![]() |
![]() |
![]()
Post
#1
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 ![]() |
Spawned by the Matrix Walkthrough thread. It appears that a lot of people have enough problems with sorting the difficulties of creating a computer system that they often overlook other interesting aspects of the Hosts. What I'm proposing is that people post sample Hosts systems complete with iconography to help others in need. After all you might end up finding something you could use here. So let's see some contributions.
I'll kick this off with a couple of suggestions: System: Sea-Tac Public Information Host LTG#/Location: Sea-Tac#0001-2223 Ratings: Orange-8/9/15/9/15/9 Security Sheaf: 4 – Probe-9 7 – Trace-7 9 – Scout-10 12 – Tar Pit-9 16 – Trace-10 18 – Passive Alert 20 – Killer-8 23 – Equal Security Decker 26 – Blaster-8 29 - Ripper (Evasion)-6 31 – Active Alert 32 – Tar Pit-10 35 - Ripper (Bod)-7 38 - Blaster-9 42 - Construct-7 (Ripper (Evasion)-7, Killer-7) Suggested Iconography: Sea-Tac airport's own terminal interior used as a metaphor. Access – Security checkpoints at the entrance with chemsniffers and MADetectors. The security guard standing besides the arch is actually Probe and will be triggered only if you wrack up too much Security Tally getting here. Control – Are represented by a number of different things depending on what function of the subsystem you are trying to access. The most common form is the helpful Check In Desk and its female operators (the one that disappears round the back to "check something" will be a Trace). You 'write' out your instructions on the boarding pass you are issued at Access and hand it to the assistants to be processed. The result is then returned to you on the same boarding pass stamped approved or not approved (this then fades the next time you run a System Op). Index– The flight information screen terminals spread out across the main causeway are actually the Index sub-system access points. You can use these to cycle through most public information such as scheduled flight times, non-restricted passenger lists and weather forecasts. To locate or track higher security Files which aren't all-access oriented you will have to go to one of the Information Desks and ask for details instead (for things like passenger lists, cargo manifestos or delivery tracking data). Files – Each specific 'datastore' or Files subsystem on this Host represented by one of the waiting/boarding lounges. Each comfortable lounge chair is actually a file and the standard built-in user-friendly media center provided to waiting passengers is the interface. You sit in a chair to access a specific file. Most information on this host is low-security including low-security passenger lists, crew schedules, maintenance and non-secure housekeeping systems, flight schedules, cargo tracking information, promotional material, and low level administrative paperwork. The really good stuff will be on one of the higher security Hosts accessible from here – the Security Host and the Control Room (including a number of emergency and security subsystems and slaves) which continue the Airport metaphor. Slaves – Slaves here are very basic and visitor-oriented. They include controls for remote cameras at the real Sea-Tac which allows you to view some of the popular concourses and flights taking off and landing. Visitor assistance drones probably also have feeds here although the SK controlling them is probably in the Control Room Host. IC iconography – Generally pretty straight forward most IC here is meant to intimidate and so is visible (as airport security, maybe with dogs for Traces and Probes). The MCT GuardHound 3.4 Trace and Burn combo is pretty common. However, mostly the IC is designed to disable and trace the offender rather than permanently damage him. Regardless a few surprises are in store. For instance Tar Pits can be little old ladies that get in the way or irritating brats running around the concourse. SANS/Other systems links: There are a number of different system links, but the two important ones are a passage into the Security Host which is identifiable with the words Security Personnel Only and is watched over by a pair of burly sec-guard IC, it should be located in a hard to find corner of the causeway (requiring a System Op to track down). The other SAN is the access to the Control Room and is hidden behind one of the ubiquitous Information desks with the words Authorized Personnel Only stencilled on it. Complications : This isn't the main Sea-Tac Host, it's the public one. Some of the ACIFS ratings are high to dissuade mischievous deckers from tampering with public access information put out by the Airport. However, to get deeper into the Sea-Tac system without an onsite access point you have to go through here. Additionally there is quite a bit of info that is actually available here if you know where to look. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 17th May 2025 - 06:15 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.