![]() |
![]() ![]() |
![]() |
![]()
Post
#351
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
On sim-modules: IIRC the version without is supposed to be official.
If you want a price structure that makes sense, the cybercommlink will come with a sim-module. As has been said. I personally envision the cyberware as a port for modular cybercommlinks, but that is not supported by the rules. At the very least, external sim-modules are available on chips (ie direct-input BTL chips, main book), and therefore should physically fit into a datajack (balancing aspect: can be taken away). |
|
|
![]()
Post
#352
|
|
Moving Target ![]() ![]() Group: Members Posts: 606 Joined: 14-April 08 From: Phoenix, AZ Member No.: 15,884 ![]() |
What happens if Nuke reduces your subscription limit below the number of active subscriptions? Last in first out? First in first out? User selected? User selected between FIFO and LIFO? Well, if you want to sim it properly, each of your subscriptions rolls your commlink's Rating vs. a number of hits based on how many you're over; anything that doesn't make it gets disconnected. If you still have too many, keep rolling. Yes, this means you might lose more connections than you should - when things crash, you kinda lose control over what happens next. |
|
|
![]()
Post
#353
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
Well, if you want to sim it properly, each of your subscriptions rolls your commlink's Rating vs. a number of hits based on how many you're over; anything that doesn't make it gets disconnected. If you still have too many, keep rolling. Yes, this means you might lose more connections than you should - when things crash, you kinda lose control over what happens next. ? When a Persona's subscriptions exceed it's System x 2 each subsequent subscription counts as an additional program for the purposes of figuring response degradation. Unwired p55, Subscriptions. |
|
|
![]()
Post
#354
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
|
|
|
![]()
Post
#355
|
|
Moving Target ![]() ![]() Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 ![]() |
Okay, so a Node by itself can't run Attack, and a conventional Agent can't run attack. So how would a nomral person's commlink (and a shadowrunners commlink) be set up to respond to detecting being hacked. I am trying to understand what the normal set for different types of people would be. Your midrange person? A corporate exec? A Johnson? A normal runner? Option 4: Use databombs. You can put them on your Comm, according to my 1st printing BBB. Once the Firewall (or an Agent running Scan or other detection software) declares the connection to be illegal, the bomb goes off. I suppose it would give you one chance to enter a password before detonating, but it's still a nice way to drive off hackers. And while you can only have one databomb per device, you can have one databomb on each file, meaning that accessing Paydata becomes painful, or at least time consuming, as you have to Defuse each bomb. Sure, they're more or less illegal but that doesn't really apply for the execs, Johnsons, and runners. |
|
|
![]()
Post
#356
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
OK, here's one.
Agent's can't using Hacking and may, optionally, not be allowed to run Attack. IC on the other hand can run any form of Combat Program and does not appear to be limited to not Hacking. In fact a number of the IC packages include Hacking Programs or are explicitly described as Hacking. Juhseung Saja I'm looking at you... So why would anyone buy an Agent? When one could buy, for example, a Singularity Encore and get all the unlocked glory of an Unrestricted Agent at a 10% discount? |
|
|
![]()
Post
#357
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
You mean IC at a discount instead of an unrestricted agent for 120% base price? Good thinking.
|
|
|
![]()
Post
#358
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,219 Joined: 26-February 02 From: Lofwyr's stomach. Member No.: 1,320 ![]() |
Because IC is limited in other ways: it can only operate on your commlink's node.
|
|
|
![]()
Post
#359
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
Yeah, to some extent I can see why Frank thought it was a bad idea for the individual Freelancers not to be able see and comment on each others work before Unwired went to print.
But, then again, the real world is full of similar examples of products that make no sense compared to other methods of achieving the same ends that people buy in droves because it just never occurs to them to approach the problem from a different direction. |
|
|
![]()
Post
#360
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]()
Post
#361
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,803 Joined: 3-February 08 From: Finland Member No.: 15,628 ![]() |
You do know that IC tands for Intrusion Countermeasure.
|
|
|
![]()
Post
#362
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 3,929 Joined: 26-February 02 From: .ca Member No.: 51 ![]() |
iirc, that 5th is acutally a reprint of 4th without any errata inbetween. it was basically done to give catalyst something to sell after they took over from fanpro, or something like that... Incorrect; there is plenty of errata integrated with the 5th printing. |
|
|
![]()
Post
#363
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
|
|
|
![]()
Post
#364
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,512 Joined: 26-February 02 Member No.: 392 ![]() |
Because IC is limited in other ways: it can only operate on your commlink's node. IC is limited. However they can leave the node. However, IC are designed to do specific things. Stray too far out of that parameter and their usefulness falls way below that of even restricted agents. For example, I don't think that the Three Musketeers would be at all useful for Data Searches. |
|
|
![]()
Post
#365
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,219 Joined: 26-February 02 From: Lofwyr's stomach. Member No.: 1,320 ![]() |
SOME IC can leave the node under specific circumstances. But if one is going to make up rules about IC being unrestricted by the same legalities as mooks, Then I'm gonna slap a different restriction on them.
|
|
|
![]()
Post
#366
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
SOME IC can leave the node under specific circumstances. But if one is going to make up rules about IC being unrestricted by the same legalities as mooks, Then I'm gonna slap a different restriction on them. Any IC can Access another node or load itself onto another node if it is instructed to. Feel free to house-rule differently or change the availability and cost of either IC or restricted agents. I would probably recommend that you do so, in fact, that was the point of the initial post. |
|
|
![]()
Post
#367
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]()
Post
#368
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
However, IC are designed to do specific things. Stray too far out of that parameter and their usefulness falls way below that of even restricted agents. For example, I don't think that the Three Musketeers would be at all useful for Data Searches. I disagree somewhat. I think that the Three Musketeers would be excellent for Data Searches, but first they'd have to be reprogrammed to do something other than attack, trace, and crash. Then they'd be great. |
|
|
![]()
Post
#369
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
If, by 'reprogramm' you mean 'load a Browse utility', then indeed.
|
|
|
![]()
Post
#370
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
Maybe in your game, sure.
In mine, I look at where pilot programs (such as those in IC) are "dog brains." So the Three Musketeers IC, which are a trio of "dogs" that have been "trained" to smack hackers need to be "retrained" to Browse the Matrix, similarly to how a police bomb-sniffing dog would have to be retrained to work as a sheep dog or a seeing-eye dog. It might go something like: PC: Porthos, find me information on Necronomicorp. Porthos: Right. Find Necronomicorp and crash its programs. Where's the Attack program? PC: No, Porthos, I need you to use this Browse program to find information about Necronomicorp. Porthos: Right, use this Browse program to find programs to crash in Necronomicorp. Where's the Attack program? PC: No, Porthos, just a Data Search, please. Porthos: Right! I'll start looking for programs to crash now. Where's the Attack program? PC: ARGH!! Porthos: Your last command is confusing to me. Where's the Attack program? PC: *shuts down Porthos program* Kinda like asking a protocol droid to act as a member of the Rebel Alliance. Wackiness may ensue. |
|
|
![]()
Post
#371
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]()
Post
#372
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 ![]() |
But still dog-brained ones, also according to your hymnal. After that, it's interpretation.
|
|
|
![]()
Post
#373
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 ![]() |
|
|
|
![]()
Post
#374
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,219 Joined: 26-February 02 From: Lofwyr's stomach. Member No.: 1,320 ![]() |
I just ruled that if you need IC that can do hacking or optionally use attack programs, then you have to pay the same 20% cost as unrestricted agents, and if you care about legality, you need the proper paperwork.
|
|
|
![]()
Post
#375
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,188 Joined: 9-February 08 From: Boiling Springs Member No.: 15,665 ![]() |
Incorrect; there is plenty of errata integrated with the 5th printing. So that means that a cyber commlink comes with a integrated Sim Module? RunnerPaul looked at his copy of 5th printing and it states that a cyber commlink has a sim module. Please tell me what the final ruling is. Thank you |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 12th February 2025 - 12:06 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.