![]() |
![]() ![]() |
![]() |
![]()
Post
#26
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,978 Joined: 26-February 02 From: New Jersey, USA Member No.: 500 ![]() |
Recon satellites don't just transmit their imagery to anyone who asks.
They only transmit to authorized ground stations, who -then- transmit the imagery (perhaps automatically, perhaps not) to the requester. That might help things.:) |
|
|
![]() ![]()
Post
#27
|
|
Target ![]() Group: Members Posts: 56 Joined: 26-September 07 From: The Glitterman Member No.: 13,422 ![]() |
Thanks everyone for the good tips. Looks like I just need to stuff the rules in my head and learn when to use which one for the moment at hand. I'll put it all to use next session! KK is Up and OUT! :rotate:
|
|
|
![]()
Post
#28
|
|||
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
Sats don't. But people who own commercial sats will gladly sell you really hi res data they have collected. But it isn't going to be realtime unless you own the sats or have REALLY good connections. And typically it takes quite a bit of post processing to get the image to do what people want. Things always look easier on TV. :twirl: As an example: http://www.spot.com/ |
||
|
|||
![]()
Post
#29
|
|
Moving Target ![]() ![]() Group: Members Posts: 241 Joined: 14-December 06 Member No.: 10,360 ![]() |
Quick matrix question (seeing as how this is the current "WTF is with the Matrix rules" thread):
|
|
|
![]()
Post
#30
|
|
ghostrider ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,196 Joined: 16-May 04 Member No.: 6,333 ![]() |
Keep in mind that "it's easy to multi-task" is fluff. However, you could take it to mean that you've got a couple of agents doing X and Y for you while you do Z, and your character (and his/her abilities) are effectively multi-tasking.
|
|
|
![]()
Post
#31
|
|
Moving Target ![]() ![]() Group: Members Posts: 241 Joined: 14-December 06 Member No.: 10,360 ![]() |
Is that a "Yes" or a "No"? Or is it a "Yes, but only with the use of agents"?
|
|
|
![]()
Post
#32
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
I'd rule no. Doing it that way would make it work like no other extended test in the game. If you're doing a long term probe to hack something, it's implied that you're doing it full time, not starting the process, then logging off to watch the trid. I don't see why an extended test measured in combat turns would work differently |
||
|
|||
![]()
Post
#33
|
|
Moving Target ![]() ![]() Group: Members Posts: 225 Joined: 13-July 07 Member No.: 12,235 ![]() |
Yep, agreeing with Nightrain here. The rules do say you can be accessing several different nodes at once; this, I think, is what they mean by multitasking. However, if you're doing extended tests, those take time and thought and effort, and you can't just tell your exploit program to go probe the Ares mainframe and tell you when it's done.
|
|
|
![]()
Post
#34
|
|
Immoral Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 15,247 Joined: 29-March 02 From: Grimy Pete's Bar & Laundromat Member No.: 2,486 ![]() |
I wouldn't allow it either.
|
|
|
![]()
Post
#35
|
|
Deus Absconditus ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,742 Joined: 1-September 03 From: Downtown Seattle, UCAS Member No.: 5,566 ![]() |
I think that's also why Agents are so wonderful. Conceptually, anyway.
|
|
|
![]()
Post
#36
|
|
Moving Target ![]() ![]() Group: Members Posts: 241 Joined: 14-December 06 Member No.: 10,360 ![]() |
Right, so you can't just leave it to make tests on it's own, but what if it were the following situation:
Combat Turn 1: IP1: Detect Hidden Node (starting detection) IP2: Intercept Wireless Signal Combat Turn 2: IP1: Detect Hidden Node (to keep attempting to detect) IP2: Command a drone etc. Is that viable? |
|
|
![]()
Post
#37
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
No. It's Combat Turn 1: IP1: Detect Hidden Node (starting detection and rolling dice) IP2: Detect Hidden Node (continuing detection, no dice rolled) Combat Turn 2: IP1: Detect Hidden Node (continuing detection and rolling dice) IP2: Detect Hidden Node (continuing detection, no dice rolled) etc. |
||
|
|||
![]()
Post
#38
|
|
Moving Target ![]() ![]() Group: Members Posts: 241 Joined: 14-December 06 Member No.: 10,360 ![]() |
That's what I figured, but I wanted verification
|
|
|
![]()
Post
#39
|
|||
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
An Agent with Exploit could, however. [GEEK TALK FOLLOWS] The way I handle THAT is to have a DMZ-like area just outside the node that is guarded. If an agent pops in they are analyzing to identify and trace detected agents. Agents they fail to trace are engaged in cybercombat after an alert. It makes it so *people* need to probe and that those probing high-sec nodes need to be reaaaally stealthy. |
||
|
|||
![]()
Post
#40
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
In shadowrun lingo a DMZ would be a chokepoint.
|
|
|
![]()
Post
#41
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
Or in 3rd ed terms it could be the LTG at the node's entrance.
|
|
|
![]()
Post
#42
|
|
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
Except that would mean running the IC on the LTG to detect those snooping Agents, and I don't think that's something the local telco would be overly happy with. Give them a public front end "web page" type server, then run the IC on that, scanning any agents that try and snoop around further than the public server
|
|
|
![]()
Post
#43
|
|||
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
not so. think about it this way: RTG: backbone internet routing. in SR1-3 it was often a national or large regional system. LTG: ISP level routing. within a RTG, any number of LTG's could exist. host: the individual servers and/or networks. now known as a node. chokepoint: DMZ/firewall, a dedicated host stuffed to the brim with defensive (proactive and reactive) software. PLTG: a collection of hosts connected together with dedicated links (like say a collection of satellites to tie regional offices together). in SR4, the LTG, RTG and maybe even the PLTG have vanished into the cloud known as the matrix. no longer do you need to go from your deck to the local LTG, onto the RTG, onto another RTG, onto the targets LTG, maybe onto their PLTG, before running head first into their chokepoint and then host. instead you go from your comlink directly to the chokepoint and then host/node after locating the "location"/address of their connection. in other words, the chokepoint/DMZ/firewall have always been a dedicated host sitting between the office host and the matrix in general. |
||
|
|||
![]()
Post
#44
|
|||
Moving Target ![]() ![]() Group: Members Posts: 241 Joined: 14-December 06 Member No.: 10,360 ![]() |
Okay, so I had an idea this morning. What if I allowed this, but basically treated it as sustaining a spell, applying a -2 to everything else? This would, obviously, be cumulative for each program that is "sustained". |
||
|
|||
![]()
Post
#45
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
i would say it depends on how you envision the action being performed.
is it a "set the settings and let it do its thing" or is it "do some stuff, tweak, repeat and continue doing so until getting wanted result"? if its the former i can see it as sustained, you just funneling energy into a started "engine"... |
|
|
![]()
Post
#46
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
Personally, I'd be open to a house rule like that in my game, though I'd make sure the penalty applied to the extended test itself as well (especially?) |
||
|
|||
![]()
Post
#47
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 ![]() |
Just note, page 217-18 of core rulebook:
When you are accessing a node, you may set your Analyze program to automatically scan and detect other users/icons on that node with a Simple Action. A successful scan will be reported to you. Th e program will maintain that task for as long as you are on that node or until you kill that process. Th e gamemaster secretly conducts Matrix Perception Tests to determine if you detect other icons accessing the system. Depending on what you are using, some programs can be set to keep running without a penalty... Note, this is not an extended test, like the hidden node detection. |
|
|
![]()
Post
#48
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
as its a secret test, it may well be like if you have something sitting in the windows tray blinking while your doing something else...
as in, yea sure it detected that agent but didnt notice... |
|
|
![]()
Post
#49
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 ![]() |
Interesting topic. Nice to see people being constructive about the Matrix.
Here are my 0.02:nuyen: about it: The actual Matrix rules offer an interesting yet incomplete canvas. You can't use them without making at least some assumptions about some details. That's why I think all GM should think about it and choose whatever interpretation they prefer. The choices include: - Do you want open (the player (or GM) can come up with a new use of a program) or closed (only listed actions are possible) rules? - agents : how do they exactly work when acting independently - ICs : do they scan everything going on in the node or just icons "near" them? - Do you want the Matrix to be another part of the game or just a few rolls, no more important than lockpicking? - Do you want a metaphor-based matrix or not? Depending of the choices you make, your whole matrix experience will be totally different from someone else's, even if both are based on the BBB rules. |
|
|
![]()
Post
#50
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
some will see that as a weakness of the rules, some will see it as a strength...
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 26th August 2025 - 03:24 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.