Dec 17 2006, 05:13 AM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
Hey all, I am currently creating a Drone Rigger for my local group. Like everyone else I am eagerly looking forward to Arsenal. Hoping that it clarifies a few things on upgrading Drones. ie Sensors. I have a couple of questions I cannot find answers for using Dumpshock's search function.
My main Combat Buddy is a Steel Lynx named the SSR (Stainless Steel Rat). His stats are stock: (Handling: 0 Accel: 15/40 Spd: 120 Pilot: 3 Body: 4 Armor: 9 Sensor: 3) AutoSofts: Defense R3 Targeting (HW) R3 Maneuver R4 Clearsight R4 Electronic Warfare R3 Weapon: ArmTech MGL-12 (HE Grenades) with Internal Smart Link Sensors: Camera (LowLite, Flare Comp, Therm UltraSound Vision Enhancement R3 Vision Mag) Motion Sensor, Microphone (Audio Enhancement R3 Spatial Recog) Radio Signal Scanner R6 My questions Can I upload an OS with a System rating and Firewall to add extra defense in being Hacked. This is a device/node and is vulnerable to hacking attempts. I have the programs ECCM and Databomb on my comlink as well as Encrypt and Command. I have this drone subscribed to me so that means that in order to Hack it I think you have to hack my comlink. Or do you? If not, can I load an OS to run an agent loaded with ECCM (For Counter Jamming with Electronic Warfare AutoSoft) DataBomb loaded somewhere to trap an unwary Hacker, behind a Firewall? Thanks |
|
|
|
Magus Drones, Drones, Drones, Dec 17 2006, 05:13 AM
The Jopp You can upgrade Response and Firewall - System is ... Dec 17 2006, 05:42 AM
Magus So I can currently upgrade the software. The price... Dec 17 2006, 05:48 AM
Lovesmasher I'm playing a non-rigging hacker, but I carry ... Dec 17 2006, 06:21 AM
Konsaki QUOTE (The Jopp) Encryption (Device)
Databomb (Dev... Dec 17 2006, 06:25 AM
Magus So where would you place the data bomb? What param... Dec 17 2006, 06:37 AM
The Jopp QUOTE (Konsaki) QUOTE (The Jopp @ Dec 17 2006... Dec 17 2006, 06:49 AM
Konsaki I think you are confused on what a Databomb is. A ... Dec 17 2006, 06:53 AM
ShadowDragon8685 Yeah - a data bomb isen't an actual pellet of ... Dec 17 2006, 07:32 AM
starkebn As a GM I prefer that secondary, player set up ... Dec 17 2006, 10:13 AM
Serbitar Very well spoken starkebn. Dec 17 2006, 12:52 PM
ShadowDragon8685 Starkebn: No. But it can tell that the authorizati... Dec 17 2006, 10:11 PM
starkebn I would imagine that spoofing commands to the dron... Dec 18 2006, 02:13 AM
kigmatzomat I might allow that but it would require significan... Dec 18 2006, 02:24 AM
Magus So basically for game balance per the general cons... Dec 18 2006, 04:29 AM
Konsaki Also, remember that the pilot is an OS and cant us... Dec 18 2006, 04:40 AM
Rotbart van Dainig QUOTE (Konsaki)Also, remember that the pilot is an... Dec 18 2006, 09:20 AM
Rotbart van Dainig QUOTE (Magus) What ever happened to the old electr... Dec 18 2006, 09:21 AM
ShadowDragon8685 QUOTE (starkebn) I would imagine that spoofing com... Dec 18 2006, 01:35 PM
Konsaki I could see physical mask or the physical illusion... Dec 18 2006, 01:53 PM
ShadowDragon8685 QUOTE (Konsaki) I could see physical mask or the p... Dec 18 2006, 06:10 PM
starkebn QUOTE (ShadowDragon8685) QUOTE (starkebn @ De... Dec 19 2006, 12:51 PM
Oracle Professional experience with RL computer security ... Dec 19 2006, 01:01 PM
Konsaki QUOTE (ShadowDragon8685) QUOTE (Konsaki @ Dec... Dec 19 2006, 01:07 PM
Lovesmasher Exploit goes around all security measures. That... Dec 19 2006, 04:34 PM
ShadowDragon8685 QUOTE (Lovesmasher) Exploit goes around all securi... Dec 19 2006, 05:20 PM
Faelan I don't think anyone is saying that hardwired ... Dec 19 2006, 08:30 PM
KarmaInferno You should be able to encode basic actions with wo... Dec 19 2006, 08:53 PM
Konsaki Of course if the 'Attack my target' comman... Dec 19 2006, 09:02 PM
Kesslan Personally I'd just limit hard coding to tell ... Dec 20 2006, 04:52 AM
Lovesmasher QUOTE (ShadowDragon8685) QUOTE (Lovesmasher ... Dec 20 2006, 06:19 AM
Lovesmasher QUOTE (KarmaInferno) You should be able to encode ... Dec 20 2006, 06:21 AM
ShadowDragon8685 I'm not talking about hardwared commands.
The... Dec 20 2006, 07:17 AM
Kesslan With a system like that I'd probably think its... Dec 20 2006, 09:11 AM
ShadowDragon8685 That's why you get the highest rated autosoft ... Dec 20 2006, 03:46 PM
WearzManySkins QUOTE (Rotbart van Dainig) QUOTE (Magus @ Dec... Aug 10 2007, 12:03 AM
Rotbart van Dainig ..and that being the case, you have no issue with ... Aug 10 2007, 12:15 AM
WearzManySkins QUOTE (Rotbart van Dainig @ Aug 9 2007, 07:15... Aug 10 2007, 12:32 AM
Rotbart van Dainig QUOTE (WearzManySkins)Hello Impressed, I am Depres... Aug 10 2007, 12:35 AM
neko128 QUOTE (ShadowDragon8685) I'm not talking about... Aug 10 2007, 02:17 AM
WeaverMount QUOTE ...Hacking means finding ways around securit... Aug 10 2007, 02:43 AM
klinktastic If the rigger has an elaborate set up of failsafes... Aug 10 2007, 03:33 AM
Tarantula QUOTE (ShadowDragon8685)If you're paranoid abo... Aug 12 2007, 04:47 PM![]() ![]() |
|
Lo-Fi Version | Time is now: 15th November 2025 - 12:43 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.