IPB

Welcome Guest ( Log In | Register )

3 Pages V   1 2 3 >  
Reply to this topicStart new topic
> Comlink vs. Corporate Node/Host, are they the same thing RAW?
OneTrikPony
post Oct 24 2006, 04:30 AM
Post #1


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



What is the difference between a hacker's comlink and the Corporate Node he's trying to hack? The node (what used to be a "host" in SR3) has the same system/Responce rules and AFIK all of the host's atributes are caped at 6 right? So how does a corporate host handle hundreds of users and bunches of IC without the maximum number of subscribers exceed the system rating, or having so many agents/progs loaded and running that the system is overloaded to the point that the responce=zero and the whole thing crashes?

If a comlink and Host are not the same thing then what are the rules for designing a host and why the hell aren't they realeasing the next matrix book right f.kn now?

edit: i have searced the board and I swear I saw a post about loading agents with agents that self spawn until the system crashes but I can't find that thread

Thanx
Go to the top of the page
 
+Quote Post
Backgammon
post Oct 24 2006, 04:36 AM
Post #2


Ain Soph Aur
******

Group: Dumpshocked
Posts: 3,477
Joined: 26-February 02
From: Montreal, Canada
Member No.: 600



Currently, a commlink works the same as a corporate node, with the same limitations and all, subject to GM common sense.
Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 24 2006, 05:00 AM
Post #3


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



OK, since my sense is common to < 2007, and I've never met anyone from the shadowrun universe in 2070, could you spell it out for the retard (me) please.

If 500 researchers in the corperate liberary load a rating 1 agent + Browse then go to lunch, does the system crash?

If not, is there any limit to the numbers of attack IC's I can launch in responce to a system alert.

If there is no limit why can't my hacker crash any system with the self spawning agent thingy.

If there are limits of somekind how do more than 11 agents access a node at one time?

Normaly I'd adjudicate according to my RL knowledge but I'm pretty much limited to porn surfing and photoshop and PHOTOSHOPING PORN! :grinbig: so I realy have no idea about what might be right.

thanx
Go to the top of the page
 
+Quote Post
Da9iel
post Oct 24 2006, 05:02 AM
Post #4


Moving Target
**

Group: Members
Posts: 556
Joined: 28-May 04
From: Moorhead, MN, USA
Member No.: 6,367



I work it this way: You may only subscribe to a limited number of nodes, but an unlimited number may be subscribed to you. It all depends on where the icon is. If your icon is on their node, you're subscribed to them. If their icon is on your comlink or node, they're subscribed to you. Not necessarily right, but it makes sense in my mind.

[edit]Agents running on a node is a whole other ball of wax. I don't know a defense to that.[/edit]
Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 24 2006, 05:51 AM
Post #5


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



No I kind of get it, programs I'm running on my comlink; analyze/browse/edit, don't lag the host node because I'm using my processing power to run them, If I unload my agent from my persona to the node the agent is running on their system so it uses their processing power not mine I just can't immagine any student / wage slave not having their own rating 1 agent loaded with browse. Or if i realy don't want to do any work today a rating 2 agent loaded with browse and edit.

"Boss I'm taking a long lunch, I'll have that report to you by 12:30 though."

Ah Ha! I think I just realized what a "network" is. I don't load the agent onto the company system, i still run the agent on my comlink subscribed to the company host while I do something else. "Marge I've just tripled my productivity" (homer simpson)

The only programs running on a host node are IC and DataBombs since any users or "utility" agents should be running on their own node NETWORKED to the host.

Sweet! so when designing systems for players to hack. I can trigger tonns of attack IC for an alert. By the rules it doesn't matter if the responce is seriously degraded since every agent will get 3 IPs, and they all get a turn at the gangbang every pass.

Heh; Grey IC, Black IC, GANGBANG IC
Go to the top of the page
 
+Quote Post
Serbitar
post Oct 24 2006, 01:21 PM
Post #6


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



My SGM (see signature) tries to answer some/all of these questions. Though, I have to say, just as a workarround.
Go to the top of the page
 
+Quote Post
The Jopp
post Oct 24 2006, 02:18 PM
Post #7


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (OneTrikPony)

Sweet! so when designing systems for players to hack. I can trigger tonns of attack IC for an alert.

Not quite right. IC is ONLY run by the attacked node in case it KNOWS security has been breached. Agents on the other hand.

Having 1 company node as their “main” system is quite alright but then having X amount of security nodes with X hordes of Agents subscribed to the main node is a bit wrong and somewhat unrealistic.

Even if the company main node is THE node for the team to get inside to get the info I’d say that the corporation most likely also have X amount of regular corporate nodes regarding different departments which would dilute the amount of agents guarding 1 node.

It is one thing for a hacker to have X amount of agents doing continous analyze on their subscribed node but corporation usually don’t have such extreme security – even in 2070.

If they had hacking would become a moot point. Let’s see: Two nodes subscribed to a third each of the two nodes have 9 agents with 3 programs each (Analyze, Armor, Attack etc).

A hacker cracks the main node and 18 agents+system makes 19 analyze checks and rolls between 8D6 and 10D6 (system). If ONE of them rolls the threshold of the hacker they have found him and they will swoop in for the kill with 3IP’s each.

The hacker has to survive 54 attacks from the agents and then the main node launches it’s own IC…

You see the problem…hacking becomes moot.

Most likely the horde of agents will be spaced out amongst a large amount of corporate servers/nodes and have between 1-2 + system.

So 2-3 Analyze checks instead of LOTS.

IF the hacker isn’t found out then he will not be Analyzed unless he does something fishy – unless he has Admin access and tells the Agents and System to ignore him since he is the Superuser…

Hacking another hacker on the other hand is entirely a different matter…Just pour agents on them if they do. If corporations are paranoid remember that hackers are even more paranoid.

Oh, and another thing - what if the hacker hacks the Node from which the agents are running? Is someone watching THAT? Hack that node and redirect those agents to attack the other node with agents.

Virtual civil war anyone? :grinbig:
Go to the top of the page
 
+Quote Post
Serbitar
post Oct 24 2006, 02:55 PM
Post #8


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



The agents issue was discussed extensively here:
http://forums.dumpshock.com/index.php?show...=15007&hl=agent
Go to the top of the page
 
+Quote Post
yesman
post Oct 24 2006, 09:40 PM
Post #9


Target
*

Group: Members
Posts: 79
Joined: 18-September 05
Member No.: 7,758



I like the idea that in research facilities, libraries, and the like that there would be a bank of provided rating 1 agents on a rotating que to help visitors. You would send it queries and wait for it to do the leg work. Kind of like rare-books libraries work in the meat world - only with Agents instead of Grad Assistants. The agents would run from thier own systems which would keep the bog-down from happening on the main system. You could have your agent send the requests from your end, but that's your end. It would be kind of fun to see what kind of 'telephone game' mistakes having a search run through two low rating agents would make.

Of course, with data size being such a non issue, and comms being so cheap.... visiting a major online library could be more like visiting one mid rating commlink out of a bank of 100s of seperate commlinks with identical information on them than visiting a more centralized system.
Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 25 2006, 02:13 AM
Post #10


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



@ Serbitar

Thanks for SGM, scanning it now. I didn't notice it when I was looking thru your cyberlimb house rules. (btw, thanks also for the CyberStuff, not quite the flavor I want in my campaign but still cool)

And again thanks for that link to the other thread, I had read that one last night befor I started this thread but that wasn't quite what I remembered reading a couple weeks ago.

@ The Jopp
What I'm thinking about GANGBANG IC :rotfl: isn't so much about hosting the IC agents on another node but the idea that boging down the system isn't such a bad thing. Here's an example of what I'm thinking, (bear in mind that I just got home and I havn't read thru Serbitars stuff yet)

Corporate Host Node: Research Node.

Node Rating 4,
networked on a wired LAN in one building, access is passcode protected.

SUBSCRIBES TO:
3 other nodes on this LAN;
... Acounting,
... operations,
... Management.
RTG
PLTG

CURRENTLY RUNNING PROGRAMS:
IC. Trafic agent 4/ Attack 4, Analyze 4, Stealth 4 (when unwired comes out the attack will be tarbaby) [note: as i read the rules programs running in an agent do not count against the node's OS for responce]

This IC agent is hidden in the node, (Stealth 4) it constantly takes Observe In Detail actions, (six times every turn), scaning the node until it notices an agent, user, program, file that it doesn't recognize.

Once that happens this IC will take another Observe in Detalil action, Scanning the suspicious icon. If the suspicion is verified the Trafic Agent will trigger an active alert.

ACTIVE ALERT:
An active alert runns several Additional IC and calls a Security Hacker to the node.

Alert turn 1, IC programs launched.
Alert IC: (these agents are directed to the intruder by the Trafic Agent)
1 - tracking agent 3, /armor 3, Track 3, Stealth 3 (begins to track if intruder present)
2 - Attack Agent 3 / Armor 3, Attack 3, Blackout 3. (begins to attack if intruder present)
1 - Cleric Agent 3 / Analyze 3, Browse 3, Medic 3 (begins to analyze system, files, programs, personas for damage and repair.)

There are now 5 programs running; Node Responce reduced by 1 wich reduces system to 3 wich reduces ratings of all agent and programs of agents to 3

Alert turn 2, (If alert conditions are still present.)
Alert IC:
3 - Attack Agent 3 / as above.

there are now 8 programs running, node responce reduced by 2. ratings of system/agents/programs reduced to 2. Security hacker called.

Alert turn 3, (If alert conditions are still present.)
Alert IC.
3 more attack agents rating 2


There are now 11 programs running Node Responce is 2, agent and program ratings are 2, but the intruder is being attacked by 8 rating 2 agents, and tracked by an agent he may or may not have noticed.

I probably wouldn't do it exactly this way, If I had been thinking I would have stepped things so that responce remained higher a little longer but I think you can see what I'm getting at.


Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Oct 25 2006, 03:41 AM
Post #11


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (OneTrikPony)
What is the difference between a hacker's comlink and the Corporate Node he's trying to hack? The node (what used to be a "host" in SR3) has the same system/Responce rules and AFIK all of the host's atributes are caped at 6 right? So how does a corporate host handle hundreds of users and bunches of IC without the maximum number of subscribers exceed the system rating, or having so many agents/progs loaded and running that the system is overloaded to the point that the responce=zero and the whole thing crashes?

If a comlink and Host are not the same thing then what are the rules for designing a host and why the hell aren't they realeasing the next matrix book right f.kn now?

edit: i have searced the board and I swear I saw a post about loading agents with agents that self spawn until the system crashes but I can't find that thread

Thanx

This has been an issue of great debate for lots of us. An interesting word used only in the first part of the AR chapter is "mainagent" and I am curious if this is precursor of things to come.

If think if there existed "mainframe" type super-nodes we'd see systems flooded with IC so much it would become unapproachable. You trip an alarm and WHAM, 20 Rating-6 IC/Agents waiting for you with little-to-no node degredation.

I think a cluster approach of nodes fits the 2070 model better than super-nodes. A cluster of "load balancing" nodes to distribute requests would be an easy solution for this sort of activity although not mentioned in SR4 core. You could send Agents on their automated way and not overload a node or system while you break for lunch.

It will be interesting to see what Unwired says about this, I know lots of us are waiting with baited breath.

Cheers.

~GTT
Go to the top of the page
 
+Quote Post
TBRMInsanity
post Oct 25 2006, 02:05 PM
Post #12


Running Target
***

Group: Members
Posts: 1,002
Joined: 22-April 06
From: Canada
Member No.: 8,494



I can't believe we are visiting this discussion again. can't people wait till Emergence comes out for the expanded rules. All your questions will be answered then. In the mean time think about the practicality that a Corp host that has millions of people view every second being run off even the most powerful Commlink. It is loco to think that. A Corp host is either a lot of Commlinks together with a shared database or a supper computer that doesn't follow standard rules (and the expanded rules will come out in Emergence).
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Oct 25 2006, 04:58 PM
Post #13


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (TBRMInsanity)
I can't believe we are visiting this discussion again.  can't people wait till Emergence comes out for the expanded rules.  All your questions will be answered then.  In the mean time think about the practicality that a Corp host that has millions of people view every second being run off even the most powerful Commlink.  It is loco to think that.  A Corp host is either a lot of Commlinks together with a shared database or a supper computer that doesn't follow standard rules (and the expanded rules will come out in Emergence).

Hi, welcome to Dumpshock, thanks for playing!

We know it's all speculation, what we are having trouble with is the fact the base rules don't account for the types of system or scenarios we'd like to use. It's been over a year and lots of us want some solid RAW to chew on.

One of the oddest things for me is the idea that "large scale" computing with big machines is missing in SR4 core. Although I think the cluster idea of smaller nodes is more interesting (and cheaper too I'd bet), it's still a big departure of what we use in current non-game time today.

Relax and let the inmates run the asylum until we get some confirmation about what new rules we want to scrutinize. :cyber:
Go to the top of the page
 
+Quote Post
Mal-2
post Oct 25 2006, 05:12 PM
Post #14


Target
*

Group: Members
Posts: 93
Joined: 9-December 03
From: Greenville, SC
Member No.: 5,889



QUOTE (TBRMInsanity @ Oct 25 2006, 09:05 AM)
I can't believe we are visiting this discussion again.  can't people wait till Emergence comes out for the expanded rules.

I don't think Emergence is going to have a whole lot of rules in it. Emergence is a setting book / campaign that involves technomancers. Like all of the setting books, there will almost certainly be some amount of rules and gadgets included in Emergence, but if you're expecting expanded decking rules or a writeup on the architecture of corporate hosts, I think you will be disappointed.

Unwired is the rule book covering deckers, technomancers, and hacking. Unwired isn't due out for another year or so though.
Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 25 2006, 10:32 PM
Post #15


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



QUOTE (TBRMInsanity)
I can't believe we are visiting this discussion again. can't people wait till Emergence comes out for the expanded rules. All your questions will be answered then. In the mean time think about the practicality that a Corp host that has millions of people view every second being run off even the most powerful Commlink. It is loco to think that. A Corp host is either a lot of Commlinks together with a shared database or a supper computer that doesn't follow standard rules (and the expanded rules will come out in Emergence).

gosh sorry TBRMInsanity, maybe I should just wait a fuking year for complete matrix rules! If any hacker I GM until then wants to hack a corporate host I'll just tell him to wait for Unwired. The good thing is that I started this thread asking for help and opinions on how make things work in the interem and your post really helped me. :)

...Wait! No it didn't help me. U just wasted almost 60 second of your life typing a message that was no help to anyone which caused me to waste two minutes of mine to reply to our inanity

KISS MY A$$
Go to the top of the page
 
+Quote Post
Garrowolf
post Oct 26 2006, 03:22 AM
Post #16


Moving Target
**

Group: Members
Posts: 870
Joined: 2-October 06
From: Athens Ga
Member No.: 9,517



Okay so let's come up with something.

The assumption that I make is that they have a fairly high response 5+ but they have so much computing resources that the response never lowers. This way we can keep the numbers from being absurd without the overload of response. You can consider this a special attribute of servers.

Signal is not an issue so ignore that.

System would be high to accomidate everything but also ignore program limits.

Firewall would have to stay in a reasonable range so hacking would be possible so keep it in the 1-6 range for everything except highly secure meagcorp or military servers and they can go to an 8+.

I don't think that they would have 15 IC or Agents running around the server. They would just spawn a new copy for help requests and during security alarms.

Set a hacking threshold and have that as a security level (say 1-4). Anytime they roll below that threshold then for every point they go below it they add a point of alarm. Also accessing certain files or nodes could raise the alarm level until it is confirmed.

Drop the perception check by the server checking for hackers. Just make it passive because if it was an active system then They could just sit around making perception tests with a near infinite number of IC and always win. This way the hacker has a chance. Also make their stealth the alarm's threshold to activate (ie you have to mess up enough to tip off the server but you can cover up a certain amount of mistakes).

That is what I suggest. I use a different version of the matrix system but this would be close to the original version and should work.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Oct 26 2006, 04:25 AM
Post #17


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Garrowolf)
Okay so let's come up with something.

The assumption that I make is that they have a fairly high response 5+ but they have so much computing resources that the response never lowers. This way we can keep the numbers from being absurd without the overload of response. You can consider this a special attribute of servers.

Signal is not an issue so ignore that.

System would be high to accomidate everything but also ignore program limits.

Firewall would have to stay in a reasonable range so hacking would be possible so keep it in the 1-6 range for everything except highly secure meagcorp or military servers and they can go to an 8+.

I don't think that they would have 15 IC or Agents running around the server. They would just spawn a new copy for help requests and during security alarms.

Set a hacking threshold and have that as a security level (say 1-4). Anytime they roll below that threshold then for every point they go below it they add a point of alarm. Also accessing certain files or nodes could raise the alarm level until it is confirmed.

Drop the perception check by the server checking for hackers. Just make it passive because if it was an active system then They could just sit around making perception tests with a near infinite number of IC and always win. This way the hacker has a chance. Also make their stealth the alarm's threshold to activate (ie you have to mess up enough to tip off the server but you can cover up a certain amount of mistakes).

That is what I suggest. I use a different version of the matrix system but this would be close to the original version and should work.

Is there no section of RAW you don't house rule or re-write? It makes it hard to have RAW conversations when 95% of your points are home grown.

Hacking rules aren't perfect, but they are far from being so unusable they need to be tossed out IMO.

Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 26 2006, 04:30 AM
Post #18


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



Thanx Garowolf, we're thinking along the same lines.

At lunch today I had a brainstorm about "distrubuted processing" which is a phrase that I feel justified in throwing around because I'm completely computor illiterate. (and if you check my spelling you'll notice that I am almost completely engrish illitelate. I blame my nation of origen.)

anyhow, back to my "distributed processing" which might be something like several computers working on the same task.

Take several computers, hardwire them together, all three or four of them use rules similar to "Teamowork Tests" pp. 59 to run the OS.

I havn't had time tonight to develop this much but basicly each additional unit provides a bonus to responce. The point of rules being to establish limits I'd cap this a 5-7 total units, but I have a vague feeling that today someone is working on linking hundreds of processors to work at the same time re. Mac's Quadcore G5 desktop and Dell's dual core2duo machine but... Bigger?

So maybe you can have a core unit with additional units up to the rating of either the responce of the core unit or the system rating of the OS.

I get the feeling that the intention of the developers is a device rating cap of 6. So max system/program/responce/firewall/pilot/skill/etc. rating should probably be left at 6. and the mechanics should reflect not a rating but a bonus.

something like this;
core processor rating 6
system rating 6
6 additional processing units

each additional processing unit, a device unto itself, adds 1 to the "EFFECTIVE" responce of the NODE. All of the devices together form a single node. ACTUAL responce rating is still 6 for all purposes relating to tests i.e. the Initiative of a security decker or the maximum rating of a Host's verson of the Reality Filter program used to skulpt Ultraviolet nodes.

Each program/agent run on the distributed node counts against the threshold for responce degredation. HOWEVER, (hehe I like caps), However the "EFFECTIVE" responce of this theoretical system is 12. [core rating 6 (+1 x 6 extra devices.)] SO, every 6 programs active on the node reduce "EFFECTIVE" responce by 1 and ACTUAL responce is unaffected until you have 36 progs running. Which seems to me like overkill and waaay to powerfull but I'm of the opinion that programs loaded into agents DON'T count against the system responce threshold.

Other ideas off the hip;
crashing the node: any of the linked devices is capable of running the the whole node at their individual device ratings. Crashing one of the computers (I can't realy think of them as comlinks and at this point they aren't nodes of themselves.), will lower the system and responce rating but you'd have to crach all six to kill the node.

double OS cost: no normal OS progs can run a distributed node these are special versions of stock OSsesz like Mac's OSX server. or the windows equivelant. (I should disclaim that I have any idea that I know what RL server software is or does I only know that it's special and costs more.) So the Isis Orb OS prog would cost 2000¥ or more and have the same stats.

Responce limited System rating: One of the special things about the distributed node system software would be that it's not limited by ACTUAL responce. So you may be able to run a rating 6 system OS on a distrubuted node with rating 4 responce as long as the EFFECTIVE responce is at least 6

I'm starting to get punchy, going to bed now. would love to work on this with people who actualy know somthing about electronics and/or the SR4 rules.
Go to the top of the page
 
+Quote Post
OneTrikPony
post Oct 26 2006, 05:06 AM
Post #19


Moving Target
**

Group: Members
Posts: 500
Joined: 4-September 06
From: Salt Lake UT
Member No.: 9,299



Grinder

I didn't read that Garrowolf was throwing out the hacking rules. I think he, like me wants his hacker player to be able to hack something that isn't a comlink.

Please, how do you set up your Corp Nodes in your game?

Everyone, what are the nodes you've run against? Which ones kicked your ass which ones where easy, did they all seem just like hacking a high level target's comlink? What made them different?

ok now I'm really going to bed, you bastards are wearing me out :)
Go to the top of the page
 
+Quote Post
Garrowolf
post Oct 26 2006, 05:21 AM
Post #20


Moving Target
**

Group: Members
Posts: 870
Joined: 2-October 06
From: Athens Ga
Member No.: 9,517



well to be fair to Grinder I did change the hacking rules significantly. These server rules would be farther afield in my game but mostly how I put it here.

In my game I removed the limits on Response unless you are running more then one agent and then it drops alot. Servers wouldn't have that issue.

I also turned System into a package deal of software like OSs are now and removed the system limit on programs so response is the only limit. That way you don't have two traits doing the same thing (limiters).

It's just an alternate system. I never consider cannon to be anything more then the best they could come up with without me!
Go to the top of the page
 
+Quote Post
Blade
post Oct 26 2006, 09:33 AM
Post #21


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



I like the idea of distributed processing too. The way I tend to see it, is that you don't have a big corporate server, but a lot of smaller nodes merged together. When you connect to a corporate server, you connect to one node, reserved for you.

Thanks to a good use of distributed processing, you don't see that you're in only one node : you can freely go from one node to another without even seeing that they are two different nodes.

For example, a security server is linked to 9 surveillance cameras. The server consists of 3 rating 5 nodes (security terminal). Each one is suscribed to 3 cameras and to the other nodes. They have 4 slots left for suscribing to user's commlinks.
Each of them run programs and agents (the agents can roam in the whole server). From node A you can check a camera suscribed to node B : node B just sends the data to node A. So the host can look like a monitoring room with 9 screens.

This way, you don't have to use different rulesets for each kind of nodes while still being "realistic".
Go to the top of the page
 
+Quote Post
Ryu
post Oct 26 2006, 09:44 AM
Post #22


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



A "redundant array of independend Comlinks" as a server model... nice. Could even be hardwired for the most part and would still be mobile.
What if your hacker does this? (Any program at rating 6 and running, yes!)
The number of subsriptions will hardly be an issue - larger bandwith for servers will be possible. I do even think the subscription limit is for comlinks only.

I do not think that the multiple-ICE-approach to intruder repelling should be "forbidden". It should be the method reserved for ultra-secure hosts, as the licensing costs are surely high - but thats one way to provide security to Z-O.



So far, we basically set things up by the book and do matrix security by storytelling needs. Encryption comes with an agent that constantly re-encrypts (exchange the extended test with a normal test, now it works. while staying RAW). Most simple systems only use the admin user-level and have alarms in case of user registration. We consider to allow increased ratings for stationary systems. Basic reservation against that idea stems from the necessary changes to vehicle ratings.
Go to the top of the page
 
+Quote Post
Blade
post Oct 26 2006, 11:01 AM
Post #23


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



QUOTE ("Ryu")
What if your hacker does this? (Any program at rating 6 and running, yes!)


There's a catch here : the agents/programs you carry with you in other nodes are loaded on your persona and the persona is linked to the commlink. So if you have 10 commlinks, you'll have 10 personas and each one will be limited to 5/6 rating 6 programs... You can't link a single persona to a node array - well at least you shouldn't be able to (except if your GM is ok with an agent army, that is).

Nevertheless, it's a really good way of getting more subscriptions (especially for the riggers) and to add layers of protections, forcing attackers to hack each commlinks one after another.
Go to the top of the page
 
+Quote Post
TBRMInsanity
post Oct 26 2006, 01:06 PM
Post #24


Running Target
***

Group: Members
Posts: 1,002
Joined: 22-April 06
From: Canada
Member No.: 8,494



QUOTE (OneTrikPony)
QUOTE (TBRMInsanity @ Oct 25 2006, 09:05 AM)
I can't believe we are visiting this discussion again.  can't people wait till Emergence comes out for the expanded rules.  All your questions will be answered then.  In the mean time think about the practicality that a Corp host that has millions of people view every second being run off even the most powerful Commlink.  It is loco to think that.  A Corp host is either a lot of Commlinks together with a shared database or a supper computer that doesn't follow standard rules (and the expanded rules will come out in Emergence).

gosh sorry TBRMInsanity, maybe I should just wait a fuking year for complete matrix rules! If any hacker I GM until then wants to hack a corporate host I'll just tell him to wait for Unwired. The good thing is that I started this thread asking for help and opinions on how make things work in the interem and your post really helped me. :)

...Wait! No it didn't help me. U just wasted almost 60 second of your life typing a message that was no help to anyone which caused me to waste two minutes of mine to reply to our inanity

KISS MY A$$

You know what, screw you! If you can not modify your own damn game as a GM then you are not a good GM period.
Go to the top of the page
 
+Quote Post
deek
post Oct 26 2006, 01:34 PM
Post #25


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Personally, I just don't worry about loads, agents or IC when it comes to corporate nodes...the hacker still has to worry about it because even though he is in the Matrix, his own commlink is his connecting point to it.

So, I basically use all the same rules when hacking a node, minus the reduced response, system, etc. This could be abused, but as a GM I try to keep things fair and it hasn't become a problem.
Go to the top of the page
 
+Quote Post

3 Pages V   1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 05:27 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.