IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Riggers in SR4!, What all is needed?
eightball1011
post Apr 26 2006, 09:33 PM
Post #1


Target
*

Group: Members
Posts: 18
Joined: 27-December 04
Member No.: 6,909



Hey. I looked everywhere for a post similar to this but just couldn't find what I was looking for, so here it is.

I am very new to SR4, as in downloaded it yesterday. I am wanting to make a rigger, but never have before. I understand how the commlink and control rig work, but what about the autosofts? Do I have to have autosofts and firewall programs for the control rig, each vehicle, and each drone? Or do the softs and firewall for my control rig handle all of that? Is firewall and control all that I need?
Will I need basic computer hacking skills in order to use drones and vehicles? Sorry, but SR4 "wireless world" section just all seems like a jumbled mess for me.

I read through this section in the book, but found almost no mention of riggers, except the 2 page section under Hackers. Someone please let me know what all is needed for a rigger to function.

Thanks in advance for your help.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 26 2006, 09:37 PM
Post #2


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



each drone and comlink will need a firewall. but only the drones need autosoft (its the drones skills).

for skills, focus on electronic warfare (for messing with other peoples drones), maybe a bit of hacking if you feel like taking drones over rather then just messing with them, and vehicle skills if you plan to drive them. remember that any vehicle with a pilot rating is potentialy a drone.
Go to the top of the page
 
+Quote Post
Voran
post Apr 26 2006, 09:49 PM
Post #3


Running Target
***

Group: Members
Posts: 1,405
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



If you can afford it, I'd say just go for skill groups that let you do both rigging and hacking. In a way, I find rigging and hacking to be a bit easier to get into that previous rigging/decking from SR3 and before. You no longer have to invest a large essence chunk to get rigger cybergear, nor spend as much to get a decent 'deck' in this case, comlink. Hell, you can cart around a handful or more of deck-like comlinks nowadays in SR4.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 26 2006, 10:10 PM
Post #4


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



another thing is that you can in theory do more split roles to. given that you can go hot sim with trode, a mage or adept can moonlight as a hacker without the cost in essence.

im trying to get my players to use the data search skill and similar now to show that people dont need to be a dedicated hacker to find info online any more. hell, maybe i should just sell them a agent with search and have them use that :smokin:
Go to the top of the page
 
+Quote Post
Shrike30
post Apr 26 2006, 10:28 PM
Post #5


Runner
******

Group: Members
Posts: 2,556
Joined: 26-February 02
From: Seattle
Member No.: 98



I've found that a couple of snide remarks from the Johnson along the lines of "Uh, you're the guys being hired here, look it up," has encouraged my players to explore the wonders of the Matrix a little more. Pretty helpful tool, actually.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 26 2006, 11:06 PM
Post #6


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



yep. and most likely they will hit the grid a bit more now that they have to get into a yaquza (or is it yacuza? nah, neither looks right) property ;)

and that reminds me to get hold of some maps. and maybe a bulding design program to trow together some quick floorplans for stuff like offices.
Go to the top of the page
 
+Quote Post
James McMurray
post Apr 26 2006, 11:12 PM
Post #7


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Yakuza
Go to the top of the page
 
+Quote Post
ronin3338
post Apr 26 2006, 11:12 PM
Post #8


Moving Target
**

Group: Members
Posts: 314
Joined: 25-February 06
Member No.: 8,307



Yakuza.

;)

(Curse you James, and your superior type fu!)
Go to the top of the page
 
+Quote Post
Aaron
post Apr 26 2006, 11:29 PM
Post #9


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (James McMurray)
Yakuza

Gesundheit.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 26 2006, 11:33 PM
Post #10


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



figures. why is it that of all things that is a word that uses a sane spelling?
Go to the top of the page
 
+Quote Post
Kanada Ten
post Apr 26 2006, 11:38 PM
Post #11


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



Because it's not an English word, just a phonetic representation of a Japanese one?
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 26 2006, 11:42 PM
Post #12


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



heh, what is realy a english word? many of them are taken from french, germanic offshots, and most likely lot of other sources :P
Go to the top of the page
 
+Quote Post
Kanada Ten
post Apr 26 2006, 11:44 PM
Post #13


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



Yeah, and they took the fragged spelling with each and every stolen word.
Go to the top of the page
 
+Quote Post
CradleWorm
post May 25 2006, 10:07 PM
Post #14


Target
*

Group: Members
Posts: 47
Joined: 22-March 05
From: Milwaukee
Member No.: 7,210



Drones themselves do not need firewall or system programs. Drones are devices that are subscribed to a commlink and make decisions using a special program (Pilot).

Your commlink is limited to a number of subscribed devices, I'm not sure the exact number but I think it has to do with your commlinks system attribute.

Your character will need a control link to access vehicles cybernetically.

Finally, I would strongly suggest a good firewall program for your commlink, along with encrypt and eccm. Several others could come in handy and I would read the matrix rules to figure out exactly what else you may need.

Go to the top of the page
 
+Quote Post
Aaron
post May 25 2006, 10:21 PM
Post #15


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (CradleWorm)
Drones themselves do not need firewall or system programs. Drones are devices that are subscribed to a commlink and make decisions using a special program (Pilot).

Actually, drones have firewall and system programs. They have a device rating of 3, and so have Firewall, Response, and Signal of 3. The pilot program also acts as the System. It's all on page 214.
Go to the top of the page
 
+Quote Post
Shrike30
post May 25 2006, 11:52 PM
Post #16


Runner
******

Group: Members
Posts: 2,556
Joined: 26-February 02
From: Seattle
Member No.: 98



Firewalling your drones is a really good idea. Nothing sucks quite so much as having one of them come back at you, all of a sudden...
Go to the top of the page
 
+Quote Post
Aaron
post May 26 2006, 01:59 PM
Post #17


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Shrike30 @ May 25 2006, 06:52 PM)
Firewalling your drones is a really good idea.  Nothing sucks quite so much as having one of them come back at you, all of a sudden...

I've actually had some experience attacking drones; I'm our team's official drone spoofer.

It turns out one's drones are relatively safe if you've properly subscribed them. An attacker would have to find the hidden node (your drones are running in hidden mode, aren't they?), decrypt the signal (you are running Encrypt, aren't you?), trace the signal to your commlink (you are running Spoof, aren't you?), successfully Analyze it (you are running Stealth, aren't you?) to get your ID, then spoof a command to the drone to change its subscription from your commlink to hers. Assuming the fastest possible attack (all tests are successful and all extended tests are successful in one roll), that'll take five action phases.

Of course, if she has direct access to your commlink (she's close enough to access your commlink and knows that you're the rigger), she can skip the trace and decrypt part, but if you're remote, you're actually pretty safe.
Go to the top of the page
 
+Quote Post
The Jopp
post May 26 2006, 02:24 PM
Post #18


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



The scary thing is that according to the RAW you can intercept the signal of the drone, put a wireless tap on it and EDIT the signal.

This means that you can circumvent the spoof command rules and have preprogrammed commands that you just insert into the datastream back to the drone.

The most efficient way to do this is to send a datapackage with a new subscription list.
Go to the top of the page
 
+Quote Post
Serbitar
post May 26 2006, 02:33 PM
Post #19


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



You have to be in a node that is relaying the signal to edit it. The air the wireless signal is going through does NOT count as such a node.
Go to the top of the page
 
+Quote Post
The Jopp
post May 26 2006, 02:45 PM
Post #20


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Serbitar)
You have to be in a node that is relaying the signal to edit it. The air the wireless signal is going through does NOT count as such a node.

Nope, see "Intercept Wireless Signal" SR4 page 225. That tactic is different from "Intercepting Traffic" page 224. The latter needs a node the first does not.
Go to the top of the page
 
+Quote Post
Serbitar
post May 26 2006, 02:50 PM
Post #21


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



You can only copy/record/forward with wirelss. For adding own or blocking or editing you need wired traffic through a node. Good rules in this case, I have to say.

edit: Should have red a little further. Your right. But do not ask me how you can alter radio waves going through the air . . . So I have to say: Bad rules . . . I dont like this one bit.
Go to the top of the page
 
+Quote Post
The Jopp
post May 26 2006, 02:54 PM
Post #22


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Serbitar)
You can only copy/record/forward with wirelss. For adding own or blocking or editing you need wired traffic through a node. Good rules in this case, I have to say.


No, read carefully, you can do the exact same things.

QUOTE
Page 225

To perform an Intercept Wireless Signal action, make an
Electronic Warfare + Sniffer (3) Test. Once the signal is intercepted,
you can monitor the traffic and even copy/record/forward it
without making any more Intercept Wireless Signal actions. If you
want to block out some parts of the traffic or add in your own, you
must make an Edit action.


Go to the top of the page
 
+Quote Post
Serbitar
post May 26 2006, 02:56 PM
Post #23


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Yeah, just edited my post . ..
Go to the top of the page
 
+Quote Post
The Jopp
post May 26 2006, 02:59 PM
Post #24


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Serbitar @ May 26 2006, 02:56 PM)
Yeah, just edited my post . ..

I can understand those rules in one way but they essentially removes the need for spoof since you can actually just kidnap the drone instead - I would like a clarification on that rule since you can basically do anything with it.

I smell gamebreaker here, in both directions, still, it's a form of electronic warfare...
Go to the top of the page
 
+Quote Post
Serbitar
post May 26 2006, 03:02 PM
Post #25


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I would just disallow to edit wireless trafic. I see no physical way of doing this.
Editing traffic is done by deleting the old traffic and inserting your own, which can be done in a node. But there is no way to delete the radio waves that are already in the air.

Solution: The "edit traffic" rule works only for "content" traffic (like text, voice comunications, pictures). If you want to edit traffic involving IDs, commands and pretty much "system" data, you have to use the old spoofing/hacking rules.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 3rd December 2025 - 10:49 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.