![]() |
![]() ![]() |
![]() |
![]()
Post
#51
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,357 Joined: 19-May 12 From: Seattle area Member No.: 52,483 ![]() |
Again, that is in the real world. Shadowrun does not work that way. See, even you have a hard time getting out of the real world mindset... (IMG:style_emoticons/default/smile.gif) Purge your mind of the real world constraints and paradigms in regards to computers and you will be set free... (IMG:style_emoticons/default/smile.gif) This is actually a commonly offered view, but in practice a very bad one for games. Why? Because if you're trying to present something in a game as "It's a computer." then you must expect players to deal with it as one, and get angry when it's disallowed. If you're trying to present something as "It's not a computer." then you must expect them to use computers for things computers are good at. If you're trying to say "There are no computers, and this is the closest approximation so deal with it." then suspension of disbelief flies out of the window precisely because you're challenging the very underlying concepts of the milieu. The game source materials explicitly say that commlinks are computers and that the matrix as a whole is the network environment. Blanket responses to the effect of "Yeah, all those computer things which computers are great at and we use computers for all the time and have for decades and decades in the real world just suddenly don't work because it's not in the rulebook." don't fly. Not at my table, not at any table I've been at. Get it? It's not the `real world constraints' or the `real world mindset' which matters except in the presentation and the player expectations - and there it all matters deeply, and irretrievably. Shadowrun (to refer to another thread) doesn't have explicit animal husbandry rules either - that doesn't mean animals don't breed. It would matter a lot less if the game source materials provided a whole new fundamental set of principles on which electronics (or the game equivalent) functions - but it doesn't. Not even a little bit. It just offers gaming abstractions, and describes VR as being an efficient way, within the game, and within the VR metaphor, for interacting with computers. It even makes explicit references to where the VR interface is not an adequate metaphor for what is happening under the skin (the Fastjack fiction snippet in the anniversary rules also make reference to this, as source material example) and reflects the fact that you are loading programs onto an electronic device. So go ahead - call it house rules, call it gamebreaking, call it what you like, but at my table, commlinks are computers and ingenuity in their use, recognising that what you are using is a data processing device and using that information to buttress your in-game decisions, will be permitted. You'll roll for your electronics and hacking skills - of course you will. But if you have the skills, the technology has the flexibility. To develop the point about the milieu, it even goes further - Shadowrun juxtaposes very well the rise of technology and the rise of what people generally have regarded as nontechnological or even antitechnological, in parallel, very well. The social questions which are raised, the implications for the elite nature of magic, and the democratising nature of technology, make for a great situation to examine. Reducing the high technology of the system to just another set of inflexible buttontwiddles eviscerates this aspect of the milieu, to the loss of the game's philosophical depth. All right in a beer-and-pretzels one-shot game, but lousy in an ongoing campaign. |
|
|
![]()
Post
#52
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,700 Joined: 1-July 10 Member No.: 18,778 ![]() |
The problem here is that it's not just that SR doesn't have rules for doing every single thing real-world computers can do - it's that its rules specifically make the Matrix not work like modern computers in a huge number of ways. In the real world, public key cryptography exists and lets people send messages, fairly easily, that can't be broken before the sun burns out. Real world decryption is about hoping that someone doing the encryption was sloppy or made a mistake, or stealing the key. Shadowrun cryptography does not work like that. At all. It's not that there are not rules for encryption. It's that there are rules for encryption and they are nothing at all like real-world encryption. This is a really fundamental thing and that it works so differently in SR and in the real world really does say that Shadowrun computers are nothing like real-world ones.
|
|
|
![]()
Post
#53
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
This is actually a commonly offered view, but in practice a very bad one for games. Why? Because if you're trying to present something in a game as "It's a computer." then you must expect players to deal with it as one, and get angry when it's disallowed. If you're trying to present something as "It's not a computer." then you must expect them to use computers for things computers are good at. If you're trying to say "There are no computers, and this is the closest approximation so deal with it." then suspension of disbelief flies out of the window precisely because you're challenging the very underlying concepts of the milieu. The game source materials explicitly say that commlinks are computers and that the matrix as a whole is the network environment. Blanket responses to the effect of "Yeah, all those computer things which computers are great at and we use computers for all the time and have for decades and decades in the real world just suddenly don't work because it's not in the rulebook." don't fly. Not at my table, not at any table I've been at. Get it? It's not the `real world constraints' or the `real world mindset' which matters except in the presentation and the player expectations - and there it all matters deeply, and irretrievably. Shadowrun (to refer to another thread) doesn't have explicit animal husbandry rules either - that doesn't mean animals don't breed. It would matter a lot less if the game source materials provided a whole new fundamental set of principles on which electronics (or the game equivalent) functions - but it doesn't. Not even a little bit. It just offers gaming abstractions, and describes VR as being an efficient way, within the game, and within the VR metaphor, for interacting with computers. It even makes explicit references to where the VR interface is not an adequate metaphor for what is happening under the skin (the Fastjack fiction snippet in the anniversary rules also make reference to this, as source material example) and reflects the fact that you are loading programs onto an electronic device. So go ahead - call it house rules, call it gamebreaking, call it what you like, but at my table, commlinks are computers and ingenuity in their use, recognising that what you are using is a data processing device and using that information to buttress your in-game decisions, will be permitted. You'll roll for your electronics and hacking skills - of course you will. But if you have the skills, the technology has the flexibility. To develop the point about the milieu, it even goes further - Shadowrun juxtaposes very well the rise of technology and the rise of what people generally have regarded as nontechnological or even antitechnological, in parallel, very well. The social questions which are raised, the implications for the elite nature of magic, and the democratising nature of technology, make for a great situation to examine. Reducing the high technology of the system to just another set of inflexible buttontwiddles eviscerates this aspect of the milieu, to the loss of the game's philosophical depth. All right in a beer-and-pretzels one-shot game, but lousy in an ongoing campaign. And obviously, I disagree with you. In Shadowrun, becasue the rules work the way they do, oftentimes, the player's intimate knowledge of Computers gets in the way. Honestly, if hacking were to emulated realistically, in game, you would never get anything done, because you would be unable to do anything as a Hacker to a properly defended system. BORING !!!!! The rules are the way they are to make Hackers viable in the game. SR4A is a much better Hacking system than the 3 previous editions in this regard, because it is streamlined. Even if there are a few issues, most, if not all of them, can be addressed with the optional rules presented in the books. Making them more reaslistic just drags the game down and kills all the fun. Oh, and I never said that computers were not computers in Shadowrun. They are, they just work on different paradigms than they do in the real world. Basic Electronics aside. Besides, Even with the simplicity, Hacking is still one of the most complex (and some would say confusing) aspects of the game. |
|
|
![]()
Post
#54
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
I see our incident response tickets, I can assure you that you can find a way to get in.
|
|
|
![]()
Post
#55
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,357 Joined: 19-May 12 From: Seattle area Member No.: 52,483 ![]() |
The problem here is that it's not just that SR doesn't have rules for doing every single thing real-world computers can do - it's that its rules specifically make the Matrix not work like modern computers in a huge number of ways. In the real world, public key cryptography exists and lets people send messages, fairly easily, that can't be broken before the sun burns out. Real world decryption is about hoping that someone doing the encryption was sloppy or made a mistake, or stealing the key. Shadowrun cryptography does not work like that. At all. It's not that there are not rules for encryption. It's that there are rules for encryption and they are nothing at all like real-world encryption. This is a really fundamental thing and that it works so differently in SR and in the real world really does say that Shadowrun computers are nothing like real-world ones. Actually, given plausible advances in technology, that's not quite true. Already quantum computing is finding real use in special situations. Give it a couple of decades, and decoding just about anything short of a one time pad becomes plausible, if not outright provably feasible. Also, as kzt observes, security gets cracked all the time - some systems just aren't well designed, like many wifi systems. People use poorly chosen passwords. Or the Johnson has a password for you. Or a key file. Or people fall for social engineering. Or get sloppy about trusting certificates. It doesn't matter how fancy your encryption is, if the person actually using it doesn't follow the processes and procedures set up by the guy who designed the security system in the first place. Even today you have tools to get you access to systems all the time - or you set up a man-in-the-middle attack. Or, you step one small victory on another until you own the whole place. One badly chosen password gets you user access. A poorly secured system gets you network scanning capability. A man in the middle position lets you identify a couple of keys. This gets you a higher privilege for a different system. From there, the administrators, for the sake of convenience, can use that level of access to hop around the systems. Pretty soon you can read an online backup containing passwords in the clear, or you can identify an SQL injection attack in some source code or script left on a system. Not long after, you're downloading paydata. Sounds almost like the system as presented, doesn't it? |
|
|
![]()
Post
#56
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,357 Joined: 19-May 12 From: Seattle area Member No.: 52,483 ![]() |
Honestly, if hacking were to emulated realistically, in game, you would never get anything done, because you would be unable to do anything as a Hacker to a properly defended system. BORING !!!!! Obviously, kzt has counterexamples. So do lots of people. Anonymous gets data from people like Sarah Palin. Banks lose credit card lists, government agencies lose personnel data. This isn't speculation, this is real, in our newsfeeds today. I think that the rules can be used as an abstraction of that. The rules are the way they are to make Hackers viable in the game. SR4A is a much better Hacking system than the 3 previous editions in this regard, because it is streamlined. Even if there are a few issues, most, if not all of them, can be addressed with the optional rules presented in the books. Making them more reaslistic just drags the game down and kills all the fun. Hackers don't need the rules as an excuse for viability, and the rules don't afford an excuse for straitjacketing intelligent play. Nothing in what you said suggests that hackers shouldn't have one system monitoring another, or monitoring Matrix links. Part of the whole point to hacking is the ability to work outside the constraints which others try to impose. And as for killing fun? What's more fun than outsmarting the opposition? Breaking the mould? Seeing another way through a problem? Oh, and I never said that computers were not computers in Shadowrun. They are, they just work on different paradigms than they do in the real world. Basic Electronics aside. Besides, Even with the simplicity, Hacking is still one of the most complex (and some would say confusing) aspects of the game. Well, you pretty much have to select one of the three positions I mentioned. Either they're computers as we understand it, or there are computers as we understand it but commlinks are different, or commlinks are all there is, and they aren't computers as we understand it. Judging by what you write here, ("they just work on different paradigms than they do in the real world") you're choosing the third option. If you're choosing the third option, then building and carrying along a conventional computer, different from a commlink, but equivalent to what we understand by the concept (since you appear to be happy with basic electronics in-game), makes a hacker massively more useful. Or should I suddenly say that for reasons of *hands wave furiously here* you can't build conventional computers any more? You're at liberty to state that, of course, but for the reasons I gave above (effects on suspension of disbelief, confusion of terms relating to the understanding of what is or is not, or can or can't be a computer, impoverishing the philosophical implications of the milieu) I decline to accept that at my table, and will reward intelligent play on the shared terms offered by the source material. Basically, that's why I prefer pen-and-paper games to CRPGs. |
|
|
![]()
Post
#57
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,700 Joined: 1-July 10 Member No.: 18,778 ![]() |
Actually, given plausible advances in technology, that's not quite true. Already quantum computing is finding real use in special situations. Give it a couple of decades, and decoding just about anything short of a one time pad becomes plausible, if not outright provably feasible. Quantum computers are very different from modern real-world computers. Saying SR computers are quantum computers is one way of explaining why they are so different. |
|
|
![]()
Post
#58
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,357 Joined: 19-May 12 From: Seattle area Member No.: 52,483 ![]() |
Quantum computers are very different from modern real-world computers. Saying SR computers are quantum computers is one way of explaining why they are so different. Quantum computers, as general purpose computing devices, not only don't exist but there are no plausible (non-blue-sky) proposals on what they might be like. The current uses of quantum computing largely relate to uses of entangling in communications, and some laboratory quantum computing units (although they're creeping out of the laboratories). The strong points of quantum computing are roughly similar in style (though not in implications for computational feasibility) to the strong points of having a graphics processor. The quantum computing unit isn't going to run Windows any faster or better than a Xeon, but can be used analogously to an FPU for doing something a lot faster than the conventional processing unit. Basically, quantum and conventional computing are not mutually exclusive, but complementary. In other words, if commlinks are quantum computers, there's utterly no reason to believe that they aren't also conventional computers. Today we can fit an entirely conventional computer into something the size and shape of an iphone. We call it an iphone. Granted, Apple crippled it because the hell with the general public, but Nokia has built quite a few, as have other companies. Look around. So even if your commlink is a dinky thing which sits on your belt, worst case it's slightly fatter, and has a conventional SoC on it. Even if you want to stick at 1980's handheld technology (why would you?) HP had some nice programmable devices in those days. And any hacker with Electronics skillsets could certainly combine the two with a little intelligent work. So why would I stop him? Because the rules don't cover it? No. That's my challenge as a Game Master to overcome. |
|
|
![]()
Post
#59
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
It's not that you can't make hacking in SR work, and even work in a way that makes sense to people. It's that you can't do it without house ruling like mad. Which is not a sign that you have great rules.
And SR has chosen option 3 as the choice for the setting. "Commlinks are all there is, and they aren't computers as we understand it". I'm not defending this choice, I'm just pointing it out. It's a terrible choice for all the reasons you mention, but it is what it is. |
|
|
![]()
Post
#60
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
I see our incident response tickets, I can assure you that you can find a way to get in. Maybe you are not as secure as you think you are... Which is my point. And I can guarantee you that your penetrations did not take on the order of seconds, like they do in Shadowrun. Different Paradigms at work here. |
|
|
![]()
Post
#61
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Obviously, kzt has counterexamples. So do lots of people. Anonymous gets data from people like Sarah Palin. Banks lose credit card lists, government agencies lose personnel data. This isn't speculation, this is real, in our newsfeeds today. I think that the rules can be used as an abstraction of that. of course, and yet, these hacks do not occur over night, nor are they generally considered easy hacks. QUOTE Hackers don't need the rules as an excuse for viability, and the rules don't afford an excuse for straitjacketing intelligent play. Nothing in what you said suggests that hackers shouldn't have one system monitoring another, or monitoring Matrix links. Part of the whole point to hacking is the ability to work outside the constraints which others try to impose. And as for killing fun? What's more fun than outsmarting the opposition? Breaking the mould? Seeing another way through a problem? Never said that. I said that the paradigms are a bit different. Computers do not function in Shadowrun QUITE like they function in the real world. The Tricks of the trade you describe above are all viable in the Shadowrun world, they just do not work quite the same way they do IRL. And I would contend that the rules do not straightjacket intelligent play. I have played a Hacker for years, within the rules (OPtional Rules in use) and have had absolutely no issues with the hacking System. Is it different than what I am used to IRL? Of Course it is... is it unworkable to the point of annoyance? Absolutely not. In fact, strict adherence to IRL models will tend to break the game by eliminating the straight Hacker as a viable archetype. QUOTE Well, you pretty much have to select one of the three positions I mentioned. Either they're computers as we understand it, or there are computers as we understand it but commlinks are different, or commlinks are all there is, and they aren't computers as we understand it. Judging by what you write here, ("they just work on different paradigms than they do in the real world") you're choosing the third option. If you're choosing the third option, then building and carrying along a conventional computer, different from a commlink, but equivalent to what we understand by the concept (since you appear to be happy with basic electronics in-game), makes a hacker massively more useful. Or should I suddenly say that for reasons of *hands wave furiously here* you can't build conventional computers any more? You're at liberty to state that, of course, but for the reasons I gave above (effects on suspension of disbelief, confusion of terms relating to the understanding of what is or is not, or can or can't be a computer, impoverishing the philosophical implications of the milieu) I decline to accept that at my table, and will reward intelligent play on the shared terms offered by the source material. Basically, that's why I prefer pen-and-paper games to CRPGs. Nope - I reject your third option, as it makes no sense, since there are obviopusly other Computing devices in the world... there is another option you forget to include... Computers/comlinks are similar to what we have now, but operate on different paradigms. You cannot say they are exactly the same, because we both know they are not. There are significant ways in which they differ, which many have stated, over the years. This has been my stance on Hacking from the start. SO... you can take what the game world gives you and run in that paradigm, or you can try to inject real world computing paradigms into the mix, which leaves most people wanting, because the paradigms do not work well together (and in fact are often contradictory). You can do everything you describe, within the rules of the Shadowrun Matrix, without resorting to the technobabble of real world computing. You just have to allow that certain things are not the same. If you cannot allow for that, then you will be unhappy with the result. Just becasue I have 20+ years in the Computrer Industry (Between College and Work Experience) and have taken my turn at White Hat endeavors from time to time does not mean that I cannot suspend my disbelief of a world that is 60 years in my future, with a differeing technological basis and development. I tend to (or at least try to) not let my RL knowledge interrupt my fun with the Game World that I am playing in, even if I do have some issues with it. History, as well as technology, diverged in the early 80's in Shadowrun, and they have had 2 world-wide technological crashes since then. Assuming that the technology is different is not a stretch (and in fact it is, by the world description). Why is that so hard to assimilate for you? You are trying to make a divergent world fit your concept of modern day computing. They are not the same. As for the conventional Computer buildiing crack, Shadowrun Computers ARE NOT what we would call Conventional Computers today. Obviously. They are both a bit better (they can do things we can only dream about currently, such as near-instantaneous decryption of the most secure files, and virtual ly unlimiterd storage space and transmission bandwidth) and worse (they lack some capabilities in areas that Modern Computers have currently, such as making a backup of a data-stream prior to decryption, odd but okay). That is to be expected of a technology that has had to be re-constructed twice in the last 90 years. And for the record, I, too, prefer Pen and Paper games, and for many of the same reasons I would wager. What I do not do is try to bend the game world to my understanding of it based upon my Real World experience. Some thing just are not required to have fun. |
|
|
![]()
Post
#62
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
It's not that you can't make hacking in SR work, and even work in a way that makes sense to people. It's that you can't do it without house ruling like mad. Which is not a sign that you have great rules. And SR has chosen option 3 as the choice for the setting. "Commlinks are all there is, and they aren't computers as we understand it". I'm not defending this choice, I'm just pointing it out. It's a terrible choice for all the reasons you mention, but it is what it is. Except that Comlinks are NOT the only computing devices in the setting. Nexi are not Comlinks. And you do not need House Rules... Simple application of a few of the Optional Rules will do just fine. The issue is that most computer Nerds (Most of us, right?) are not happy with that sort of fix. They (We) want it to work like they (we) know it should. And that is the trap. |
|
|
![]()
Post
#63
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,091 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
Never said it does. But if the system has a rule stating "There no Security accounts on this system", and one shows up? Trigger a Restricted Alert on that user, and begin terminating their connection. Hacking does not create an account, except when the intruder elects to install a backdoor -- which will be a hidden account if the hacker is any good, and thus hidden from the script. QUOTE "Optimization This modification optimizes the device’s processor and components to enhance one particular program, applying a +1 dice pool modifier for all tests using that so ware. Each device may only be optimized once." (Unwired p198) It's not the Program Option I meant; it's the Comlink modification I was talking about. And that still is not available for matrix attributes QUOTE Since when is a rating 6 program, and a rating 6 then spcialised skill, someone "without any serious skills or programs" ...??? Which part of "the average commlink" left you with the impression that I was talking about a device with Firewall 6? |
|
|
![]()
Post
#64
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Validating Posts: 2,492 Joined: 19-April 12 Member No.: 51,818 ![]() |
Hacking does not create an account, except when the intruder elects to install a backdoor -- which will be a hidden account if the hacker is any good, and thus hidden from the script. Um. Yes, yes it does: " Hacking on the Fl y is an Hacking + Exploit (target’s Firewall, Complex Action) Extended Test. Reaching the threshold will get you a user account on the node. If you want a security account, increase the threshold by +3, for an admin account increase it by +6." SR4A, p235, emphasis mine. Second paragraph under the heading Hacking on the fly. Literally, "SR4 Hacking 101". So, again: set your System/OS so that there are zero allowed User accounts and zero allowed Security accounts - by the same mechanism that allows you to decide there are no public accounts on your link (or CHN, or whatever). So now, it's "Admin or bust", and that lovely +6 threshold comes into play. So, do your 18 dice beat a threshold of 12, as fast as 11 dice beat a threshold of 6? (Answer: not statistically, no. It shuld take two rolls of an 18 die pool to reach 12 successes; it takes only about 1.5 rolls of an 11 die pool, to meet a threshold of 6 (which means, functionally 2 rolls - but with a wee bit of buffer against a spot of bad luck.) And that's with Analyze 4. Add in some Optimisation for that program, and you can push the 'link's DP to 13 (Firewall 6, Analyze 6, Optimised Link +1), giving even more of a buffer against poor rolls. So, gee. The best starting-legal link, turns out to be reasonably good at resisting some pretty high-end-for-starting-characters hacking attempts - wihtout being unreasonably HARD to hack, either. Go figure, eh? QUOTE And that still is not available for matrix attributes Firewall is a Program, in addition to being a matrix attribute. QUOTE Which part of "the average commlink" left you with the impression that I was talking about a device with Firewall 6? First, you said: Skill 6 Specialization 2 Exploit 6 VR Bonus 2 Encephalon 2 18 dice without bending over backwards, or even maxing out the potential pool. Chances are that 18 dice beat Firewall 6 faster than 10 (or even 12) dice beat Stealth 6. Then, you said: If the average commlink can be hacked by the kid at the table next to you without any serious skills or programs, there is something wrong. ... and I replied: Since when is a rating 6 program, and a rating 6 then spcialised skill, someone "without any serious skills or programs" ...??? I was responding to the bit where you mentioned "the kid at the table next to you without any serious skills or programs". |
|
|
![]()
Post
#65
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 ![]() |
I tend to (or at least try to) not let my RL knowledge interrupt my fun with the Game World that I am playing in, even if I do have some issues with it. This, IMO, is very important for RPGs and SR especially. If you just can't bear the inconsistency of a future computer system that won't accept tricks you know can be done today then perhaps you can be mollified by considering that your character himself has no idea (unless you were playing a world-leading computer historian, perhaps). There have been times when as GM I've refused an action based on a player's RL knowledge because it was unbelievable that the character would have said knowledge too. I've done it to my own character too and so have most of my players at one time or another. It's not c***blocking, it's investing in the shared gaming experience where the system needs only to maintain integrity within it's own framework. You might not accept the fundamentals of the Matrix, but your character must and that's why you should too. After all, if everything were about what you would do then it's not really roleplaying. |
|
|
![]()
Post
#66
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
Um. Yes, yes it does: " Hacking on the Fl y is an Hacking + Exploit (target’s Firewall, Complex Action) Extended Test. Reaching the threshold will get you a user account on the node. If you want a security account, increase the threshold by +3, for an admin account increase it by +6." SR4A, p235, emphasis mine. Second paragraph under the heading Hacking on the fly. Literally, "SR4 Hacking 101". It is stated in unwired somewhere (since I never bothered to buy a PDF version of that POS I can't cite it) that you are bypassing accounts when you hack. The computer rules are full of this kind of contradictory stuff. |
|
|
![]()
Post
#67
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Validating Posts: 2,492 Joined: 19-April 12 Member No.: 51,818 ![]() |
You don't need a PDF copy to at least give a page number.
Also, you're wrong. Unwired says that you are bypassing the usual authentication process ... but you're still making an account: "Hacking and Authentication When a character hacks into a node, whether on the fly or by probing, she is actually circumventing normal authentication routines and setting up a fake account that the system believes has access at the privilege level the hacker chose at the start of the attempt. [...]" -- Unwired p65, emphasis mine. |
|
|
![]()
Post
#68
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,150 Joined: 15-December 09 Member No.: 17,968 ![]() |
I checked UW, as I too thought hacking did not provide an account, and could only find it in the very special case that is hidden access points (under Backdoors - sorry, forgot the page number). Elsewhere Pax is right.
|
|
|
![]()
Post
#69
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,091 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
Um. Yes, yes it does: Not according to Unwired, p. 97. Yep, the extended rulebooks occasionally contradict the BBB... QUOTE Firewall is a Program, in addition to being a matrix attribute. Uh huh, so each system needs to set aside 2 program slots for Firewall and System, and a TM can thread both... QUOTE I was responding to the bit where you mentioned "the kid at the table next to you without any serious skills or programs". ...while apparently still being unable to read the first part of the sentence. So once more and just for you: A device with FIrewall 6 (the maximum allowed by the BBB) is not an "average commlink", which Joe Wageslave would bring with him during lunch time. The standard Device Rating is 3, and at that point hacking becomes trivial. The system itself is OK, but it simply is too easy to hack stuff, and security ratings max out too soon. |
|
|
![]()
Post
#70
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Validating Posts: 2,492 Joined: 19-April 12 Member No.: 51,818 ![]() |
Not according to Unwired, p. 97. Yep, the extended rulebooks occasionally contradict the BBB... For one very special, limited-applicability edge case: "hidden access point". Furthermore: "IC or security hackers that perceive the hacker will immediately recognize him as an intruder." Thus, immediate Restricted Alert, and therefore, VOILA, "Terminate Connection". All you'd have to add to my setup is a lowly Rating 1 Agent. QUOTE Uh huh, so each system needs to set aside 2 program slots for Firewall and System, and a TM can thread both... Don't be a complete ass. (IMG:style_emoticons/default/ohplease.gif) |
|
|
![]()
Post
#71
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,091 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
For one very special, limited-applicability edge case: "hidden access point". Oh dear, reading comprehension really does not not seem to be at an alltime high today...try reading the whole page again... QUOTE If a node has been hacked on-the-fly, the hacker has found some gaping hole in the system security that allows him to access an account on that node. ... If the target node was carefully probed before the hack [...] Either the hacker has ascertained a passcode that will allow him to access the account legitimately in the future, or he has discovered a re-usable exploit (p. 96)—the gamemaster determines which. Yep, hacking is total magic. It gives you access to an account, but it neither requires one nor creates one. If you want an explanation, maybe those accounts are system accounts PS: Just FYI, here is a list of users (and similar objects) that come with various windows versions. QUOTE Don't be a complete ass. (IMG:style_emoticons/default/ohplease.gif) Hey, I'm just drawing the logical conclusions. If you want something to be a program, it becomes a program with all the consequences (IMG:style_emoticons/default/wink.gif) |
|
|
![]()
Post
#72
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Validating Posts: 2,492 Joined: 19-April 12 Member No.: 51,818 ![]() |
Oh dear, reading comprehension really does not not seem to be at an alltime high today...try reading the whole page again... Fuck you. I read the damned page. Did you? First off: "If a node has been hacked on-the-fly, the hacker has found some gaping hole in the system security that allows him to access an account on that node." (Emphasis mine.) Now, the four actual options discussed under "Backdoors" ...?
QUOTE Hey, I'm just drawing the logical conclusions. If you want something to be a program, it becomes a program with all the consequences (IMG:style_emoticons/default/wink.gif) FIREWALL Firewall is the device’s built-in security software. It protects against unauthorized access and fends o hostile access attempts and exploits. A fi rewall will, for instance, instantly block access to multiple icons using the same access ID. Firewall is also used to defend against Matrix attacks in cybercombat (p.236)." -- SR4A p221, emphasis mine. "SYSTEM System measures the power of the device’s operating system (OS) so ware. This includes its stability, multitasking properties, ability to control hardware, resources, and the general quality of its code. If the System software ever crashes, the entire device crashes. System limits the rating of programs running on the device, and sets the limit on most devices for the number of programs that can be run without a Response drop. The System program is limited by the base Response rating of the device it is on: if the base Response rating of the device is lower than the System rating, then the System rating is set to equal the Response rating. System also sets the size of the Matrix Condition Monitor of persona programs running on the device (Cybercombat, p.236)." -- SR4A p222, emphasis mine. "UPGRADING DEVICES If you are looking for more power in your device, you can upgrade its Matrix attributes. Upgrading a device is simply a matter of having the proper hardware module (for Response and Signal) or software package (for Firewall and System)." -- SR4A p222, emphasis mine. See also, page 119 of Unwired - top right corner. Big table, hard to miss, titled "Advanced Programming Table". Deals with coding yoru own software; includes entries for Firewall and for System. Funny how that works. ... Now, please; stop being an ass. (IMG:style_emoticons/default/mad.gif) |
|
|
![]()
Post
#73
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,091 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
|
|
|
![]()
Post
#74
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,357 Joined: 19-May 12 From: Seattle area Member No.: 52,483 ![]() |
I'm perfectly happy to assume that everyone here knows a lot more about computing both in theory and practice than I do.
I'm perfectly happy to accept that other people want different things from their games from what I want. I'm even happy to accept that there are issues with the rules in the printed publications. My sole position here is that:
So let's look at that list of conditions:
So go ahead, run the game you like. Just, please, if I ever sit at your table, provide a courteous disclaimer. That's all I ask, and I don't think it's very unreasonable. |
|
|
![]()
Post
#75
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
I'm perfectly happy to assume that everyone here knows a lot more about computing both in theory and practice than I do. I'm perfectly happy to accept that other people want different things from their games from what I want. I'm even happy to accept that there are issues with the rules in the printed publications. My sole position here is that:
So let's look at that list of conditions:
So go ahead, run the game you like. Just, please, if I ever sit at your table, provide a courteous disclaimer. That's all I ask, and I don't think it's very unreasonable. So you use Houserules. Great, at least you admit it... (IMG:style_emoticons/default/smile.gif) |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 13th August 2025 - 12:01 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.