IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Agent = IC, IC = Agents, Okay, okay, my final thoughts, really.
GrinderTheTroll
post May 31 2006, 10:09 PM
Post #1


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



I've been thinking about the last thread discussion about this and I convinced myself that Agents = IC and IC = Agents. Not from anything explicitly stating the fact, although that's been the subject of my argument in the past what's convinced me was looking at an example of when you're own commlink comes under attack and your own defenses come into play.

If I had my own Commlink-5 loaded with programs and Agents, they indeed count againt my own Sysx2 Reponse limit. If I have IC or Agents offline that come online, they begin to count against my node's Sysx2 Reponse limit. In all respects, Agents and IC are the same. They both count against node load and function the same. If an invading Agent or IC came into my node, it too would inccur load and count against my own Sysx2 limit. Just because it's not mine, doesn't mean I don't pay for it's bandwidth. The fact is, it's running on my machine and not on another Persona.

Turning the table on my example and infiltrating my own node, I can see how my outside Agent would inccur load on the Commlink as would it's own Agent or IC response to the alert (the latter is noted explicitly on SR4.228).

Regarding DOS attacks, there is no mention of Reponse < 1, so the worst that can happen is IC and other programs ratings are effectively 1 giving you a bonus (-4 to their dice rolls in most cases) but not limiting your own local programs. Interestingly, if you trip an alarm (+4 Firewall) and DOS a Rating 5 node (-4 rating), these would offset each other making it no easier to brute-force hack the node without an alert.

With this in mind as well as my prior bouts about this, I'll conclude that, yes, IC=Agent and Agent=IC.

Thanks all for contributions to this topic.

Regards,

~GTT
Go to the top of the page
 
+Quote Post
stevebugge
post May 31 2006, 10:19 PM
Post #2


Neophyte Runner
*****

Group: Members
Posts: 2,026
Joined: 23-November 05
From: Seattle (Really!)
Member No.: 7,996



That's been my understanding too, which in a way makes IC potentially even more dnagerous then it was before, now it's easy to customize. Just wait until Unwired comes out, at the very least it will have a bunch of new utilities, at best it may have program design rules.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 31 2006, 10:33 PM
Post #3


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (stevebugge)
That's been my understanding too, which in a way makes IC potentially even more dnagerous then it was before, now it's easy to customize.  Just wait until Unwired comes out, at the very least it will have a bunch of new utilities, at best it may have program design rules.

Yeah that means a single IC-5 could have (9) Rating-5 programs loaded before the IC itself suffered a local Reponse limit beyond what it inherits from the node it's on.
Go to the top of the page
 
+Quote Post
mdynna
post May 31 2006, 10:40 PM
Post #4


Moving Target
**

Group: Members
Posts: 371
Joined: 10-January 06
From: Regina
Member No.: 8,145



An important thing to note is that for an Agent to start running on a target Node you must spend a Complex Action to load it there. Just because the Agent is running on your Commlink doesn't mean it automatically enters the target Node when your Persona does.
Go to the top of the page
 
+Quote Post
stevebugge
post May 31 2006, 11:26 PM
Post #5


Neophyte Runner
*****

Group: Members
Posts: 2,026
Joined: 23-November 05
From: Seattle (Really!)
Member No.: 7,996



Here's an ugly idea:

Hacker breaks in to system, but trips an alarm.

A Rating 5 IC agent loads:
It's loaded with Track, Exploit, Stealth, Edit, Analyze, and a Big Nasty Data Bomb.

Rather than engage the Hacker, it evades him and tries to follow the data trail back to the Hackers commlink where it starts trashing and databombing his local files.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 31 2006, 11:30 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (stevebugge)
Here's an ugly idea:

Hacker breaks in to system, but trips an alarm.

A Rating 5 IC agent loads:
It's loaded with Track, Exploit, Stealth, Edit, Analyze, and a Big Nasty Data Bomb.

Rather than engage the Hacker, it evades him and tries to follow the data trail back to the Hackers commlink where it starts trashing and databombing his local files.

I don't know if data bomb works on unwilling files or just targets specific ones.

Another neat trick would be to erase the Commlinks subscription list or as you mentioned, start erasing all offline files.

2070 virus code is fun!
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 1 2006, 12:33 AM
Post #7


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (mdynna @ Jun 1 2006, 12:40 AM)
An important thing to note is that for an Agent to start running on a target Node you must spend a Complex Action to load it there.  Just because the Agent is running on your Commlink doesn't mean it automatically enters the target Node when your Persona does.

oh but they do follow your persona over. its just when you want them to operate outside of your comlink that you have to spend a complex action to upload them.

thats why you can in theory pack weapon platform agents and similar and do the whole "pokemon" thing with them ;)

ie, as long as your connected/activly subscribed to a node, the agents can operate on said node without being uploaded there...

hell, thinking about it im starting to wonder if not future joe wageslave home software will be more in the area of agents loaded with the proper utilitys rather then just the utilitys. ie, they become a kind of personal secretary.

joe to comlink: hey, find me the news vid about the lastes urban brawl matches!

agent with search on comlink: yet sir.
Go to the top of the page
 
+Quote Post
DarkCrisis
post Jun 1 2006, 01:46 PM
Post #8


Target
*

Group: Members
Posts: 26
Joined: 17-May 06
Member No.: 8,568



IC and Agents can have a certian amount of programs in them, but do these programs count against the limit the node or commlink has?

Say you have a Rating 3 Agent with Analyze, Attack, & Exploit in it. Well assuming you could the Agent thats 4 programs! Or is it considered just 1? If so why?
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 1 2006, 03:08 PM
Post #9


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



in my view yes, the agent counts as only one program. but to be honest i dont see it realy spelled out that way in the book, anywhere...
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 1 2006, 05:40 PM
Post #10


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (DarkCrisis @ Jun 1 2006, 06:46 AM)
IC and Agents can have  a certian amount of programs in them, but do these programs count against the limit the node or commlink has?

Say you have a Rating 3 Agent with Analyze, Attack, & Exploit in it.  Well assuming you could the Agent thats 4 programs!  Or is it considered just 1?  If so why?

The book mentions that the Agent/IC can overload it payload but will suffers it own Sysx2 penalties.

I'd argue that it only counts as one program since it doesn't really start working until you launch it and then starts using the Reponse of the node it's on. While loaded in your Persona it's more just "packed away" until you need it. Someone said it best with the Pokemon reference, lol.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th April 2024 - 05:43 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.