![]() |
![]() ![]() |
![]() |
![]() ![]()
Post
#1
|
|
Target ![]() Group: Members Posts: 76 Joined: 23-September 12 Member No.: 56,131 ![]() |
So I got my copy of Shadowrun 4 in the mail last tuesday, and I've gotten a decent amount of reading done. The only thing is, while I get the basics of how the matrix is supposed to run as a concept, I'm not quite getting how to actually run matrix stuff. Could someone give me a brief overview of how to run the matrix?
|
|
|
![]()
Post
#2
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,389 Joined: 20-August 12 From: Bunbury, western australia Member No.: 53,300 ![]() |
So I got my copy of Shadowrun 4 in the mail last tuesday, and I've gotten a decent amount of reading done. The only thing is, while I get the basics of how the matrix is supposed to run as a concept, I'm not quite getting how to actually run matrix stuff. Could someone give me a brief overview of how to run the matrix? You ask the impossible (IMG:style_emoticons/default/nyahnyah.gif) |
|
|
![]()
Post
#3
|
|
Target ![]() Group: Members Posts: 17 Joined: 22-December 12 Member No.: 66,132 ![]() |
I think you just have to jump in and give it a try. As the previous poster seems to articulate, a lot of people (including me) are still afraid of matrix rules even though we all admit that the sr4 rules are more elegant and game centrically thoughtful than ever before. I think its not a prob with the rules though, more just a function of jumping in and getting the feet wet.
I wrote a shorthand outline of the matrix rules that u might find helpful: MATRIX Device Attributes Firewall System Signal Response Condition Monitor = 8 + (system/2) Use programs + skills instead of attributes + skills Actions Free (all run simply on SYSTEM OS "program" unless otherwise noted) Alter icon Change mode of slave Detect active/passive (not hidden) nodes Jackout Switch to AR/VR Terminate data transfer Transmit phrase Simple Analyze icon (ANALYZE PROGRAM) Computer + analyze v. ? Deactivate Program Decrypt (with key) Encrypt (ENCRYPT PROGRAM) Command Slave Inhabit drone/slave Log off Observe in Detail Transfer Data Lasts only a combat turn Complex Capture wireless signal (SNIFFER PROGRAM) Control Slave (COMMAND PROGRAM) Tactile skill + Command program Crash node (EXPLOIT PROGRAM) Hacking + Exploit (System + Firewall, Complex Action) extended test After 1st attack, node gets +4 to Firewall Crash Program (EXPLOIT PROGRAM) Hacking + Exploint v. Firewall + System opposed test Data search Data search + browse (variable threshold, variable interval)extended test In lieu of browse, use: Scan to find associated wireless or wired devices Analyze to find agents or other elements in a node Sniffer to distill data from intercepted wireless traffic Detect Hidden Node Electronic Warfare + Scan (4) [if you know about where the wireless node is] Electronic Warfare + Scan (15, combat turn) extended test if location of node is unknown Disarm Data Bomb (DISARM PROGRAM) Hacking + Disarm (rating x 2) Edit (EDIT PROGRAM) Computer + Edit (difficulty level) Hack on the fly (EXPLOIT PROGRAM) Hacking + exploit (firewall, complex action) extended +3 to threshold for security account +6 to threshold for admin Each hack action grants node a free analyze + firewall (hacker's STEALTH) extended test which, upon success triggers an alert OR ONE CAN DO PROBE HACKING WHICH IS MUCH SAFER Hacking + Exploit (system+firewall + 3 or +6 [depending on account level], 1 hour) extended test Then log on action Then target gets a single analyze + firewall (hacker's STEALTH) test at log on Cryptanalysis (DECRYPT PROGRAM) Electronic Warfare + Decrypt (encryption rating x 2, combat turn) extended [runs autonomosly after initiation and does not require further active analysis] Intercept Traffic (SNIFFER PROGRAM) [must have access to a bottleneck node] Hacking + SNIFFER Hits=threshold for others to detect the snooping TO INSERT FAKE TRAFFIC: Hacking + Sniffer v. Firewall + System Jam Signals (NO PROGRAM) Automatically jams signals less than its signal [taking into account target's ECCM] Log On No test Attack Reboot [must have admin account] System + Response (10, combat turn) extended Redirect Trace (SPOOF PROGRAM) Hacking + Spoof v. Computer + Track Repair Icon (MEDIC PROGRAM) Computer + Medic (damage taken x2, complex action ) extended Run Program [Loads onto ram] Set Data Bomb Does rating x 1d6 damage Spoof (SPOOF PROGRAM) [this is just the illicit version of the command action] Must be aware of a valid access ID Hacking + spoof v. system/pilot + firewall -3 modifier if the command needs a security account -6 modifier if the command needs an admin account Trace user (TRACK PROGRAM) Computer + Track (10, complex action) extended test Target Stealth is a negative modifier Redirect increases threshold Terminate [hacker's] connection [used by IC or defense deckers] Firewall + System (exploit, combat turn) extended test Combat Initiative Cold Sim -- Initiative = response + intuition and extra initiative pass Hot Sim -- Initiative = response + intuition +1 and 2 extra initiative passes Cybercombat + attack program rating v. response + firewall If black hammer or blackout programs score hit, then target connection is jammed open May jack out on willpower + biofeedback filter v. IC rating + response Success still incurs dumpshock Inflicts rating + net hits damage upon appropriate condition monitor per IC/program type Resisted with System + Armor test (PERSONA) or willpower + biofeedback filter program (PHYSICAL OR STUN) Dumpshock [occurs whenever you are forced off] 5S/P for cold/hot sim respectively resisted by willpower + biofeedback filter program |
|
|
![]()
Post
#4
|
|
Target ![]() Group: Members Posts: 17 Joined: 22-December 12 Member No.: 66,132 ![]() |
I think you just have to jump in and give it a try. As the previous poster seems to articulate, a lot of people (including me) are still afraid of matrix rules even though we all admit that the sr4 rules are more elegant and game centrically thoughtful than ever before. I think its not a prob with the rules though, more just a function of jumping in and getting the feet wet.
I wrote a shorthand outline of the matrix rules that u might find helpful: MATRIX Device Attributes Firewall System Signal Response Condition Monitor = 8 + (system/2) Use programs + skills instead of attributes + skills Actions Free (all run simply on SYSTEM OS "program" unless otherwise noted) Alter icon Change mode of slave Detect active/passive (not hidden) nodes Jackout Switch to AR/VR Terminate data transfer Transmit phrase Simple Analyze icon (ANALYZE PROGRAM) Computer + analyze v. ? Deactivate Program Decrypt (with key) Encrypt (ENCRYPT PROGRAM) Command Slave Inhabit drone/slave Log off Observe in Detail Transfer Data Lasts only a combat turn Complex Capture wireless signal (SNIFFER PROGRAM) Control Slave (COMMAND PROGRAM) Tactile skill + Command program Crash node (EXPLOIT PROGRAM) Hacking + Exploit (System + Firewall, Complex Action) extended test After 1st attack, node gets +4 to Firewall Crash Program (EXPLOIT PROGRAM) Hacking + Exploint v. Firewall + System opposed test Data search Data search + browse (variable threshold, variable interval)extended test In lieu of browse, use: Scan to find associated wireless or wired devices Analyze to find agents or other elements in a node Sniffer to distill data from intercepted wireless traffic Detect Hidden Node Electronic Warfare + Scan (4) [if you know about where the wireless node is] Electronic Warfare + Scan (15, combat turn) extended test if location of node is unknown Disarm Data Bomb (DISARM PROGRAM) Hacking + Disarm (rating x 2) Edit (EDIT PROGRAM) Computer + Edit (difficulty level) Hack on the fly (EXPLOIT PROGRAM) Hacking + exploit (firewall, complex action) extended +3 to threshold for security account +6 to threshold for admin Each hack action grants node a free analyze + firewall (hacker's STEALTH) extended test which, upon success triggers an alert OR ONE CAN DO PROBE HACKING WHICH IS MUCH SAFER Hacking + Exploit (system+firewall + 3 or +6 [depending on account level], 1 hour) extended test Then log on action Then target gets a single analyze + firewall (hacker's STEALTH) test at log on Cryptanalysis (DECRYPT PROGRAM) Electronic Warfare + Decrypt (encryption rating x 2, combat turn) extended [runs autonomosly after initiation and does not require further active analysis] Intercept Traffic (SNIFFER PROGRAM) [must have access to a bottleneck node] Hacking + SNIFFER Hits=threshold for others to detect the snooping TO INSERT FAKE TRAFFIC: Hacking + Sniffer v. Firewall + System Jam Signals (NO PROGRAM) Automatically jams signals less than its signal [taking into account target's ECCM] Log On No test Attack Reboot [must have admin account] System + Response (10, combat turn) extended Redirect Trace (SPOOF PROGRAM) Hacking + Spoof v. Computer + Track Repair Icon (MEDIC PROGRAM) Computer + Medic (damage taken x2, complex action ) extended Run Program [Loads onto ram] Set Data Bomb Does rating x 1d6 damage Spoof (SPOOF PROGRAM) [this is just the illicit version of the command action] Must be aware of a valid access ID Hacking + spoof v. system/pilot + firewall -3 modifier if the command needs a security account -6 modifier if the command needs an admin account Trace user (TRACK PROGRAM) Computer + Track (10, complex action) extended test Target Stealth is a negative modifier Redirect increases threshold Terminate [hacker's] connection [used by IC or defense deckers] Firewall + System (exploit, combat turn) extended test Combat Initiative Cold Sim -- Initiative = response + intuition and extra initiative pass Hot Sim -- Initiative = response + intuition +1 and 2 extra initiative passes Cybercombat + attack program rating v. response + firewall If black hammer or blackout programs score hit, then target connection is jammed open May jack out on willpower + biofeedback filter v. IC rating + response Success still incurs dumpshock Inflicts rating + net hits damage upon appropriate condition monitor per IC/program type Resisted with System + Armor test (PERSONA) or willpower + biofeedback filter program (PHYSICAL OR STUN) Dumpshock [occurs whenever you are forced off] 5S/P for cold/hot sim respectively resisted by willpower + biofeedback filter program |
|
|
![]()
Post
#5
|
|
Douche ![]() ![]() ![]() ![]() Group: Banned Posts: 1,584 Joined: 2-March 11 Member No.: 23,135 ![]() |
My biggest suggestion would be, like above, sorting out all the separate rules beforehand, by common usage. Make yourself a little data sheet (or 3) on it. Doing this is going to help you out a ton, for information purposes as well as getting a feel for what the hacker's options are. Once it "clicks" with you it'll just seem like a slightly more abstracted version of meatspace gameplay (since concepts of "where" and "how far" and "tactical positioning" don't mean anything on a node).
There are a few general categories of Matrix activity, and you should arrange your thoughts along those lines. 1) Breaking In -- finding the node and getting on the system, analyzing the host and getting your bearings 2) Finding the Target -- you broke in to look for something like a file or a camera or door controls, so now you need to find where that resides on the system 3) Dealing with Threats -- IC, data bombs, encryption, security personnel, all will get in your way 4) Manipulating the Target -- changing the video feed, tapping the comm lines, downloading that file, or whatever else you came in to do 5) Getting Out -- graceful logoff or dumpshock, clean get away or traces Generally you'll do a little bit of 1 first, followed by a mix of 2, 3, and 4 depending on circumstances. This is where data sheets are important, because to keep things moving you'll want to have the basic rules for each part all together (with page number references for stuff that's rarer / won't fit on your sheet). A "most basic" sort of matrix incursion will be: break in, find target, disable primary security, manipulate target, deal with security response, get out. |
|
|
![]()
Post
#6
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,091 Joined: 3-October 09 From: Kohle, Stahl und Bier Member No.: 17,709 ![]() |
DDH #2 has a nice flowchart for hacking a node.
|
|
|
![]()
Post
#7
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,930 Joined: 9-April 05 From: Scandinavian Union Member No.: 7,310 ![]() |
Wait, SR4 or the Anniversary edition? (SR4A)
If the first, curl up in a ball and cry. If the second just read the entire chapter and you should have a decent grip. I |
|
|
![]()
Post
#8
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 ![]() |
It´s a few years old by now, but the thread in my sig was written for those with SR4-non-A. In both cases, look at Aarons Cheat Sheets.
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 31st July 2025 - 01:00 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.