![]() ![]() |
Dec 17 2010, 01:16 PM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 557 Joined: 26-July 09 From: Kent, WA Member No.: 17,426 |
I'm trying to script a few Matrix encounters, and I'm coming to realize I don't know what I'm doing. Can somebody help me out on the following?
1) J. Random Hacker badly wants a Nuka-Cola, and is using hack-on the fly against his nemesis, the Vending Machine. The Vending Machine rolls well, and beats J. Random's Stealth. This triggers an Alert. J. Random Hacker feels that even with an Alert giving the Machine a Firewall bonus against him, and whatever other countermeasures might be launched, he is still good enough to hack in and get his soda. Is J. Random allowed to continue attempting to hack-on-the-fly, or is he automatically blocked once an alert is triggered? 2) J. Random has planned ahead, and has taken the time to Probe the Vending Machine. The Vending Machine does not detect J. Random Hacker as he uses his forged credentials, and J. Random gains access to the Vending Machine's node without triggering an Alert. J. Random believes that he now owns the node, at the level of authority he hacked to. Is it possible for the node's Firewall to trigger an alert after a successful hack without the presence of ICe or Security Hackers to spot the intruder? 3) A normal commlink can only run a number of programs equal to its system rating. J. Random Hacker believes this means he will only face serious opposition on corporate Nexi, since an average commlink will only have three slots, and fighting off a hacker will require at the minimum an ICe frame running Attack and Analyse. If the target were using the commlink for something like a tac-net, then the system would drop everything from Rating3 to Rating 2, and J. Random is not worried about any system that can't roll six dice. Is J. Random reading this correctly? 4) J. Random Hacker is getting ready to 'harden' his commlink, and decides to save money and resources by not including an ICe frame to run his security. He reasons that his commlink can just run Analyse and Attack itself, so why pay for the extra code? 5) J. Random has a great idea. He is going to buy his cousin's old Nexus and load it with a dozen ICe programs, all packing useful security tools. Then, he will call all his friends with cheap commlinks and offer to have ICe hosted on his Nexus patrolling their Commlinks. Since the ICe is running on his machine, he reasons, the low system resources on the commlinks won't matter, and for a few nuyen a month they will have automated overwatch like a serious system. Will J. Random's plan work? ...thanks in advance for just *reading* this far; I know this is a lot of questions, and I hope somebody can clarify how these things are supposed to work together. |
|
|
|
Dec 17 2010, 01:35 PM
Post
#2
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 297 Joined: 11-April 10 From: Raleigh, NC Member No.: 18,443 |
5) J. Random has a great idea. He is going to buy his cousin's old Nexus and load it with a dozen ICe programs, all packing useful security tools. Then, he will call all his friends with cheap commlinks and offer to have ICe hosted on his Nexus patrolling their Commlinks. Since the ICe is running on his machine, he reasons, the low system resources on the commlinks won't matter, and for a few nuyen a month they will have automated overwatch like a serious system. Will J. Random's plan work? Nice! Cloud computing applied to Shadowrun. It absolutely will work once your nexus has access to all those commlinks. However, your nexus had better have good security of its own, because now it's a single point of access to every commlink it patrols. Mesh |
|
|
|
Dec 17 2010, 02:17 PM
Post
#3
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 222 Joined: 12-July 10 Member No.: 18,814 |
1) J. Random Hacker badly wants a Nuka-Cola, and is using hack-on the fly against his nemesis, the Vending Machine. The Vending Machine rolls well, and beats J. Random's Stealth. This triggers an Alert. J. Random Hacker feels that even with an Alert giving the Machine a Firewall bonus against him, and whatever other countermeasures might be launched, he is still good enough to hack in and get his soda. Is J. Random allowed to continue attempting to hack-on-the-fly, or is he automatically blocked once an alert is triggered? When the firewall detects him an alert is triggered which includes not only a higher firewall rating (making it a lot harder to hack into), but also some sort of alert response as well, see page 238 SR4A, it even has a random chart for what type of response the machine does. Continuing to attempt to hack into the machine alerted to his presence is doable, if it hasn't shut down, though it is alot harder against the significantly stronger firewall. He can also attempt to change to another ID that the machine isn't alerted against, since the bonus firewall from the alert only applies to the detected user. He can either change commlinks or spoof/hack a new matrix connection with his existing commlink (I think unwired has those rules? and I don't remember it being particularly difficult). Either way there might be active IC or a spider looking for intruders at that point. |
|
|
|
Dec 17 2010, 02:20 PM
Post
#4
|
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
For 1), yeah, JRH can can still hack into the node, dealing with the + 4 Firewall on and the results of any security measures that alert triggered. For a vending machine, its not likely going to be a spider or even any serious IC. There is probably a camera recording the vicinity and it might get sent to local authorities, but the likelihood anyone will come down there and bust JRH is slim. He'll have enough time to get his Nuka-Cola and leave before anyone shows up. He'd likely want to clean up the Access Logs (although if using a temp Access ID, that may not be an issue as long as he doesn't use it again) or check what the alert triggered and clean that up. But then again, it may not even be worth the time for such a petty crime.
For 2), yeah, the node itself could be set up to do random or scheduled scans on all icons it can see. If JRH was Stealthed, then its even less likely that he'll get checked, but its still possible if the node just checks everything on a regular basis. Doesn't make a lot of sense for lower security, but it could happen. For 3), just to clarify, you can run more programs than system rating, its just that running more will degrade your response, which basically translates into one less die to roll in many of your pools. So, yeah, JRH is reading that correctly. For 4), I don't think your node can Attack anything, so the best your node would be able to do is run Analyze and if it finds anything, report back to you, then you could decide. If you had an agent in there, it could Analyze, report and then Attack. Node's actions are pretty limited, so that's the main difference. |
|
|
|
Dec 17 2010, 02:29 PM
Post
#5
|
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
4) You want to run an agent because the agent can be scripted with responses. The agent, once it detects the intruder can load attack and start spanking.
5) This really is an ideal situation. Your agents just need an open subscription to the commlink. You could also slave their commlinks to your nexus. Allowing only skinlinked connections, and connections from the nexus. 2) No, with no ICE and no Spider, he owns that vending machine. Of course, that vending machine probably gets software updates that reset the accounts every so often. And your cloud security idea works for corporations too. 1) A vending machine that detects an intruder is probably configured to send a mayday to Corp Headquarters and then do a hard reboot, kicking you out of the system. 3) He's reading this wrong. A) Average Commlink with response 3 only has 2 slots before response degredation B) Response degrading does not effect the rating of the programs that can be run (those are determined by the System Rating of the Commlink) C) Response degradation only effects initiative rolls D) You lose a point of Response when ever the number of programs your running is N-1 where N = Max Rating Response 3 Commlink # of Programs Running | Current Response 1 | 3 2 | 3 3 | 2 4 | 2 5 | 2 6 | 1 7 | 1 8 | 1 9 | System Crash |
|
|
|
Dec 17 2010, 03:46 PM
Post
#6
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,094 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 |
5) J. Random has a great idea. He is going to buy his cousin's old Nexus and load it with a dozen ICe programs, all packing useful security tools. Then, he will call all his friends with cheap commlinks and offer to have ICe hosted on his Nexus patrolling their Commlinks. Since the ICe is running on his machine, he reasons, the low system resources on the commlinks won't matter, and for a few nuyen a month they will have automated overwatch like a serious system. Will J. Random's plan work? Well, depends. According to the BBB, Agents cannot "project" their icon into nodes they are not running on, as a human user's persona can. According to Unwired, they can. |
|
|
|
Dec 17 2010, 04:29 PM
Post
#7
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,083 Joined: 13-December 10 From: Rotterdam, The Netherlands Member No.: 19,228 |
Just want to add:
2) JRH can glitch his rolls, which can cause an alert at GM fiat. 3) JRH can be incredibly slow at hacking himself an account into said system, due to general bad rolling. The system may use its low dicepool to detect the hacking attempt and go on alert. The general populace's idea of an alert response should be along the lines of 'Hit that power button!' JRH on the other hand should know when to quit picking at the door, and leave for a bit, to wait for the dog to fall back asleep. |
|
|
|
Dec 17 2010, 07:24 PM
Post
#8
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 356 Joined: 3-April 10 Member No.: 18,409 |
1) J. Random Hacker badly wants a Nuka-Cola, and is using hack-on the fly against his nemesis, the Vending Machine. The Vending Machine rolls well, and beats J. Random's Stealth. This triggers an Alert. J. Random Hacker feels that even with an Alert giving the Machine a Firewall bonus against him, and whatever other countermeasures might be launched, he is still good enough to hack in and get his soda. Is J. Random allowed to continue attempting to hack-on-the-fly, or is he automatically blocked once an alert is triggered? That depends on what the Vending machine's response is to an active alert. It could: 1) Reboot. That would prevent him from connecting, and likely wipe out any successes he's made. 2) Attempt to log him off. Since he's not yet logged on, I'd say it works, and his Access ID is blocked. 3) Call a spider/IC/etc. from HQ. 2) J. Random has planned ahead, and has taken the time to Probe the Vending Machine. The Vending Machine does not detect J. Random Hacker as he uses his forged credentials, and J. Random gains access to the Vending Machine's node without triggering an Alert. J. Random believes that he now owns the node, at the level of authority he hacked to. Is it possible for the node's Firewall to trigger an alert after a successful hack without the presence of ICe or Security Hackers to spot the intruder? A glitch might trigger an alert. Resident IC, an agent, or a spider might periodicaly Analyze and attempt to detect the hacker. And whenever he attempts something that his access level wouldn't allow (such as creating a legitimate account with just User access), the firewall would get another chance to detect (i.e. whenever Hacking is used, instead of Computer). 3) A normal commlink can only run a number of programs equal to its system rating. J. Random Hacker believes this means he will only face serious opposition on corporate Nexi, since an average commlink will only have three slots, and fighting off a hacker will require at the minimum an ICe frame running Attack and Analyse. If the target were using the commlink for something like a tac-net, then the system would drop everything from Rating3 to Rating 2, and J. Random is not worried about any system that can't roll six dice. Is J. Random reading this correctly? A node/nexus/commlink can run Response programs before degradation. There are also Ergonomic programs (Unwired Software option) that don't count against this limit (the # of Ergonomic programs is limited to the system's Response, as well). So a rating 3 node could run 3 programs and 3 ergonomic programs. And a software suite counts as 1 program for both load and crashing purposes. That Black IC with Armor, Medic, and Cascading Attack might be a whole suite, and thus count as only 1 program. Analyze is your friend. 4) J. Random Hacker is getting ready to 'harden' his commlink, and decides to save money and resources by not including an ICe frame to run his security. He reasons that his commlink can just run Analyse and Attack itself, so why pay for the extra code? His commlink will make use of the Analyze, but he'll need an agent (or his own persona) to make use of the Attack (or any other) program. And the node will only use the Analyze when the Firewall gets an attempt to detect an intruder (hack on the fly, probing, etc.) 5) J. Random has a great idea. He is going to buy his cousin's old Nexus and load it with a dozen ICe programs, all packing useful security tools. Then, he will call all his friends with cheap commlinks and offer to have ICe hosted on his Nexus patrolling their Commlinks. Since the ICe is running on his machine, he reasons, the low system resources on the commlinks won't matter, and for a few nuyen a month they will have automated overwatch like a serious system. Will J. Random's plan work? Sure, but as others said, while he secures some areas, he introduces other problems. Putting all your eggs in one basket is fine, as long as you WATCH THAT BASKET. |
|
|
|
Dec 17 2010, 07:34 PM
Post
#9
|
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
Guys
The limit to the number of programs a System can run before degradation is not it's response. It's the System Rating - 1. It's a subtle difference, but it makes a BIG difference. |
|
|
|
Dec 17 2010, 09:26 PM
Post
#10
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Not that you really lose anything for going over it anyway.
|
|
|
|
Dec 17 2010, 10:33 PM
Post
#11
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
Supposing the alert is raised...is there any way that J. Random can cancel the alert. For example if he is the administrator can he command the node to cancel the alert.
Going a little bit further, if J. Random has a clever piece of software, or a helpful sprite, that delayed the alert for 1 round...could J.Random stop the alert from happening? |
|
|
|
Dec 18 2010, 02:37 AM
Post
#12
|
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Yes, both of those options exist. I'll check for pages.
Unwired p55: "Most of the time a user with security access is able to create or delete standard user accounts, edit other users’ data, initiate (and deactivate) an active alert, and read the access log (see Access Log, p. 65)." Unwired p117: "If a program with the Mute option is used in an action which triggers an alarm, the alarm is temporarily delayed for one full Combat Turn." Canceling an alert is not stopping it from ever happening, in your first example. I'm not *sure* about the second example, but I think I'd allow it. (IMG:style_emoticons/default/smile.gif) |
|
|
|
Dec 18 2010, 08:29 AM
Post
#13
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
Thanks Yerameyahu.
We have played that you can, but were never sure if we were fudging it. |
|
|
|
Dec 21 2010, 06:51 AM
Post
#14
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
Supposing the alert is raised...is there any way that J. Random can cancel the alert. For example if he is the administrator can he command the node to cancel the alert. Going a little bit further, if J. Random has a clever piece of software, or a helpful sprite, that delayed the alert for 1 round...could J.Random stop the alert from happening? When you've triggered an alert, your account on that Node is considered restricted. That means that you lose all account privileges. However, you still have access, so you can preform ANY action, including removing the alert and the restriction by making a hacking test. That's a Hacking + Exploit vs System + Firewall test, with the firewall bonus form the alert. So, for a good hacker who somehow forgot his Mute option, the game's still not over. Also, while Response degradation from overloading with programs won't effect max System and therefore program rating, it will effect Initiative and Dodge for drones or cybercombat. Not as bad as overloading on armor, but still it's basically losing a point of Reaction, which is significant in some circumstances. |
|
|
|
Dec 21 2010, 08:24 AM
Post
#15
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
When you've triggered an alert, your account on that Node is considered restricted. That means that you lose all account privileges. However, you still have access, so you can preform ANY action, including removing the alert and the restriction by making a hacking test. That's a Hacking + Exploit vs System + Firewall test, with the firewall bonus form the alert. So, for a good hacker who somehow forgot his Mute option, the game's still not over. This is not correct canceling an alert requires security level access per unwired, if you don't have security level access, because of an alert you can't shut down the alert. Is it a catch 22? Sure, but I've found it works good in my games. When it comes to hacking like so much else in shadowrun the best practice is not to get caught. |
|
|
|
Dec 21 2010, 08:51 AM
Post
#16
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 557 Joined: 26-July 09 From: Kent, WA Member No.: 17,426 |
Thanks to everybody who has already jumped in; This has been a very educational thread. I do have one other scenario I need help with, and I'm hoping that somebody will spot this and save me from making a new thread. The effectiveness of stealthy hackers actually came up in our last game, and my players really want a clear ruling on this.
6) Due to a troubling amount of missing Nuka-Colas, the Vending Machine has been upgraded, and is now being actively patrolled by a Spy-Eye (ICE-4 running Analyse-4 Stealth-4). J. Random Hacker is unaware of this, and proceeds to probe and hack the system as per usual, and does not trigger an alert. Assuming that J. Random is running an Analyze, he will need to get more hits then the ICE does with it's pool of 8 just to detect the presence of the ICE. Meanwhile, the ICE is running Analyse on the Node, presumably to beat J. Random Hacker's Stealth. Since J. Random Hacker is using an apparently legal login that has the authority to be testing the Mechanized Soda Ejector, will the Spy-Eye trigger an Alert immediately when it detects him, or is J. Random safe as long as he seems to be using his credentials in accordance with system policy? |
|
|
|
Dec 27 2010, 11:43 AM
Post
#17
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
This is not correct canceling an alert requires security level access per unwired, if you don't have security level access, because of an alert you can't shut down the alert. Is it a catch 22? Sure, but I've found it works good in my games. When it comes to hacking like so much else in shadowrun the best practice is not to get caught. Here's the relevant section w/ emphasis. QUOTE Additionally, all privileges involving the node itself (such as deactivating programs or agents, reboot- ing, editing files, etc.) are no longer automatically allowed to the trespasser, who must either use the Hacking skill to perform such actions or Spoof a command from a legitimate user that still has her permissions intact. Unwired is just chock full of instances where they say "If you do not have sufficient access privileges, use Hacking + [relevant program]" and the section on Alerts says specifically that you can hack past privileges while targeted by an Alert. So, you're right in that it doesn't specifically say, "to deactivate an alert, follow this process," but it does say hacking = actions. I know there are more rules here, but I'm too tired to hit all the pages. I'll dip back into this tomorrow though. In the mean time, an example of this in action is on p79 of Unwired in the Security in Action play demo. |
|
|
|
Dec 27 2010, 11:51 AM
Post
#18
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
6) Due to a troubling amount of missing Nuka-Colas, the Vending Machine has been upgraded, and is now being actively patrolled by a Spy-Eye (ICE-4 running Analyse-4 Stealth-4). J. Random Hacker is unaware of this, and proceeds to probe and hack the system as per usual, and does not trigger an alert. Assuming that J. Random is running an Analyze, he will need to get more hits then the ICE does with it's pool of 8 just to detect the presence of the ICE. Meanwhile, the ICE is running Analyse on the Node, presumably to beat J. Random Hacker's Stealth. Since J. Random Hacker is using an apparently legal login that has the authority to be testing the Mechanized Soda Ejector, will the Spy-Eye trigger an Alert immediately when it detects him, or is J. Random safe as long as he seems to be using his credentials in accordance with system policy? Basically, if they have a legitimate account, then they can do anything that account has access to do without risking suspicion. If they do something outside of the scope of their privileges then they risk being found out. All the relevant info is on p97 of Unwired. |
|
|
|
Dec 27 2010, 09:22 PM
Post
#19
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 681 Joined: 23-March 10 From: Japan Member No.: 18,343 |
One more thing to keep in mind... A legit account will not be using the Stealth program. Legit users have no reason to hide. We've always played that if you are using a legit account you turn off stealth, otherwise the system will still be suspicious of you and your activity. We also say that using the Hacking skill while not using a Stealth program could be seen as bad. It really helps to keep Hackers under control.
So a legit account (or one hacked as legit) can do anything that account should be able to do, but if you want to do anything shady, you need to really watch yourself or turn on stealth and become non-legit. Just my 2¥ -D |
|
|
|
Dec 27 2010, 09:55 PM
Post
#20
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 252 Joined: 11-June 10 Member No.: 18,694 |
One more thing to keep in mind... A legit account will not be using the Stealth program. Legit users have no reason to hide. We've always played that if you are using a legit account you turn off stealth, otherwise the system will still be suspicious of you and your activity. We also say that using the Hacking skill while not using a Stealth program could be seen as bad. It really helps to keep Hackers under control. So a legit account (or one hacked as legit) can do anything that account should be able to do, but if you want to do anything shady, you need to really watch yourself or turn on stealth and become non-legit. Just my 2¥ -D A Stealth program isn't like a commlink's hidden mode. Stealth is a clever hacker program that attempts to make the hacker as “invisible” as possible to other system processes by obfuscating his activities, erasing system tracks, and mimicking authorized traffic. Stealth hides the hacker from the Firewall’s watchful gaze as he breaks into a system (see Breaking In, p. 221). Stealth also protects the hacker from prying Analyze actions (p. 217) and track attempts (p. 219). It is literally hiding you from the system's processes, sneaking you into the little cracks. It's not a 'this user is hidden' flag. |
|
|
|
Dec 28 2010, 10:48 PM
Post
#21
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 681 Joined: 23-March 10 From: Japan Member No.: 18,343 |
It is literally hiding you from the system's processes, sneaking you into the little cracks. It's not a 'this user is hidden' flag. What’s the difference between the two? With one you are hiding your activity, with the other you are hiding your activity… If you saw someone skulking around your office and acting dodgy would you question it? Using a Stealth program is skulking and being dodgy, not using one isn’t. -D P.S. I’m not trying to be a smartass, just trying to clarify for my own sanity. |
|
|
|
Dec 28 2010, 10:59 PM
Post
#22
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 252 Joined: 11-June 10 Member No.: 18,694 |
What’s the difference between the two? With one you are hiding your activity, with the other you are hiding your activity… If you saw someone skulking around your office and acting dodgy would you question it? Using a Stealth program is skulking and being dodgy, not using one isn’t. -D P.S. I’m not trying to be a smartass, just trying to clarify for my own sanity. The difference sounds like "I'm not here" versus "I'm here but being quiet about it". The idea is that your digital skulking around and acting dodgy keeps you from being seen, period, not what you do from being seen. If you see the office skulker, yeah, that's suspicious. If you don't, would you even think something was going on? |
|
|
|
Dec 28 2010, 11:03 PM
Post
#23
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
Stealth is a S.E.P. Device.
|
|
|
|
Dec 28 2010, 11:06 PM
Post
#24
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
I understand the argument that, because Stealth tries to obfuscate the source of commands or actions, any time it fails, it makes that action automatically suspect, even if the user it is traced to has full permissions to preform that action. "Why did User 423's edit action come through the operating system's old sub-level command line?" and such.
One decent way of modeling this is the Security Tally rule tweak on p39 of Unwired. |
|
|
|
Dec 28 2010, 11:11 PM
Post
#25
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 252 Joined: 11-June 10 Member No.: 18,694 |
Agreed.
|
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 17th April 2026 - 06:35 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.