Idiot's Guide to the Matrix 2.0 |
Idiot's Guide to the Matrix 2.0 |
Apr 6 2006, 12:21 AM
Post
#151
|
|||
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Hear hear! |
||
|
|||
Apr 6 2006, 03:40 PM
Post
#152
|
|||
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
here, have a pumpkin :pumpkin: watch out, its hot :grinbig: |
||
|
|||
Apr 6 2006, 03:45 PM
Post
#153
|
|||||
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
hobgoblin, at least he is not thinking gnobgoblin. eh? |
||||
|
|||||
Apr 6 2006, 04:24 PM
Post
#154
|
|||
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
actually, i generally see hobooblin when i look at it, befaist the g and the unlerline blend together. |
||
|
|||
Apr 6 2006, 09:35 PM
Post
#155
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Well since it seems like there's been little action for the last few hours and most seem to think, either by their above stated support or silence, that my interpretation is at least valid (though not necessarily correct :biggrin:) I'm going to stick to my guns.....
As stated in the last few paragraphs, Aku wants to offload an agent from his persona onto the chokepoint's node. In order to do this, it has been ruled that Aku needs to make a Hacking + Edit test vs. the System's Firewall + System. Aku, if you would please provide me with that roll? |
|
|
Apr 7 2006, 10:26 AM
Post
#156
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
very sleepy stil (dang pshycotic bird chirping to itself) so heres the roll
hacking(5)+edit(6)=11 dice, -1 for load, -1 for botched reality filter, again tossing 9 dice 1, 2, 2, 4, 5,5, 6, 6, 6, for 5 hits Dang, thats going to be hard to beat :) since i'm fairly confidant the serverwon't beat that i'll toss in a bit of ic for the ensueing interaction. As Battlecat finishes uploading ,and despite looking like a mech announces, "I AM Joe Wageslave." |
|
|
Apr 10 2006, 03:14 PM
Post
#157
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
bump
|
|
|
Apr 10 2006, 11:30 PM
Post
#158
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
ok, my turn to retro quote...
"Dash?" |
|
|
Apr 11 2006, 12:30 AM
Post
#159
|
|
Moving Target Group: Members Posts: 108 Joined: 12-March 06 From: TX Member No.: 8,363 |
these are my general thoughts on the SR4 rules, and so not to break up the flow with a long post, I am enclosing it all in a spoiler tag.
[ Spoiler ]
|
|
|
Apr 11 2006, 02:18 PM
Post
#160
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
<<< Sickness. I'll be back as soon as I can. Sorry for the delay. Oh, and weekends suck for me anyway but I should have posted this yesterday. Just couldn't work up the motivation to do much beyond watch movies and blow my nose. Damned, spring colds.
|
|
|
Apr 12 2006, 06:01 PM
Post
#161
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Okay, again sorry about the delay. After three days of cold medicine and movies on DVD, I'm feeling better so on with the tutorial:
By my reasoning above, if Aku -- who only hacked a user level account -- wants to offload an Agent from his commlink onto the node's hardware, he has to make a Hacking + Edit vs. System + Firewall test. He rolled above and got 5 hits, so I'll roll the Node's dice pool of 12 to combat: 1, 2, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6 And with only 4 hits to his 5, the Agent has been successfully offloaded on the Node. This reduces Aku's program count by 1, but if I remember correctly, this doesn't increase his matrix attributes because he's still running 9 or 10 other programs. However, this new program running on the node does cause problems for it. The Node's system and response are both 6, and it was running six programs but with this offloading, the node is now running 7 programs which will reduce the node's Response attribute by 1 from 6 to 5. This reduction in system resources could trigger an alert. Above, I argue that it would definatly cause an alert, but in this case we'll give Aku a chance to get away with things for the purposes of the tutorial. With a quick GM decision, I'll roll a System + Analyze (Response) test for the node. Thus, if the node's System can recognize that the Response has been reduced, it'll trigger an alert. Also, since the Response is what gets lowered in this process, if Aku wanted to continue to offload Agents to reduce the node's ratings further, then eventually the node will probably succeed. They system has been reduced to 5, which also caps the program rating at 5 so I'll roll 10 dice with a threshold of 5: 1, 2, 2, 3, 4, 4, 5, 5, 6, 6 With only 4 hits, the system doesn't quite detect the drop in resources and Aku is good to go with BattleCat running within the choke point. Since BattleCat's stealth roll was good enough to not be seen last time and hit hasn't actually made an action, yet, I won't have the agents roll to see the new icon since it's really just the same icon. Traffic seems light through the node as Aku takes a moment to observe his surroundings. As you watch, rats and insects seem to scuttle their way out of the darkness moving in one direction or the other along the tunnel. They pay no attention to you. You also notice that the root system that stretches down from above seems to be swaying slightly in an unknown and sourceless virtual breeze. |
|
|
Apr 13 2006, 01:32 AM
Post
#162
|
|
Running Target Group: Members Posts: 1,404 Joined: 23-February 04 From: Honolulu, HI Member No.: 6,099 |
That strikes me as a little odd though. If I understand correctly, by following that line of reasoning, the best way to defend a node is to load it up to the point it nearly degrades system performance, so if any new load comes in it pretty much triggers an alert?
In this case, Aku not only successfully snuck into the node, but successfully dropped an agent that wasn't noticed by the node, yet still could trigger an alert? Granted in this case, he succeeds because the system didn't make enough successes on noticing that its system resources dropped. |
|
|
Apr 13 2006, 02:20 PM
Post
#163
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Not the best way to defend a node, but certainly one way. The best way, is still probably a combination of IC and resource triggers. Or, just buy a hojillion registered fault sprites from your local, poor Technomancer and drop them into the node as they don't bother system resources.
This is a stopgap, temporary solution to oppose a hacker tactic of unloading X copies of an Agent on to a node's hardware with impunity, reducing the node's system and response to effectively one, thus limiting all programs run on the node (including IC) to a rating of one and, therefore, owning the system. Something like a sixth world DOS attack. However, if there's a chance that either (a) the system may not allow a low-account hacker to offload programs (as was the case in this scenario) or if (b) the resources are effected the system can detect that change, it may reduce (though, as evidenced, not eliminate) the chance that a hacker will perform this attack. |
|
|
Apr 14 2006, 08:32 PM
Post
#164
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
ok, im honestly, sort of lost? would i make another peeption check to examine this nebuleous root system, or am mi besting doen the wrong path?
|
|
|
Apr 14 2006, 09:53 PM
Post
#165
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Right now you're in the chokepoint node, which is represented in the metaphor of a endless, underground, spooky tunnel. To let you in on the iconography, the water plinking is a representation of the system's analyze program running, the root system is the icon of the attacking IC software, and the smaller, scuttling creatures moving along the floor are information passing through the chokepoint either into it from the rest of the matrix or from the node you have yet to discover on the other side of the chokepoint.
Due to a number of well rolled stealth actions and some lucky dice on your part, the chokepoint has not yet been alerted to your presence. As a result, you're now free to try and find the node that's on the other side of the chokepoint. On p. 217 under Matrix Perception Tests, it indicates that you can discover nodes using such a test. However, if the target is running the stealth program, this becomes an opposed test. I have yet to disclose information about the node-within-a-node so you have no idea whether or not it's running stealth. One thing you do know, out of character, is that the chokepoint is protecting the other node with a Data Bomb. So, back to your question, roll me a Matrix Perception Test to try and find the other node. If this fails, you'll have to perform more actions within this node, the chokepoint, to determine the location of that other node, but we'll cross that river when we come to it. Remember, for every net hit on the perception test, you get one piece of information. Thus, if you get more than one hit, you could end up detecting the node and its associated data bomb all in one action. In a "real" game, I wouldn't indicate anything about the Data Bomb unless the player specifically asked about it, but in this tutorial, it's better to explain my reasoning that leave things in the background, I feel. |
|
|
Apr 19 2006, 02:44 PM
Post
#166
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
sorry, been busy trying to keep my new job heh.
Dash, what would i need to do if i wanted to try and figure out where things were going to/coming from before actually trying to determine where the wired host is connected at? |
|
|
Apr 21 2006, 02:23 PM
Post
#167
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Intercept Traffic is probably your best bet. At that point, while the data is not that important to you, you will be able to determine where it's coming from and where it's going.
Hacking + Sniffer. The hits are my threshold to detect your interception if anyone rolls a matrix perception test. |
|
|
Apr 26 2006, 02:40 PM
Post
#168
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Bump? Aku, you want to tag someone else in if you're busy for the moment? I'm going to be going to be on vacation shortly and would like to see if we could finish this scenario before then.
|
|
|
Apr 26 2006, 03:08 PM
Post
#169
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
I was actually just digging for this :D not getting enough sleep sucks :( but lets get on it!
Hoping to find where packets go before i try to pinpoint find the actual node, i make my hacking(5) +sniffer(6) test for 11 dice, minus 1 for the botched filter and 1 for load still, so 9 dice, again. 1, 2, 2, 2, 3, 3, 4, 4, 6 ouch,. only 1 success |
|
|
Apr 27 2006, 03:02 PM
Post
#170
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Other than being a nasty GM, I can't at this time determine a reason that the host would re-attempt to perceive Aku's actions. He hasn't edited or deleted any of the information, only tapped it to see what it's all about, thus no actions have been made on the host which would make it suspicious ... yet. Aku's intercept action goes unchallenged at the moment.
On other hosts, especially hosts that provide almost no account privileges to Users, which is the level at which Aku hacked, an Intercept Traffic action could definitely result in a perception test to notice the intruder. Or, I could decide that since Intercept Traffic is a complex action, the host may run an Analyze test on itself every turn, which could follow this action. In either of these cases the Intercept Traffic test would be opposed by the system's Firewall + System test. But, in the interests of moving along, I'll forgo that at this time. Running your sniffer program seems to attract the rats, mice, spiders, and other vermin traveling through the tunnel to your shoes. As then run over them you can immediately tell that the information which the critters represent is encrypted. Thus, you can't tell that much about it specifically. However, what you can read from the traffic is a public key code representing it's point of origin and destination. Taking a moment to analyze the information, you notice that the point of origin is the same for all of the rodents while the destination for the insects match the origin for the rats. So what the hell does all of that mean? Basically it's fluff to fill in some details about the host and it's inner workings. All of the rodent icons are information leaving the secured node and heading into the matrix representing messages sent by the advertising company that Aku is assaulting. The insect icons are replies or other information coming in from the matrix at large, through the chokepoint, and then on into the secured, hidden node. That's why the insects' destination matches the rodents' origin. Remember that Aku's instructions were to get into the system and find as much paydata as he could. The information about who this advertising company is working with, i.e. who's sending data to them and who are they sending data to, could be worth some extra cash from Aku's employers. If, of course, Aku can decode the matrix addresses into real business names, of course. What's your next move, Aku? A Matrix Perception test will tell you more about the host and how to get into the node-within-a-node at this point. |
|
|
Apr 27 2006, 03:40 PM
Post
#171
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
Realizing, that, in all likelyhood, the insect packets will be on the other side of the node as well (as i would suspect that beyond this node is more of a router node)
Since a perception test is a computer test, my pool is actually slightly different, using computer (from the electronics group) 4+ analyze(6) for 10 dice, minus 1 for load, and 1 for the botched filter, leaving me 8 dice to roll. 2,3,3,5,5,5,6,6 for 5 total hits Fortunately, with that roll, i should learn all i need too, and then some, about this node. |
|
|
Apr 27 2006, 04:56 PM
Post
#172
|
|||
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
[Disclaimer: I teach computer science (specifically programming, networking, and security). However, your mileage may vary when applying modern "real world" concepts to your role-playing games.] A smart system would run Analyze on itself, I agree. I don't believe that doing it every turn would be useful, though; it would tie up the system. If I was GM, I'd make it maybe every minute or thirty seconds, given data transmission speeds in 2070. |
||
|
|||
Apr 28 2006, 01:21 PM
Post
#173
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
I tend to agree. Plus, every turn would probably end up being too draconian and no one would be able to get through. While that would be the intended purpose of such a system, it's also less fun for the game. I tend to choose fun over realism.
The five hits generated on Aku's perception test are more than enough to get him information about this node. More of what he learns can be found in the yellow text below. However, one of the things he was focused on was the location of the other node at the other end of this chokepoint. One thing he didn't know is that the other node is actually running a stealth program. Thus, his perception test is opposed for the purposes of discovering that node. That node has a Firewall of 6 and a Stealth Program rating of 5, so after that roll: 2, 2, 3, 3, 4, 4, 4, 4, 5, 5, 5 With only three hits on the stealth test, Aku not only gets good details about the chokepoint, he also gets to find that other node. The results of Aku's analysis of the node comes back a few moments after he runs the program. The node he's in is running 7 programs at the moment, one of which is a data bomb. Concentrating his efforts there to determine what the bomb is protecting, Aku successfully discovers the hidden node! As he find it, a door appears in the tunnel wall, wooden with a brass handle. There's a window in the door with vertical iron bars like a medieval prison. Now I'll let you in on the last dirty security trick that the host has. If that data bomb goes off it not only deals damage to the intruder, it'll also trigger an alert. Hope you have a good diffuse program, Aku :vegm: |
|
|
Apr 28 2006, 05:04 PM
Post
#174
|
|
Running, running, running Group: Dumpshocked Posts: 2,220 Joined: 18-October 04 From: North Carolina Member No.: 6,769 |
and indeed i do.
Recognizing the door, and the databomb attached to it i focus in on them, carefully inspecting the node to see how it is trapped, and atempting to seperate the trap from the entryway. rolling hacking(5)+defuse(6) gives me 11 dice, minus my 2 dice, again gives me 9 dice to roll: 1, 1, 2, 2, 3, 4, 4, 6, 6 for two successes edited for color |
|
|
Apr 28 2006, 06:19 PM
Post
#175
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
To oppose Aku's attempt at diffusing I'd roll the Data Bomb's rating x2. It's rating is 4. If I wanted to be really nasty this would be a moment to cash in 4 dice for 1 hit meaning that Aku would have zero net successes, the test would fail, the bomb would go off, and an alert would be triggered. However, let's not do that and I'll roll things fair and square to see what happens:
1, 1, 1, 1, 1, 1, 5, 5 Now that's really strange. Well, the Data Bomb got two hits, canceling Aku's, so the diffusing test fails. This means that, as per the the rules for Data Bombs on p. 226-7 of SR4, Aku takes 4 boxes of damage on his matrix condition monitor. However, because the data bomb glitched, no alert was triggered. 'Course, Aku technically doesn't know that unless he rolls another Perception test or if the IC start going nuts. Running his diffuse program on the trapped door, Aku reaches out to grip the brass handle of the door. Upon doing so the brass handle extends hidden spikes driving like thorns into the "flesh" of Aku's icon. Release a viral code into Aku's system, there is some static for a moment before the virtual world re-coalesces before our protagonist. The handle has returned to normal. Looks like the diffusing went a little south. |
|
|
Lo-Fi Version | Time is now: 9th January 2025 - 09:12 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.