IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3 >  
Reply to this topicStart new topic
> Need Hacking Inspiration/Ideas, How do I flesh out hacking within a run?
Penta
post Oct 8 2007, 09:42 PM
Post #26


Shooting Target
****

Group: Members
Posts: 1,978
Joined: 26-February 02
From: New Jersey, USA
Member No.: 500



Recon satellites don't just transmit their imagery to anyone who asks.

They only transmit to authorized ground stations, who -then- transmit the imagery (perhaps automatically, perhaps not) to the requester.

That might help things.:)
Go to the top of the page
 
+Quote Post
Kool Kat
post Oct 8 2007, 11:17 PM
Post #27


Target
*

Group: Members
Posts: 56
Joined: 26-September 07
From: The Glitterman
Member No.: 13,422



Thanks everyone for the good tips. Looks like I just need to stuff the rules in my head and learn when to use which one for the moment at hand. I'll put it all to use next session! KK is Up and OUT! :rotate:
Go to the top of the page
 
+Quote Post
kzt
post Oct 8 2007, 11:59 PM
Post #28


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Penta)
Recon satellites don't just transmit their imagery to anyone who asks.

They only transmit to authorized ground stations, who -then- transmit the imagery (perhaps automatically, perhaps not) to the requester.

Sats don't. But people who own commercial sats will gladly sell you really hi res data they have collected. But it isn't going to be realtime unless you own the sats or have REALLY good connections. And typically it takes quite a bit of post processing to get the image to do what people want. Things always look easier on TV. :twirl:

As an example: http://www.spot.com/
Go to the top of the page
 
+Quote Post
Kerris
post Oct 9 2007, 01:52 AM
Post #29


Moving Target
**

Group: Members
Posts: 241
Joined: 14-December 06
Member No.: 10,360



Quick matrix question (seeing as how this is the current "WTF is with the Matrix rules" thread):
  • There are quite a few matrix actions that are extended tests with an interval of 1 combat turn. The BBB (somewhere, I don't have a page reference) says that it's easy to multitask. While these "1 combat turn" matrix actions are happening, can the hacker take other actions? Can he start a scan for a hidden node, and then issue a command to a drone in the same turn?
Go to the top of the page
 
+Quote Post
eidolon
post Oct 9 2007, 02:00 AM
Post #30


ghostrider
********

Group: Retired Admins
Posts: 4,196
Joined: 16-May 04
Member No.: 6,333



Keep in mind that "it's easy to multi-task" is fluff. However, you could take it to mean that you've got a couple of agents doing X and Y for you while you do Z, and your character (and his/her abilities) are effectively multi-tasking.
Go to the top of the page
 
+Quote Post
Kerris
post Oct 9 2007, 02:31 AM
Post #31


Moving Target
**

Group: Members
Posts: 241
Joined: 14-December 06
Member No.: 10,360



Is that a "Yes" or a "No"? Or is it a "Yes, but only with the use of agents"?
Go to the top of the page
 
+Quote Post
NightRain
post Oct 9 2007, 03:21 AM
Post #32


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



QUOTE (Kerris)
Quick matrix question (seeing as how this is the current "WTF is with the Matrix rules" thread):

  • There are quite a few matrix actions that are extended tests with an interval of 1 combat turn.  The BBB (somewhere, I don't have a page reference) says that it's easy to multitask.  While these "1 combat turn" matrix actions are happening, can the hacker take other actions?  Can he start a scan for a hidden node, and then issue a command to a drone in the same turn?

I'd rule no. Doing it that way would make it work like no other extended test in the game. If you're doing a long term probe to hack something, it's implied that you're doing it full time, not starting the process, then logging off to watch the trid. I don't see why an extended test measured in combat turns would work differently
Go to the top of the page
 
+Quote Post
Gelare
post Oct 9 2007, 03:27 AM
Post #33


Moving Target
**

Group: Members
Posts: 225
Joined: 13-July 07
Member No.: 12,235



Yep, agreeing with Nightrain here. The rules do say you can be accessing several different nodes at once; this, I think, is what they mean by multitasking. However, if you're doing extended tests, those take time and thought and effort, and you can't just tell your exploit program to go probe the Ares mainframe and tell you when it's done.
Go to the top of the page
 
+Quote Post
Fortune
post Oct 9 2007, 03:29 AM
Post #34


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



I wouldn't allow it either.
Go to the top of the page
 
+Quote Post
Adarael
post Oct 9 2007, 03:42 AM
Post #35


Deus Absconditus
******

Group: Dumpshocked
Posts: 2,742
Joined: 1-September 03
From: Downtown Seattle, UCAS
Member No.: 5,566



I think that's also why Agents are so wonderful. Conceptually, anyway.
Go to the top of the page
 
+Quote Post
Kerris
post Oct 9 2007, 03:47 AM
Post #36


Moving Target
**

Group: Members
Posts: 241
Joined: 14-December 06
Member No.: 10,360



Right, so you can't just leave it to make tests on it's own, but what if it were the following situation:

Combat Turn 1:
IP1: Detect Hidden Node (starting detection)
IP2: Intercept Wireless Signal

Combat Turn 2:
IP1: Detect Hidden Node (to keep attempting to detect)
IP2: Command a drone

etc.

Is that viable?
Go to the top of the page
 
+Quote Post
NightRain
post Oct 9 2007, 04:02 AM
Post #37


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



QUOTE (Kerris)
Right, so you can't just leave it to make tests on it's own, but what if it were the following situation:

Combat Turn 1:
IP1: Detect Hidden Node (starting detection)
IP2: Intercept Wireless Signal

Combat Turn 2:
IP1: Detect Hidden Node (to keep attempting to detect)
IP2: Command a drone

etc.

Is that viable?

No. It's

Combat Turn 1:
IP1: Detect Hidden Node (starting detection and rolling dice)
IP2: Detect Hidden Node (continuing detection, no dice rolled)

Combat Turn 2:
IP1: Detect Hidden Node (continuing detection and rolling dice)
IP2: Detect Hidden Node (continuing detection, no dice rolled)

etc.

Go to the top of the page
 
+Quote Post
Kerris
post Oct 9 2007, 04:13 AM
Post #38


Moving Target
**

Group: Members
Posts: 241
Joined: 14-December 06
Member No.: 10,360



That's what I figured, but I wanted verification
Go to the top of the page
 
+Quote Post
Wasabi
post Oct 9 2007, 04:32 AM
Post #39


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Gelare)
you can't just tell your exploit program to go probe the Ares mainframe and tell you when it's done.

An Agent with Exploit could, however.

[GEEK TALK FOLLOWS]
The way I handle THAT is to have a DMZ-like area just outside the node that is guarded. If an agent pops in they are analyzing to identify and trace detected agents. Agents they fail to trace are engaged in cybercombat after an alert. It makes it so *people* need to probe and that those probing high-sec nodes need to be reaaaally stealthy.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 04:40 AM
Post #40


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



In shadowrun lingo a DMZ would be a chokepoint.
Go to the top of the page
 
+Quote Post
Wasabi
post Oct 9 2007, 10:33 AM
Post #41


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Or in 3rd ed terms it could be the LTG at the node's entrance.
Go to the top of the page
 
+Quote Post
NightRain
post Oct 9 2007, 10:35 AM
Post #42


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



Except that would mean running the IC on the LTG to detect those snooping Agents, and I don't think that's something the local telco would be overly happy with. Give them a public front end "web page" type server, then run the IC on that, scanning any agents that try and snoop around further than the public server
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 11:41 AM
Post #43


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Wasabi)
Or in 3rd ed terms it could be the LTG at the node's entrance.

not so.

think about it this way:

RTG: backbone internet routing. in SR1-3 it was often a national or large regional system.

LTG: ISP level routing. within a RTG, any number of LTG's could exist.

host: the individual servers and/or networks. now known as a node.

chokepoint: DMZ/firewall, a dedicated host stuffed to the brim with defensive (proactive and reactive) software.

PLTG: a collection of hosts connected together with dedicated links (like say a collection of satellites to tie regional offices together).

in SR4, the LTG, RTG and maybe even the PLTG have vanished into the cloud known as the matrix.

no longer do you need to go from your deck to the local LTG, onto the RTG, onto another RTG, onto the targets LTG, maybe onto their PLTG, before running head first into their chokepoint and then host.

instead you go from your comlink directly to the chokepoint and then host/node after locating the "location"/address of their connection.

in other words, the chokepoint/DMZ/firewall have always been a dedicated host sitting between the office host and the matrix in general.
Go to the top of the page
 
+Quote Post
Kerris
post Oct 9 2007, 03:32 PM
Post #44


Moving Target
**

Group: Members
Posts: 241
Joined: 14-December 06
Member No.: 10,360



QUOTE (Kerris)
Combat Turn 1:
IP1: Detect Hidden Node (starting detection)
IP2: Intercept Wireless Signal

Combat Turn 2:
IP1: Detect Hidden Node (to keep attempting to detect)
IP2: Command a drone

Okay, so I had an idea this morning. What if I allowed this, but basically treated it as sustaining a spell, applying a -2 to everything else? This would, obviously, be cumulative for each program that is "sustained".
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 07:18 PM
Post #45


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i would say it depends on how you envision the action being performed.

is it a "set the settings and let it do its thing" or is it "do some stuff, tweak, repeat and continue doing so until getting wanted result"?

if its the former i can see it as sustained, you just funneling energy into a started "engine"...
Go to the top of the page
 
+Quote Post
NightRain
post Oct 9 2007, 08:52 PM
Post #46


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



QUOTE (Kerris)
Okay, so I had an idea this morning. What if I allowed this, but basically treated it as sustaining a spell, applying a -2 to everything else? This would, obviously, be cumulative for each program that is "sustained".

Personally, I'd be open to a house rule like that in my game, though I'd make sure the penalty applied to the extended test itself as well (especially?)
Go to the top of the page
 
+Quote Post
deek
post Oct 9 2007, 09:10 PM
Post #47


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Just note, page 217-18 of core rulebook:

When you are accessing a node, you may set your Analyze
program to automatically scan and detect other users/icons on
that node with a Simple Action. A successful scan will be reported
to you. Th e program will maintain that task for as long as you are on that node or until you kill that process. Th e gamemaster
secretly conducts Matrix Perception Tests to determine
if you detect other icons accessing the system.

Depending on what you are using, some programs can be set to keep running without a penalty...

Note, this is not an extended test, like the hidden node detection.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 09:37 PM
Post #48


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



as its a secret test, it may well be like if you have something sitting in the windows tray blinking while your doing something else...

as in, yea sure it detected that agent but didnt notice...
Go to the top of the page
 
+Quote Post
Blade
post Oct 10 2007, 11:54 AM
Post #49


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



Interesting topic. Nice to see people being constructive about the Matrix.
Here are my 0.02:nuyen: about it:

The actual Matrix rules offer an interesting yet incomplete canvas. You can't use them without making at least some assumptions about some details. That's why I think all GM should think about it and choose whatever interpretation they prefer. The choices include:
- Do you want open (the player (or GM) can come up with a new use of a program) or closed (only listed actions are possible) rules?
- agents : how do they exactly work when acting independently
- ICs : do they scan everything going on in the node or just icons "near" them?
- Do you want the Matrix to be another part of the game or just a few rolls, no more important than lockpicking?
- Do you want a metaphor-based matrix or not?

Depending of the choices you make, your whole matrix experience will be totally different from someone else's, even if both are based on the BBB rules.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 10 2007, 12:02 PM
Post #50


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



some will see that as a weakness of the rules, some will see it as a strength...
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th August 2025 - 03:24 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.