IPB

Welcome Guest ( Log In | Register )

11 Pages V  « < 6 7 8 9 10 > »   
Reply to this topicStart new topic
> Idiot's Guide to the Matrix 2.0
Jaid
post Apr 28 2006, 10:01 PM
Post #176


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



defusing. you defuse a bomb to make it not go off.

diffusing is where something is spread out through something else, like when you take food color and drip some into water it starts to diffuse :D
Go to the top of the page
 
+Quote Post
Monnock
post Apr 29 2006, 04:05 AM
Post #177


Target
*

Group: Members
Posts: 56
Joined: 26-April 06
Member No.: 8,500



Earlier in the thread there was a question about technomancers and being able to be hacked. I skimmed over the other post but saw no resolution so I figured that I would chime in:

QUOTE
Technomancers have no form of organic storage memory whatsoever, so if they want to download a file, they need to mentally transfer it to a physical storage device (Page 233 SR4)


You can't hack something that you can't get into I wouldn't think. Kind of like how you can't send IC or an Agent into a file, they have to access/manipulate it within the system as it has no 'space' to fit inside of.

As for if they function as a node or not, I believe the simple answer to that would be no. Technomancers work on a deeper level in the matrix than programs. For example, their ability to use threading/complex forms to directly manipulate data in a way that a programmer must do manually. Another interesting quote on this is:

QUOTE
These new technomancers had a sixth sense about them that surpassed the abilities of the previous otaku. In accordance with their affinity for the technological world, technomancers have an instinctive awareness of the fluxuations of data around them. (. . .) technomancers can "feel" the wireless data traffic flowing through the airwaves around them (Page 232 SR4)


This tends to make the techomancer similar to how the astral plane is with magi, where the Matrix that non-otaku use is like the material world that we live on, while the otaku accessing the Matrix exist only on the 'astral plane of the Matrix' until they manifest themselves. Unlike the astral plane, however, a technomancer in the astral Matrix can not percieve anything in the normal Matrix other than getting a general idea of the flow of information.

Considering how the Deep Resonance is pervasive in all parts of the Matrix, and it is through communication/attunement to this resonance (hence the attribute and the submersion) that technomancers are able to manipulate it, I believe that it would be safe to say that when a technomancer re-boots, they simply appear in the Matrix where they 'are.' Because of the wirelessness of the matrix, they simply pop into existence in the Matrix right where they are standing on the world.

Obviously from my previous statement, this doesn't boot them into whatever node they happen to be standing near, but rather... well, it is rather abstract. They exist in a 'higher state' of being within that area of the Matrix, and they must 'lower' themselves to enter into the node that they may be standing inside of.

I hope this wasn't redundant. I find the enigma that is the technomancer very intriguing myself and have much longer theories on them than I'm sure most would care to have to read :P

Ah ha, and I just solved the infinate loop thing with a quote!

QUOTE
A system run on a device with a lower Responce rating functions at the Responce rating (Page 213 SR 4)


Note that the rating of a device is a fixed number. The only way to change the actual rating of the device is to make a physical change to the device itself. When it says:

QUOTE
(. . .) your Responce is reduced by (. . .) (Page 212 SR 4)


It never says that the rating is reduced, just the raw Responce number itself.
Go to the top of the page
 
+Quote Post
Ranneko
post Apr 29 2006, 02:03 PM
Post #178


Moving Target
**

Group: Members
Posts: 349
Joined: 16-January 05
Member No.: 6,984



QUOTE (Monnock)

QUOTE
Technomancers have no form of organic storage memory whatsoever, so if they want to download a file, they need to mentally transfer it to a physical storage device (Page 233 SR4)


You can't hack something that you can't get into I wouldn't think. Kind of like how you can't send IC or an Agent into a file, they have to access/manipulate it within the system as it has no 'space' to fit inside of.

Ah but you have your permanent storage (like say a hard drive, or a data chip) and your temporary storage.

When you hack into a system, you are hardly uploading yourself or that program to them. (Except when you are uploading an Agent to them). Your persona is being run from your commlink, your agents typically are being run from your commlink. Not running on the system you are hacking into.

Besides, I think that disallowing hacking into techno's seems a bit silly, as it makes their PANs completely secure, without the drawbacks that others need to cope with for similar security (ie no wireless access)
Go to the top of the page
 
+Quote Post
Dashifen
post Apr 29 2006, 06:36 PM
Post #179


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Jaid @ Apr 28 2006, 05:01 PM)
defusing. you defuse a bomb to make it not go off.

diffusing is where something is spread out through something else, like when you take food color and drip some into water it starts to diffuse :D

Meh. I'm American ... English isn't my strong suit :D :D

Edit: Sad but true ....... :eek:
Go to the top of the page
 
+Quote Post
Monnock
post Apr 29 2006, 06:39 PM
Post #180


Target
*

Group: Members
Posts: 56
Joined: 26-April 06
Member No.: 8,500



QUOTE
Your persona is being run from your commlink (. . .)


I seem to recall reading somewhere that technomancers many times don't even carry commlinks. I can't find the page or the quote, so I copped out and just looked at the sample technomancer. Note that she doesn't have a commlink.

Your persona is being run from yourself. The only time that any sort of hardware is associated with you is when you subscribe to it, which in that case would allow a hacker to attack any hardware you are subscribing to. Because there is no reason for a technomancer to subscribe to something for a long period of time, however, this is mostly useless.

QUOTE
Besides, I think that disallowing hacking into techno's seems a bit silly


What are you going to do, hack into their brain? That's what Black IC is for. I was a bit unclear before about what I meant by hacking into them. There is nothing stopping you from accessing their PAN, however most of the time they wont be connected to any hardware except yours. If they have agents they can just subscribe to a data-storage center, upload them, then un-subscribe.
Go to the top of the page
 
+Quote Post
Dashifen
post Apr 29 2006, 06:41 PM
Post #181


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



You may be correct on the commlink, but a TM does need offline storage as their brain isn't capable of recording digital information, only reading it. Granted, they could have memory built into their clothing if they want to.
Go to the top of the page
 
+Quote Post
Monnock
post Apr 29 2006, 06:44 PM
Post #182


Target
*

Group: Members
Posts: 56
Joined: 26-April 06
Member No.: 8,500



Dashifen: I just said they don't have permenant storage in the post that Ranneko was refutting! That has nothing to do with my point that most of the time you can't hack a technomancer. I was just pointing out that their living persona is not run through a commlink as he suggested.
Go to the top of the page
 
+Quote Post
Dashifen
post Apr 29 2006, 07:13 PM
Post #183


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Gotcha. Either way, I'd disagree. You can hack a technomancer whenever you are within signal range. Granted, once you do so, there may not be anything to find when you do so if they don't have some form of personal storage and/or devices subscribed to their node.

I don't see there being a matrix astral plane, as you described above, into which TMs manifest. Instead, I see them as a permanent fixture of the matrix. They cannot disconnect, nor would the want to. For all intents and purposes, they are a commlink that lives and breathes. 'Course YMMV.
Go to the top of the page
 
+Quote Post
Dissonance
post Apr 29 2006, 08:11 PM
Post #184


Moving Target
**

Group: Members
Posts: 515
Joined: 19-January 04
Member No.: 5,992



Y'know how Lucille Ball claimed that she got secret Russian transmissions through her fillings?

I figure that Techies kind of work like that, to some degree. In that they manage to tap into already existing thingers through bizarre happenstance.
Go to the top of the page
 
+Quote Post
Aku
post Apr 30 2006, 12:16 AM
Post #185


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



am i looking at the same -2 dice for "trying again" the the defuse as normal?
Go to the top of the page
 
+Quote Post
Voran
post Apr 30 2006, 10:11 AM
Post #186


Running Target
***

Group: Members
Posts: 1,404
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



QUOTE (Aku)
am i looking at the same -2 dice for "trying again" the the defuse as normal?

In this case since it glitched, would it be correct to say that it did it's damage but failed to send up an alert. Then since its been triggered, the databomb program itself crashes/poofs?

I'm wondering too, would the crashing of a databomb program itself be an action that would cause the system to take notice? I'm all for fun, so I'm inclined to say that the glitch was a combination of the bomb didn't squeal, and the system didn't notice.

I'm trying to think of a real world equivalent to my comp, since I've only got a layperson's experience with it I'm going to say something like when one of my progs on XP goes 'not responding' but I don't notice that unless I actually try to access that particular program (my wordfile whatever) or I open up my task manager. The only other time I'd notice something going 'not responding' is if its like one of my media players that was currently playing then suddenly cut out, or started repeating...
Go to the top of the page
 
+Quote Post
Aku
post Apr 30 2006, 11:57 AM
Post #187


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



Hmm, thats not something i thought of, that the bomb isnt there anymore to hurt me :D. Typically, if the bomb was on a file, it would generally be set to destroy that copy of the info as well, but since this was guarding a node, i dont think it would've been prudent...


And on that thought, i'm gonna /facepalm myself. Hindsight tells me that, since packets are going in, they much have the correct encryption for the bomb, i could've intecerepted one of them and attempted to get the key that way, correct?
Go to the top of the page
 
+Quote Post
Dashifen
post May 1 2006, 02:01 PM
Post #188


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE ("SR4. p 227 under Data Bomb")
Once triggered, the Data Bomb program crashes.


No, you don't need to defuse again as the bomb has now crashed. As for getting the key from the traffic, I hadn't thought of that. I would have allowed it probably just for the creativity of the concept and then subsequently changed all data bombs into Agents running Analyze and Data Bomb so that I could combat that technique in the future :vegm:

Go to the top of the page
 
+Quote Post
Aku
post May 3 2006, 02:39 PM
Post #189


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



My next action would be to obviously hack into the new node. unLike last time, i'm going to probe the target to be safe (giving the node only 1 chance to detect me, as opposed to 1 for every attempt), I'm also going to go for admin level access adding 6(!) to the threshold i'm using hacking+exploit with a threshold of firewall+system+6.


However, i'm not sure what modifiers would apply. I would assume that my load out -1 does, however, since i'm working onto a new node, i dont think my botched reality filter would, Dash, what are your thoughts?
Go to the top of the page
 
+Quote Post
Dashifen
post May 3 2006, 02:45 PM
Post #190


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



I would feel that your botched reality filter does count because you're still in the node in which you botched the test. Don't forget the matrix damage modifiers from the 4 damage you took as a result of the bomb. 'Course, if you have the Medic program you could try to fix that up.
Go to the top of the page
 
+Quote Post
Aku
post May 3 2006, 02:57 PM
Post #191


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



ofcourse i forgot about the damage, and ofcourse i have the medic program!

so thats a computer(5)+meidc(6) minus the usual 2 dice, for a usual total of 9 dice.
1, 1, 3, 3, 3,
3, 5, 5, 5

For 3 hits, healing 3 boxes, taking me down to 1 total point of damage, and thus no modifier.

since i dont know if this node is using the same stats as the node i'm on, i'm going to make some rolls and assume that it is, meaning that my threshold is 16(!)

1,2,2,2,3,3,4,4,5
2,3,3,4,5,5,6,6,6
1,2,2,3,3,4,6,6,6
2,3,4,4,5,6,6,6,6
1,1,2,4,4,5,5,6,6
SUCCESS!
18 hits in 5 intervals.


That means that i've probably just put my team in a SERIOUS amount of danger, as the interval time on this is 1 hour(!) but for my safety i think it was worth it.
Go to the top of the page
 
+Quote Post
Hasimir
post May 3 2006, 09:19 PM
Post #192


Target
*

Group: Members
Posts: 34
Joined: 3-May 06
Member No.: 8,522



As my first presence in the DumpForums I'm jumping into this VERY interesting discussion...adding my 2 nuyens ;)
Obviously what I express is just my personal interpretation of the rules ^_^

____________________________________________________________

1) Noob question...
What is the "RAW" manual you often quote?
Is it the pdf version of the SR4 book, or something else?
And speaking of it...how can I know if my version the pdf-book is up to date?

____________________________________________________________

2) About the overload "degeneration spiral"...
The SR4 book is very thorough in repeating (endlessy and quite annoingly) every thing that has to be considered or not considered in terms of rules and effects.
As previously noted the book describes the Response and System featurs talking about their ratings...but when it comes to the overload effect it only refers to a reduction of "Response".

This leads me to read it as follows:
- Programs are capped by the System _rating_
- System _rating_ is capped by the Response _rating_
- overloading will decrease the Response, not its _rating_

Reading it backwars we notice that the Response we use is deacreased, making us slower, but its _rating_ is safe and sound ...
If the Response _rating_ is ok then the System is ok too and the Program's quality is also safe.

Tagline: the effect of overload is a modifier to triX initiative and "agility", much like carrying too many objects around will generate an "encumberance" modifier to meatbox initiative.
Period.

____________________________________________________________

3) About the current run...
I'll do a general recap of the run, adding some personal thoughts and comments on the info we got so far:

- Aku managed to get INSIDE the corp building to do the hacking
- as soon as he jacked-in he found himself in front of an high-security node...the only access to the network


This is odd...wage slaves that work from legal terminals into the building should be already INTO the network, past the harsh defenses layed down to prevent EXTERNAL intrusion...so that you just need to get user-status into the terminal.
This is almost the only good reason to physically break into the building!

But this company runs valuable affairs and therefoe is paranoid, requiring ANY matrix operation to be verified through the choking node before it is granted access to the more internal work-areas.
Fine with this :)

So Aku gets to the job and exploits himself a nice user-level access.
-> Aku (Hacking+Exploit) vs Node (Firewall)
-> Node (Analyze+Firewall) vs Aku (Stealth)


At that point he IS safe to operate...the problem is that the 3 agents are not in a passive mode, awaiting suspicious activity to wake them; they are constantly ACTIVE and scanning ALL traffic.
So even if Aku seems a legitimate user he is scanned by them...
-> Agents (Pilot+Analyze) vs Aku (Hacking+Stealth)

The Agents are fooled by Aku and will let him go.
Now he tryes to get more comfortable by reshaping the sculpted system of the node...but fails, making it all even more awkward.
-> Aku (Response+Reality Filter) vs Node (System+Response)

In-game you tryed to use the Filter first, then the Agents scanned you.
I inverted the order because it's more plausible that the already active (and ever watchfull) programs will look at you as soon as you access the node, rather then letting you do "something" before they can asses your identity.

Feeling lonely, Aku launces one of his own agents and frees it in the node with a nice subscription.
"Running a program into my company system" looks quite legit and harmless, so this action should be in the range of his user-level account; but this node is NOT a work-zone...it is just a high-security access point to the real system and probably the ONLY action allowed to a normal user is "passing through" and maybe "looking around".

Just launching one of my programs does NOT require any test, and surely not an Edit action...starting an agent and subscribing it should definitely be an automatic action.

Instead, IF this action is not in the range of a user-level access privileges the system should get a chance to notice the anomaly, expecially since the offloading of the agent causes the node to overload!
For this I would go as far as decreasing Aku's Stealth by 1 point, due to such a messy and noisy action...or let the node check the situation even if it would have normally ignored it.
THEN the 3 agents will scan the new Icon, as per their normal routine.
-> Node (Analyze+Firewall) vs Aku (Stealth) or (Stealth-1)
-> Battlecat (Pilot+Stealth) vs Agents (Pilot+Analyze)


So now Aku is in good company and the node looks to be fine with that...good.
He starts looking around to find out what to do and his idea is to detect & follow any traffic in the node.
-> Aku (Hacking+Sniffer) [no opposition here :P]

This reveals that the node has only one entrance and one exit...wich is not in sight.
That's odd...
We established that all the corp terminals MUST get past this node before entering the company network; it strikes me as strange that the only links available are to the open matrix and to a hidden door o_O''
This would mean that the terminals installed into the building are connected ONLY to the open matrix...the one and only entrance-point to this node.
And even the hidden/trapped link is strange, unless even the low-level wage slave users have a pass-code to automatically detect and open the passage to the hidden node.

Anyway...we are in a room with just the exit door and a flow of vermins disappearing somewhere near a wall; this calls for a deeper look around...that leads to a secret door with a nice boobytrap on it.
-> Aku (Computer+Analyze) vs Node (Firewall+Stealth)

Our hacker tryes to get rid of the trap but his stiky fingers trip an explosion...that luckily fails to rise an allarm.
-> Aku (Hacking+Defuse) vs Bombx2

Despite all the noise and commotion the system looks very quiet, so Aku spends some time to repair his Persona...and then invests a whole hour in probing the new mysteious door.
-> Aku (Computer+Medicine)
-> Aku (Hacking+Exploit)
-> Node (Firewall+Analyze) but just onece.


____________________________________________________________

4) About the Hacking of a Technomancer...
Reading the book leads me to belive that a you CAN hack into the brain of a TM.
But I'm too tierd now...my mind has collapsed about five minutes ago o_O''
Go to the top of the page
 
+Quote Post
Dashifen
post May 3 2006, 10:05 PM
Post #193


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Welcome aboard Hasimir.

1) RAW stands for Rules As Written. So, in this context, yes it's the SR4 rulebook. As for knowing if your PDF is up to date, if you purchased it from BattleCorps online, I know they email me when there's a new version available. Not sure about others; YMMV (your mileage may vary).

2) I would disagree with some of the way you're using terms, but in essence, I think you're correct.

3) A note on your recap: Aku was hacking his access to the system and, thus, he is faced with the chokepoint. Normal, legitimate users of the system would have an access key that would allow them to either bypass the chokepoint, or be analyzed by it and recognized as legitimate. Either way, they'd not have to face the security. It's not Aku's physical location that determined his need to face the chokepoint, but rather the method by which he's hacking his way into the system.

Thanks, I guess, for the recap, but in the future I'd prefer to do any recapping myself. It reduces clutter and it makes sure that the recap doesn't happen before we're done with the run. I'd prefer to have the tutorial work as a play-by-post until we're done with each scenario, then we can have a recap, then we'll start a new scenario.
Go to the top of the page
 
+Quote Post
Dashifen
post May 3 2006, 10:10 PM
Post #194


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Aku)
of course i forgot about the damage, and of course i have the medic program!

so thats a computer(5)+medic(6) minus the usual 2 dice, for a usual total of 9 dice.
1, 1, 3, 3, 3,
3, 5, 5, 5

For 3 hits, healing 3 boxes, taking me down to 1 total point of damage, and thus no modifier.


I don't see anything in the book that says a repair icon test isn't effected by wound modifiers. Since it's an action based on skills, I'd think it could be, but since it's a "healing" type test, tradition states that it wouldn't be effected. Any thoughts from the peanut gallery on this one?

Also, if you have 1 total point of damage, you're still at -1 to all rolls. Until you're fully healed, you still have a wound modifier.


QUOTE
That means that I've probably just put my team in a SERIOUS amount of danger, as the interval time on this is 1 hour(!) but for my safety i think it was worth it.


There is no rest of the team, in this example, it's just you hacking on your lonesome. Thus, probing the target was, in this case, extremely appropriate.

I'm going to hold off on respoding to the probing test you made to see if we can have some discussion on the medic test and wound modifiers; I'm interested to see what others think on the matter. Plus, if the concensus is that they apply, then you might be doing more medic tests before the probing. In the mean time, when I return to my computer after shopping a little this evening, or tomorrow morning at the latest, I'll post information about the node-within-a-node that you're probing as well.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post May 3 2006, 10:14 PM
Post #195


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



Resisting damage typically does not apply wound modifiers, but that's not what this is.
Casting a heal spell while wounded or using first aid while wounded both apply injury penalties. I'd say this does, too.
Go to the top of the page
 
+Quote Post
Voran
post May 3 2006, 10:29 PM
Post #196


Running Target
***

Group: Members
Posts: 1,404
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



As for levels of access, even if logging in from an inside building location, I think that's still covered by the access level you've spoofed. Due to HIPAA stuff, there are varying levels of access in our offices to client-sensitive information. User access here would probably be the clinician computers that can access our common server, agency forms, etc. My level of access would be somewhere around 'security' level, I work in the clinical QA section so I need access to the client data, and our IT guy has admin access. I can login to any comp in our network (any workstation, even the ones off island) and have my same level of access. Likewise, anyone can login to my computer, but unless they're using my account, they won't see any of my files.
Go to the top of the page
 
+Quote Post
Voran
post May 3 2006, 10:30 PM
Post #197


Running Target
***

Group: Members
Posts: 1,404
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



Sidenote, I'm thinking it might be a good idea to bring back something akin to the security count tree from SR3. Be nice to see what they come up with.
Go to the top of the page
 
+Quote Post
Aku
post May 3 2006, 10:35 PM
Post #198


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



voran i disagree on the access, i think its new node=new access, or, atleast the chance to change it, perhaps, if i was running the scenario, i would lower the threshold for someone changing nodes that was keeping the same access, but i dont feel user level is going to be enough for me on the second node.
Go to the top of the page
 
+Quote Post
Voran
post May 3 2006, 10:52 PM
Post #199


Running Target
***

Group: Members
Posts: 1,404
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



Woops. Sorry I was referring to Hasimir's post. I agree that user level access probably won't be enough. Our network (as far as I know) can't be accessed from a terminal outside the network, so it'd be akin to having to physically be onsite at least at one of our satellite offices, to get even basic server access.
Go to the top of the page
 
+Quote Post
Hasimir
post May 4 2006, 02:40 PM
Post #200


Target
*

Group: Members
Posts: 34
Joined: 3-May 06
Member No.: 8,522



Thanks Dashifen for the answers :)
My recap was actually made more to my own benefit that any other's...I needed to clear exactly WHAT had been done over this 8 pages of discussion, so that I can comment in the right way ^_^

QUOTE
Aku was hacking his access to the system and, thus, he is faced with the chokepoint. Normal, legitimate users of the system would have an access key that would allow them to either bypass the chokepoint, or be analyzed by it and recognized as legitimate. Either way, they'd not have to face the security. It's not Aku's physical location that determined his need to face the chokepoint, but rather the method by which he's hacking his way into the system.


I understand that this is just a theoretical exercise to show the workings of the 'triX, but I would like to uderstand the network structure you designed because I'm a bit confused...let me try to explain how I see it...

So I sit into the building and use the computer terminal of some Wage Slave that works here...right?
I "turn the computer on" and am confronted with an identification request to access it...this calls for my Hacking+Exploit test.
This way I manage to somehow get User-Access.

Now I am into the computer terminal (that is a node) of Mr WageSlave with what seems a legitimate User account and are free to search it for his real user ID and Password...getting myself a REAL User account.
There should be no chokepoint node, I am already into a "place" INSIDE the network!

After that I will have the same privileges and access options that this employee has when working at his own desk...being free to roam in the network as a legitimate user.

This way I can access other nodes in the network (or not) depending on what are the options open to the Wage Slave I am impersonating.
For example my "home node" (the terminal I hacked into) may lead to 2 other nodes:
- one is accessible to me because the node is just a shared printer.
- the other one denies me access becuase it leads deeper into the network, where there are the administration terminals and the sensible databanks.
HERE a security node may be used to filter unautorized access from low level employees and external traffic.

But this also means that if I go to the Company CEO office and hack into HIS terminal I will already be past the security node!
And searching into his terminal I should find HIS access data, granting me the privileges of the CEO account!

In your run all of this doesn't happen; as soon as I try to get into the WageSlave terminal I am confronted with a high security chokepoint with just two doors...one leading to the open matrix and one hidden, trapped and guarded by 3 agents o_O''
This means that the work terminals in the building are THE SAME as my house terminal or a street phone-boot...they are EXTERNAL to the corp-network and the chokepoint is the ONLY access point.

That structure is not impossible...but surely it's quite odd because I think there is a problem :P

To get into the node in the first place I had to hack my way in...this means that the access entry from the matrix is NOT open to the occasional surfer, it needs User-Level access codes.
So...if I got inside the node I HAVE User-Level access...and I SHOULD see the same stuff that any WageSlave would see: doors, links, etc.
Adding to this, both the System and the Agents already analyzed and aknowledged my presence too!

Network structure is NOT an abstract concept...physically breaking into a building (risking your life) HAS a distinct advantage over a remote connection.
The termial of a CEO may be harder to crack into, but once inside you are already past most of the network security checkpoints.

Or is this all uotdated stuff from old SR versions? :spin:
Go to the top of the page
 
+Quote Post

11 Pages V  « < 6 7 8 9 10 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 9th January 2025 - 09:11 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.