Hacking |
Hacking |
Jan 9 2011, 05:09 PM
Post
#1
|
|
Target Group: Members Posts: 46 Joined: 21-May 10 From: McAllen, TX Member No.: 18,600 |
I just finished GMing my first session of SR. Now, this is a new campaign since the first one fell through when two of the players left. I've got two new players, and one of them is playing a technomancer. And I seem to be having the same trouble here as I did in the previous campaign and that's getting bogged down with hacking. Does anyone have any tips on making the hacking much faster or any house rules that they use to streamline the hacking for technomancers and hackers?
|
|
|
Jan 9 2011, 05:29 PM
Post
#2
|
|
Neophyte Runner Group: Members Posts: 2,248 Joined: 14-October 10 Member No.: 19,113 |
One thing I do is work out in advance how good the hacker is at "hacking on the fly". There is a difficulty that they can do easily without breaking into a sweat, a difficulty they might be a ble to do , and a difficulty that they cannot easily do.
So if they can easily do it, just take them outside, and tell them whats in the system (prehaps getting them to make a roll or two one hacking + exploit or computer + analyse to make them feel good). If its a system that they will have trouble with, then you can play it out. But since you are in charge of the game, you have put this in to give them a fun period: prehaps one session in three. If its a hard system tell them, and if they do go in, change the theme music to Chopin's requiem and blast them to bits. In other words if they are just going to hack it, don't bother rolling all the die just some sort of "how well you get the data now that you have hacked it". I too am interested in how other people streamline the hacking |
|
|
Jan 9 2011, 06:46 PM
Post
#3
|
|
Moving Target Group: Members Posts: 211 Joined: 11-April 03 From: Maine Member No.: 4,431 |
I never use matrix topography and all that stuff. I just run hackers in real time with the rest of the team and I use THIS set of actions. It's just a summary of the matrix actions from the BBB that I found online with a bunch of other compiled hacking rules
It's all you really need for the most part, unless your doing matrix combat, and has worked great for our group. |
|
|
Jan 9 2011, 07:03 PM
Post
#4
|
|
Target Group: Members Posts: 46 Joined: 21-May 10 From: McAllen, TX Member No.: 18,600 |
Is the 2nd page supposed to be blank?
|
|
|
Jan 10 2011, 07:01 AM
Post
#5
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
Play it just like you'd play the face's social skills or the infiltrator infiltration skills:
- If the system is easy enough for him to get inside, don't bother with dice rolling. - If you're in a hurry or aren't really interested in the details, just have him do a single roll (logic+hacking or hacking+exploit, you can do an opposition test against System+Firewall) and tell him what he gets. - If it's something important and you want to play right, play it right. Just like you'd have the infiltrator roll for opening the lock, getting inside undetected, finding whatever he's looking for, opening the lock to get it, take it without raising an alarm and getting back out without getting caught, have the hacker/TM roll for his actions. But, just like you'd describe what happens to the infiltrator and make the scene interesting (even to the other players), describe what happens to the hacker/TM. |
|
|
Jan 10 2011, 07:53 AM
Post
#6
|
|
Moving Target Group: Dumpshocked Posts: 681 Joined: 23-March 10 From: Japan Member No.: 18,343 |
We created a "Quick Hacking" chart that we use. The hacker makes 1 roll, the GM rolls once for the system and then you compare the results to see what happens. If you'd like I can send you a copy (it's an excel spreadsheet). PM me your email and I'll send it along.
-D P.S. We don't use it all the time, but for the quick hack stuff (not major plot items) it works well. It is biased towards the hacker. |
|
|
Jan 10 2011, 11:40 AM
Post
#7
|
|
Moving Target Group: Members Posts: 151 Joined: 28-August 08 From: Berlin, Germany Member No.: 16,285 |
For simplified Hacking, try this:
http://www.land-of-kain.de/shadowrun/sr4/sr4_hacker.html I never used it (yet), but it reads OK. |
|
|
Jan 10 2011, 03:00 PM
Post
#8
|
|
Target Group: Members Posts: 29 Joined: 12-August 08 Member No.: 16,228 |
I too have been thinking of ways to simplify Hacking at the table and to make it run smoothly (and quickly). I like to treat my hackers like the other PCs and give them their shot during combat or whatever and adjudicate on the fly so I need some easy to implement rules to go with.
|
|
|
Jan 10 2011, 03:56 PM
Post
#9
|
|
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
For simplified Hacking, try this: http://www.land-of-kain.de/shadowrun/sr4/sr4_hacker.html I never used it (yet), but it reads OK. Never seen this before. I read it and it does look good for what it says, a character that hacks "on the side". Since there is a lot of stuff removed, this will only work well if your TM/hacker is okay with not being able to customize every last bit of his hardware and software. I think that it would work well at my table, as all my players, even the hacker, just want to get through the hack, not spend a lot of time in the spotlight. |
|
|
Jan 10 2011, 07:04 PM
Post
#10
|
|
Moving Target Group: Members Posts: 211 Joined: 11-April 03 From: Maine Member No.: 4,431 |
Is the 2nd page supposed to be blank? Yeah, It's supposed to be blank. Sorry about that. I should have gotten rid of it before converting to PDF. I just add those actions on to the big list of actions to do for the round like in combat. That way the hacker is on par with the other charachters and doens't need his own mini-game to do stuff. |
|
|
Jan 10 2011, 07:06 PM
Post
#11
|
|
Moving Target Group: Members Posts: 211 Joined: 11-April 03 From: Maine Member No.: 4,431 |
For simplified Hacking, try this: http://www.land-of-kain.de/shadowrun/sr4/sr4_hacker.html Ooooo...I like that! |
|
|
Jan 10 2011, 07:06 PM
Post
#12
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
You can use the device rating table to figure out thresholds and dicepools on the fly. Usually only the hacking test will be relevant, so Hacking+Exploit vs. Firewall+Analyse would be the ideal single test IMO. Proper TMs will thread Stealth and succeed without being detected most of the time, so that player can have fun without holding the rest of the group up.
|
|
|
Lo-Fi Version | Time is now: 29th April 2024 - 12:24 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.