![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 352 Joined: 10-August 10 From: Madison, WI Member No.: 18,916 ![]() |
Hey Guys,
I was re-reading the core Matrix rules and I thought it was curious that they don't list standard matrix node security. Can somebody give me a node breakdown for a normal node and a vehicle node? What programs should they be running? What actions can they take? What should their security response be? Can they send multiple security programs after an intruder? Does it make more sense to use 1 large toolbox IC program running everything or a bunch of smaller agents running minimal programs? |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 4th August 2025 - 08:25 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.