IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> what are you rolling when deleting logs and such.
sunnyside
post Jan 28 2007, 12:44 AM
Post #1


Shooting Target
****

Group: Members
Posts: 1,907
Joined: 31-December 06
Member No.: 10,502



Against firewall? Opposed test?
Go to the top of the page
 
+Quote Post
FrankTrollman
post Jan 28 2007, 12:53 AM
Post #2


Prime Runner
*******

Group: Banned
Posts: 3,732
Joined: 1-September 05
From: Prague, Czech Republic
Member No.: 7,665



Logs are deleted and modified with the Edit program. It's technically Edit + Computer. And the threshold is "set by the gamemaster" and can be done as an extended test. (SR4, p. 219)

---

Personally, I think that's crap. I would make it something more like this:

Opposed test of Logic + Computer (max hits equal Edit + 1) against System. If you succeed, you edit the datatrail, and your net hits are the threshold required to notice the change. The node's firewall makes an immediate roll to find th discrepency, and alarms go off if it does.

-Frank
Go to the top of the page
 
+Quote Post
Konsaki
post Jan 28 2007, 12:53 AM
Post #3


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



Depends on if it is a legal action or not. If you dont hack in at Admin level, then it's a Hacking + Edit test with a Hacking + Stealth Vs Firewall + Analize to see if the system 'sees' you doing the illegal action of deleting security logs or whatnot.
If you have an Admin Level access, then it's just a Computer + Edit test because what you are doing is perfectly legal.
Go to the top of the page
 
+Quote Post
cetiah
post Jan 28 2007, 12:57 AM
Post #4


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510




SR4 p225, under "Hackers and Editing" mentions that deleting logs is a Hacking + Edit, using the Edit program. The Edit program description says it is used for Edit Tests and the Edit Tests section refers to a "gamemaster-determined threshold".

I would use "1" or half the Firewall as a guideline, but that's just me. I think deleting logs should be a fairly common and easy task for a hacker (or his agent).

Technically, however, the act of deleting a log leaves a log behind. It might be better to crash the OS.
Go to the top of the page
 
+Quote Post
Konsaki
post Jan 28 2007, 12:57 AM
Post #5


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



@Frank

That threshold, IMO, should be determined by the ammount of illegal actions + half the ammount of legal actions you performed in the server. Then each hit on the test reduces the logs by one.
All things considered, you are only taking maybe 3 seconds out of your life to perform this action. In truth, you dont even really need to erase your log data unless you want your actions to be truly unknown. You could always just spoof your commcode once you left the node and there is little they could do to you.
Go to the top of the page
 
+Quote Post
Serbitar
post Jan 28 2007, 01:05 AM
Post #6


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (sunnyside @ Jan 28 2007, 01:44 AM)
Against firewall?  Opposed test?

Depends on what logs, depends on what ruleset (offical?), depends on your GM.

If you are interested in my interpretation:

QUOTE (sgm 1.1)

Deleting logs
Legal: Logic + Computer [Edit] (1, 1 turn)
Illegal: Logic + Hacking [Edit] (1, 1 turn)
Description: To erase all the traces of the hacking
activities one has left in the node, the log files
must be edited. Every hit deletes ”edit program
rating” hits worth of traces left behind.
If traces are left behind, a security hacker can
find out that the system was hacked and what
AID was used in the process.


The test is resisted by System+Firewall if it is done illegaly.
Go to the top of the page
 
+Quote Post
sunnyside
post Jan 28 2007, 01:35 AM
Post #7


Shooting Target
****

Group: Members
Posts: 1,907
Joined: 31-December 06
Member No.: 10,502



I notice two people have different methods for having the system resist. Is there actually a rule for it? That's really the issue. What happens when you want to erase something you shouldn't be at your user level.
Go to the top of the page
 
+Quote Post
Konsaki
post Jan 28 2007, 01:41 AM
Post #8


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



If it's an illegal action you have to roll Hacking + 'X', with X being the program required for the task.
The system which the illegal activity is taking place on gets to roll Firewall + Analize against the hacker's Hacking + Stealth dicepool to see if the system notices the illegal action.
Go to the top of the page
 
+Quote Post
Jaid
post Jan 28 2007, 01:42 AM
Post #9


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



QUOTE (sunnyside)
I notice two people have different methods for having the system resist. Is there actually a rule for it? That's really the issue. What happens when you want to erase something you shouldn't be at your user level.

well, the only major difference between having authorisation and not is whether you use hacking skill or computer skill, really, and that the node has a chance to detect if you hack it.
Go to the top of the page
 
+Quote Post
Serbitar
post Jan 28 2007, 01:58 AM
Post #10


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (sunnyside)
I notice two people have different methods for having the system resist. Is there actually a rule for it? That's really the issue. What happens when you want to erase something you shouldn't be at your user level.

No, no overall rule for this. In RAW, different attributes are used for differnt resists.
Go to the top of the page
 
+Quote Post
cetiah
post Jan 28 2007, 02:53 AM
Post #11


Moving Target
**

Group: Members
Posts: 745
Joined: 2-January 07
From: Los Angeles, CA
Member No.: 10,510



Near as I can tell there is no resistance unless the GM wants to set a threshold. If you score hits on a Hacking+Edit test, the logs are deleted.

Like I said before, deleting logs is mentioned in "Hacking and Editing" which refers to using Hacking + Edit but mentions no threshold. The Edit program mentions nothing about it except that its used for Edit Tests. The section on Edit Tests says to use a GM-determined threshold.
Go to the top of the page
 
+Quote Post
sunnyside
post Jan 29 2007, 03:16 AM
Post #12


Shooting Target
****

Group: Members
Posts: 1,907
Joined: 31-December 06
Member No.: 10,502



QUOTE (cetiah)
Near as I can tell there is no resistance unless the GM wants to set a threshold. If you score hits on a Hacking+Edit test, the logs are deleted.

Like I said before, deleting logs is mentioned in "Hacking and Editing" which refers to using Hacking + Edit but mentions no threshold. The Edit program mentions nothing about it except that its used for Edit Tests. The section on Edit Tests says to use a GM-determined threshold.

Ok so I wasn't missing something. That's all there is.

However the rest of you do the opposed test stuff as a house rule because, really, it just makes more sense.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 19th April 2024 - 11:36 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.