IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Matrix Help!, See above!
Thanos007
post Dec 14 2003, 05:37 PM
Post #1


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



The Idiots Guide to the Matrix thread needs to be edited down to something readable. I am trying to incorporate deckers into my game that aren't npc's and am having a hard time trying to understand all the rules. Is there a faq or another thread that has a step by step guide to decking. I find the layout in the BBB to be confusing.

Thanks

Thanos
Go to the top of the page
 
+Quote Post
Synner
post Dec 14 2003, 06:23 PM
Post #2


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



The Idiot's Guide thread has grown somewhat since its inception and can be hard to follow because we're not only doing sample runs with explanations but also fielding people's (and our own) doubts and questions as we go along. That being said a read through the first 4-5 pages includes a simple no frills datasteal run (my own posts and satcong's).

It would help to know what you're having difficulty with and how much of the rules you are comfortable with before commenting further.

However I will say that from a GM's point of view the Matrix is exceptionally simple to run. All you really need to know is that every Host has a Security Value and an ACIFS rating (ie. Orange 9-8/13/10/10/10) and that almost everything a decker can possibly do is a System Operation - which is simply an Opposed Test rolled against one of the ACIFS subsystems with a negative modifier equal to the appropriate program (without the appropriate program a decker rolls against the unmodified subsystem rating). .

The charts on pages 162 and 163 of the Matrix sb are the ideal crib sheets for this - they list all the possible Tests, the relevant ACIFS subsystem and the program that can be used to modify the target. Every time a decker makes a System Operation Test, the host Opposes it rolling its Security Value against the decker's Detection Factor. As in any standard Opposed Test, the host's successes are subtracted from the decker's to get the final result.

Independent of this result (whether the decker succeeded or failed the Test) all the successes the host rolls are registered by the GM. These make up the decker's Security Tally. When the Security Tally reaches certain levels (called Steps) IC is triggered in response. Different IC do different things and must be dealt with on a case by case basis.
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 14 2003, 11:10 PM
Post #3


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



QUOTE
every Host has a Security Value and an ACIFS rating (ie. Orange 9-8/13/10/10/10) and that almost everything a decker can possibly do is a System Operation - which is simply an Opposed Test rolled against one of the ACIFS subsystems with a negative modifier equal to the appropriate program (without the appropriate program a decker rolls against the unmodified subsystem rating). .


Yes. I understood that. What I'm having a problem with is when to do what. I'll read your posts in the Idiots Guide and see if this gets any clearer. However I still stand by my comment that the Matrix rules in the BBB are layed out in a very confusing manner. At least for me.

Thanks

Thanos
Go to the top of the page
 
+Quote Post
Dende
post Dec 15 2003, 02:01 AM
Post #4


Moving Target
**

Group: Members
Posts: 124
Joined: 21-November 03
Member No.: 5,837



Not just for you, 14/15 pages is TOO much for a simple walkthroug and/or faq.

I think a nice abridged article on someone's personal site would be far more helpful to understand the current ruleset.

That having been said. As a person with a computer science degere and lots of experience in networking, I find it much better to ignore the Matrix rules, which are horribly out of date, and insanely inaccurate now, let alone 60 years from now; and just kind of say okay, you wanna do what? Okay done, and/or leave out of the Matrix entirely.

If you do not have enough experience with modern technology to know/care, and like the rules, by all means use them. But I will warn you strongly if you are knowledge about how computers/the web work, you will be sorely dissapointed by the Matrix rules. Especially the hardware ones and their costs. The Deck parts show some of the systems flaws better than any other item for sale in the SR world.
Go to the top of the page
 
+Quote Post
Adam
post Dec 15 2003, 02:10 AM
Post #5


Prime Runner
*******

Group: Retired Admins
Posts: 3,929
Joined: 26-February 02
From: .ca
Member No.: 51



Synner and I have discussed a pared-down version of The Idiots Guide to the Matrix for a future issue of the Shadowrun Supplemental; I have some interesting ideas as to how it will be presented, and hope that the format will make it a bit more clear than the thread.

Go to the top of the page
 
+Quote Post
Dende
post Dec 15 2003, 02:14 AM
Post #6


Moving Target
**

Group: Members
Posts: 124
Joined: 21-November 03
Member No.: 5,837



Do you also plan to fix the memory, cost, and workings of the decks along with the out-dated matrix rules too?
I am not saying they were done poorly, but really, they are outdated, and horribly inaccurate given modern computing standards.

EDIT: That includes connections, the way RTGs/LTGs interact...Corpate LTGs...all sorts of stuff. Oh making a lot of it clearer would be beneficial too. The book really upon a strict reading inticates someone with a computer use of 1 can't even log in legally to servers at work...etc
Go to the top of the page
 
+Quote Post
Adam
post Dec 15 2003, 02:21 AM
Post #7


Prime Runner
*******

Group: Retired Admins
Posts: 3,929
Joined: 26-February 02
From: .ca
Member No.: 51



You should be addressing such concerns to the Shadowrun Line Developer., not me. You can reach him at info at shadowrunrpg.com
Go to the top of the page
 
+Quote Post
Kurukami
post Dec 15 2003, 06:15 AM
Post #8


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



On the other hand, since comparisons between megabytes and Megapulses were intentionally left undefined and vague, they might not be as out of whack as you might think. It's a different scale entirely, so abstract comparisons to modern-day computing standards (like "standard" PCs these days coming with 80 gig hard drives and 512+ megs of RAM) really don't apply.
Go to the top of the page
 
+Quote Post
Dende
post Dec 15 2003, 06:26 AM
Post #9


Moving Target
**

Group: Members
Posts: 124
Joined: 21-November 03
Member No.: 5,837



Did I even once mention that as my basis of comparison?
My basis is simply how many programs I can keep on my deck...100k for a program I shoulda written myself in a few days, at MOST a few weeks of which I can have about 4 running at any given time!?

HELL no...That is completely ridiculous especially as hackers write the smallest, best, and cleanest code using the highest level languages available, I assure you they could have dozens or MORE programs running simultaneously for simply mundane tasks...Only for things such as decryption would it be a mildly limiting factor, which I will not argue eats RAM, and CPU time, which it does, however locate, read/write, attack, and about 90% of the others are rediculous.

The sheer cost for a measely 512MP of Active is rediculous, and the fact that the room cost is so obscenely high for those simple and small parts it just doesn't make sense... Doube the Active space for storage? please...

I have about a billion other gripes about accuracy. this is as I said earlier, why I stay out of the matrix. I played 1 decker, best char I ever made for SR...and I will not play one again using those rules. Until I see an overhaul or write my own house rules for decking/computing I am out. If you like the system, fine. I am merely saying it isn't accurate, which is usually something about a dozen people here get behind and say "We like accuracy." In the case of computing, this is something I have a BS in and a lifetime of vested interest. I can make a dozen computers in 2 hours, I can build a dream machine for about 600 bucks...I know computers, especially hardware, and I feel more than safe saying the SR system is not accurate.
Go to the top of the page
 
+Quote Post
Diesel
post Dec 15 2003, 07:21 AM
Post #10


Moving Target
**

Group: Members
Posts: 608
Joined: 9-July 02
From: California
Member No.: 2,955



Hey hey, those hackers aren't writing programs that fly through fucking virtual reality in not the internet but the freakin' matrix and then kill people or blow stuff up. That's too cool to multi-task.
Go to the top of the page
 
+Quote Post
Adam
post Dec 15 2003, 07:24 AM
Post #11


Prime Runner
*******

Group: Retired Admins
Posts: 3,929
Joined: 26-February 02
From: .ca
Member No.: 51



Well, yes. Comparing Shadowrun's computers and Matrix to real life is pointless, because they're entirely different and meant to be that way.

Wanting Shadowrun's computers and Matrix to be more like real life, that's the domain of house rules.
Go to the top of the page
 
+Quote Post
Kurukami
post Dec 15 2003, 07:30 AM
Post #12


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



Actually, in that regard I agree with you. I do agree that a number of the prices for creating your own hardware are quite excessive. Software, too, for some of the things.

I also possess a BSci in computer science, though I haven't gone into networking as you have (the job market wasn't quite as friendly to me :S ). And I do agree that, realism-wise, the Matrix rules as written don't approach the factual structure and logic which govern computing in the modern era. What, precisely, would you replace it with?

Basically, I'm seeing a great deal of "this system sucks" without much in the way of proposed replacement. Within the SR system, if you eliminate all but the decryption (which, from your previous posts, you debate most eloquently is the only thing which should take CPU time), then decking -- one of the primary elements of the cyberpunk genre -- becomes little more than a single test. If you have alternative rules which might prevent the relegation of an entire archetype to obsolescence and still meet your demands for accuracy, then by all means present them.

I completely respect your experience and your devotion to your profession. It's a devotion which, to some degree, I share. If you've read my posts on this board, you know that I've often rallied against how quickly mages seem to develop their kick-ass techniques while deckers get screwed on time and Karma (having to buy half a dozen knowledge skills for specific programming tasks, where mages get by on fairly basic skills). I guess I'm just looking for something more than "I feel more than safe saying the SR system is not accurate".

Help us build something better.
Go to the top of the page
 
+Quote Post
Synner
post Dec 15 2003, 10:03 AM
Post #13


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE (Dende)
Not just for you, 14/15 pages is TOO much for a simple walkthroug and/or faq.

I suggest you give it a read anyway. The IGTTM thread is not a 14/15 page walkthrough and it is not hard to follow if you identify people who are involved in the sample runs (satcong and I, and now Kukukami and I) and follow their posts. The "problem" is that the IGTTM thread attempt to come up with (unofficial) answers to a number of different FAQs and doubts interspersed with the two actual play by play runs as those doubts come up in practice. I've since added some "identifiers" to the relevant posts.

As Adam has mentioned above, we have discussed making the IGTTM sample runs (rather than the FAQ aspect) into TSS articles and I hope to have the first one prepped to send to him soon.

Regarding the rest of the post I'd like to argue that Dende is missing one important element (if not the most important) of the Matrix, one which is way beyond a current decker/hacker's experience, which has nothing to do with how the program functions or how tight the code, and which ultimately justifies any value the designers chose to put on the size of programs - ASIST technology and all the sensory input coding that goes with every single piece of software represented in the Matrix, even if it is simple UMSII.

Even if someone were to go to the trouble to calculate an equivalence between Mb and MPs, and then analyze program sizes based on that (still mostly impossible since it is impossible to know how many variables you'd have to include in any program to match a 2063 host's/mainframe's capacity to protect itself), there is still absolutely no way to derive values for the ASIST/interactive representation aspect of each program.

Furthermore, despite Dende's negative take on the plausibility of the Matrix system, I've talked to at least one CompSci alumni who says that the SR Matrix system is actually pretty close to developments in modern User-based systems (rather than Network Code-based systems), that in fact the Matrix is closer to an Internet structure than what SR would have you believe and in many ways similar to technology being developed not for traditional computer network management but for interactive/digital television and online computer games.

As he put it, "a Persona seems to be simply a cross between a current day operating system and a web browser - in most respects it is a mobile "Windows platform" which interfaces with other systems like a browser does a website and off which you run programs. Like a browser it logs on to a particular address/coordinates, allows access to the ASIST feed information at those coordinates and allows you to then manipulate the information "on site" with the programs that you have "Active" in your "mobile operating system" rather than using the Host's space."

However this all means that the underlying Matrix protocols are highly biased towards program use and are based on the understanding that at the speeds the Matrix operates at, most deckers/hackers would not have the skill to affect most Host coding with on the fly hacking and programming, and so would resort to simply running pre-made programs (with their ASIST loads).

The "run time" this takes is impossible to judge since in fact several levels of processing are happening every time you do anything (ie. you give your orders by DNI; this is translated to ASIST protocols; run by your deck, transmitted to your Persona/browser which is operating on another system - the Host - in terms of programming commands; the program then runs on the Host which includes both the strict execution of the commands and the ASIST/Sensory interaction elements;
the Host 'interacts' to those commands with a set of responses and ASIST/Sensory interaction elements; this is recieved by your Persona and sent back to the deck; then those are translated back into DNI and processed by your mind.
Go to the top of the page
 
+Quote Post
Namergon
post Dec 15 2003, 10:53 AM
Post #14


Moving Target
**

Group: Members
Posts: 138
Joined: 26-February 02
From: Paris, France
Member No.: 639



Amen, Synner.
As someone working in computer technology in a R&D center, I agree 200% with your post.
I also want to add that the programming rules of Matrix sourcebook are very compliant to RL development process.
Go to the top of the page
 
+Quote Post
Dende
post Dec 15 2003, 04:31 PM
Post #15


Moving Target
**

Group: Members
Posts: 124
Joined: 21-November 03
Member No.: 5,837



EDITED to be readable...Actually can be read now...

All SUs assume max allowed per part. You can only go as fast as the slowest part. You actual Speed is up to your net quickness, decided by your (Int + Will + (Hack or comp skill))/2. You cannot go above the SU allotment.

Matrix Connections

Sat Accessible anywhere on the planet
Type Cost/Month SU Allowable
S-1: 500 ¥ 2
S-2: 750¥ 4
S-3: 1500¥ 5

Personal Accessible anywhere with a line
Type Cost/Month SU Allowable
A-1: 100¥ / month 1
A-2: 250¥ / month 3
A-3: 500¥ / month 5
A-4: 750¥ / month 6
A-5: 1000¥ / month 10

Corporate These also require a business grade line to your house/building
Type Cost/Month SU Allowable
A-1: 1000¥ 10 SU
A-2: 2500¥ 12 SU
A-3: 5000¥ 15 SU
A-4: 7500¥ 20 SU
A-5: 10000¥ 25 SU

Custom Decks All Decks need a case, Active and Physical, Board and Chip.

Deck Cases Flashy colors (Conceal – 2). All boards fit in all decks.
Type Concealment Ex Drive Bays Cost
A: 6 1 200¥
B: 8 2 500¥
C: 10 3 750¥

Boards
Type Cost Active Slots Physical Slots SU Allowment
Light: 200¥ 2 2 15
Med: 300¥ 4 3 30
Heavy: 500¥ 6 4 50

Ex Drives
MiniCD 50¥
Crystal 100¥
Chip Drive 200¥

Active Chips
5 slots 100¥ a pop
10 slots 250¥ a pop
15 slots 500¥ a pop
20 slots 750¥ a pop

Physical Storage
50 slots 150¥ a pop
100 slots 300¥ a pop
150 slots 750¥ a pop
200 slots 1000¥ a pop

Processor Chip:
Type Cost SU Allotment
Low-1: 750¥ 5
Low-2: 1000¥ 10
Mid-1: 1250¥ 15
Mid-2: 1500¥ 25
High-1: 2000¥ 40
High-2: 2500¥ 50

Programs
Your OS/browse utility must always be running to be in matrix. This consumes 1 Active and 3 Physical slots. OS always runs. Base cost assigned to each type:
Rating Base Cost Utility Combat System Development
1 1000¥ 50% 100% 75% 40%
2 2000¥
3 4000¥
4 6000¥
5 10000¥
6 15000¥
7 20000¥

Programming Base Time
Time Cost is per 2 ratings. A Development Program is required.
Total Time = Time / ((Successes of Programming Roll + Devolopment Rating)/4)
Type Base Time Minimum Time
Utility 2 wks 3 days
Combat 1 month 1 week
System 3 wks 5 days
Development 1.5 wks 2 days

Umm, combat is left alone, as is availability. I would like a bit of help there, but I do like how comabt works now, mostly. I welcome comments, and questions.
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 15 2003, 07:20 PM
Post #16


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



As entertaining and informative as the above discussions are they don't really help me with my problem. I have read the IGTTM and found it entertaining as well and a little helpful. I would have probably been better if they had done the run with just the tests etc. then done it with all the color. IMHO.

However, to bring this back on topic... I'm going to do my own run here. 1st I'll create a host using the rules from the BBB. In fact that's all I'll be using as I don't have any of the Matrix SB's available. So... I'v decided that the Host will be orange. Something tuff but not impossible for a noobie. I've also decide that it's intrusion difficulty will be average. Generating a random number using the BBB rules I role a two wich equals 1. I add the +6 for a total of 7. So the host is now known as Orange-7.

Now for the sub-systems... In order role 2d3 +9 to get numbers: 12,12,12,15,14

So now we know the whole system as Orange-7 12/12/12/15/14

Depending on the posts this generates my next trick will be to create a deck with programs.


Thanos
Go to the top of the page
 
+Quote Post
Dende
post Dec 15 2003, 07:40 PM
Post #17


Moving Target
**

Group: Members
Posts: 124
Joined: 21-November 03
Member No.: 5,837



Okay...Well let's do it this way.

You have your target server. check

Don't forget to assign IC level...

Your decker needs stats, and a datajack to go into his computer. Let us know these.

Your decker needs to assign points to his Bod, Masking, Evasion, and Sensors. Once there, let us know those.

You will need to make your decker's deck. Easiest way would be use a base model... like the CMT Avatar, expensive, but nice. in the system.
MPCP of 7
Hardening of 4
I/O speed of 300
Memory of 700
Storage of 1400

Then you must buy programs to put on the deck.
Go to the top of the page
 
+Quote Post
Synner
post Dec 15 2003, 09:38 PM
Post #18


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



Before you get into the decker and software, you should first draw up a Security Sheaf listing the IC and trigger steps to go with the Security Rating and ACIFS you have already generated.

Unfortunately though there are rules for determining Security Sheaf trigger steps in SR3 (page 211), the random IC allocation rules are in Matrix. You can either:
  • create your own on the fly and attribute IC as you see fit (probably unwise at this point);
  • borrow one from one of the published SR3 adventures;
  • borrow one of the ones on here
  • or try this link to a random host generator (note that from experience I've found the Sheaves generated on this one on the tough side).
Get the Security Sheaf sorted out before getting into decker creation.

Note that calling your host "Orange-7" is slightly misleading and might lead to confusion - Orange-7 is the Security Rating of the Host not a designation. It's «insert corp name here» corporate office Host and it has a Security Rating of Orange-7. This minor distinction is important when your Orange-7 host is actually part of a tiered system (but more on that later).

It's also helpful to know whether you intend to gamemaster or play a decker since this gives us some parameters to help you with. And whether you are creating a decker with Chargen rules or after some game time (this is mainly because depending on your GM's interpretation, decks like the CMT Avatar might be unavailable at creation because the MPCP has a rating above 6).

You may also want to check out The original Idiot's Guide to the Matrix thread which contains guidelines and help for anyone interested in developing a decker and his program load including explanations by a number of people on the various choices available and different priorities/strategies.
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 16 2003, 12:27 AM
Post #19


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



QUOTE
Note that calling your host "Orange-7" is slightly misleading and might lead to confusion - Orange-7 is the Security Rating of the Host not a designation. It's «insert corp name here» corporate office Host and it has a Security Rating of Orange-7. This minor distinction is important when your Orange-7 host is actually part of a tiered system (but more on that later).

It's also helpful to know whether you intend to gamemaster or play a decker since this gives us some parameters to help you with. And whether you are creating a decker with Chargen rules or after some game time (this is mainly because depending on your GM's interpretation, decks like the CMT Avatar might be unavailable at creation because the MPCP has a rating above 6).


Yes. I ment that we know it is a orange-7. It's for Corp X. No tiered system. I'm GMing and just want to get the veerrrryyy basics down. So this doesn't represent a charicter or actual game. Just hypothetical so I can get the rules down.

Here's the rest of the info on the host: Corp X orange-7 12/12/12/15/14
Security sheaf is as follows using the rules in the BBB. 2d6 divided by 2 +2. Now I didn't see it but I assume after the 1st number the others are added to it. So 1st trigger is at 3 which activates probe 3. Next role resulted in a 5 so the next trigger, as I figgure it, is 8. At that point probe 5 is activated. Next one is 11 with two tarbaby activated: sleez and analyze. Also passive alert. Finaly 15 blaster 5 active alert.

Orange-7 12/12/12/15/14

SECURITY SHEAF

trigger
3 probe-3
8 probe-5
11 tarbaby-4 x 2 targeting operational and offensive. passive alert
15 blaster-5 active alert.

Access has scramble 5 on it.

Also how exactily does a san figgure into this? I want to put scramble on it.

Thanks

Thanos

This post has been edited by Thanos007: Dec 16 2003, 03:11 PM
Go to the top of the page
 
+Quote Post
Synner
post Dec 16 2003, 10:28 AM
Post #20


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



That looks good although a bit sparse, you may want to go up to 25 trigger steps. Newbies tend to accumulate a lot more Tally than you'd expect.

Additionally those IC look pretty whimpy, using Matrix (or any of the examples in the adventures) most IC will have a Rating between 5 and 12 on an average toughness Orange system.

Also Tar IC (both Baby and Pit) isn't programmed (SR3 pages 228-229) to target a specific Utility/Program, but rather programs within one of the four general categories of Utilities (Operational, Defensive, Offensive, Special). This means that if programmed against Operational Utilities it will remain hidden (it is Reactive IC) and attempt to destroy the first Operational Utility used after it is triggered.

Regardless of this, it cannot target completely passive Utilities such as armor or sleeze.

A System Access Node in SR3 is simply an iconographic representation of the Access subsystem in ACIFS (especifically the one that links with the Local Telecom Grid rather than a sub-host of the network). Since it is not triggered but is always active, Scramble IC (as well as Virtual Machines, Databombs, worms and other nasty surprises) is listed separately from the Security Sheaf, normally as a small Note at the end:
"Access subsystem has Scramble-8" or "Security cameras in the Slave subsystem have Scramble-7" or "Restricted files have Scramble-8, normal files don't"
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 16 2003, 03:09 PM
Post #21


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



I've edited my last post so that it now reads "tarbaby is targeted to operational and offensive programs. I also added scramble 5 to access. I'm leaving everything else the same for simplisity sake. Once I see how things work I'll definitly change the numbers.

Later in the day I'll post the stats for the decker and the deck.


Thanos
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 16 2003, 05:02 PM
Post #22


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



Here are the decker and deck stats that I've come up with.

Decker: race ork. B6, Q4, S5, C2, I5, W5. 1 data jack. The only skill I see that applies to decking is computer so that skill is at 6.

Deck: CMT Avatar MPCP-7 This gives me 21 points to spend on BEMS (7X3=21) with no single value being above 7 per the rules in the BBB. So now the deck looks like this: MPCP-7 4/5/7/5 with 4 points of hardening, responce increase 1, active mem 700, storage mem 1400, speed 300. Detection Factor 7 (8+5 divided by 2=7), Hacking pool 4 (5+7 /3=4)

It has the following programs:
Analyze3=12mp
Decrypt5=25mp
Browse3=9mp
Deception5=50mp
Sleaze5=75mp
Read/Write5=50mp
Attack6s=144mp
Armor5=75mp
Spoof4=48mp

Total mp=488mp With 212 left over for what ever.

Lets see where that takes us for a few posts and then we'll try a run against the host I created.

Thanos
Go to the top of the page
 
+Quote Post
Thanos007
post Dec 18 2003, 06:55 PM
Post #23


Moving Target
**

Group: Members
Posts: 369
Joined: 1-September 03
From: New York State
Member No.: 5,563



How quickly we loose interest here. Ok on with the show.

To even log onto the host I 1st have to defeat the scramble ice on the san. To do this I have a TN of 3(the ice rating)-5=-2. How ever 2 is the lowest TN you can have so all I need is a single 2 to beat the ice then I can attempt to log onto the host. The host gets to roll 7 dice (its security rating is 7) against a TN of 12. My DF is 7 but I'm all so running sleaze so that boosts it up to 12.

I roll 8 dice. 6 for my computer skill plus two from my hacking pool. I get 6,6,5,5,4,4,3,2. Easily defeating the ice. The host rolls 7 dice and gets 5,5,5,4,3,1,1. No sucesses so the security tally stays at zero.

Now comes the part where you the reader gets to tell me if I got it right or if I really screwed up the rules.

Looking for your imput

Thanos
Go to the top of the page
 
+Quote Post
Kurukami
post Dec 18 2003, 07:24 PM
Post #24


Moving Target
**

Group: Members
Posts: 488
Joined: 4-August 03
From: Amidst the ruins of Silicon Valley.
Member No.: 5,242



One small thing straight off the top of my head. Your Detection Factor is the average of your Masking and your Sleaze, rounded up. If you had no Sleaze running, your Masking alone (at rating 7) would provide you with a DF of 4. With Sleaze-5, it makes it ((7 + 5)/2) = 6.

Thus, the host only needs to roll against a TN of 6, not a TN of 12.

Your security tally in the example above would still be zero, but you're not quite as invisible as you thought. :scatter:
Go to the top of the page
 
+Quote Post
Mal-2
post Dec 18 2003, 08:09 PM
Post #25


Target
*

Group: Members
Posts: 93
Joined: 9-December 03
From: Greenville, SC
Member No.: 5,889



I assume you've deliberately skipped to Log on to LTG, etc. to actually get to your desired target. Also, I agree with Synner, those IC seem to have particularly low ratings for an Orange(Average) system. If you haven't seen it, take a look at an online random host generator, using the SR3 and Matrix rules here: http://plastic.dumpshock.com/shadowrun/mhg.html

Anyway. Your decker is currently in the LTG, facing a scrambled SAN. Before you can attempt to Log On to Host, you have to Decrypt the Scramble IC protecting it. You make a Computers(Decking) test against a 2 (Rating 5 IC - Decrypt 5 = TN 0, brought up to 2 as the minimum target number). Your decker scored 5 successes. The Host then makes a Security Test against your Detection Factor (7 dice, target number 6 as Kurukami said). Since the Host got no successes, you decrypt the entry to the SAN and avoid racking up a security tally.

Next, you'll need to perform a Log On to Host operation. This is also a Computer(Decking) test, target number 12 (The Host's Access rating) - 5 (The rating of you Deception Utility), or TN 7. That test is opposed by the Host's standard Security roll (7 dice, vs. your DF of 6).

Mal-2
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th April 2024 - 10:52 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.