![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Target ![]() Group: Members Posts: 18 Joined: 18-December 11 From: Perth, Western Australia Member No.: 46,284 ![]() |
I've been running a campaign for some time now and I've mostly given the matrix a very basic treatment.
What I want to do now is beef up my cyber security to give a bit more depth to the matrix. My question is; how does an agent or IC know if a runner in one of their nodes with a user/security/admin isn't meant to be there? I know you would get the agent or IC to do a Analyze Icon/Node simple action but if the runner had an account for the node why would the agent or IC do anything about it? Thanks, and any help constructing matrix systems would also be appreciated. |
|
|
![]()
Post
#2
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,018 Joined: 3-July 10 Member No.: 18,786 ![]() |
Knowing basic hacking techniques, admin accounts could set an authorized list of users. If a new account appears without an existing admin either creating it or tagging it as okay, that might raise some alarms, if the hacker didn't technobabble to get around that when creating a new account. Perhaps the IC is coded with some signs to look for that appear on legitimate users that a hacker probably wouldn't know about (abstracted in game with the stealth program (IMG:style_emoticons/default/wink.gif) ), such as a certain icon style.
|
|
|
![]()
Post
#3
|
|
Target ![]() Group: Members Posts: 22 Joined: 1-October 12 Member No.: 56,499 ![]() |
Though you have given yourself a certain level of access you don't necessarily have all the correct coding on your icon. So while the system will respond to commands from your persona its heuristic system is constantly checking to make sure that everything is legit (or at least not corrupt or broken). When a security agent/IC encounters a new persona it checks it against whatever safe list it has or tags the persona is supposed to have. It is likely the character is not on that list or has the correct coding. That is why most hackers/techno run in stealth mod. Keeps those pesky programs from even detecting you there. I have seen the matrix run at least a dozen different ways and the cheese answer is find a way that is most fun for your players and yourself. If getting admin access grants near immunity to analyze and IC in your campaign then that is fine. If you want to slog through every guys rating 2 commlink with tons of opposed tests that is also a way to go.
|
|
|
![]()
Post
#4
|
|
Target ![]() Group: Members Posts: 18 Joined: 18-December 11 From: Perth, Western Australia Member No.: 46,284 ![]() |
Though you have given yourself a certain level of access you don't necessarily have all the correct coding on your icon. So while the system will respond to commands from your persona its heuristic system is constantly checking to make sure that everything is legit (or at least not corrupt or broken). When a security agent/IC encounters a new persona it checks it against whatever safe list it has or tags the persona is supposed to have. It is likely the character is not on that list or has the correct coding. That is why most hackers/techno run in stealth mod. Keeps those pesky programs from even detecting you there. I have seen the matrix run at least a dozen different ways and the cheese answer is find a way that is most fun for your players and yourself. If getting admin access grants near immunity to analyze and IC in your campaign then that is fine. If you want to slog through every guys rating 2 commlink with tons of opposed tests that is also a way to go. So putting in an IC with a beefy scan program to pick up illegitimate users in nodes where I want a bit of cyberspace action to occur would be a good way to go? |
|
|
![]()
Post
#5
|
|
Horror ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 ![]() |
Indeed, but after the first few times you pull this, your players will wise up and grab the Disarm program from Unwired, start using it on the node they're on first thing to make Analyze literally unable to do any thing unpleasant to them.
|
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 881 Joined: 13-November 11 From: Vienna, Austria Member No.: 43,494 ![]() |
Or they start with viral warefare, getting analyze infected with an "inertia" Virus and all running programs with "Swiss Cheese" Virus is very effective.
|
|
|
![]()
Post
#7
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,102 Joined: 23-August 09 From: Vancouver, Canada Member No.: 17,538 ![]() |
For really secure systems you can use some of the alternate methods of verification in Unwired, like the various passkeys (biometric, alchemical, etc). If the PC commlink doesn't have one of these plugged in, then they are pretty much guaranteed to be tagged as intruders. Nothing preventing them from stealing one from someone of course, or just using some poor shmuck's commlink with the right passcodes. But that puts them into social engineering or kidnapping and gets the whole group involved in the hack, which is a good thing.
|
|
|
![]()
Post
#8
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,782 Joined: 28-August 09 Member No.: 17,566 ![]() |
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 30th May 2023 - 06:59 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.