IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Agents and Cybercombat?, Do they die?
Lord Ben
post Oct 20 2005, 01:17 PM
Post #1


Moving Target
**

Group: Members
Posts: 600
Joined: 31-August 05
Member No.: 7,659



If I'm just Joe Shadowrunner and want to make it difficult for people to hack into my computer and really want to kill them for doing it what do I have to do? I'd basically need to get an agent right? Since to not have an agent means I get my measely 1 initiative pass per round to defeat any "enemy" hackers right?

Also, if you hack the encryption of an agent program can you make multiple copies and send them into battle the same time?

If one "dies" can you just reload it?
Go to the top of the page
 
+Quote Post
Serbitar
post Oct 20 2005, 01:37 PM
Post #2


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



dont know what you mean exactly with defending with 1 ini pass
rest:
yes and yes
Go to the top of the page
 
+Quote Post
Lord Ben
post Oct 20 2005, 01:41 PM
Post #3


Moving Target
**

Group: Members
Posts: 600
Joined: 31-August 05
Member No.: 7,659



I just mean IC is a program you use right? It has no value unless you or an agent are using it.
Go to the top of the page
 
+Quote Post
Oracle
post Oct 20 2005, 02:46 PM
Post #4


Moving Target
**

Group: Members
Posts: 934
Joined: 26-August 05
From: Earth - Europe - AGS - Norddeutscher Bund - Hannover
Member No.: 7,624



No. IC is an agent used for node-defense. The agent is loaded with different utilities which it uses to interfere with intruders.
Go to the top of the page
 
+Quote Post
mfb
post Oct 20 2005, 04:09 PM
Post #5


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



you're correct, Lord Ben. if you want to give your computer automatic defenses, you need to have an agent or a frame loaded with combat programs patrolling your computer. that way, you (or rather, your computer) will get multiple init passes with which to fight off intruders.
Go to the top of the page
 
+Quote Post
Jaid
post Oct 20 2005, 09:18 PM
Post #6


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



no, IC can be loaded anytime your firewall detects an intruder.

certainly, it might make sense to have an agent always on, and continuously checking for intruders, but there is no reason IC won't work on it's own.
Go to the top of the page
 
+Quote Post
Beowurk
post Oct 21 2005, 12:27 AM
Post #7


Target
*

Group: Members
Posts: 10
Joined: 4-October 05
From: Secret Underground Space Station Laboratory In Space
Member No.: 7,809



IC, in 3+1 easy steps:

1) Aquire Agent program. At chargen, this means that you'll be looking at a Rating 4 Agent, for 10 000 :nuyen:

2) Aquire some or all of the following utilities:
  • Analyse (to detect hacking attempts - the rules as written don't require this to be loaded into an agent, just running on the node)
  • Attack
  • Armor
  • Black Hammer/Blackout (for Fun With Black IC)
  • Stealth (to help the IC evade cybercombat attacks)
  • Track (if you want to trace that sonuvabeech and deal with them later)
Remember that the rating of the agent is limited by the Response of the node it runs on, and any programs it carries are limited by the Rating of the agent.

3) Instruct your Firewall program to launch copies of your Agent with designated utility payloads if it detects a hacking attempt. Since you have the program, rules as written allow you to launch as many copies of the Agent as you like, each with different payloads. For example, you may launch an Agent carrying Attack and Armor to distract and attack, while another Agent carrying Stealth and Track gets a lock.
Just don't launch so many that your node slows down.

4) Congratulations. You are now the proud owner of Nice IC, for a cost of roughly 30 000-40 000 :nuyen: !
Go to the top of the page
 
+Quote Post
Vector
post Oct 21 2005, 12:48 PM
Post #8


Moving Target
**

Group: Members
Posts: 112
Joined: 26-February 02
Member No.: 1,896



Do IC/Agents launched to by your Firewall count towards the program limit you as the user of the commlink have? Meaning if you are running a System 5 commlink with four active programs and your Firewall detects an intruder and launches 2 IC... does your Response drop? I would think so, but just checking for clarity.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Oct 21 2005, 01:04 PM
Post #9


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



It does - therefore the reference that Nodes are careful not to run too much IC.
Go to the top of the page
 
+Quote Post
Vector
post Oct 21 2005, 01:20 PM
Post #10


Moving Target
**

Group: Members
Posts: 112
Joined: 26-February 02
Member No.: 1,896



Ok, so a hacker would probably want to tune their Firewall to not launch IC if it would drop their Response.

Thanks. :)
Go to the top of the page
 
+Quote Post
Eyeless Blond
post Oct 21 2005, 02:10 PM
Post #11


Decker on the Threshold
******

Group: Dumpshocked
Posts: 2,922
Joined: 14-March 04
Member No.: 6,156



Well, at least not while they were actually using the Commlink for something important, like hacking. If it was just idle or something they'd probably have it run exactly enough IC to max out and team-kill the intruder. :)
Go to the top of the page
 
+Quote Post
Vector
post Oct 21 2005, 02:50 PM
Post #12


Moving Target
**

Group: Members
Posts: 112
Joined: 26-February 02
Member No.: 1,896



Maybe command it to launch enough IC to leave 1 free program slot open. Then the hacker can at least do one thing even if he's coming on the scene late without impacting his system.
Go to the top of the page
 
+Quote Post
Eyeless Blond
post Oct 21 2005, 02:56 PM
Post #13


Decker on the Threshold
******

Group: Dumpshocked
Posts: 2,922
Joined: 14-March 04
Member No.: 6,156



Yes, but which? Stealth so you won't get smacked the moment you log in, or Attack so you can actually do something?

Nah; if it's your own commlink getting hacked your only real option is to log in using another commlink, and leave the comprimised one to running IC.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 18th April 2024 - 10:54 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.