IPB

Welcome Guest ( Log In | Register )

> Description of an ICE characteristic and behaviour :, How did it translate in game term ?
IKerensky
post Jul 9 2010, 09:05 AM
Post #1


Moving Target
**

Group: Members
Posts: 303
Joined: 26-May 10
Member No.: 18,622



Here is the idea for an ICE I have :

Stealthy ICE that Analyse every persona in his node.
If the ICE detect a not-allowed persona it will track it back to his origins node.
When in the persona node he will launch an Agent in the node then go back home.
The Agent is Stealthy and Selfreplicating.
Agent script :
- If it dont replicate yet, replicate.
- Analyse the node to see if it is crypted by his own device, if not then Encrypt the node with a Databomb that would explode if not provided by the Agent password.
- Analyse the decryption program to see if it exist or is not encrypted yet, if so Encrypt the program with a Databomb that would explode if not provided by the Agent password.
- Analyse all the programs to see if they are encrypted, if not encrypt them with Databomb.
- Do the same for the files.
- Check for any Agent/Persona unknown presence, if so track and infiltrate them. Go back to start of list.
- If nothing left to do check for any master/slave connection in the node and access the master/slave. Go back to start of list.

How did it translate in game terms ?

More specific question :

1- Is the hacker automatically aware of the lowering of Response on his commlink.
2- Can you really Encrypt a Decrypt program ?
3- Can you run another copy of the program ?
4- Can you Encrypt loaded but not running program ?
5- Can a program/files/node be crypted by different users/programs ?
6- Is it too strong ?
7- What would happen if you Encrypt a Node while a persona is originating from it ?
Go to the top of the page
 
+Quote Post

Posts in this topic
- IKerensky   Description of an ICE characteristic and behaviour :   Jul 9 2010, 09:05 AM
- - CeeJay   Well, there are a couple of problems I see with th...   Jul 9 2010, 01:33 PM
|- - Udoshi   QUOTE (CeeJay @ Jul 9 2010, 07:33 AM) At ...   Jul 9 2010, 07:26 PM
- - hobgoblin   actually, given that the hacker being traced alrea...   Jul 9 2010, 03:06 PM
- - MikeKozar   I'm working on integrating the Matrix into my ...   Jul 9 2010, 03:33 PM
|- - Saint Sithney   QUOTE (MikeKozar @ Jul 9 2010, 07:33 AM) ...   Jul 10 2010, 03:35 AM
- - hobgoblin   hehe, trace and burn, from back when software coul...   Jul 9 2010, 05:05 PM
- - Wasabi   QUOTE (IKerensky @ Jul 9 2010, 04:05 AM) ...   Jul 9 2010, 05:41 PM
|- - hobgoblin   QUOTE (Wasabi @ Jul 9 2010, 07:41 PM) 3. ...   Jul 9 2010, 06:28 PM
- - Wasabi   "Copy Protection prohibits the program from b...   Jul 9 2010, 07:20 PM
|- - hobgoblin   QUOTE (Wasabi @ Jul 9 2010, 09:20 PM) ...   Jul 9 2010, 07:52 PM
|- - Wasabi   QUOTE (hobgoblin @ Jul 9 2010, 02:52 PM) ...   Jul 10 2010, 02:21 AM
|- - hobgoblin   QUOTE (Wasabi @ Jul 10 2010, 04:21 AM) Fo...   Jul 10 2010, 04:44 AM
- - Wasabi   And where's it say its legal to load multiple ...   Jul 10 2010, 05:38 AM
|- - hobgoblin   QUOTE (Wasabi @ Jul 10 2010, 07:38 AM) An...   Jul 10 2010, 02:25 PM
|- - Tymeaus Jalynsfein   QUOTE (Wasabi @ Jul 9 2010, 11:38 PM) And...   Jul 10 2010, 03:06 PM
- - Wasabi   Ah, I see now... good call fella's, thanks...   Jul 11 2010, 06:57 AM
- - IKerensky   Ok. But lets say the ICe Encrypt the Hacker Decry...   Jul 12 2010, 06:34 AM
- - hobgoblin   i dont know if a comlink can be encrypted in that ...   Jul 12 2010, 12:27 PM


Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 22nd April 2026 - 06:28 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.