![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 870 Joined: 2-October 06 From: Athens Ga Member No.: 9,517 ![]() |
I was just looking at cetiah's post of his hacking rules as a way of speeding up hacking and I thought I would say something about speeding up hacking.
I understand that the official position of Fanpro is that hacking occurs by proxy of personas because the matrix just moves that fast. I don't disagree with the thought that computers will move faster and faster but I don't like the consequences of the way they thought this out. Okay if they are saying that the persona is the one actually doing things because we are too slow then why not do that all the way? Make hacking a function of agents and not people. Then you can throw away all the matrix rules and have an agent roll. The rest occurs behind the scenes. > Well that wouldn't be fun and it would take away a character type. People who are interested in computers like to be able to deal with the matrix. But the matrix system doesn't reflect actual computers. If you know much about computers then you know that most of this doesn't make any sense. >But it could make sense in the future! SO your making a detailed computer system to please the people who are interested in computers by making one that doesn't make sense to people who know computers? ( See Lewis Black for an expression about this logic, the one with the confounded jowl shaking) I think that computers will be fast and are fast now but they still depend on people. They will be limited to what their computer is telling them. No one can stare at something at the rate these people are talking about. Making a perception test several times a second against all the traffic in a system for a normal 8 hour shift? Think about that for a second. You will end up will a drooling mess that can see anything anymore. It won't work. You are effectively increasing the time that they perceive by a factor of their initiative increase. So they are staring at something for effectively 24 hours! Even staring at the same area for more then a few minutes normal time will wear out a person. How is it going to feel with high resolution hyperactivity of the brain from all the input? So we go back to programs making the perception tests. The spyder only pays attention when the programs tell him something. That way the poor spyder doesn't fall unconscious with a few minutes of his shift starting. Now programs can make constant perception tests. Okay so for one why would the roll vary? They are artificial so they would notice the same amount of information all the time. So take it's average successes as a threshold. So we have eliminated the problem of multiple perception tests by the system. If you are going to do something that they might think is strange then you just have to beat a perception threshold with your stealth. We have sped things up alot so far! Now you don't have to worry about making perception tests for every second. More in a bit. |
|
|
![]() |
![]()
Post
#2
|
|||
Moving Target ![]() ![]() Group: Members Posts: 745 Joined: 2-January 07 From: Los Angeles, CA Member No.: 10,510 ![]() |
Serbiter, are you just arguing for the sake of it now? I know you want to defend your system, but this is rediculous. First you critique SR4 for not being realistic. Then you attack other interpretations to streamline custom rules for not taking into account your views on how hacking works. Then when someone tries to explain to you that your views in no way match how hacking rules, you say you don't care, and want to know how it works in SR4. There have been numerous attempts to explain it to you. I and others have tried. You just don't want to listen. An exploit allows you access to a system without a user account. That's how it works in SR4. A hacker doesn't have permission rights, but he can do stuff anyway. (My theory is that this is done through the kernel.) A hacker can attempt to get a user account, but this is +3 to his exploit test. Since a user account has basic permissions to many parts of a system and limited access to the operating system, he can do more from here. With +6 he has admin access which has even more permissions, but still not everything. You are not understanding it because you are sticking to this idea that there is no way to hack a system unless you have a user account that gives you permission rights. It's just not true. |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 13th August 2025 - 07:33 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.