Agents and Cybercombat?, Do they die? |
Agents and Cybercombat?, Do they die? |
Oct 20 2005, 01:17 PM
Post
#1
|
|
Moving Target Group: Members Posts: 600 Joined: 31-August 05 Member No.: 7,659 |
If I'm just Joe Shadowrunner and want to make it difficult for people to hack into my computer and really want to kill them for doing it what do I have to do? I'd basically need to get an agent right? Since to not have an agent means I get my measely 1 initiative pass per round to defeat any "enemy" hackers right?
Also, if you hack the encryption of an agent program can you make multiple copies and send them into battle the same time? If one "dies" can you just reload it? |
|
|
Oct 20 2005, 01:37 PM
Post
#2
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
dont know what you mean exactly with defending with 1 ini pass
rest: yes and yes |
|
|
Oct 20 2005, 01:41 PM
Post
#3
|
|
Moving Target Group: Members Posts: 600 Joined: 31-August 05 Member No.: 7,659 |
I just mean IC is a program you use right? It has no value unless you or an agent are using it.
|
|
|
Oct 20 2005, 02:46 PM
Post
#4
|
|
Moving Target Group: Members Posts: 934 Joined: 26-August 05 From: Earth - Europe - AGS - Norddeutscher Bund - Hannover Member No.: 7,624 |
No. IC is an agent used for node-defense. The agent is loaded with different utilities which it uses to interfere with intruders.
|
|
|
Oct 20 2005, 04:09 PM
Post
#5
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
you're correct, Lord Ben. if you want to give your computer automatic defenses, you need to have an agent or a frame loaded with combat programs patrolling your computer. that way, you (or rather, your computer) will get multiple init passes with which to fight off intruders.
|
|
|
Oct 20 2005, 09:18 PM
Post
#6
|
|
Great Dragon Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
no, IC can be loaded anytime your firewall detects an intruder.
certainly, it might make sense to have an agent always on, and continuously checking for intruders, but there is no reason IC won't work on it's own. |
|
|
Oct 21 2005, 12:27 AM
Post
#7
|
|
Target Group: Members Posts: 10 Joined: 4-October 05 From: Secret Underground Space Station Laboratory In Space Member No.: 7,809 |
IC, in 3+1 easy steps:
1) Aquire Agent program. At chargen, this means that you'll be looking at a Rating 4 Agent, for 10 000 :nuyen: 2) Aquire some or all of the following utilities:
3) Instruct your Firewall program to launch copies of your Agent with designated utility payloads if it detects a hacking attempt. Since you have the program, rules as written allow you to launch as many copies of the Agent as you like, each with different payloads. For example, you may launch an Agent carrying Attack and Armor to distract and attack, while another Agent carrying Stealth and Track gets a lock. Just don't launch so many that your node slows down. 4) Congratulations. You are now the proud owner of Nice IC, for a cost of roughly 30 000-40 000 :nuyen: ! |
|
|
Oct 21 2005, 12:48 PM
Post
#8
|
|
Moving Target Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 |
Do IC/Agents launched to by your Firewall count towards the program limit you as the user of the commlink have? Meaning if you are running a System 5 commlink with four active programs and your Firewall detects an intruder and launches 2 IC... does your Response drop? I would think so, but just checking for clarity.
|
|
|
Oct 21 2005, 01:04 PM
Post
#9
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
It does - therefore the reference that Nodes are careful not to run too much IC.
|
|
|
Oct 21 2005, 01:20 PM
Post
#10
|
|
Moving Target Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 |
Ok, so a hacker would probably want to tune their Firewall to not launch IC if it would drop their Response.
Thanks. :) |
|
|
Oct 21 2005, 02:10 PM
Post
#11
|
|
Decker on the Threshold Group: Dumpshocked Posts: 2,922 Joined: 14-March 04 Member No.: 6,156 |
Well, at least not while they were actually using the Commlink for something important, like hacking. If it was just idle or something they'd probably have it run exactly enough IC to max out and team-kill the intruder. :)
|
|
|
Oct 21 2005, 02:50 PM
Post
#12
|
|
Moving Target Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 |
Maybe command it to launch enough IC to leave 1 free program slot open. Then the hacker can at least do one thing even if he's coming on the scene late without impacting his system.
|
|
|
Oct 21 2005, 02:56 PM
Post
#13
|
|
Decker on the Threshold Group: Dumpshocked Posts: 2,922 Joined: 14-March 04 Member No.: 6,156 |
Yes, but which? Stealth so you won't get smacked the moment you log in, or Attack so you can actually do something?
Nah; if it's your own commlink getting hacked your only real option is to log in using another commlink, and leave the comprimised one to running IC. |
|
|
Lo-Fi Version | Time is now: 18th April 2024 - 10:54 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.