IPB

Welcome Guest ( Log In | Register )

> more questions about the matrix
makari
post Mar 7 2010, 03:10 AM
Post #1


Target
*

Group: Members
Posts: 61
Joined: 4-March 10
Member No.: 18,242



I keep having little questions and for some I find answers pretty quickly but i figured I'd start this post to help me get some input and clarification on these things.

1. if I spoof a command for a drone to slave itself to my commlink instead of it's current node... and it works, he is now slaved to my commlink, does this mean that he now recognized my personal commlink admin account as his master? or would I still need to spoof commands or hack an account in order to control him? also, when the drone switches to be slaved to my commlink what happens from the security riggers point of view? does the drone just dissappear from his network so that he would need to scan for the signal and start from scratch to get that drone back?

2. can spoofed commands be given a timer? so you could spoof a series of drones to all slave themselves to your commlink in 20 seconds giving you time to issue the orders to all your targets and then setup a jammer so that all the drones switch to your control and then a jammer goes off hopefully killing the security riggers connection? if you give a spoofed command a 20 second timer, is there a reasonable chance that security personel might notice the spoofed command before it goes off? or would it not register as anything unusual until after it went off?

3. If I have hacked into a node and want to checkout what forms of protection is has and how they are configured how would I do this? a simple matrix perception test? at what level? my main goal would probably be to find out if there is an active security hacker or rigger, and if so where he is physically and what programs he has available... so how would I go about that without setting any alarms off?

4. for run assistance, lets say a stereotypical warehouse break in, lets say there's a spider with a network of security camera's, door controls, and various freight drones and maybe 1-2 surveilance or combat drones. so we're planning the run and I'm the hacker going to clear the way for the party... is it possible to hack in, make an account, and then do things like loop camera's, open and close doors, have a drone load our cargo for us... without the spider noticing? I dont see how but I'm curious.. and if I'm right and it's not really feasable(sp?) then what's my best option for taking out the spider, or atleast taking control long enough to do the run?

Thanks for your input, you guys are really helping me understand the whole matrix section much better

I'll be adding more questions as they come up
Go to the top of the page
 
+Quote Post

Posts in this topic
- makari   more questions about the matrix   Mar 7 2010, 03:10 AM
- - SleepIncarnate   1. I don't think you can spoof a slave command...   Mar 7 2010, 03:26 AM
- - makari   spoofing a slave command is an example given in un...   Mar 7 2010, 04:03 AM
|- - Kumo   QUOTE (makari @ Mar 7 2010, 06:03 AM) spo...   Mar 7 2010, 04:26 PM
- - Faraday   While we're at it, I've been having some t...   Mar 7 2010, 04:11 AM
|- - Tymeaus Jalynsfein   QUOTE (Faraday @ Mar 6 2010, 09:11 PM) Wh...   Mar 7 2010, 04:26 AM
|- - Faraday   QUOTE (Tymeaus Jalynsfein @ Mar 6 2010, 08...   Mar 7 2010, 04:34 AM
|- - Tymeaus Jalynsfein   QUOTE (Faraday @ Mar 6 2010, 09:34 PM) Aw...   Mar 7 2010, 03:31 PM
|- - Faraday   QUOTE (Tymeaus Jalynsfein @ Mar 7 2010, 07...   Mar 7 2010, 06:39 PM
|- - Fatum   QUOTE (Tymeaus Jalynsfein @ Mar 7 2010, 06...   Mar 8 2010, 12:29 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 7 2010, 05:29 PM) The ...   Mar 8 2010, 02:55 AM
|- - Fatum   QUOTE (Tymeaus Jalynsfein @ Mar 8 2010, 05...   Mar 8 2010, 04:54 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 7 2010, 09:54 PM) Actu...   Mar 9 2010, 02:14 AM
|- - Fatum   QUOTE (Tymeaus Jalynsfein @ Mar 9 2010, 05...   Mar 11 2010, 12:30 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 10 2010, 05:30 PM) Bec...   Mar 11 2010, 02:10 AM
- - makari   that's really what my question is... can the...   Mar 7 2010, 05:56 PM
- - makari   how would putting data bombs into these odd locati...   Mar 8 2010, 01:29 AM
|- - Faraday   QUOTE (makari @ Mar 7 2010, 05:29 PM) how...   Mar 8 2010, 04:44 AM
- - makari   also, is there a situation where a hacker would be...   Mar 8 2010, 01:58 AM
- - makari   there was an example somewhere (can't remember...   Mar 8 2010, 02:46 AM
|- - Tymeaus Jalynsfein   QUOTE (makari @ Mar 7 2010, 07:46 PM) the...   Mar 9 2010, 02:17 AM
- - SleepIncarnate   That's assuming it's rating 5, a starter d...   Mar 8 2010, 04:50 AM
|- - Faraday   QUOTE (SleepIncarnate @ Mar 7 2010, 08:50...   Mar 8 2010, 05:37 AM
- - makari   how about my question about the use of a nexus? ...   Mar 8 2010, 12:18 PM
|- - Tymeaus Jalynsfein   QUOTE (makari @ Mar 8 2010, 05:18 AM) how...   Mar 9 2010, 02:11 AM
- - makari   ahha thanks for pointing out that that type of enc...   Mar 9 2010, 03:30 AM
- - makari   although thinking from current real life situation...   Mar 9 2010, 03:33 AM
|- - Tymeaus Jalynsfein   QUOTE (makari @ Mar 8 2010, 08:33 PM) alt...   Mar 9 2010, 03:51 AM
- - Faraday   Of note, data bombs can also be used offensively. ...   Mar 9 2010, 08:02 AM
|- - rumanchu   QUOTE (Faraday @ Mar 9 2010, 12:02 AM) Of...   Mar 9 2010, 08:19 AM
|- - Faraday   QUOTE (rumanchu @ Mar 9 2010, 12:19 AM) A...   Mar 9 2010, 08:29 AM
- - Fatum   I direct you to the FAQ again. A data bomb only co...   Mar 11 2010, 03:02 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 10 2010, 08:02 PM) I d...   Mar 11 2010, 04:40 AM
- - Fatum   How does the way programs are run has changed sinc...   Mar 11 2010, 10:30 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 11 2010, 03:30 AM) How...   Mar 12 2010, 02:37 AM
- - Fatum   FAQ.   Mar 12 2010, 02:41 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 11 2010, 07:41 PM) FAQ...   Mar 12 2010, 02:45 AM
- - Fatum   It's still an official document written by the...   Mar 12 2010, 05:50 AM
- - Saint Sithney   It could easily be a process on standby. Code wai...   Mar 12 2010, 06:38 AM
|- - Tymeaus Jalynsfein   QUOTE (Saint Sithney @ Mar 11 2010, 11:38...   Mar 13 2010, 12:41 AM
|- - Fatum   QUOTE (Tymeaus Jalynsfein @ Mar 13 2010, 03...   Mar 13 2010, 11:45 AM
|- - Tymeaus Jalynsfein   QUOTE (Fatum @ Mar 13 2010, 04:45 AM) The...   Mar 13 2010, 04:35 PM
- - makari   having no specific book ruling or example to site ...   Mar 13 2010, 03:12 AM
- - Ascalaphus   There should be some consistency to it. Singularit...   Mar 13 2010, 05:29 PM
- - Tymeaus Jalynsfein   QUOTE (Ascalaphus @ Mar 13 2010, 10:29 AM...   Mar 13 2010, 05:32 PM


Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th January 2025 - 06:51 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.