IPB

Welcome Guest ( Log In | Register )

3 Pages V   1 2 3 >  
Reply to this topicStart new topic
> 'monkey or Tarantula Help me, Or anyone who knows the Matrix
jmecha
post Jul 28 2007, 02:52 AM
Post #1


Target
*

Group: Members
Posts: 51
Joined: 23-July 07
Member No.: 12,339



If you were a hacker, would thier be a down side to having pockets full of comlinks, each comlink being full of agents and what not?

The reason I ask is because I know about jack and shit about the matrix despite rereading that chapter a few times, and I am sincerely curious if this multiple comlinks full of agents idea is any good.

I sort of think of each of thoose comlinks as truck loads full of S.C.U.D. vending machines, when you need help in the matrix, just keep calling on disposable assassions until the job is done.

Please anyone with an answer please chime in.
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 03:04 AM
Post #2


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



And their purpose would be to do what? Define "full of agents", what you're trying to do with it. If you're using it to exploit the (arguably) broken teamwork exploit tests, then sure, it'll work, but its debatable on whether thats allowed or not. If you're using it to exploit the agents only cause load on their home commlink, then again, it'll probably work, but its cheezy as hell. Honestly, imo, if you can run a few dozen agents on commlinks and have them do something useful by connecting to a central node, then goodbye hacking, because the corps will do that too, but their resources are more numerous. (I.E. next time you're hacking, the node you're in has a few dozen IC analyzing it a few dozen times per pass, since you have your few dozen agents, I merely consider it escalation, if it works, then everyone will be doing it.)
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 03:13 AM
Post #3


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



Aren't there penalties for running too many programs on the same node? That would limit the effectiveness of hordes of agents (and hordes of hackers too for that matter). In fact, the rating of the agent itself should reduce the effectiveness of the node too (but I don't know if that's RAW).
Go to the top of the page
 
+Quote Post
jmecha
post Jul 28 2007, 03:14 AM
Post #4


Target
*

Group: Members
Posts: 51
Joined: 23-July 07
Member No.: 12,339



huh?
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 03:20 AM
Post #5


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



QUOTE (jmecha @ Jul 27 2007, 10:14 PM)
huh?

p. 213. System (Software)
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 03:24 AM
Post #6


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Thats the arguement. If I am a hacker, and I'm hacking your metalink running vector xim OS. (Res 1, Sig 2, Fire 1, Sys 1). But I'm running off my commlink thats 6, 6, 6, 6. Running 5 rating 6 programs. Why don't my programs get limited by your commlink that I'm hacking? Because I'm not running them on your commlink. I'm merely connected to it, but they are running on MY commlink. Thusly, I can have each agent running on his own commlink, and hack his own way into yours, and each can do things to your commlink with the same freedom hackers get. They're running on their home commlink, and are merely connected to yours. Thats why its broken.
Go to the top of the page
 
+Quote Post
jmecha
post Jul 28 2007, 03:27 AM
Post #7


Target
*

Group: Members
Posts: 51
Joined: 23-July 07
Member No.: 12,339



So...if the comlink, node or whatever the matrix device maybe in this example had a system of 6....it could only hold (System x 2) 6 subscribers.......so only six hackers could fight over one comlink and or node at once simple because there is no room for additional combatants.

So because of this limitation, there are not countless IC inside of every node?
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 03:33 AM
Post #8


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



No, then everynode just subscribes to the nearest 12 office supplies. Stapler, printer, keyboard, etc etc. And hacking is utterly useless. Again, because you can't connect because its overwhelmed.

The way around this is to argue it this way. Corp Node A has system of 3 (for a max of 2x3=6) 6 subscribers. It subscribes a matrix connection 1, 4 IC nodes, and 1 Corp Node B.

I want to hack it, a successful hacking attempt subscribes Node A to my commlink (System 6). Subscriptions don't have to be two way, so I subscribe it to me, and I can now go about my way pwning it.

Thusly, the IC subscribe the node they're protecting to themselves, so they can access it . And you get infinite IC/agents again.

You either get no connections cause they're full, or infinite agents/IC/personas. Which is it?
Go to the top of the page
 
+Quote Post
Ravor
post Jul 28 2007, 03:38 AM
Post #9


Cybernetic Blood Mage
******

Group: Members
Posts: 3,472
Joined: 11-March 06
From: Northeastern Wyoming
Member No.: 8,361



Basically there are two different view on how Agents work, in one view yes, you can run an Agent using Node A's resources but have that Agent present and operating on Node B. In which case you have to ask questions like why doesn't every corp have node after node whoes only purpose is to run IC on the rest of the system.

The other view which I happen to share is that Agents have to use the resources of the node they are present on in which case nodes aren't going to be running hoards of IC because of the Responce drop. However then you have to ask how does Exploiting work, well personally I figure that the Agent gets to use Node A's resources while hacking into Node B but once in Node B then they have to use Node B's resources.

Deckers don't have this limitation because ... well ... they have a persona and Agents don't, or something to that effect.

As for using the hoards of Agents to be a super Decker, well, that's been hashed over so many times that I just suggest running a search on the topic.
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 03:48 AM
Post #10


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



I never really looked into agents much because of all the babble about the super smith hoard. Now, looking, I've found this line.
"Agents use the Response attribute of whatever node they are run on; this means that the attributes of an agent operating independently may vary as it moves from node to node."SR4, 227.

A lot can be taken from this line. 1) That agents are run on whatever node they are currently accessing (unless piggybacking as an active program on a deckers persona). 2) This means they count as an active program (as well as their active programs) against that node. 3) Therefore, the agent hoard is only good for bombarding IC nodes with, as the sudden appearance of so many programs will almost immediately halt the system through response degredation.

Therefore, agent hoards are good for many different tasks at once, or for halting systems through resource hogging. Other than that, they're pathetic and expensive.
Go to the top of the page
 
+Quote Post
jmecha
post Jul 28 2007, 03:51 AM
Post #11


Target
*

Group: Members
Posts: 51
Joined: 23-July 07
Member No.: 12,339



So in short...there is no real explination and or rule currently on print that explains why or even states why this is not possible, but it is generally accepted amoungst the Dumpshock communuity here that giant swarms on swarms of PC Agents vs Corp Hackers and what not is just ridiculous and sort of game breaking.

right or wrong?
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 03:57 AM
Post #12


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Actually, though the rule is vague, it does state that agents RUN on the node they are operating in. Unless they are operating as a program of a persona. THusly, there is a rule that explains why it isn't possible, because going past 1 (decent agent) or 2 (pathetic agents) even the best systems start becoming worthless, and quickly.
Go to the top of the page
 
+Quote Post
Ravor
post Jul 28 2007, 03:59 AM
Post #13


Cybernetic Blood Mage
******

Group: Members
Posts: 3,472
Joined: 11-March 06
From: Northeastern Wyoming
Member No.: 8,361



Welcome to the Martix 2.0, just pray to the Spirits that it actually gets fixed in Unwired.
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 03:59 AM
Post #14


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



I never played a hacker, but my understanding was that the hacker's persona is running on his commlink and the agent's persona is running on the node. The agent is free roaming and is essentially re-spawned on each node it exists on. The hacker's persona can only be spawned from his commlink.

Am I not misinformed? Was I not informed correctly?
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 04:02 AM
Post #15


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



And that would explain the difference between IC and an agent. IC is a network appliance that spawns it's persona somewhere on the system (like a hacker) and can roam the entire system without degrading each node it is on. This is why you would be smarter to run IC to protect your commlink instead of an agent.
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 04:02 AM
Post #16


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Yes buster. Thats roughly correct, however if a hacker is running the agent on his persona, then its always running on the hackers home node, much as any of the hackers other programs are. If the agent is free roaming, it is respawned on each node independently.
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 04:05 AM
Post #17


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



I didn't think an agent could be run on a persona, it had to be run on a node. When an agent is running on the hacker's commlink, it's only protecting/affecting his commlink node, not the node the hacker's persona is currently playing around in. Hence my IC/Agent post I made a second before your post.
Go to the top of the page
 
+Quote Post
Fortune
post Jul 28 2007, 04:05 AM
Post #18


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



QUOTE (Buster)
This is why you would be smarter to run IC to protect your commlink instead of an agent.

What, exactly, is the difference? And how would one go about converting an Agent into IC?
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 04:06 AM
Post #19


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



"Agents can be loaded into your persona like other programs (taking a Complex Action), allowing the agent to accompany you to any nodes you access."SR4, 227.
They can.
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 04:07 AM
Post #20


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



The difference is the sentence right before the sentence you quoted. And you don't "convert" Agents to IC anymore you can convert Pilots to Agents.
Go to the top of the page
 
+Quote Post
Tarantula
post Jul 28 2007, 04:10 AM
Post #21


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Fortune: Agents are IC, and IC are agents. IC is just the moniker for corps defensive agents. Hackers and spiders are much the same, except their real people. Difference is the name, not the abilities.

Buster: Persona's use their home commlinks ratings to run. Thusly, an agent running on your persona still uses your home commlinks response. However, the agent himself is a program, plus any other programs you want him to run, plus the ones you want yourself to run, and its already almost worthless anyway.
Go to the top of the page
 
+Quote Post
Ravor
post Jul 28 2007, 04:10 AM
Post #22


Cybernetic Blood Mage
******

Group: Members
Posts: 3,472
Joined: 11-March 06
From: Northeastern Wyoming
Member No.: 8,361



Reading the description of IC, they are basically Agents with a certain program loadout, a legacy term so to speak.

Unless Unwired changes things of course.
Go to the top of the page
 
+Quote Post
Fortune
post Jul 28 2007, 04:11 AM
Post #23


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



Then how would the Hacker go about acquiring/programming the IC (I still see no mechanical difference between the two) that you suggest he use on his Commlink instead of Agents?
Go to the top of the page
 
+Quote Post
Buster
post Jul 28 2007, 04:12 AM
Post #24


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



QUOTE (Tarantula)
"Agents can be loaded into your persona like other programs (taking a Complex Action), allowing the agent to accompany you to any nodes you access."SR4, 227.
They can.

Hmmm, that confuses the hell out of me then. Doesn't that mean that a node is NEVER degraded? If neither IC, agents, or hackers degrade a node with their programs, then what is the rule for? The rule must just be for commlinks and one spawn server on the system? So a company can save a ton of money by buying one high-system server that spawns all its IC/agents and all other nodes have System 1?
Go to the top of the page
 
+Quote Post
Fortune
post Jul 28 2007, 04:15 AM
Post #25


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



QUOTE (Tarantula)
Fortune: Agents are IC, and IC are agents. IC is just the moniker for corps defensive agents. Hackers and spiders are much the same, except their real people. Difference is the name, not the abilities.

That's what I've always thought, but people keep telling me they are different ... without actually explaining that difference.
Go to the top of the page
 
+Quote Post

3 Pages V   1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2025 - 06:49 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.