The Idiot's Guide To The Matrix Thread, Support for the Matrix-challenged |
The Idiot's Guide To The Matrix Thread, Support for the Matrix-challenged |
Nov 18 2003, 09:57 PM
Post
#276
|
|
Target Group: Members Posts: 53 Joined: 13-November 03 Member No.: 5,820 |
Roll dice equal to program rating.
Wound Level TN Light 4 Moderate 5 Serious 6 Each success heals one box of damage. The program degrades one Rating Point each time it's used, regardless of success or failure. I don't have Matrix on hand, but it looks like you can use your hacking pool here (no mention of not being able to). |
|
|
Nov 19 2003, 01:42 AM
Post
#277
|
|
Shooting Target Group: Members Posts: 1,512 Joined: 16-August 03 From: Northampton Member No.: 5,499 |
As a side note, as an Otaku's living persona's icon takes damage (which can be healed by medic as i understand it) does the Stun conidition moniter heal as well? Only one or two answers please as im not wanting to grag this totally OT.
|
|
|
Nov 19 2003, 01:44 AM
Post
#278
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
Which means, of course, that you have to eventually reload it to continue gaining its benefits. Makes sense...
In that case, I'll roll the five dice provided by the utility. The result: 17, 8, 7, 1, 1. Eeeeex-cellent, Mr. Smithers... that removes all the damage boxes from the condition track of Cheng's icon. And, of course, the copy which is in active memory degrades to 4. (The copy of the utility which is in storage remains intact, ready to be reloaded when needed.) Cheng sighs in relief as the utility works its way through her operating code, eliminating errors and reassembling the structure where fragments had snuck in. As it proceeds, her movements smooth out once again and her perception (which had been "blocking up" in certain areas, like the visual censor edited in by the more puritanical of broadcasters, and not refreshing as she acted or moved through the virtual environment) cleared. (I'll write more later, Synner...) |
|
|
Nov 19 2003, 09:58 AM
Post
#279
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Kurukami - Actually, I've got an issue or two with Medic:
a) The way it is written Medic operates using its own Rating rather than the decker's Computer skill which suggests it works independently (and so brings into doubt whether or not Hacking Pool is appropriate). b) On the other hand, assuming it isn't independent of the decker and Hacking Pool is appropriate, wouldn't those target numbers be subject to the decker's Wound Modifiers just like any other Test? Shockwave IIc - A strict interpretation is that Medic rebuilds the damaged code and restores your Matrix Persona. Personally I would rule that it can't affect the physical and mental stress/damage resulting from Persona damage in an Otaku because I simply can't see how a program designed to restore code could do so. You might be able to design a program that might generate psychotropic and psychosomatic healing effects, but I don't think Medic is it. |
|
|
Nov 19 2003, 04:43 PM
Post
#280
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
I was kind of presuming the Medic utility was rather like the code for Attack programs -- in that it was automated (you rolled the utility's value rather than your Computer skill), but you could use Hacking pool to make its use more effective. Do any utilities but the operational ones actually use Computer? I'm thinking specifically of:
Attack Killjoy Black Hammer Erosion Steamroller Hog Track Medic Arguably, Cloak and Lock-on might fall into this category too, since they only modify the rolls for your Persona chips during cyberspace Combat Maneuvers. |
|
|
Nov 19 2003, 05:19 PM
Post
#281
|
|||
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Note I'm not decided on which way this should go, but I'd assume that this would mean that (like Attack) it is subject to Wound Modifiers... in which case the appropriate Target Number in case of self-use on a damaged Icon pops from 5 to 7 in your case. |
||
|
|||
Nov 19 2003, 05:22 PM
Post
#282
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
That's certainly an unpleasant thought. Any way we can get a ruling from the FAQ gurus one way or the other? :D
*imagining trying to hit a TN of 9 (book 6, +3 for wound level) for a Serious icon-wound* |
|
|
Nov 19 2003, 05:31 PM
Post
#283
|
|||
Target Group: Members Posts: 53 Joined: 13-November 03 Member No.: 5,820 |
Hmmm.....I may have been wrong in my previous post re: Hacking Pool. SR pg. 207 states that the Hacking Pool can be used for
And I don't see Medic falling into any of these categories. On the plus side, that means you don't have to worry about wound modifiers. |
||
|
|||
Nov 19 2003, 07:04 PM
Post
#284
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
I tend to agree with Pavlov's new interpretation. Under this assumption the Medic would act independently of the Decker (unaided by Hacking Pool) but would also be immune to Wound Modifiers. If you're okay with this approach Kurukami, adjust the post above accordingly and we'll go on from here (I'll be mailing FanPro some of the questions brought up in this thread after we've finished this run).
|
|
|
Nov 19 2003, 07:21 PM
Post
#285
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
OK, I've updated the original post. As always, my luck with the dice is... just weird. :]
|
|
|
Nov 19 2003, 08:00 PM
Post
#286
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
As the error-correction routines of the Medic utility take effect and smooth out the performance of her deck, Cheng takes a deep breath and tries to let the tension leak out of her shoulders. Now, where was I...? Ah, yes -- locating the controls for the pressure sensors on the side of the compound where the rest of the team is waiting.
The acupuncture needles, their work completed, drift into the hand of Cheng's icon, and she absentmindedly stores them back in their pocket as she generates the incense-smoke that symbolizes her Analyze utility. A handful of bold strokes limn the necessary kanji in midair, and she waits nervously to see how the host might respond. Since the host blocked Cheng's search before (which triggered the popup of the arachnoid Blaster IC), she still needs to get this operation past the host and discover the location of the resources she'll need to control. I'll roll Cheng's seven Decking dice, and add three dice from my Hacking Pool, to try and push this through the host before many more things can get fragged up. Another possibility which makes me twitchy is that, with the release of the Blaster IC, the host may have jumped from normal status into a passive alert, in which case things will be much more difficult for me to affect. I roll: 11, 7, 5, 5, 4, 4, 3, 3, 2, 1. Tentatively, that's four successes at what I think was the old Index TN of 11, as modified by my Analyze-6. And, as always with my Analyze utility, it's sneaky, making my DF 11. With those digital locales firmly set in her thoughts, she moves to the controls for the perimeter cameras and prepares to loop a cycle of video for each that is near the potential entry point for the others. From the displays she can make out, it should be easy to determine whether the cameras are static or panning. It'll be somewhat more difficult, but still possible, to digitally loop the inputs to display an "all-remains-well" image even as her teammates are approaching. At the same time, she decides to keep one eye on the whatever video surveillance might be observing security posts. On the off chance that some guard tries to make a call out in response to events in the compound, she hopes to be prepared to block and/or deceive it. I will update this further once I get home and can reference my SR3 book for the needed operations. |
|
|
Nov 20 2003, 12:50 AM
Post
#287
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
In case anyone was curious, this is what I've deduced about the Host and its security sheaf so far:
Yamatetsu Research Host: * Orange-10 * A/C/I/F/S: .../14 - 15/11/11 - 13/... Sheaf: 4: ......... Probe-9. 8: ......... Scout-10. 11: ....... Tar Pit-8 13: ....... Blaster-8 Cheng's security tally currently sits at 13 (pending response regarding the success of my roll to locate the system controls for the outdoors pressure sensors), so we'll have to wait a bit to see what other nastiness Synner's got in store. :) As soon as I try to manipulate the various Slaves via the host, I'll get a better sense of what the Slave rating might be. The main difficulty I foresee is that, being foolish and shortsighted, Cheng didn't have a particularly good Spoof program loaded into her memory before setting off on this quest. A base Slave TN somewhere between 11 and 16, combined with the really wimpy Spoof-3 that Cheng's got, is going to make for some viciously difficult rolls. And this just goes to show how important it is to tailor your program load to the job at hand (while carrying backup utilities in your storage memory "sideboard" for potential surprises). |
|
|
Nov 20 2003, 10:08 AM
Post
#288
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Pretty good guess so far. I've had people tell me I've gone light on the IC but I've been comparing with some of the official Sheafs in Target:Matrix and they're not far off.
Matrix Overwatch Walkthrough Back to the host... Cheng's compass indicates the reference board for the pressure sensors which includes the simple toggle on/off switch for sections being actively patrolled. There are 4 sensors located on the team's planned approach route. The host rolls no successes in its Security Value roll against Cheng's analyze meaning she gets her way with the system. A moment's glance at the camera feeds reveals that the external ones are all mounted and panning across the manicured lawn. Additionally there are cameras on elevated poles at each corner of the compound's protective fence. Fortunately the system seems to be set up for only 9 camera feeds at any given time which means the system has a 10-second blind spot when certain feeds are not on the air, and then they switch. As always in such situations Cheng gets a chill, she is intimately aware that someone somewhere is looking at these feeds, looking right through her. As if she wasn't there... Only one security cam covers the guardhouse on the main driveway where two guards are camped out inside away drinking coffee and safely away from the freezing rain. A third guard patrols the driveway outside in a full body security armor and an smg hanging from a sling on his shoulder. Barrier and tire spikes are visible in the rain under the stark searchlights mounted on the roof of the guardhouse. Cheng's headware radio crackles somewhere else, "Pan to Jolly Roger, we're 2 minutes out and approaching the fence at position 1." |
|
|
Nov 20 2003, 07:12 PM
Post
#289
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
Two minutes is an eternity is the slowed time of cyberspace, but nevertheless having all the pieces in place beforehand will make the job much easier. The first thing to do, though, is check that the surveillance cameras on the path the outside runners hope to take is, and will be, clear of any roving security guards.
Next, she begins to set up video loops on the two exterior cameras nearest the runner's insertion point. (This presumes that they'll be going in directly between two of them, as per the plan the runner team discussed earlier. :D I only hope that the segment we checked is out of line-of-sight of the main guard shack?) That'll give them a broad corridor through which they might get past the exterior fence unobserved. Presumably, each camera has about a ten-second pan cycle, so to properly deceive any watcher she'll need to capture ten seconds of relatively anonymous video (that is, without any distinguishing characteristics like a bird flying through). Nighttime in the rain, though, should be fairly straightforward to counterfeit assuming she can gain control of the cameras. From there, things will likely progress quickly. She will need to disable any alarms on the exterior fence which might indicate a breach, as well as negate the current which normally would flow through it. That entails futzing with the feedback from it to show everything status quo. From there, the pressure sensors beneath the lawn will need to be be bollixed temporarily, then released back into the normal queue. At the same time, she'll need to temporarily loop the cameras inside the perimeter to show no signs of intrusion. Once the team reaches the target building for the run, Cheng knows she'll likely need to pick any maglocks that might block access. At the same time, paranoid employers tend to place security cameras just inside such doors to record any usage, so not only will she need to open the lock she will also find it necessary to block any record of the door opening and provide faked video of the door at that period of time. Continuing tasks will include the monitoring of interior surveillance to provide a heads-up of any potential security guard patrols; identification and bypass of any "trap" security measures like laser detection beams, pressure pads, or motion sensors; negation of security measures like knockout gas to be used against intruders (at least, unless she can turn such measures against the defenders); and so forth and so on. I'll update this post later with the operations and rolls required. |
|
|
Nov 20 2003, 07:21 PM
Post
#290
|
|
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
Don't get too far ahead in case something goes wrong... not saying that it will, just saying that it might.
Also note the plan calls for an intrusion from one of the lateral fences and breaking the external maglock on the lateral cargo bay access door. |
|
|
Nov 20 2003, 07:52 PM
Post
#291
|
|
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
Oh, I'm not actually DOING that yet... just laying out for myself and others the course that I hope the run will take.
|
|
|
Nov 20 2003, 10:28 PM
Post
#292
|
|
Moving Target Group: Members Posts: 413 Joined: 20-November 03 Member No.: 5,835 |
(Off Topic Slightly)
I'm curious -- how far ahead is Kurukami's character from a starting character?? She's got things that are way out of the league of anything I could afford -- which leads me to believe that a starting decker would have a slim chance in hell of completing this run. Also, Kurukami -- What is the programming option you are using on your attack utility? I think you mention "sneaky", but I don't see it in VR2. VR2 (Matrix 2.0 rules) lists a "Stealth" or "Skulk" option (which I think are the same thing - I need to check the Errata to be sure), but it adds to the program's effective rating -- which means that a rating 6 utility with stealth added is actually considered a rating 7+ utility (and only helps to reduce the tally count when you don't suppress a crashed IC -- and therefore is (IMO) both practically useless and almost offlimits to starting characters). Is there a list someplace of more of these program options? The add-to-detection-factor thing you mention seems like it's a wiz thing to have; but does it add to the program's effective rating? (Back on topic) Thank you both (and the original decker too) for this thread - it's helped me see some of the nuances of matrix running that I had not notiuced when I read the rules. (No dodge? Simple action attacks? ouch! Sounds like Body is almost useless, and DF/Evasion/Sensors seem to take precedence.) A question for Synner -- how far advanced should a decker be before he tackles a matrix-overwatch like mission? What sorts of runs should a starting character decker be able to do (even if they're a challenge)? Would Kurukami's decker have been able to avoid a lot of this IC and such if she'd been able to deck in earlier and plant a false set of authentication credentials (and therefore be a legit user this run)? How likely is it that would she have been able to make such a plant at an earlier date? All these questions make me realize that it's an extremely good idea for deckers to do legwork beforehand, and even mini-runs to plant such. It also seems like it's almost impossible to make a non-otaku decker who can do anything useful without taking the million nuyen. (ick, million, :( ) |
|
|
Nov 20 2003, 10:43 PM
Post
#293
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
you have 2 options, one is called stealth and are used on attack utils to make ice lesslikely to trigger nasty stuff on "death" whiel the sneak on is used for tils like analyze and this one adds to detection factor when the util is used.
oh and i think cheng is running a bit above what a starting char will be able to do as she is walking tru a pltg to get to her target and so on but she is not a ghost in the machine like fastjack or the smiling bandit :) matrix overwatch is a staple, it all depends on the target. a basic labsystem may run green-hard or orange-easy for a starter and be hooked straight to the matrix, thereby makeing the life of the decker easyer. he will just have to do some matrix legwork to locate it and when in will have to mess with the slaves (and maybe do a sweep of the files stored to look for some paydata if he feels lucky or crasy :vegm: ) and takeing the mill is a baseline for the decker, you will want hte most hot deck the GM allow you to start with and utils to fill it with, mutch the sameway a samurai will burn the mill on cyber and weapons... |
|
|
Nov 20 2003, 10:51 PM
Post
#294
|
|||||
Moving Target Group: Members Posts: 413 Joined: 20-November 03 Member No.: 5,835 |
What book has the Sneak option listed? I can't find it in VR2. =/
Dangit ... that pretty much kills my character. 650k == not enough. =( Time to hit the drawing board yet again. |
||||
|
|||||
Nov 20 2003, 11:25 PM
Post
#295
|
|||||||||||||||
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
Actually (as I glance at the sheet with her stats for this run on it), the stuff that she has isn't that far beyond the bounds of what would be acceptable for a starting decker. Let me quickly show what I've got listed on the sheet here:
Overall, I've basically been playing her as without significant amounts of karma. The original page which has her details on it is here, about halfway down, posted on August 28 2003. Stuff that's not listed among her basic cyberware includes a headware radio and a bunch of other stuff which wasn't really relevant (she's a rigger/decker, and yes, I bought the reflex deactivator thingy that allows you to turn implants like wired reflexes and VCRs off). She's got no skill above 6 with the exception of her Decking concentration of Computers (which, at 7, is reachable by any starting character who chooses to do the same). Her Computer is 6, which admittedly I bought up with Karma, but it hasn't really entered into this run since all we've handled is the Decking side. For Edges, she's got Cracker (Control) (costing 4 pts, and giving her a bonus die for all Control tests) and Bonus Attribute Point (Intelligence) (costing 2 pts).
The option I've got on one of my Attack programs -- the one represented by a big wheel-lock pistol, like one from old pirate movies -- is One-Shot. It increases the design size of a program considerably, but reduces the actual size down to one-quarter what it normally is. The option I wish I had is called Targetting -- it lowers your TN for attacks by 2. My Analyze and Browse programs both have Sneak-2 added as options. That means that, whenever I use them for an operation, my Detection Factor is increased by 2 for that activity. And I may be mistaken, but from what I recall reading in Matrix adding program options only affects the size in Mps -- not the price, the actual rating, or the availability. Thus, programs with options are as far as I know available to starting deckers, as long as their actual ratings don't exceed 6. Admittedly, Analyze with Sneak-2 is quite pricy, since with a size of 300 Mp (at the rating 6 costs) it'll run 60,000 :nuyen: , but Analyze is so widely used in systems operations it's damned useful. All of these options are listed in the Matrix book. Virtual Realities 2 is a bit obsolete. :)
The options are all listed in Matrix, under the chapter which I believe is titled "Programming Utilities". I'm pretty sure that WizKids has republished it recently; I saw a copy on my friendly local gaming store's shelves just a week or two ago.
Not useless, but some of the IC one encounters on a serious run can be incredibly dangerous. Additionally, when one runs in Masking mode, one has to decrease one Persona rating to compensate -- and lowering Bod while sneaking around made more sense than lowering Evasion or Sensors.
It is entirely possible that she'd be able to avoid a lot of difficulty by setting up a validated account earlier. However, attempting to do so on a Red or Orange Host with high Security Ratings can be insanely difficult. Additionally, it is far harder to hack out a security or superuser account than a basic user account -- as in +6 or so to the TN in order to make yourself a superuser. But that's the kind of access you'll need to properly pull off a good Matrix overwatch in many cases.
Yup, the million nuyen is pretty vital if you want a solid decker. Nonetheless, you can accomplish quite a bit with only a slightly jazzed MPCP-6 deck -- up the I/O and the active/storage memory and you have a useful IC-slicing tool, even though your MPCP won't be as impressive. But on the other hand, the book's MPCP-6 deck only runs 125,000 :nuyen: , while the MPCP-8 runs 400,000 :nuyen: . Synner had actually asked me to tone down some of the utilities I was using to the levels only available to starting deckers. Additionally, I've been playing Cheng with only the Karma Pool available to a starting PC -- I used my one point from there to reroll something midway through the expedition into the chokepoint, and ever since I've had some critical times where things went badly that might've been corrected with a reroll. |
||||||||||||||
|
|||||||||||||||
Nov 20 2003, 11:26 PM
Post
#296
|
|||||||||||||||
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
As she's laid out on page 5 of this thread Lady Cheng is basically a starting character using SR3 rules with (unstated) two assumptions: a) the Rating 6 cap at chargen does not apply to a deck's MPCP. b) Programs can be bought with Program Options (from the Matrix sb, page 82 and following) using the Option-modified Size to calculate price.
Thsio should explain some of the confusion above. We are using the rules from Shadowrun 3rd Edition and the SR3 decker sourcebook Matrix (note: not the fabulous Target: Matrix setting sourcebook). Several programs and their respective game mechanics have been revamped in 3rd Edition and the Matrix is easier to play in general, this run may seem to be taking a long time but it is mostly because we are explaining every test and discussing the interpretations of the rules. In truth Kurukami has only made about 10 System Operations so far (plus a couple of fast rounds of Cybercombat). The Matrix sb offers more Program Options (Mods) than the VR books because some of them now have slightly different effects and/or work on different program types. For instance Matrix has a Sneak Option for Operational Utilities and a Stealth Option for Offensive Utilities.
Aim to please. Note -Sine there's no "dodge" without Bod you are going to be dead really fast. Cheng took a bad wound in part because she is only using a Bod 3. However DF is really the single most important factor in this type of run. If you're going for a fast snatch and grab however you might opt for a brute force route but most deckers will max everything they can.
As I've said above Kurukami's character is essentially a starting character (as long as your GM approves those two precepts, and most of the ones I know will). As such I believe this would be a typical tough run perfectly within the reach of a starting character. At the start I'd avoid any system clocking in at Red-10 plus but that's about it.
Yes and no. We actually addressed this earlier in the thread. If you do a "recon" run and create a Legitimate User account (explained in SR3 p.226) using the Validate Account System Operation (unfortunately only detailed in Matrix p.102) you can avoid some trouble however you still gain Security Tally and you still trigger IC. Legitimate User accounts will normally only save you from Probe or Scout IC which shouldn't become active if you "show" them a legitimate account when they're initially triggered. After that the IC will come after you whether you're a legal user or not if you've done something you shouldn't (what this means exactly is detailed on page 38 of the Matrix which explains the different levels of Account Privileges and what they entail. In SR3 Legitimate or Intruding status will also affect the actual Target numbers in cybercombat so its always a good idea to plant a false account during a recon run if you can.
Yes, quite correct. Matrix and Target: Matrix go into this in quite some depth and provide numerous ideas for contacts and sources of info besides those in SR3 for the discerning decker. Getting any information on a target be it physical, astral or Matrix gives everyone involved an edge so legwork always pays. Deckers and Matrix-savvy runners have access to a wide variety of "online" sources as well as the regular databrokers and infomongers on the street.
It's tough but you can make a passable decker for 400k or alternatively you can use the Build Point system from SR Companion, or if your GM allows it the Sum-of-10 method or BECKS v2. |
||||||||||||||
|
|||||||||||||||
Nov 20 2003, 11:50 PM
Post
#297
|
|||||||
Moving Target Group: Members Posts: 413 Joined: 20-November 03 Member No.: 5,835 |
Thanks, guys =-D Last I had heard, the SR3 version of Matrix rules hadn't been published, I guess, and VR2 was the latest -- which means I was /wrong/. Now to go buy that book as soon as I possibly can, hehe!
The decking specialization sounds pretty useful, in this light. Did you find you had any troubles having only 5 as your base computer skill?
How useful is that? Does a -2 TN help more than having two less power? (I mean, 4D vs 6D -- about 3 times easier to resist, I think, compared to the -2 TN's effectiveness in getting you more successes, right?)
Synner -- I've been trying to use the points system with 650k; getting a /nice/ set of hardware (MPCP 6 limit tho :)) isn't all that hard, it's the utilities that kill me. *laughs* Well, that and I wanted a shop for doing cooking/coding tasks. I suspect that the reason I have trouble getting high rating utils is that it's just the tradeoff I'm making when I try to make 650k decker (most of my noncritical ones are 3's, 4's and 5's). I'm especially thankful for this example run (no, it doesn't seem too long, I LOVE the detail! VERY helpful) in that it showed me just how nasty tar pit can be. Especially with attack utils. Good reason to attack with a one-shot first, it seems. 8) I look forward to seeing how the rest of this pans out. |
||||||
|
|||||||
Nov 21 2003, 12:45 AM
Post
#298
|
|||||||||||||||
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
To some degree, that can be troublesome. For example, if you plan for your character to program a great deal of his or her own utilities (which can save thousands upon thousands of nuyen, and all you really need for it is downtime), then the lowered Computer rating is what you use. Unless, of course, you're like me, and you buy specializations in both Decking and Programming with Karma from the starting Computer rating. That's where having a mnemonic enhancer (from Man and Machine) comes in incredibly useful -- and particularly for all of the little knowledge skills that a programming decker absolutely needs to build utilities from scratch or upgrade ones that you have. The +1 to all Knowledge skills from having one at level 3 doesn't hurt a bit, either.
Actually, I think you misunderstand the details of the Targetting option. It only lowers the TN to strike an opposing icon; it doesn't lower the power. It does up the design size and actual size, but spirits know it can be worth it. For example, if you're on an Orange host (as Cheng is) and you have to fight something off, the difference in TN between a 3 and a 5 is tremendous.
Yup, a lot of min-maxing has to go into decker design -- figuring out how much things will cost, what kind of things you're more likely to use (my big list is Analyze, Browse, Deception, Spoof, Read/Write, and Decrypt -- all of those should be at 6), and so forth. Sleaze can often be bought at an odd number, since Detection Factor is figured from (Detection + Masking) / 2, rounding up.
Actually, that was pure chance. I went with that Attack first because it had D-level damage, not for any other reason. It could have just as easily gone the other way, and then I'd've been fighting off that spider-IC with a pair of one-shot Attack programs while evading furiously and waiting for my next round of "ammunition" to load through I/O. Another nasty trick, which I'm not sure would work but which might, would be to set Tar Pit to hit Deception. Potentially, it might hit a decker trying to enter the system, stripping out their Deception and screwing their ability to get in... but a nastier version would be to load it with high-rating Blaster or Sparky, wait for a decker to try to get out of the system, and devour his Deception utility. Then sit back and watch him panic as the other IC closes in for dinner. Of course, he could always just jack out. But that leaves one with Serious or Deadly Stun damage from dump shock... assuming it isn't Black IC. |
||||||||||||||
|
|||||||||||||||
Nov 21 2003, 03:00 PM
Post
#299
|
|||
Runner Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 |
The former isn't really practical - and in fact doesn't really work that way - because Tar is programmed to nail a certain type of Utility not a specific Utility. It would take out any Operational Utility you used on the SAN including Analyze! Furthermore it would mean placing the IC upfront before even Probe has had a chance to verify the Icon's legitimacy. The latter those is a very nasty trick and one I might be using in the future. |
||
|
|||
Nov 21 2003, 04:44 PM
Post
#300
|
|||
Moving Target Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 |
So, to accomplish this I need to perform an Edit Slave operation. That goes against the Slave subsystem, and uses the Spoof utility. At this point, it becomes clear that I didn't plan Cheng's utility load as well as I should have -- because the only Spoof she's carrying is a mere rating 3. Therefore, I'm rolling my seven Decking dice, plus what Hacking Pool I add in (three dice in this case) against a nastily high TN -- most likely an 8 or greater. One question, though -- are the perimeter cameras each an individual slave which I need to Edit? I roll to set up the (primary) camera(s) to loop a innocuous video image and get 10, 9, 5, 5, 4, 3, 3, 3, 2, 1. Hopefully that will be sufficient to garner two successes. Edit Slave is a monitored operation. That means that, assuming I've succeeded in my test, I need to spend a Free Action at the beginning of each and every Initiative Pass to maintain it. If I don't, the operation automatically aborts. (An alternative tactic that occurs to me now is to perform an Edit File operation to create the 10-second video loop datafile for the appropriate camera, and then Control Slave to have the security displays take their input not from the live camera feed but from the newly created datafile. However, Control Slave is also a monitored operation, so I'd gain nothing. On the other hand -- the security feeds might well be controlled by code. If I were to alter the file telling the feeds where to look for their input with another Edit File operation... hmm, that's an interesting possibility. Synner, what's your call on it?) |
||
|
|||
Lo-Fi Version | Time is now: 10th January 2025 - 01:18 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.