IPB

Welcome Guest ( Log In | Register )

21 Pages V  < 1 2 3 4 > »   
Reply to this topicStart new topic
> The Idiot's Guide To The Matrix Thread, Support for the Matrix-challenged
Synner
post Aug 21 2003, 07:13 PM
Post #26


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



You are correct, it's actually a Log On to LTG system operation, but I normally only use that when the decker is logging on through a Host or telecom. Although it's debatable, I assume that when he's using an illegal jackpoint or dataline tap to access the network directly, he's avoiding the need to do the Log On to LTG (because he isn't using a valid Matrix Service Provider account if nothing else).
Go to the top of the page
 
+Quote Post
Solidcobra
post Aug 21 2003, 07:43 PM
Post #27


Moving Target
**

Group: Members
Posts: 138
Joined: 5-August 03
Member No.: 5,252



*whistles* :love: this is helpful.... i'm actually beginning to understand from viewing the good and detailed descriptions of actions possible that Synner posts
Go to the top of the page
 
+Quote Post
Synner
post Aug 22 2003, 08:28 AM
Post #28


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



The other thing that I'm purposefully avoiding (in the interest of clarity) and which often adds another interesting dimension is the decker's end of the description.

The problem some people encounter when playing the Matrix is the fact that without the descriptions it ultimately boils down to just a bunch of tests. So I make it a point of describing the metaphors and the decker's interaction with the elements of the Matrix. In my game I try to prompt the decker into helping me with this. I give a -1 modifier to any target number in which the decker takes the time to describe his Utility in use and how it operates/interfaces with the Matrix, instead of just saying I use my Browse utility...

However this is an unnecessary, and house rule, point which just serves to add more color to the game.

And now back to our regular broadcast...
Go to the top of the page
 
+Quote Post
DigitalMage
post Aug 22 2003, 09:28 AM
Post #29


Moving Target
**

Group: Members
Posts: 214
Joined: 26-February 02
From: UK
Member No.: 340



QUOTE (Game2BHappy)
Awesome stuff Synner.

I haven't touched Matrix stuff in awhile and this is a great refresher.

Question:
Doesn't the decker have to perform a "Logon to Host" when he first jacks in? I thought that dumped him into the LTG and that was the first thing that happened.

I think the log on to host, changing RTGs was mentioned but glossed over as it isn't really important to the task at hand.

However, if a decker is using a legitimate MSP (Matrix Service Provider) account, e.g. with UCAS Online (unlikely his own, but it could be one "borrowed" from a neighbour :cyber: ) then all these tests are likely to be automatically successful.

I say "likely" as it depends which LTG and RTGs are accessed, e.g. Aztechnology (who no doubt run the Aztlan grid) may not allow UCAS Online users to automatically access Matrix sites on their grid, but may allow deckers with the premium priced Aztechnology MSP account to do so.

Once you get to a host it is unlikley that your basic UCAS Online MSP will be any good, at that point you need to have user account to do things automatically.

The Logon operations are effectively fooling the LTGs, RTGs, PLTGs and Hosts that you have a valid MSP account for that particular operation.
Go to the top of the page
 
+Quote Post
Synner
post Aug 22 2003, 02:14 PM
Post #30


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Datasteal Walkthrough
Since satcong is taking a while and in the interest of keeing this going, I'm going to assume he chooses a Locate File system operation from the possibilities above...

Your little old man Icon limps across to the reception desk to perform his query (ie. a Locate File operation on the Host's Index subsystem represented by the recepcionists). The decker's Icon asks the Recepcionist for the location of the relevant file while he puts on his bottle-bottom glasses (his Browse Utility).

He rolls his Computer skill (6) plus Hacking Pool (6) against the Host's Index Rating (9) minus Browse (6) for a target number of 3. He rolls 9 successes on 12 dice. Meanwhile the Host (as always) rolls it's Security Rating (9) against the decker's Detection Factor (7) for 2 successes. Overall the decker totals 7 successes which is more than enough to succeed; however his Security Tally rises to 5 which according to the Host's Security Sheaf activates a Probe 8 IC (at Step 4 to be exact).

In the Matrix a pretty recepcionist hands the decker a slip of ultra-smooth paper with a smile, the paper has the door number for the appropriate File subsystem where his target is stored but before the decker can move away, the recepcionist next to her asks, "May I see your ID card, sir?"

[edit] Since Probe is reactive IC the GM just makes a secret Sensor Test (SR3 page 209) for the decker (4) against a Target number equal to the IC's rating ( 8 ), the decker gets very lucky and rolls 2 successes finding out that this Recepcionist Icon is a Cutie8.1 Probe IC and is asking for the passcode that identifies him as a legitimate user. If he had failed the test, the recepcionist would have just noted his unauthorized presence, said nothing and the IC would have remained undetected.[/end edit]

You now have a choice:
a) you either enter Cybercombat and try to nuke the Probe IC and then surpress it or;
b) you don't reply and from that point on the Host adds the Probe's rating ( 8 ) to all Security Rating (9) rolls against the decker's Detection Factor (7). Meaning that after Probe is triggered the System starts rolling 17 dice every System Operation you make.

Note - Although I don't think it's clearly stated anywhere that I recall, IMHO it should be assumed that possessing a Validated Account (see above) means you can show Probe IC a valid passcode and the IC returns to its passive state. This is another good reason to do a recon hack.
Note2 - When I've had time to work out the metaphor before hand and I think the decker is in the mood for some more color, I use the IC or Program's rating as a version number so I don't have to break from in character description (ie. a "Cutie8.1 Probe" for a Probe - 8 IC).
Go to the top of the page
 
+Quote Post
Person 404
post Aug 22 2003, 04:12 PM
Post #31


Moving Target
**

Group: Members
Posts: 214
Joined: 8-June 03
Member No.: 4,696



My knowledge of the Matrix rules is far from perfect, but since probe is reactive IC, shouldn't there have been a free sensor test involved to determine if the decker notices it/ knows its rating/ etc?
Go to the top of the page
 
+Quote Post
Synner
post Aug 22 2003, 04:33 PM
Post #32


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



You are correct Person 404, I did leave that out in terms of Game Information. However the Sensor Test is made in secret by the GM anyway. In this particular case assume the decker totalled a couple of successes.

Thanks for the correction, I'll edit it in now for consistency.
Go to the top of the page
 
+Quote Post
satcong
post Aug 25 2003, 01:34 PM
Post #33


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Sorry for the delay, I have been away for the weekend....

The little old man acknowledges the receptionist's question with a wave of his hand (activating Cloak utility), "Ah, yes, certainly young lady. Just give me a minute while I find it...". Looking confused he starts searching his pockets with his free-hand.

"Um, I'm sure it was here... can you hold this for me please", he hands his walking stick to the receptionist. Whether or not she takes hold of the stick, the little old man presses the big red 'Press to Defrost' button on the handle of his walking stick. The walking stick instantly glows white-hot like an arc-light element and a shock-wave of heat, like a blow-torch, jets towards the receptionist as the little old man launches his Attack (6D) utility....

Go to the top of the page
 
+Quote Post
satcong
post Aug 25 2003, 08:28 PM
Post #34


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Had I chosen to, could I have used an 'Evade Detection' combat maneuver to buy myself time? Using the Cloak utility (the hand-wave) this combat maneuver would, I believe, have been easier to succeed at?

If I successfully evade the IC for a couple of combat turns, is that sufficient time to go to the file-subsystem (door number on paper slip) room where the file I want is located?
Go to the top of the page
 
+Quote Post
TinkerGnome
post Aug 25 2003, 08:37 PM
Post #35


Dragon
********

Group: Members
Posts: 4,138
Joined: 10-June 03
From: Tennessee
Member No.: 4,706



QUOTE (satcong)
If I successfully evade the IC for a couple of combat turns, is that sufficient time to go to the file-subsystem (door number on paper slip) room where the file I want is located?

Probe IC doesn't work quite that way. I'll leave it up to Synner to give you the long version, but the short is that Probe simply sits there, making your actions harder. Evade is a combat-only action and, since you're not in combat with the probe, does nothing useful in this case. If you attack Probe IC, it's worth noting, it also does not fight back.

Another common low tier IC is Scout IC, which works just like Probe till it's attacked. At that point, it flips and becomes combat IC.
Go to the top of the page
 
+Quote Post
satcong
post Aug 25 2003, 08:45 PM
Post #36


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Thanks TinkerGnome.

Reading SR3, and from Synner's last post, this Probe IC is bad news anyway since it ratchets up my security tally every time I carry out a system test. I assume it is therefore worth crashing (and suppressing?) as soon as possible?
Go to the top of the page
 
+Quote Post
Synner
post Aug 25 2003, 09:37 PM
Post #37


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Datasteal Walkthrough
Tinkergnome is correct, Probe is reactive IC (SR3 page 212) and doesn't fight (although it does defend itself it can never take an offensive posture). It just sits there making your Tests harder, in fact, if that Sensor Test above fails you won't even notice it's doing it.

You've chosen to handle this IC by entering Cybercombat which is the most likely option for most deckers. Probe is pretty common and nasty in that it makes your life miserable from the point it's activated on and can't really be decieved. That being said if you're running in Masking mode (Matrix page 123) and have a sufficiently high Detection Factor it might be worth leaving it be.

To handle your choice we should backtrack a little. You declare cybercombat and at that point (cyber)Initiative should be rolled, in this case we know beforehand it is irrelevant, but things might be different if this were a Probe trapped with a TarPit. Anyway, returning to our example. Since this is non-aggressive IC you don't need to use defensive Combat Maneuvers or Defensive Utilities (like Cloak), furthermore you should endeavor to take it out as fast as possible.

Which brings me to a usually overlooked aspect of Cybercombat: Attacks are simple actions! You can make 2 Attacks per action phase or you can use the Position Attack Maneuver and then use your Attack Utility. The latter option has the advantage of increasing your chances of taking the IC down with a single strike. For the purposes of this example let's assume that the IC is destroyed by your Position Attack Maneuver plus Attack (6D).

The CutieIC burns away into pixilated ashes which fall to the floor. You must now choose if you want to suppress it or not. The base IC Suppression rule is that you lose 1 point of Detection Factor for every IC you suppress (SR3 page 212), this will lower your Detection Factor to 6 (which given a loophole in SR rules is the same as your previous Factor of 7). I assume you suppress and move on.

Your Icon hobbles down the appropriate corridor - indicated by a plaque listing the door number range each corridor contains afixed above each entrance -until he finds the appropriate door. He opens the door and enters the File subsystem which looks like a huge File Archive with the old-fashioned pull-out drawers system. (note this is color and no tests are involved, a GM might describe this as you make the File Subsystem Test or do it separately). The piece of paper tells you which cabinet and you find the File easily. Now you need to do either a Download Data System Operation to download the File as is or an Edit File System Operation to check inside it and make sure its the one you want.

Note - After you've become more acquainted with the rules you might want to try the Matrix sourcebook's Optional IC Suppression rule (page 26) which allows for using/losing Hacking Pool dice instead of Detection Factor points.

Note2 – There is some debate about the issue of Cybercombat and Security Tallies. IMHO since it does not involve System Tests, the IC's successes in Cybercombat should not add towards your Security Tally. However, I have seen good arguments to the contrary and so I leave it up to individual GMs to rule on the matter.
Go to the top of the page
 
+Quote Post
Mightyflapjack
post Aug 25 2003, 09:52 PM
Post #38


Target
*

Group: Members
Posts: 56
Joined: 14-August 03
Member No.: 5,492



Probe IC should usually be attacked and suppressed by a decker if they are planning to do a lot more in a system.

Probe IC is the worst type of IC in the way that it adds its rating to the system in every test to add to your security tally. It is usually better for a decker to just incur the penalty for supressing it.

EDIT:
It is also a good idea to keep a special IC-buster attack program (limit target : IC, Stealth +5, Attack 6S). Damage =6S, 160 MP = 32,000Y. Stealth's rating reduces the security tally generated by "crashing an icon" (in this case.. crashing a probe - 8 with this utility would only increase the tally by 3 instead of 8.) a 6M version of this would only be 90 MP, and 18,000Y.
Go to the top of the page
 
+Quote Post
Gorath
post Aug 26 2003, 12:00 AM
Post #39


Moving Target
**

Group: Members
Posts: 128
Joined: 19-March 03
Member No.: 4,292



It is possible, that it is better to keep your detecion factor (DF) high.

Example:

1. Red-6, Probe IC 8, DF 6
a) (don't fight) 14*1/6=2.3
b) (fight&surpress) 6*2/6=2

2. Green-12, Probe IC 8, DF 6
a) 20*1/6=3.3
b) 12*2/6=4

Rule: If (SR+IC)*P(DF)<SR*P(DF-1) its better to avoid the fight.

[Security rating (SR), Probe IC (IC), P(x) prohability to get a x on a d6]

Best thing for the decker is in my opion to give up a dice from hacking pool. Most deckers have HP>Computer skill, so its no problem for non-combat (that you always avoid...)



EDIT:

The equation is equivalent to (SR+IC)/SR = 1+IC/SR < P(DF-1)/P(DF) for avoiding the fight.

Just some notes because the "better" choice does not depend on the a high enough DF but the ratio between P(DF) and P(DF-1), that changes because of d6 use. The main problem is that you roll twice more 5s as 6s (mathematical) but the ratio between 3s and 4s is better (4 vs. 3) Because of the nature of d6 this is true for x+6, x+12, x+18... too (i.e. you would expect twice more 11s then 12s).


Example:

DF 9

P(9)=1/6*4/6=1/9=0.111...
P(8)=1/6*5/6=5/36=0.13888...

==> P(8)/P(9)=5/4=1.25 ==> If IC> 1/4 of SR start fight!

DF 6

P(6)=1/6=0.1666...
P(5)=2/6=0.333...

==> P(5)/P(6)=2 ==> If IC>SR start fight!

For multiples of 6 the ratio is 2. But at 7, 13, 19... it is always better to fight, because P(7)=P(6) ==> ratio 1
Go to the top of the page
 
+Quote Post
Synner
post Aug 26 2003, 12:21 AM
Post #40


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Thanks for the detailing Gorath, that's essentially what I meant that if you have a high enough Detection Factor you might want to leave the Probe in place. Also I'd like to note that even a beginning character can push their Detection Factor as high as 9 by using certain Modes which makes it an even stronger possibility.
Go to the top of the page
 
+Quote Post
satcong
post Aug 26 2003, 08:23 AM
Post #41


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



OK, I choose to suppress the crashing IC using my Hacking Pool; as the pixelated ashes of the IC gently fall, the little old man catches them in a small butterfly net.

I am in the file subsystem and have located the file that contains the data that I am after. How do I know that the data is safe to start tampering with?

The little old man has a small circular case on a safety chain around his neck. He opens the case and flips out a gold-rimmed monacle. He puts the monacle in place and squints his eye to grip it. His eye is magnefied three-fold as he checks the file over (Edit File) and confirms that it contains what he is looking for.

Having confirmed that it is what he is after, he puts the file in the breast-pocket of his embroidered waist-jacket (Download File).

There are two things that I am now considering: firstly I would like to create a valid account on this host so that I can re-visit at a later date and, secondly, since things are going reasonably well, I want to locate some paydata as a small bonus for this first run....
Go to the top of the page
 
+Quote Post
Synner
post Aug 26 2003, 08:48 AM
Post #42


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Datasteal Walkthrough
Satcong - Both the Edit File and the Download Data are system operations that require Tests. Both are aided by Read/Write and have a target of 9 (File Subsystem Rating) and are opposed by the Host's Security Rating as usual. Both might increase your Security Tally and/or not even work so you should make those rolls before you decide what to do next...
Go to the top of the page
 
+Quote Post
satcong
post Aug 26 2003, 08:59 AM
Post #43


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Another couple of questions if you don't mind.

Is the decker aware of his security tally or is this kept secret by the GM?

If the decker carries out a successful 'Analyze Host' operation does he gain any indication of the contents of the security sheaf? If not, is there any way to do this or do deckers just continue to push-the-envelope until it gets too hot to stay and log-off?

Also, on further reading, it appears that I can not create a valid account since I do not have the utility 'Validate', correct?
Go to the top of the page
 
+Quote Post
Gorath
post Aug 26 2003, 09:16 AM
Post #44


Moving Target
**

Group: Members
Posts: 128
Joined: 19-March 03
Member No.: 4,292



There are some ways to get information about this host:

Analyze Host:
For each success you get information about
- securtity rating (code and value)
-one subsystems rating
For 7 successes you get all Informations.

Analyse Security:
If you successed you get the information about your tally and the alarm status of the host. (I don't think you can see the security sheaf.)

And you *could* try to make a account. BUT you must make a Validate Account operation vs. Control subsystem without the help of your Validate utility, so the TN 14 is very high. If you would succeed you get the account...

Note: You should get a Validate 6 utility fast so you can make a reckon hack to get an account for hosts. In your case the TN would be 8 - not 14 - oppossed to the host.

Note2: The TN for Validate Account is Control Subsystem Rating +2. If you try to get super-user access the TN mod is +6.
Go to the top of the page
 
+Quote Post
Synner
post Aug 26 2003, 09:41 AM
Post #45


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



The decker isn't aware of his exact Security Tally, that is GM information, however a player can have a rough idea of how much trouble he's in if he keeps check of the results of the net sucesses in his Tests. This isn't foolproof, which IMHO is good, since it mimmicks the uncertainty the decker faces.

Next, the closest you will get is the Analyze Security System Operation (SR3 page 215). This will give you readings of the Security Rating and your current Security Tally but not the actual Sheaf. As far as I know no Operations will give up Sheaf information. In other words deckers do this until it gets too hot to stay.

QUOTE
Also, on further reading, it appears that I can not create a valid account since I do not have the utility 'Validate', correct?

This is a common misconception.

Actually you can perform any System Operation without the respective Utility. It just makes it much harder since the Utility's Rating isn't subtracted from the relevant ACIFS Subsystem Rating.

In this particular case without a Validate Utility you're looking at a Control Subsystem Test with a Target of 14 (Control +2, Matrix page 102 ) which is opposed, as usual, by the Host's Security Rating vs your Detection Factor.

Note - It's always useful to have the charts on page 162 thru 164 of the "Matrix" sb with you as a crib sheet when running decking. It facilitates System Operations immensely and works as a quick reference for all Matrix Tests.
Go to the top of the page
 
+Quote Post
satcong
post Aug 26 2003, 10:25 AM
Post #46


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



Thanks guys, very useful information.

Synner, I will attempt an 'Edit File' operation with the aid of my 'Read/Write' utility. I will roll 12 dice (Computer 6 + Hacking Pool 6) against a TN# 4 (File Subsystem rating - Read Write 5). I roll 7 successes.

As a point of interest, it certainly is more fun and colourful describing the icon's actions as oppossed to simply stating the procedures in terms of dice rolls required etc.... my little old man icon still uses his monacle as described previously....

I realise that the Host will oppose this and may increase my security tally. However, if nothing drastic happens, I will then use my second simple action to attempt the 'Download Data' operation using the same utility. This time it will be 9 dice (Computer 6 + Remaining Hacking Pool 3) against TN#4. I roll 4 successes....

I assume that attempting to validate an account against a TN#14 is not only going to be very hard, but, as an oppossed test, is likely to result in a large increase to my security tally since I am unlikely to score any successes while the Host is?
Go to the top of the page
 
+Quote Post
Synner
post Aug 26 2003, 10:50 AM
Post #47


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Datasteal Walkthrough
Continuing...

Opposing your Edit File system operation the Host rolls it's usual 9 dice (Security Rating) against your Detection Factor (7) and gets 2 successes. Behind the GM's screen your Security Tally goes up by 2.

Meanwhile, this means you easily open the File and peak inside its contents, sifting through the virtual pages with your monocle on (Read/Write Utility) making sure it contains the target's personal details you were looking for. Satisfied this is the correct File you proceed with the Download Data operation.

You make your System Operation roll and get 4 successes (above) and the Host makes it's usual Security Rating (9) roll against your Detection Factor (7) and amazingly rolls 5 successes. This means that not only did your System Test fail and you weren't able to download the File but also that your Security Tally just shot up 5 steps (although the character in the example doesn't know it he's already up to step 12 and has triggered two IC).

Your Icon turns just in time to see a faceless Security Guard Icon accompanied by a MCTracker dog 8.0 Icon step through the door to the Archive Room, the guard asks "ID code please?" (One success on the secret Noticing Triggered IC Sensor Test - SR3 page 209 - let's you notice the Guard Icon but doesn't tell you what it is, three successes on the Sensor Test against the second IC tells you its a Trace - 8 IC).

Your move.
Go to the top of the page
 
+Quote Post
satcong
post Aug 26 2003, 11:07 AM
Post #48


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



The monacle drops from the little old man's face to be replaced by a set of night-vision goggles (ANALYZE IC).....

This is a Control Test so I use my 'Free Action' to Analyze the IC and roll 10 dice (Computer 6 + Hacking Pool 4) against a TN# (Control Rating 12 - Analyze Utility 4) = 8. I roll 3 successes....

Note: I am assuming from it's appearance and question that this is IC. Would it be prudent to first 'Analyze Icon' since this is also a free action?
Go to the top of the page
 
+Quote Post
Synner
post Aug 26 2003, 11:09 AM
Post #49


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Sorry Satcong I had to revise the post above because I'd forgotten you had added 2 to the Tally with the Edit File test and just noticed you jumped to Step 12 activating 2 IC not one.
Go to the top of the page
 
+Quote Post
satcong
post Aug 26 2003, 11:24 AM
Post #50


Target
*

Group: Members
Posts: 41
Joined: 18-August 03
From: Manchester, UK
Member No.: 5,515



No problem Synner, although I thought my eyes were deceiving me and I had missed a paragraph of your description :)

My Analyze IC will be directed at the security guard since I am not too concerned about the MCTracker Dog Trace IC at this point....
Go to the top of the page
 
+Quote Post

21 Pages V  < 1 2 3 4 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 8th January 2025 - 07:23 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.