Snohomish is considered "local" in comparison to the scope of the entire North American continental grid, the Local Branch Administration host is probably the one I'm looking for. Chances are that the Local host is a chokepoint -- something with high levels of security, which controls access to the somewhat more "squishy" hosts I'm seeking access to.

So. First, I'll Decrypt Access on the LBA host, and then I'll attempt to Logon to Host under the auspices of my Deception-6. Now, theoretically the Scramble IC is on the PLTG host, which has substantially less security to it than the host I'll (hopefully) soon be inside of. Therefore, I'll save most of my Hacking Pool to go towards the Logon attempt. 2 dice towards the Decrypt, and 6 dice towards the Logon.

Lady Cheng once again draws forth a stick of incense -- cinnamon, this time -- and coaxes it to life to attempt her Decrypt Access. A series of smoky pictograms is quickly sketched in the air, this time in front of the Local Branch Administration host's elevator. The spirits are apparently with her today -- Decrypt-6 combined with a roll of 10, 9, 8, 8, 4, 2, 2, 1, 1 for her Decrypt Access attempt -- as the kanji pictograms quickly morph from one shape to another in their efforts to find the proper key that will allow access to the host.

Next, she breathes in a wisp of smoke from the incense -- which exhibits yet another aroma, this time of freshly baked bread -- and exhales a much larger cloud than might be expected. The smoke quickly forms into a floating menagerie of lockpicks, narrow keys, and what appear to be surgical instruments, which try their best to unlock the outer doors of the Red LBA host. She offers up a wordless plea to her ancestors as -- with her 7 Decking dice and the 6 Hacking Pool dice she's added in, she rolls 13, 9, 7, 5, 5, 5, 5, 5, 3, 3, 3, 3, 1 for her Deception-6-aided Logon to Host operation -- the evanescent tools attempt to find a means inside.

Over to you, Synner.
Go to the top of the page
 
+Quote Post
Synner
post Sep 5 2003, 09:16 AM
Post #148


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Matrix Overwatch Walkthrough
Here's something that I find often needs clearing up. The Scramble IC (even though its visible from the public Host) is encrypting the Access subsystem (SAN point) of the next system in the PLTG. In practical terms what this means is that the elevators (or any other system link iconography) is a representation of an Access subsystem of the next Host, much like the Yamatetsu Eyecon or Mitsuhama Pagoda in the Downtown Seattle LTG include representations (ie. the iris doorway) of the Access subsystems of the Hosts "behind" them.

With this in mind Kurukami may want to revise the dice roll since he's assuming the next Host is a chokepoint.

Go to the top of the page
 
+Quote Post
Dashifen
post Sep 5 2003, 12:37 PM
Post #149


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Kurukami @ Sep 4 2003, 01:58 PM)
So.  First, I'll Decrypt Access on the LBA host, and then I'll attempt to Logon to Host under the auspices of my Deception-6.  Now, theoretically the Scramble IC is on the PLTG host, which has substantially less security to it than the host I'll (hopefully) soon be inside of.  Therefore, I'll save most of my Hacking Pool to go towards the Logon attempt.  2 dice towards the Decrypt, and 6 dice towards the Logon.


This part confused me a little. (1) Why do you need to decrypt access? Why not just try to log on to the host? And, (2) Why did you save some of your hacking pool? As I understand pools (in general) they refresh completely after each use unless your in combat when they refresh at the end of the turn. Am I wrong in this thinking?

Edit: OH! Just read Synner's post. So the Scramble IC is causing the need for the decryption then?

-- Dashifen --
Go to the top of the page
 
+Quote Post
TinkerGnome
post Sep 5 2003, 01:09 PM
Post #150


Dragon
********

Group: Members
Posts: 4,138
Joined: 10-June 03
From: Tennessee
Member No.: 4,706



QUOTE (Dashifen)
Edit: OH! Just read Synner's post. So the Scramble IC is causing the need for the decryption then?

That's right. Scramble IC is fairly common, in fact. Any time you try to log onto a Satellite RTG, you have to pass through it, for instance.
Go to the top of the page
 
+Quote Post

21 Pages V  « < 4 5 6 7 8 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 9th January 2025 - 07:37 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.