IPB

Welcome Guest ( Log In | Register )

21 Pages V  « < 8 9 10 11 12 > »   
Reply to this topicStart new topic
> The Idiot's Guide To The Matrix Thread, Support for the Matrix-challenged
hobgoblin
post Oct 11 2003, 05:47 PM
Post #226


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



do the titanic baby :silly:
Go to the top of the page
 
+Quote Post
Kurukami
post Oct 12 2003, 04:44 PM
Post #227


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Cheng shouts "I'm the king of the wor--", pauses, pats down her ample hourglass figure, and reconsiders her entire statement. :ork
Go to the top of the page
 
+Quote Post
Synner
post Oct 13 2003, 02:15 PM
Post #228


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Matrix Overwatch Walkthrough
The Johnson briefed the team on the existance of several perimeter security measures including electrified fence (3m high, monowire topped), one guard-manned (three men sec-guard teams, 5 hour shifts) gate, concealed pressure pads on the greens leading up to the mainbuilding and sofisticated maglocks on all external doors (at least rating 6) - all measures are supposed to be non-lethal which fits with Yamatetsu's known capture and interrogate policy. Mr.J was unaware if security systems are centrally controlled or not and no data was forthcoming on internal security, except that the facility is not supposed to be rigger-equipped.

Back to the run...

Note - While not strictly necessary Cheng's Locate File operation for the commcode registry is a nice piece of colour and can provide additional paydata as well as a quick reference if she needs shortcuts later. However Locate operations only provide a location for something, in this case the rolodex File. They effectively tell you where it is not what is in it. For that you need to a Read/Write on the File after you've Located it.

The Host fails its Opposed roll miserably without getting a single success (Cheng has 2 net successes). The characters on the Browse scroll shift wildly as the information is drawn from the Host and directions to the file appear as an e-ddress with a small animated compass underneath indicating the virtual "route" to the file.

Before proceeding, Kurukami may need to adjust his post... but as I've said above the commcode is not strictly necessary for the second Locate (the one on the Slave). It should always be possible to Locate any hardware wired into the Host(unless it's Scrambled) much like it's possible to locate any hardware linked to your PC by tracing through the OS firmware's equivalent of a "Device Manager".
Go to the top of the page
 
+Quote Post
Kurukami
post Oct 14 2003, 01:51 AM
Post #229


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



OK, my previous post is updated to reflect Cheng running an Analyze Icon on the telecomm file to make sure there's no nastiness in it., and the Download Data to store a copy of the security telecomm (rather than the whole) file in her storage memory. I figure my I/O speed of 360 should blow through such an abbreviated list in a very short while...
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 18 2003, 03:10 PM
Post #230


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



grr, get back to the first page you stupid thread...
Go to the top of the page
 
+Quote Post
Synner
post Oct 18 2003, 06:44 PM
Post #231


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Matrix Overwatch Walkthrough
Apologies, this week I've been recovering from a bout of flu and some deadlines and its been impossible to get my head together enough to give this thread its due attention.

Back to the ongoing operation in the Yamatetsu lab system...

Having completed her Locate File Cheng runs an Analyze Icon on the file she located with her Browse Utility and rolls 4 successes (the Host fails to roll any successes in the Opposed Roll) which reveals that the Commcode directory contains Scramble but nothing worse.

While the words of the file continuously rearrange themselves on the scroll icon of her Browse Utility, Cheng must decide whether to do a Locate Slave or decode the directory and then do the search.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 18 2003, 08:28 PM
Post #232


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



gvien that the person is going for the securityim starting to wonder what the hell she (i belive that was the right sex) is doing going tru the files as she is building up security point here. personaly i would just fire off a locate slave and get to work...
Go to the top of the page
 
+Quote Post
Synner
post Oct 18 2003, 08:47 PM
Post #233


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



I understand Kurukami's reasoning although in this particular case I don't think it applies. It would be the sort of stunt I would pull if I were on a PLTG looking for a specific host rather than a subsystem on a particular Host. If I had a commcode listing to go by I could track the e-ddress I much easier, however here Cheng seems more or less sure that the various slaves are on a subsystem of this Host so...

At the very least it'll provide some minimal paydata and it does go to show that with a high enough DF a decker can take a few risks. Personally I'd go straight to the security stuff because of the acumulated Security Tally is getting pretty high.
Go to the top of the page
 
+Quote Post
mfb
post Oct 19 2003, 01:47 PM
Post #234


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



question about the Null Operation system op. what happens if neither the decker nor the system scores any successes? i mean, it's not like you can fail the grueling task of not doing anything. what, is the decker somehow forced to take an action?
Go to the top of the page
 
+Quote Post
Synner
post Oct 19 2003, 01:55 PM
Post #235


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE
fail the grueling task of not doing anything

This is not what a Null Operation does. What it does do is convince the Host system to disregard your presence while you do nothing (for a while), which is something completely different. If you fail you fail and you're back where you started. If you succeed you have a little time to plan, wait or just take a breather while the system ignores your existance (as long as you do nothing).
Go to the top of the page
 
+Quote Post
mfb
post Oct 19 2003, 08:53 PM
Post #236


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



right, but what happens if you fail the test? last night, my otaku scored no successes, but the system scored no successes either--what happens?
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 19 2003, 09:30 PM
Post #237


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



nothing, you where just lucky thats all...

a null op isnt a decker initiated operation as mutch as its a test to see if the host spots you while you maintian or wait for something.

if the host scores no successes, fine but if it had then those would be added to your tally unless you could counter them with your successes. its a success contest, not a normal operation...
Go to the top of the page
 
+Quote Post
mfb
post Oct 19 2003, 09:39 PM
Post #238


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



yeah, that's what i thought, but i wasn't really sure. just to be safe, i rolled it again and passed the next turn. *shrug*
Go to the top of the page
 
+Quote Post
Gorath
post Oct 24 2003, 07:37 AM
Post #239


Moving Target
**

Group: Members
Posts: 128
Joined: 19-March 03
Member No.: 4,292



So the successes from the decker represent her ability to blend into the data traffic to stay unnoticed.
Go to the top of the page
 
+Quote Post
Synner
post Oct 24 2003, 08:50 AM
Post #240


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



In a nutshell yes.
Go to the top of the page
 
+Quote Post
Synner
post Oct 25 2003, 09:30 AM
Post #241


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Kurukami?
Go to the top of the page
 
+Quote Post
michaelius
post Oct 26 2003, 09:49 PM
Post #242


Target
*

Group: Members
Posts: 23
Joined: 24-September 03
Member No.: 5,647



i have a question that has been dogging me since the first run/walkthrough. and i don't mean to sound ungrateful, i guess i should start by saying how AWESOME this topic is.

Synner has been talking about Probe IC in terms of it raising a system's Security Rating for future tests. However on pg 228 in the SR3, it says:

QUOTE
For a probe-equipped system, the {GM} makes a Probe Test using it's probe IC Rating against a decker's {DF} every time the decker makes a System Test.  Add any successses from the Probe Test to the Decker's security tally


this seems much more deadly than just increasing the Security Rating. while increasing the rating makes the system more powerful, increasing the security tally launches more IC at the decker. am i just reading all of Synner's posts wrong, or what?
Go to the top of the page
 
+Quote Post
michaelius
post Oct 26 2003, 10:12 PM
Post #243


Target
*

Group: Members
Posts: 23
Joined: 24-September 03
Member No.: 5,647



Also, I just found this on the errata page (I can't believe it, but i'm actually putting all the errata in my home copy...do normal people do this?)

QUOTE

The icon that has been hit rolls a Damage Resistance Test, using its Bod Rating against a target number equal to the Power of the damage. For IC programs that take damage, make a Damage Resistance Test using the host's Security Value. The armor utility reduces the Power for the test.

Compare the attacker and defender's successes. If the attacker achieved more successes, for every 2 net successes stage the Damage Level of the attack up by 1 level. If the defender achieved more, stage down the Damage Level by 1 level for every 2 net successes.

Cassie is attacked by a Killer-6 program on an Orange host, so she faces 6S damage. The IC achieves 3 successes on its Attack Test. Cassie is running an Armor-4 utility, which reduces the Power of the attack to 2. Cassie makes a Bod (2) Test and achieves 4 successes. She achieved only 1 net success, so the damage is not staged down, and her persona takes Serious damage.


this irons out the whole "staging up/down" debate in this thread regarding matrix combat. this was updated in the 11th printing (you can see your printing on pg. 5)
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 27 2003, 12:10 AM
Post #244


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



for the first question, your probably reading synners post wrong as prove have allways added to the tally, its liek a watchdog that barks...

as for the second one, i dont recalla problem with stageing but what number of dice to roll, computer skill or the attack utilitys rating...
Go to the top of the page
 
+Quote Post
Synner
post Oct 27 2003, 10:13 AM
Post #245


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE (michaelius @ Oct 26 2003, 09:49 PM)
Am i just reading all of Synner's posts wrong, or what?

Probe - You're reading my posts wrong. Probe IC in a Host does exactly what you describe, rolling it's own Rating everytime the illegitimate Decker makes a System Operation, successes add to the Decker's Security Tally. I've made this clear by quoting the reference to the same page you have at least a couple of times. That being said I often roll the Probe dice right after I roll the Host's Opposed Roll to any System Operations and simply add the total to the Security Tally in the interest of speediness.

Damage- Actually hobgoblin, he does have a point. We've previously discussed if the Damage of an Attack program, or IC, is capped at Deadly (no matter how many successes you have the max Damage you could do with one attack was Deadly) and this was resolved before the Resistance Roll was made (which made sense reading the rules in SR3). With the modified example in the errata it now seems that all the Attacker's successes factor in and the Resistance Roll has to reduce the successes before starting to Stage down the Damage. All of which means Matrix combat just got a hell of a lot deadlier.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 27 2003, 12:07 PM
Post #246


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



isnt that how normal combat damage works (as in being shot, it seems melee damage works a diffrent way)?

Go to the top of the page
 
+Quote Post
Synner
post Oct 27 2003, 12:41 PM
Post #247


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Yes and no. The problem in Cybercombat was that SR3 wasn't clear about how to handle excess successes in the Attack since you immediately jumped to the Resistance roll which only mentioned Staging down the Attack's final damage (which explains this Errata).

While this does bring it in line with normal ranged combat to some extent it makes Matrix combat far more deadly (1st strike will win 90% of the time), since there is no actual Dodge in Cybercombat (even the advanced rules from Matrix provide only a limited answer to this lack).
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 27 2003, 03:30 PM
Post #248


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



nice, that just points out that cybercombat is bad unless you feel like have a rampant tallyand is damn fast...
Go to the top of the page
 
+Quote Post
Kurukami
post Oct 28 2003, 12:18 AM
Post #249


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Hey all... sorry to have been AWOL for so long. I'll post responses tonight. My job's been breathing down my neck big time with the approach of the end of the fiscal year. So, tonight -- helping the infiltration team slip undetected into the Yamatetsu facility!
Go to the top of the page
 
+Quote Post
michaelius
post Oct 28 2003, 01:49 AM
Post #250


Target
*

Group: Members
Posts: 23
Joined: 24-September 03
Member No.: 5,647



Yeah, my bad. sorry about that. i was reading the post wrong...
Go to the top of the page
 
+Quote Post

21 Pages V  « < 8 9 10 11 12 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 10th January 2025 - 09:09 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.