IPB

Welcome Guest ( Log In | Register )

11 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> Idiot's Guide to the Matrix 2.0
Dashifen
post Mar 22 2006, 05:48 PM
Post #1


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Way back when, a number of us (I know Synner was involved and, if I remember correctly, Kagetenshi) worked on a thread called the Idiot's Guide to the Matrix. It was an SR3 themed thread aimed at a step by step explanation of a decking run. I got involved as the "player" while Synner was acting as a GM for the run. We didn't worry about any real-world stuff, just Matrix actions.

I'm judging from the amount of confusion about the Matrix 2.0 stuff in SR4, that such a thread would be of benefit to the forum members at large. Thus, I humbly throw my hat into the ring as a "GM" for this thread if someone else wants to act as a player. I suggest using either the Hacker or the Technomancer sample characters because that way we all have a common starting point. If we want to involve Rigging we can either start a new thread, or use the Drone Rigger, though I would add a few programs to that character myself.

I think the Technomancer provides us perhaps the best opportunity for exploration since the majority of actions performed by Technomancers are the same as those for Hackers (disregarding, for the moment, the semantic difference between programs and complex forms) but the Technomancer provides us all of the Resonance skills, Threading, and Sprites to examine.

As I see it there are a number of different scenarios that we could look at:
  1. Hacking a security node and performing a data steal.
  2. Hacking a commlink and searching for data on it.
  3. Hacking a security node and performing overwatch.
  4. Hacking someone's wireless equipment.
If we wanted to, we could also include the following:
  1. Operating a rigged security system.
  2. Intercepting and spoofing commands to a drone.
If you all have any others that we might want to examine, post away. And, if anyone wants to act as the "player" for this thread, volunteer away. For those that haven't seem the original Idiot's Guide to the Matrix thread, it was somewhat similar in structure to the DSF online games in Welcome to the Shadows in that included both descriptive text about the nature of the action taking place (in normal type face) and a description of the dice rolling and mechanical details (in orange). That trend seemed to be successful and helped to make the thread more interesting to read.

Any takers?
Go to the top of the page
 
+Quote Post
Aku
post Mar 22 2006, 05:56 PM
Post #2


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



I'll be the player, however, i would like to submit the character i made for a game instead. it would allow us to examine some of the "what-if's" as well in gear selection and what not. I can host it and post it in the top of the thread for all to see as well, so we all know what's where, but if you're inisistant on the archetype, thats fine as well.
Go to the top of the page
 
+Quote Post
Butterblume
post Mar 22 2006, 06:00 PM
Post #3


Running Target
***

Group: Members
Posts: 1,150
Joined: 19-December 05
From: Rhein-Ruhr Megaplex
Member No.: 8,081



First thing would probably posting the archetypes with errata worked in, and you can take it from there. Or we could use Aku :D.
Thumbs up for your project.
Go to the top of the page
 
+Quote Post
Magus
post Mar 22 2006, 06:05 PM
Post #4


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



Hey Dash, I have a Hacker you can use
Leigh O'Rourke
Human Female Hacker
B:3 A: 6 R: 4 S:2 C: 4 I: 5 L: 5 W: 3 Edge: 4
Init: 9 Matrix Init 9 Cold: 14 Hot: 15
IPs 2 /2/3
Codeslinger (Hacking) Aptitude Hacking Scorched Spirit Bane Addicted Mod/Hash
Cracking Group 4
Electronics Group 3
Firearmas 3
Etiquette 3
Dodge 3
First Aid 3
Pilot GC 2
Infiltration 2
Novatech navi Upgraded 5 Firewall 5 System
Fairlight Caliban Upgraded 5 response 5 signal
AR Gloves
Sim Module w/HS
Agent Hacking (Exploit/Spoof/Stealth/edit/browse Rating 4
Agent Track (Scan ECCM Decrypt Sniffer Rating 4
Agent Combat (Black Hammer Attack) Rating 3
Edit Rating 3
Track 3
Browse 3
Analyze 3
Encrypt 3
Scan 3
Medic 4
Armor 3
BioFeedBack Filter 3
Defuse 3
ECCM 3
Command 4
Attack 4
Decrypt 4
Exploit 4
Sniffer 4
Spoof 4
Sniffer 4
Go to the top of the page
 
+Quote Post
Kleaner
post Mar 22 2006, 06:06 PM
Post #5


Target
*

Group: Members
Posts: 66
Joined: 24-October 05
Member No.: 7,887



What a hacker does, and how he does it in the matrix are pretty clear from the rules, and have been well discussed on this board.

Some questions to talk about that I'd find helpful:

What isn't clear at all, is what do devices/systems do to detect hackers?

After a hacker hacks on the fly, does the system/device stop it's extended test once the hacker is in?

When does the system/device get a chance to detect the hacker? What kind of test is it?

What can a person in AR do to stop a hacker invading his comm link?

What does a "system" look like in AR? VR?

How do files work? Is there a directory tree that the hacker needs to go to first, or can he just do a data search +browse/scan once the hacker is in the system?

Why would a system NOT put data bombs/encryption on everything?

What is the difference between controlling a object (complex action) and issuing a command to an object(simple action)? For example when is a device (like a security camera) considered to be a device that needs to be controlled, and when is it considered to be something that you can just issue a command to?

p.s. basically I'm looking for information that a GM would find useful.
Go to the top of the page
 
+Quote Post
Synner
post Mar 22 2006, 06:07 PM
Post #6


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



The old IGTTM thread is still available here for reference. I still feel bad for not finishing that final run, but my workload has not let up. I'm hoping to develop something similar as a walkthrough for the official SR4 website in the future (you all know better than to ask dates) and meanwhile I think Dashifen's idea is perfect to help people out!
Go to the top of the page
 
+Quote Post
Guye Noir
post Mar 22 2006, 06:14 PM
Post #7


Target
*

Group: Members
Posts: 43
Joined: 1-March 06
From: NYC
Member No.: 8,325



I think I can answer a few of your questions kleaner.

In AR/VR, a system looks like whatever it's programmers want it too look like.

You wouldn't put encryption and databombs on everything for the same reason you don't put locks on ALL of the internal doors in your house: convenience. Imagine what would happen to the productivity of the average office if everyone needed to remember a different password to access each and every one one of their files. Now imagine that same office with databombs on all of those files, going off every time somebody got a password wrong 3 times.

I'd say the difference between commanding and controlling is in how much 'control' the user has. Issuing a command is like giving a command to a dog. You tell it to go do something, then wait while it goes and does it. Actually taking control of a device is literally taking direct control of that device and directly controlling all of it's actions yourself.
Go to the top of the page
 
+Quote Post
Azralon
post Mar 22 2006, 08:02 PM
Post #8


Shooting Target
****

Group: Members
Posts: 1,651
Joined: 23-September 05
From: Marietta, GA
Member No.: 7,773



I strongly endorse the existence of this thread.
Go to the top of the page
 
+Quote Post
Dissonance
post Mar 22 2006, 08:02 PM
Post #9


Moving Target
**

Group: Members
Posts: 515
Joined: 19-January 04
Member No.: 5,992



This looks like it'll be an interesting challenge. I think what you might want to do is actually make a nice mid-level character, who is focused in hacking, sure, but can do other stuff as well. Sure, your old-school decker could be a meat-wastoid, and your otakus to an even greater extent, but in this'n, you might want to explore secondary skills they'd want.

Like stealth. I'm not saying you'd have to do an entire run with a team of all hackers to explain, but it wouldn't be a bad-wrong idea to include the types of actions that hackers might have to do _prior_ to the actual hacking part, such as stealth and fast-talking. No rolls on those and so forth, but just Helpful Handy Suggestions.

I'd also suggest using things straight out of the box with minimal edges and flaws for your first dude, as well as using a real-boy off-the-shelf commlink.

Technomancers would also be worth exploring in the not-too-distant future, IMO. But right now? More Power To The Mundane.

I loved deckers in SR3. I just hardly ever had a chance to play them, because where I played, almost nobody knew the rules. I'd love to see the geeks get their day in the sun.

EDIT: Once this one is actually done? Or possibly once it gets to a point where it can _become_ done for whatever section you're working on? I'd strongly suggest putting a copy up in, like, Community with all the fat trimmed off and with any editorial changes needed. Go Team Hacker!

EDIT x 2: Man, it's getting to the point where we ought to get a new Dumpshock site that's still being updated with this kind of stuff. Don't we have some out there that haven't been updated since 2E?
Go to the top of the page
 
+Quote Post
Dashifen
post Mar 22 2006, 08:03 PM
Post #10


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



@Aku: post your character, we'll go with that for the moment. Which scenario do you want to tackle?

@Magus: wait in the wings, I'll jump to you for a different scenario when we get there and we can use this character.

@Synner: thanks for the linkification. I'm available when you want to finish the run, I'll just have to bone up on SR3 again :D

@Others:
If you look at the original IGTTM thread, there were questions interspersed throughout the major activity of the run. So don't worry about questioning or commenting on the system as we go along. Perhaps we'll use more color-coding to help distinguish the "meat" of the thread from the other questions. I propose yellow for the information about what Aku's character and my systems are doing and orange for the mechanics (die rolls, rules explanations, etc) within the thread. Then the normal typeface can be used for general questions or comments and we should all have a relatively easy-to-read thread. Until, of course, we forget about the conventions :D

Edit:
Also, since this thread stands to have a number of different questions from many different people, please do your best to indicate who asked each question when quoting (as I did with the post below this one).

This post has been edited by Dashifen: Mar 22 2006, 08:28 PM
Go to the top of the page
 
+Quote Post
Dashifen
post Mar 22 2006, 08:22 PM
Post #11


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Kleaner)
What isn't clear at all, is what do devices/systems do to detect hackers?


Firstly, the system gets a test to detect the intrusion when the character breaks in (see Breaking In, p. 221). After that, the text on p. 222 suggests the following: security hackers, patrolling IC, and glitches. Hackers and IC would have to be equipped with the Analyze program to watch for Stealthy icons. I particularly like using glitches to bring the attention of a hacker or IC onto the hacker while critical glitches trip an alert right away. Technically, as well, the host could be running the Analyze program itself, giving it not only the intrusion test(s), but the chance to notice the hacker's icon when they log in to the system, but this would be up to the GM's interpretation of the Analyze program's ability to perform rudimentary matrix perception tests without the interaction of a Pilot or Hacker.

QUOTE (Kleaner)
After a hacker hacks on the fly, does the system/device stop it's extended test once the hacker is in?


I run it as yes. The text in the book states "Each time you make a test to hack in, however, the target node also gets to make a free Analyze + Firewall (Stealth) Extended Test. If the node detects you--whether you hack in or not--an alert is triggered." I see the Extended Test as having an interval of the same length as the Extended Test to hack on the fly. Thus, for every interval of the hacker's extended test, the target node makes an Analyze + Firewall (Stealth) test, adding any hits to all previous hits like any other Extended Test. Thus, if the node beats the hacker's stealth before the Hacker beats the system's Firewall (plus any mods for security/admin access), an alert is triggered. However, since after breaking in the hacker will no longer be performing "a test to hack in" the system stops getting this free test and must rely on secondary detection methods like those above.

QUOTE (Kleaner)
When does the system/device get a chance to detect the hacker? What kind of test is it?


There is the intrusion test which depends on whether your hacking on the fly or probing the target. If hacking on the fly, it's an Analyze + Firewall (Stealth) extended test as explained above. If probing the target, it's a single Analyze + Firewall (Stealth) test when the intrusion is successful. After that the system/device may not get another test at all, unless the GM rules that the system's Analyze program can run rudimentary perception tests similar to a character's Analyze program as described in the last paragraph of p. 217.

QUOTE (Kleaner)
What can a person in AR do to stop a hacker invading his comm link?


Turn off the commlink, turn off the commlink's wireless capabilities, skinlink their commlink, engage the hacker in cybercombat, use agents (IC) to engage the hacker in cybercombat, shoot the hacker, have friends shoot the hacker, etc.

QUOTE (Kleaner)
How do files work? Is there a directory tree that the hacker needs to go to first, or can he just do a data search +browse/scan once the hacker is in the system?


That's up to the GM. I ran one system that had a seperate file storage device so that needed to be detected prior to the files being available to the hacker. Thus, there was a Perception test necessary to find the file storage device followed by a data search + browse extended test to find the file in question. However, there's no real need for that first perception test unless the GM is trying to pull a fast one.

I thought the other few questions you asked were nicely handled by Guye Noir.
Go to the top of the page
 
+Quote Post
Magus
post Mar 22 2006, 08:26 PM
Post #12


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



Spiffy Dashifen, always glad to help. Your last thread with Synner opened me up to Deckers in SR3.
Go to the top of the page
 
+Quote Post
Waltermandias
post Mar 22 2006, 08:39 PM
Post #13


Moving Target
**

Group: Members
Posts: 137
Joined: 21-February 06
From: Lenexa, Kansas (Yes Kansas, we ain't all hicks y'all.)
Member No.: 8,291



Yay! I can't wait to see this get done. My new character is a decent hacker and it would be great to have a clear guide as to how it all works. I am precisely the kind of Idiot this guide should be aimed at!
Go to the top of the page
 
+Quote Post
hobgoblin
post Mar 22 2006, 09:51 PM
Post #14


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



looking forward to see this thread in motion :)
i have even learned something from it. i had missed that the hack-on-the-fly detection test was a extended one. makes it much more nasty to do it the fast and noisy way :P

as for how stuff looks in ar. think of it somewhat like the desktop of today, only that stuff is floating in the air in front of you.

to find a specific node in the matrix, you fire up a program that search diffrent directory services (google, msn, yahoo and so on), other databases like dns and whois records, and maybe other sources to (i realy depends on how the program your using is designed).

ones found the node would probably appear as a "arrow", that when activated allows you to send commands to said host as if you where using it directly (kinda like how remote desktop is a window with the desktop of a remote system in it).

given how desktop search is a hot topic today, i belive that all content of the nodes are indexed into infinity. and if diffrent nodes are linked into a network they may allso share indexes.

so to locate a file you formulate the search terms and see what pops up. if you realy wanted to you could probably get a index dump that shows the diffrent metadata as folders and then you can look under each to check if it contains interesting files.

so in that way you get a directory "tree" but the system itself will probably be using a database as a filesystem and have some hardcoded search terms as "folders" on your AR hud (music, video, pictures, simsense, latest modified files, programs and maybe others). you can probably allso create your own permanent searches...

going VR and things turn into something that should be very similar to the good old days...
Go to the top of the page
 
+Quote Post
Dissonance
post Mar 22 2006, 09:57 PM
Post #15


Moving Target
**

Group: Members
Posts: 515
Joined: 19-January 04
Member No.: 5,992



I kind of figured that AR mode works a lot like it does in, say, Ghost in the Shell, or at least the S.A.C that they're playing on television nowadays. You have your regular reality, but also the capability to open up real-time windows in your perception and so-forth, whereas, yeah, VR mode goes back to the SR3 days.

Which makes sense, really. When you're at home and aren't going anywhere, I'd rather use VR mode from the comfort of my coma-chair and so-forth.

And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in realtime.
Go to the top of the page
 
+Quote Post
Azralon
post Mar 22 2006, 10:02 PM
Post #16


Shooting Target
****

Group: Members
Posts: 1,651
Joined: 23-September 05
From: Marietta, GA
Member No.: 7,773



QUOTE (Dissonance)
And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in realtime.

An Analyze (interpret sensor feeds) + Edit (create/update map) agent would do the trick.
Go to the top of the page
 
+Quote Post
hobgoblin
post Mar 22 2006, 10:04 PM
Post #17


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



hacked cameras, all team comlinkes subscribed, some creative ARO work?
hell if i know but i would give the hacker a complex action to update the map...

a lot of people have interpeted it as being something similar ot the battletac stuff, as it basicly does the same job. if some we may see it appear in arsenal or unwired.

you will notice that there is stuff in the SR4 fluff that there are no rules for (like say a ghoul character iirc)...
Go to the top of the page
 
+Quote Post
Dashifen
post Mar 22 2006, 10:12 PM
Post #18


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Dissonance)
And speaking of the ARO stuff, I'm thinking back to the introductory cola wars run: How the heck could you do what the hacker did in there, what with the map overlay? As a runner, I'd find that _incredibly_ useful, knowing where hostiles were in real time.

Well, if I were going to do that the first thing would be an extended Data Search + Scan test to locate the RFID transmissions in the building. As a GM, I would assume that the RFID information that would be transmitted by the tags would indicate whether the tag is on an employee or, say, a wall hanging or fluorescent light bulb. The threshold on that test would be high and would depend on the size of the area being searched. If the player wanted to limit the information to, say, just people in motion, I'd lower the threshold because the Scan program could quickly remove certain data from the overall system. The interval would be based on the Search Table (p. 220) so since you're searching one network for data, it'd be 1 combat turn.

Now to present the overlay, you could have gotten the floorplan from some form of public archive prior to the run. Perhaps you had someone fast talk their way into the building to scope out the hallways and what not. I long for the days of the old orientation system cyberware. If that one comes back, then you could be making the floorplan on the fly based on what that cyberware is able to produce. Without a pre-run map available, I'd probably allow another Data Search + Browse test with a hard threshold within the network to try and find any maps that the system maintains -- perhaps for fire alarms or even for internal employee tracking. If the hacker can find such a map at this time, then it's a simple matter of putting the little dots from the RFID's in the first search on top of the overlay from the second and viola! you have an overlay showing the location of anyone not in the party.

Course this relies on the fact that the employees have embedded chips, that there isn't signal dampening technology in effect somewhere (producing empty sections of the map) etc. Thus, it's going to change from host to host. The availability of such an overlay would probably be best determined prior to the run during legwork, I'd say.
Go to the top of the page
 
+Quote Post
Aku
post Mar 22 2006, 11:28 PM
Post #19


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



CODE
Character Name:  Aku
Profession:  Hacker/jack of many trades

Build Points Max: 400
Build Points Used: 400

Nuyen:
Build points spent on Nuyen(50)
Nuyen: 250000

Race:
Race:Dwarf
Build points spent on Race (25)
Race Notes:
Dwarf: Natural Thermographic Vision and +2 dice for Body tests to resist pathogens and toxins

Contacts:
Build Points spent on Contacts (17)
Contact # 0 Loyalty: 4  Connection Rtg: 5
Contact # 1 Loyalty: 6  Connection Rtg: 2
Contact # 2 Loyalty: 0  Connection Rtg: 0
Contact # 3 Loyalty: 0  Connection Rtg: 0
Contact # 4 Loyalty: 0  Connection Rtg: 0

Attributes:  
Build points spent on Attributes (160)
Attributes: (min/current/max)
Agility 1 / 3 / 6
Body 2 / 3 / 7
Reaction 1 / 3 / 5
Strength 3 / 4 / 8
Charisma 1 / 2 / 6
Intuition 1 / 3 / 6
Logic 1 / 5 / 6
Willpower 2 / 5 / 7
Essence 1 / 6 / 6
Magic 0 / 0 / 6
Resonance 0 / 0 / 6
Edge 1 / 1 / 6

Derived Attributes:
Initiative   6
Memory   10
Composure   7
Judge Intentions   5
Lift/Carry   7

Walking Rate (m/turn): 8
Running Rate (m/turn): 20
Swim Rate (m/turn):  4
Lift w/out test (kg/lbs): 40/88
Overhead Lift w/out test (kg/lbs): 20/44

Condition Monitors:
Physical Track: 11
Stun Track: 10

Active SKILLS:
Build points spent on Active Skills:(148)
Hacking (Log)  RANK 5
Group: Electronics (Log) RANK 4
Pistols (Agi)  RANK 3 Specialization:  Semi-Automatics
Perception (Int)  RANK 4
Cybercombat (Log)  RANK 5 Specialization:  by Specific Opponents(IC)
Electronic Warfare (Log)  RANK 4
Group: Athletics (Str) RANK 2

Knowledge SKILLS:
Build points spent on Knowledge Skills:(0)
academic Computer Hardware Interfaces RANK:4
professional Security Procedures RANK:2
interests Games Matrix Games RANK:3
interests Sports Football RANK:4 Specialization: Pittsburgh Steelers
academic Matrix Theory Technomancers RANK:6

Native Language:  (free)
English Specialization: Cityspeak





Gear is too ugly to copy from the excel spreadsheat, so i'll add that as a clicky in a moment as soon as i get hosted. One minor rule the GM allowed was he let me code and build my own software and commlink. as this is an idiots guide, i dont think the costs of such things really matter, but i'm letting everyone know of that now. i think that's the difference though, and im not sure if it's a "difference" he was just liberal in the amount of time that was usable prior to game start time.


geargear

Not that it matters, but the history for the character went something like this:


My past is mostly a mystery to me. All i know is what Jenny Heathrow (contact 1 6/4 the only true friend thats stuck with me through the rest of this story) and Ken Redbull Mcduff (fixer 4/5) Have told me.

Apparently, my mind works on a 15 year cycle. Every 15 years on my half-birthday, i've dropped into a coma, only to wake up 6 months later, on my birthday. No clue as to who i am.

I know how to do and use everything i did before, but none of the people. At First, im told, i had alot of people behind me, helping me. But as this became a recurring problem, they slowly dwindled away, until there were two. I am now 8 years into my cycle. Hopefully, this time, i'll know what th frag is going on, before i get to 15 and ahalf years.
Go to the top of the page
 
+Quote Post
Waltermandias
post Mar 23 2006, 12:00 AM
Post #20


Moving Target
**

Group: Members
Posts: 137
Joined: 21-February 06
From: Lenexa, Kansas (Yes Kansas, we ain't all hicks y'all.)
Member No.: 8,291



John Barnes fan? That is a very cool book.
Go to the top of the page
 
+Quote Post
Cain
post Mar 23 2006, 12:50 AM
Post #21


Grand Master of Run-Fu
*********

Group: Dumpshocked
Posts: 6,840
Joined: 26-February 02
From: Tir Tairngire
Member No.: 178



QUOTE
Why would a system NOT put data bombs/encryption on everything?

Because Data Bombs are programs, and too many programs will lower your Response/System. If a typical commlink is like a typical PC, only with unlimited memory, even the average user could have hundreds of files. You wouldn't even be able to get close to securing all of them before you crashed your OS.

Let's assume that Zurich-Orbital, the super-nasty holy grail of the Shadowrun matrix, has an even 10 in all stats. It handles millions of transactions per day, and has multiple accounts for each and every megacorp on the planet. Even with this supersystem, if it tried to Data Bomb only 100 of the trillions of accounts it has, it'd come crashing down. And that assumes that Z-O would have no IC running at all!
Go to the top of the page
 
+Quote Post
Aku
post Mar 23 2006, 12:51 AM
Post #22


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



QUOTE (Waltermandias)
John Barnes fan? That is a very cool book.

who was this directed at?
Go to the top of the page
 
+Quote Post
Jaid
post Mar 23 2006, 01:09 AM
Post #23


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



i have a couple of questions...

can you hack a technomancer?

if so, what happens when you do?
Go to the top of the page
 
+Quote Post
Kleaner
post Mar 23 2006, 01:15 AM
Post #24


Target
*

Group: Members
Posts: 66
Joined: 24-October 05
Member No.: 7,887



head explodes! haha...

well, it seems that if you hack them you can crash them giving them dumpshock, but since they don't store any files in the head, you'd have to get any paydata from comlinks subscribed to their noggin.
Go to the top of the page
 
+Quote Post
Jaid
post Mar 23 2006, 01:19 AM
Post #25


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



ok. i'll put some more specific questions...

can you use command on the technomancer?

can you create an account on the technomancer?

can you edit their memory?

can you unsubscribe them from things (for example, drones)?

can you make them go into VR? can you make them go out of VR?

just curious for opinions =P don't think these are really explained in the rules at present =P
Go to the top of the page
 
+Quote Post

11 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th March 2024 - 05:43 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.