IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3  
Reply to this topicStart new topic
> Basic matrix questions
hobgoblin
post Nov 12 2010, 06:59 AM
Post #51


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (etherial @ Nov 11 2010, 12:41 AM) *
3C. Brute force. Roll Hacking + Exploit (target's Firewall [+3 for Security Access, +6 for Admin.], Complex Action). Success logs you onto the Node.The Node gets a free roll on an Extended Analyze + Firewall (your Stealth) each time you roll. If the Node succeeds, it triggers an Alert.

Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy.

And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio).
Go to the top of the page
 
+Quote Post
Halinn
post Nov 12 2010, 07:57 AM
Post #52


Running Target
***

Group: Members
Posts: 1,018
Joined: 3-July 10
Member No.: 18,786



QUOTE (hobgoblin @ Nov 12 2010, 07:59 AM) *
Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy.

And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio).


A good hacker (18 dice exploit is not hard, if that's your specialty), hacking admin on a rating 4 commlink with rating 6 stealth wins in less than two rounds, where it takes him two and a half to get noticed. Using edge can get you to win even against a rating 6
Go to the top of the page
 
+Quote Post
etherial
post Nov 12 2010, 08:20 AM
Post #53


Moving Target
**

Group: Members
Posts: 266
Joined: 21-November 09
Member No.: 17,891



QUOTE (yesferatu @ Nov 11 2010, 11:25 AM) *
Now, if I could just tell the difference between:
Computer and...Data Search...Electronic Warfare...Cybercombat...Hacking...
Scan...Analyze...Browse... Track...

I suppose I'll need to reread the Wireless section until it sinks in.


So, the reason I say to manually Cross-Reference upthread is that when you draw lines from the Actions to the Programs and back, you learn which Matrix Actions anybody can do at any time, and which require specific Programs. You also learn which programs do only one thing:

Armor, Attack, Biofeedback Filter, Black Hammer, Blackout, Browse, Data Bomb, Decrypt, Defuse, Disarm*, ECCM, Edit, Encrypt, Medic, Nuke*, Purge*, Reality Filter, Stealth, Track

Which programs do two subtly different things:

Analyze, Command, Corrupt*, Scan, Sniffer

and which do several different things:

Exploit

*Programs from Unwired.
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 22nd January 2026 - 01:47 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.