![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
The Idiots Guide to the Matrix thread needs to be edited down to something readable. I am trying to incorporate deckers into my game that aren't npc's and am having a hard time trying to understand all the rules. Is there a faq or another thread that has a step by step guide to decking. I find the layout in the BBB to be confusing.
Thanks Thanos |
|
|
![]()
Post
#2
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 ![]() |
The Idiot's Guide thread has grown somewhat since its inception and can be hard to follow because we're not only doing sample runs with explanations but also fielding people's (and our own) doubts and questions as we go along. That being said a read through the first 4-5 pages includes a simple no frills datasteal run (my own posts and satcong's).
It would help to know what you're having difficulty with and how much of the rules you are comfortable with before commenting further. However I will say that from a GM's point of view the Matrix is exceptionally simple to run. All you really need to know is that every Host has a Security Value and an ACIFS rating (ie. Orange 9-8/13/10/10/10) and that almost everything a decker can possibly do is a System Operation - which is simply an Opposed Test rolled against one of the ACIFS subsystems with a negative modifier equal to the appropriate program (without the appropriate program a decker rolls against the unmodified subsystem rating). . The charts on pages 162 and 163 of the Matrix sb are the ideal crib sheets for this - they list all the possible Tests, the relevant ACIFS subsystem and the program that can be used to modify the target. Every time a decker makes a System Operation Test, the host Opposes it rolling its Security Value against the decker's Detection Factor. As in any standard Opposed Test, the host's successes are subtracted from the decker's to get the final result. Independent of this result (whether the decker succeeded or failed the Test) all the successes the host rolls are registered by the GM. These make up the decker's Security Tally. When the Security Tally reaches certain levels (called Steps) IC is triggered in response. Different IC do different things and must be dealt with on a case by case basis. |
|
|
![]()
Post
#3
|
|||
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
Yes. I understood that. What I'm having a problem with is when to do what. I'll read your posts in the Idiots Guide and see if this gets any clearer. However I still stand by my comment that the Matrix rules in the BBB are layed out in a very confusing manner. At least for me. Thanks Thanos |
||
|
|||
![]()
Post
#4
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 21-November 03 Member No.: 5,837 ![]() |
Not just for you, 14/15 pages is TOO much for a simple walkthroug and/or faq.
I think a nice abridged article on someone's personal site would be far more helpful to understand the current ruleset. That having been said. As a person with a computer science degere and lots of experience in networking, I find it much better to ignore the Matrix rules, which are horribly out of date, and insanely inaccurate now, let alone 60 years from now; and just kind of say okay, you wanna do what? Okay done, and/or leave out of the Matrix entirely. If you do not have enough experience with modern technology to know/care, and like the rules, by all means use them. But I will warn you strongly if you are knowledge about how computers/the web work, you will be sorely dissapointed by the Matrix rules. Especially the hardware ones and their costs. The Deck parts show some of the systems flaws better than any other item for sale in the SR world. |
|
|
![]()
Post
#5
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 3,929 Joined: 26-February 02 From: .ca Member No.: 51 ![]() |
Synner and I have discussed a pared-down version of The Idiots Guide to the Matrix for a future issue of the Shadowrun Supplemental; I have some interesting ideas as to how it will be presented, and hope that the format will make it a bit more clear than the thread.
|
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 21-November 03 Member No.: 5,837 ![]() |
Do you also plan to fix the memory, cost, and workings of the decks along with the out-dated matrix rules too?
I am not saying they were done poorly, but really, they are outdated, and horribly inaccurate given modern computing standards. EDIT: That includes connections, the way RTGs/LTGs interact...Corpate LTGs...all sorts of stuff. Oh making a lot of it clearer would be beneficial too. The book really upon a strict reading inticates someone with a computer use of 1 can't even log in legally to servers at work...etc |
|
|
![]()
Post
#7
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 3,929 Joined: 26-February 02 From: .ca Member No.: 51 ![]() |
You should be addressing such concerns to the Shadowrun Line Developer., not me. You can reach him at info at shadowrunrpg.com
|
|
|
![]()
Post
#8
|
|
Moving Target ![]() ![]() Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 ![]() |
On the other hand, since comparisons between megabytes and Megapulses were intentionally left undefined and vague, they might not be as out of whack as you might think. It's a different scale entirely, so abstract comparisons to modern-day computing standards (like "standard" PCs these days coming with 80 gig hard drives and 512+ megs of RAM) really don't apply.
|
|
|
![]()
Post
#9
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 21-November 03 Member No.: 5,837 ![]() |
Did I even once mention that as my basis of comparison?
My basis is simply how many programs I can keep on my deck...100k for a program I shoulda written myself in a few days, at MOST a few weeks of which I can have about 4 running at any given time!? HELL no...That is completely ridiculous especially as hackers write the smallest, best, and cleanest code using the highest level languages available, I assure you they could have dozens or MORE programs running simultaneously for simply mundane tasks...Only for things such as decryption would it be a mildly limiting factor, which I will not argue eats RAM, and CPU time, which it does, however locate, read/write, attack, and about 90% of the others are rediculous. The sheer cost for a measely 512MP of Active is rediculous, and the fact that the room cost is so obscenely high for those simple and small parts it just doesn't make sense... Doube the Active space for storage? please... I have about a billion other gripes about accuracy. this is as I said earlier, why I stay out of the matrix. I played 1 decker, best char I ever made for SR...and I will not play one again using those rules. Until I see an overhaul or write my own house rules for decking/computing I am out. If you like the system, fine. I am merely saying it isn't accurate, which is usually something about a dozen people here get behind and say "We like accuracy." In the case of computing, this is something I have a BS in and a lifetime of vested interest. I can make a dozen computers in 2 hours, I can build a dream machine for about 600 bucks...I know computers, especially hardware, and I feel more than safe saying the SR system is not accurate. |
|
|
![]()
Post
#10
|
|
Moving Target ![]() ![]() Group: Members Posts: 608 Joined: 9-July 02 From: California Member No.: 2,955 ![]() |
Hey hey, those hackers aren't writing programs that fly through fucking virtual reality in not the internet but the freakin' matrix and then kill people or blow stuff up. That's too cool to multi-task.
|
|
|
![]()
Post
#11
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 3,929 Joined: 26-February 02 From: .ca Member No.: 51 ![]() |
Well, yes. Comparing Shadowrun's computers and Matrix to real life is pointless, because they're entirely different and meant to be that way.
Wanting Shadowrun's computers and Matrix to be more like real life, that's the domain of house rules. |
|
|
![]()
Post
#12
|
|
Moving Target ![]() ![]() Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 ![]() |
Actually, in that regard I agree with you. I do agree that a number of the prices for creating your own hardware are quite excessive. Software, too, for some of the things.
I also possess a BSci in computer science, though I haven't gone into networking as you have (the job market wasn't quite as friendly to me :S ). And I do agree that, realism-wise, the Matrix rules as written don't approach the factual structure and logic which govern computing in the modern era. What, precisely, would you replace it with? Basically, I'm seeing a great deal of "this system sucks" without much in the way of proposed replacement. Within the SR system, if you eliminate all but the decryption (which, from your previous posts, you debate most eloquently is the only thing which should take CPU time), then decking -- one of the primary elements of the cyberpunk genre -- becomes little more than a single test. If you have alternative rules which might prevent the relegation of an entire archetype to obsolescence and still meet your demands for accuracy, then by all means present them. I completely respect your experience and your devotion to your profession. It's a devotion which, to some degree, I share. If you've read my posts on this board, you know that I've often rallied against how quickly mages seem to develop their kick-ass techniques while deckers get screwed on time and Karma (having to buy half a dozen knowledge skills for specific programming tasks, where mages get by on fairly basic skills). I guess I'm just looking for something more than "I feel more than safe saying the SR system is not accurate". Help us build something better. |
|
|
![]()
Post
#13
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 ![]() |
I suggest you give it a read anyway. The IGTTM thread is not a 14/15 page walkthrough and it is not hard to follow if you identify people who are involved in the sample runs (satcong and I, and now Kukukami and I) and follow their posts. The "problem" is that the IGTTM thread attempt to come up with (unofficial) answers to a number of different FAQs and doubts interspersed with the two actual play by play runs as those doubts come up in practice. I've since added some "identifiers" to the relevant posts. As Adam has mentioned above, we have discussed making the IGTTM sample runs (rather than the FAQ aspect) into TSS articles and I hope to have the first one prepped to send to him soon. Regarding the rest of the post I'd like to argue that Dende is missing one important element (if not the most important) of the Matrix, one which is way beyond a current decker/hacker's experience, which has nothing to do with how the program functions or how tight the code, and which ultimately justifies any value the designers chose to put on the size of programs - ASIST technology and all the sensory input coding that goes with every single piece of software represented in the Matrix, even if it is simple UMSII. Even if someone were to go to the trouble to calculate an equivalence between Mb and MPs, and then analyze program sizes based on that (still mostly impossible since it is impossible to know how many variables you'd have to include in any program to match a 2063 host's/mainframe's capacity to protect itself), there is still absolutely no way to derive values for the ASIST/interactive representation aspect of each program. Furthermore, despite Dende's negative take on the plausibility of the Matrix system, I've talked to at least one CompSci alumni who says that the SR Matrix system is actually pretty close to developments in modern User-based systems (rather than Network Code-based systems), that in fact the Matrix is closer to an Internet structure than what SR would have you believe and in many ways similar to technology being developed not for traditional computer network management but for interactive/digital television and online computer games. As he put it, "a Persona seems to be simply a cross between a current day operating system and a web browser - in most respects it is a mobile "Windows platform" which interfaces with other systems like a browser does a website and off which you run programs. Like a browser it logs on to a particular address/coordinates, allows access to the ASIST feed information at those coordinates and allows you to then manipulate the information "on site" with the programs that you have "Active" in your "mobile operating system" rather than using the Host's space." However this all means that the underlying Matrix protocols are highly biased towards program use and are based on the understanding that at the speeds the Matrix operates at, most deckers/hackers would not have the skill to affect most Host coding with on the fly hacking and programming, and so would resort to simply running pre-made programs (with their ASIST loads). The "run time" this takes is impossible to judge since in fact several levels of processing are happening every time you do anything (ie. you give your orders by DNI; this is translated to ASIST protocols; run by your deck, transmitted to your Persona/browser which is operating on another system - the Host - in terms of programming commands; the program then runs on the Host which includes both the strict execution of the commands and the ASIST/Sensory interaction elements; the Host 'interacts' to those commands with a set of responses and ASIST/Sensory interaction elements; this is recieved by your Persona and sent back to the deck; then those are translated back into DNI and processed by your mind. |
||
|
|||
![]()
Post
#14
|
|
Moving Target ![]() ![]() Group: Members Posts: 138 Joined: 26-February 02 From: Paris, France Member No.: 639 ![]() |
Amen, Synner.
As someone working in computer technology in a R&D center, I agree 200% with your post. I also want to add that the programming rules of Matrix sourcebook are very compliant to RL development process. |
|
|
![]()
Post
#15
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 21-November 03 Member No.: 5,837 ![]() |
EDITED to be readable...Actually can be read now...
All SUs assume max allowed per part. You can only go as fast as the slowest part. You actual Speed is up to your net quickness, decided by your (Int + Will + (Hack or comp skill))/2. You cannot go above the SU allotment. Matrix Connections Sat Accessible anywhere on the planet Type Cost/Month SU Allowable S-1: 500 ¥ 2 S-2: 750¥ 4 S-3: 1500¥ 5 Personal Accessible anywhere with a line Type Cost/Month SU Allowable A-1: 100¥ / month 1 A-2: 250¥ / month 3 A-3: 500¥ / month 5 A-4: 750¥ / month 6 A-5: 1000¥ / month 10 Corporate These also require a business grade line to your house/building Type Cost/Month SU Allowable A-1: 1000¥ 10 SU A-2: 2500¥ 12 SU A-3: 5000¥ 15 SU A-4: 7500¥ 20 SU A-5: 10000¥ 25 SU Custom Decks All Decks need a case, Active and Physical, Board and Chip. Deck Cases Flashy colors (Conceal – 2). All boards fit in all decks. Type Concealment Ex Drive Bays Cost A: 6 1 200¥ B: 8 2 500¥ C: 10 3 750¥ Boards Type Cost Active Slots Physical Slots SU Allowment Light: 200¥ 2 2 15 Med: 300¥ 4 3 30 Heavy: 500¥ 6 4 50 Ex Drives MiniCD 50¥ Crystal 100¥ Chip Drive 200¥ Active Chips 5 slots 100¥ a pop 10 slots 250¥ a pop 15 slots 500¥ a pop 20 slots 750¥ a pop Physical Storage 50 slots 150¥ a pop 100 slots 300¥ a pop 150 slots 750¥ a pop 200 slots 1000¥ a pop Processor Chip: Type Cost SU Allotment Low-1: 750¥ 5 Low-2: 1000¥ 10 Mid-1: 1250¥ 15 Mid-2: 1500¥ 25 High-1: 2000¥ 40 High-2: 2500¥ 50 Programs Your OS/browse utility must always be running to be in matrix. This consumes 1 Active and 3 Physical slots. OS always runs. Base cost assigned to each type: Rating Base Cost Utility Combat System Development 1 1000¥ 50% 100% 75% 40% 2 2000¥ 3 4000¥ 4 6000¥ 5 10000¥ 6 15000¥ 7 20000¥ Programming Base Time Time Cost is per 2 ratings. A Development Program is required. Total Time = Time / ((Successes of Programming Roll + Devolopment Rating)/4) Type Base Time Minimum Time Utility 2 wks 3 days Combat 1 month 1 week System 3 wks 5 days Development 1.5 wks 2 days Umm, combat is left alone, as is availability. I would like a bit of help there, but I do like how comabt works now, mostly. I welcome comments, and questions. |
|
|
![]()
Post
#16
|
|
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
As entertaining and informative as the above discussions are they don't really help me with my problem. I have read the IGTTM and found it entertaining as well and a little helpful. I would have probably been better if they had done the run with just the tests etc. then done it with all the color. IMHO.
However, to bring this back on topic... I'm going to do my own run here. 1st I'll create a host using the rules from the BBB. In fact that's all I'll be using as I don't have any of the Matrix SB's available. So... I'v decided that the Host will be orange. Something tuff but not impossible for a noobie. I've also decide that it's intrusion difficulty will be average. Generating a random number using the BBB rules I role a two wich equals 1. I add the +6 for a total of 7. So the host is now known as Orange-7. Now for the sub-systems... In order role 2d3 +9 to get numbers: 12,12,12,15,14 So now we know the whole system as Orange-7 12/12/12/15/14 Depending on the posts this generates my next trick will be to create a deck with programs. Thanos |
|
|
![]()
Post
#17
|
|
Moving Target ![]() ![]() Group: Members Posts: 124 Joined: 21-November 03 Member No.: 5,837 ![]() |
Okay...Well let's do it this way.
You have your target server. check Don't forget to assign IC level... Your decker needs stats, and a datajack to go into his computer. Let us know these. Your decker needs to assign points to his Bod, Masking, Evasion, and Sensors. Once there, let us know those. You will need to make your decker's deck. Easiest way would be use a base model... like the CMT Avatar, expensive, but nice. in the system. MPCP of 7 Hardening of 4 I/O speed of 300 Memory of 700 Storage of 1400 Then you must buy programs to put on the deck. |
|
|
![]()
Post
#18
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 ![]() |
Before you get into the decker and software, you should first draw up a Security Sheaf listing the IC and trigger steps to go with the Security Rating and ACIFS you have already generated.
Unfortunately though there are rules for determining Security Sheaf trigger steps in SR3 (page 211), the random IC allocation rules are in Matrix. You can either:
Note that calling your host "Orange-7" is slightly misleading and might lead to confusion - Orange-7 is the Security Rating of the Host not a designation. It's «insert corp name here» corporate office Host and it has a Security Rating of Orange-7. This minor distinction is important when your Orange-7 host is actually part of a tiered system (but more on that later). It's also helpful to know whether you intend to gamemaster or play a decker since this gives us some parameters to help you with. And whether you are creating a decker with Chargen rules or after some game time (this is mainly because depending on your GM's interpretation, decks like the CMT Avatar might be unavailable at creation because the MPCP has a rating above 6). You may also want to check out The original Idiot's Guide to the Matrix thread which contains guidelines and help for anyone interested in developing a decker and his program load including explanations by a number of people on the various choices available and different priorities/strategies. |
|
|
![]()
Post
#19
|
|||
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
Yes. I ment that we know it is a orange-7. It's for Corp X. No tiered system. I'm GMing and just want to get the veerrrryyy basics down. So this doesn't represent a charicter or actual game. Just hypothetical so I can get the rules down. Here's the rest of the info on the host: Corp X orange-7 12/12/12/15/14 Security sheaf is as follows using the rules in the BBB. 2d6 divided by 2 +2. Now I didn't see it but I assume after the 1st number the others are added to it. So 1st trigger is at 3 which activates probe 3. Next role resulted in a 5 so the next trigger, as I figgure it, is 8. At that point probe 5 is activated. Next one is 11 with two tarbaby activated: sleez and analyze. Also passive alert. Finaly 15 blaster 5 active alert. Orange-7 12/12/12/15/14 SECURITY SHEAF trigger 3 probe-3 8 probe-5 11 tarbaby-4 x 2 targeting operational and offensive. passive alert 15 blaster-5 active alert. Access has scramble 5 on it. Also how exactily does a san figgure into this? I want to put scramble on it. Thanks Thanos This post has been edited by Thanos007: Dec 16 2003, 03:11 PM |
||
|
|||
![]()
Post
#20
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,314 Joined: 26-February 02 From: Lisbon, Cidade do Pecado Member No.: 185 ![]() |
That looks good although a bit sparse, you may want to go up to 25 trigger steps. Newbies tend to accumulate a lot more Tally than you'd expect.
Additionally those IC look pretty whimpy, using Matrix (or any of the examples in the adventures) most IC will have a Rating between 5 and 12 on an average toughness Orange system. Also Tar IC (both Baby and Pit) isn't programmed (SR3 pages 228-229) to target a specific Utility/Program, but rather programs within one of the four general categories of Utilities (Operational, Defensive, Offensive, Special). This means that if programmed against Operational Utilities it will remain hidden (it is Reactive IC) and attempt to destroy the first Operational Utility used after it is triggered. Regardless of this, it cannot target completely passive Utilities such as armor or sleeze. A System Access Node in SR3 is simply an iconographic representation of the Access subsystem in ACIFS (especifically the one that links with the Local Telecom Grid rather than a sub-host of the network). Since it is not triggered but is always active, Scramble IC (as well as Virtual Machines, Databombs, worms and other nasty surprises) is listed separately from the Security Sheaf, normally as a small Note at the end: "Access subsystem has Scramble-8" or "Security cameras in the Slave subsystem have Scramble-7" or "Restricted files have Scramble-8, normal files don't" |
|
|
![]()
Post
#21
|
|
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
I've edited my last post so that it now reads "tarbaby is targeted to operational and offensive programs. I also added scramble 5 to access. I'm leaving everything else the same for simplisity sake. Once I see how things work I'll definitly change the numbers.
Later in the day I'll post the stats for the decker and the deck. Thanos |
|
|
![]()
Post
#22
|
|
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
Here are the decker and deck stats that I've come up with.
Decker: race ork. B6, Q4, S5, C2, I5, W5. 1 data jack. The only skill I see that applies to decking is computer so that skill is at 6. Deck: CMT Avatar MPCP-7 This gives me 21 points to spend on BEMS (7X3=21) with no single value being above 7 per the rules in the BBB. So now the deck looks like this: MPCP-7 4/5/7/5 with 4 points of hardening, responce increase 1, active mem 700, storage mem 1400, speed 300. Detection Factor 7 (8+5 divided by 2=7), Hacking pool 4 (5+7 /3=4) It has the following programs: Analyze3=12mp Decrypt5=25mp Browse3=9mp Deception5=50mp Sleaze5=75mp Read/Write5=50mp Attack6s=144mp Armor5=75mp Spoof4=48mp Total mp=488mp With 212 left over for what ever. Lets see where that takes us for a few posts and then we'll try a run against the host I created. Thanos |
|
|
![]()
Post
#23
|
|
Moving Target ![]() ![]() Group: Members Posts: 369 Joined: 1-September 03 From: New York State Member No.: 5,563 ![]() |
How quickly we loose interest here. Ok on with the show.
To even log onto the host I 1st have to defeat the scramble ice on the san. To do this I have a TN of 3(the ice rating)-5=-2. How ever 2 is the lowest TN you can have so all I need is a single 2 to beat the ice then I can attempt to log onto the host. The host gets to roll 7 dice (its security rating is 7) against a TN of 12. My DF is 7 but I'm all so running sleaze so that boosts it up to 12. I roll 8 dice. 6 for my computer skill plus two from my hacking pool. I get 6,6,5,5,4,4,3,2. Easily defeating the ice. The host rolls 7 dice and gets 5,5,5,4,3,1,1. No sucesses so the security tally stays at zero. Now comes the part where you the reader gets to tell me if I got it right or if I really screwed up the rules. Looking for your imput Thanos |
|
|
![]()
Post
#24
|
|
Moving Target ![]() ![]() Group: Members Posts: 488 Joined: 4-August 03 From: Amidst the ruins of Silicon Valley. Member No.: 5,242 ![]() |
One small thing straight off the top of my head. Your Detection Factor is the average of your Masking and your Sleaze, rounded up. If you had no Sleaze running, your Masking alone (at rating 7) would provide you with a DF of 4. With Sleaze-5, it makes it ((7 + 5)/2) = 6.
Thus, the host only needs to roll against a TN of 6, not a TN of 12. Your security tally in the example above would still be zero, but you're not quite as invisible as you thought. :scatter: |
|
|
![]()
Post
#25
|
|
Target ![]() Group: Members Posts: 93 Joined: 9-December 03 From: Greenville, SC Member No.: 5,889 ![]() |
I assume you've deliberately skipped to Log on to LTG, etc. to actually get to your desired target. Also, I agree with Synner, those IC seem to have particularly low ratings for an Orange(Average) system. If you haven't seen it, take a look at an online random host generator, using the SR3 and Matrix rules here: http://plastic.dumpshock.com/shadowrun/mhg.html
Anyway. Your decker is currently in the LTG, facing a scrambled SAN. Before you can attempt to Log On to Host, you have to Decrypt the Scramble IC protecting it. You make a Computers(Decking) test against a 2 (Rating 5 IC - Decrypt 5 = TN 0, brought up to 2 as the minimum target number). Your decker scored 5 successes. The Host then makes a Security Test against your Detection Factor (7 dice, target number 6 as Kurukami said). Since the Host got no successes, you decrypt the entry to the SAN and avoid racking up a security tally. Next, you'll need to perform a Log On to Host operation. This is also a Computer(Decking) test, target number 12 (The Host's Access rating) - 5 (The rating of you Deception Utility), or TN 7. That test is opposed by the Host's standard Security roll (7 dice, vs. your DF of 6). Mal-2 |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 6th June 2023 - 06:05 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.