IPB

Welcome Guest ( Log In | Register )

6 Pages V  « < 2 3 4 5 6 >  
Reply to this topicStart new topic
> new Matrix run thread?, any chance of this happening?
GlassJaw
post Oct 7 2004, 04:01 PM
Post #76


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



Probe IC could affect my logoff too right? That would make my TN really high. Is there a chance I didn't see it but it's affecting? If so, I might have to try to find it and destroy.

Before I do that, I'll try another Graceful Logoff:

1, 1, 1, 2, 3, 3, 4, 4, 10, 10, 11, 11
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 04:15 PM
Post #77


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You catch sight of a gray blob rushing towards you as you sever connection with the system. The room snaps into focus around you.

[ Spoiler ]
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 04:17 PM
Post #78


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



QUOTE (GlassJaw)
Probe IC could affect my logoff too right? That would make my TN really high. Is there a chance I didn't see it but it's affecting? If so, I might have to try to find it and destroy.

There’s certainly a chance for you not to notice, that’s what makes Probe so scary. IIRC it adds dice to the system’s security test rather than raising your TN, but that does indirectly make it more difficult to perform operations.

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 04:18 PM
Post #79


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



Ok, I read the spoiler on this one just because I wanted to see why I was able to get out. Can I go back and read the others?

So I was up to about 12 on the security tally. Why didn't I notice any IC before? Is it because my Sensor test didn't detect anything? What can I do to be more aware when things happen?
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 05:18 PM
Post #80


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You didn’t perform a Locate IC operation, and the IC, while proactive, didn’t start proacting yet. I suppose you can read the other spoilers, but if you do I’ll be rerandomizing the security sheaf. The security rating and soforth will remain the same, though.

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 05:38 PM
Post #81


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



QUOTE
I suppose you can read the other spoilers, but if you do I’ll be rerandomizing the security sheaf


Nah, I won't read them. No biggie.

Ok, so how do I edit the file offline?

How big of a file is it anyway? What is the general scope of the contents? What did my client embezzel?, How much?, How did his boss find out, etc?
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 05:53 PM
Post #82


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You can edit it however you’d like; it’ll be a Computers test against a low TN (again, negligible protection). The contents are a bunch of receipts, statements, and some system logs, as well as a security photo. From what you can tell, it seems to span the course of several years, amounting to a total take of about sixty-five thousand nuyen, a decent chunk of it in a car that was signed over to your friend under suspicious circumstances. No mention is made of how the evidence was discovered.

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 06:19 PM
Post #83


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



Ok, cool. Can do I a global find and replace with my client's name and his boss? Then I want to delete the security photo as well.

My Computer is 6 and I have a TP of 3:

2, 3, 3, 5, 5, 5, 11, 11, 14
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 06:43 PM
Post #84


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You do so with ease. Anything else you want to do?

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 07:02 PM
Post #85


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



QUOTE
Anything else you want to do?


Uhh, is there anything else I should be doing?

After I do that, I'll probably wait about an hour and then head back in. The first thing I'll do when I get back in is erase the original file and replace it with the one I just modified. Then I'll have to find a "public" place the file as well. Maybe I'll look for a public company message board or something. I could even hack the company's home page. We'll see.

I'll then have to find the employee database and see if it has promotion info.

Do you want to go through the Logons again?
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 07:17 PM
Post #86


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You can do whatever to the file, just checking what you wanted. You do have to perform the Logon operations again, though.

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 07:43 PM
Post #87


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



QUOTE
You do have to perform the Logon operations again


Which ones do I actually need? Do I have to Logon to the LTG, then the RTG, then another LTG, the the PTG? Let's say I'm in the Redmond LTG. Where do I go from there? What LTG is the corp located?
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 08:15 PM
Post #88


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



The corp itself is on the same RTG as you are, but a different PLTG. I suppose we skipped a LTG logon earlier: you’ll be going LTG > RTG > LTG > PLTG.

~J
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 08:50 PM
Post #89


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



Yikes. I can really see how your security tally can rise fast. I never really realized the benefits of jacking in from the inside. Of course, you have to get inside.

Anyway, here are my Logon attempts, all with Deception 6.

LTG: 1, 2, 2, 2, 2, 4, 5, 5, 8, 8, 8, 9

RTG: 1, 1, 1, 3, 3, 4, 4, 4, 4, 9, 10, 17

LTG: 1, 2, 2, 3, 3, 3, 4, 4, 4, 9, 10, 17

Host (PTG): 1, 1, 1, 2, 3, 3, 4, 5, 5, 7, 10, 10

PHEW!!

Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 09:26 PM
Post #90


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You reach the PLTG with little incident, bumping into the errant bit here and there.

[ Spoiler ]
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 7 2004, 09:42 PM
Post #91


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



about that null op. what you do is to basicly tally the time the icon of the decker sits idle and then use that to set the targetnumber for the null op. basicly the longer you sit around the easyer it will become for the host to detect that something funny is going on.

i like the use of spoiler tags in this thread ;)

and swapping in a app can be done in the background and you can have more then one operation running at the same time (you just have to multiplex the bandwidth available, just like opening multiple webpages or downloading more then one file at a time in real life). its just the initiation of the swap mem operation that takes a simple action (either when you yourself is in combat or when the rest of the team is on combat. take a look at the non-combat actions section on page 209 in sr3. i defines a nice system for use both to time how long stuff takes and for when a decker is in the system while his team mates are in combat).
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 10:20 PM
Post #92


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



QUOTE
You reach the PLTG with little incident, bumping into the errant bit here and there.


Ok, I'm going to head right back to where I found the original file. Do I need to do another Locate File?

If not, I'm going to do an Edit File and delete the original and then do an Upload Data to replace it with the one I editted. My R/W is 6 and IIRC, the system's File rating is 13.

Edit File (erase original): 1, 2, 3, 3, 3, 4, 4, 5, 5, 5, 10, 10 (my guess is 2 successes)

Upload Data (with editted version): 1, 1, 1, 1, 1, 2, 4, 4, 5, 5, 9, 9 (yikes, I'm hoping 2 successes again)

Assuming these succeed, I might do an Analyze Security to see where I'm at.
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 10:58 PM
Post #93


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



You find the file without difficulty, it's right where you left it. In a matter of seconds the old file is gone and the new is in place, with only a brief stutter.

[ Spoiler ]
Go to the top of the page
 
+Quote Post
GlassJaw
post Oct 7 2004, 11:32 PM
Post #94


Moving Target
**

Group: Dumpshocked
Posts: 202
Joined: 15-September 04
From: East Providence, RI
Member No.: 6,664



Hmm, so far, so good...and that's the problem.

I'm going to do an Analyze Security.

Analyze 6: 1, 1, 1, 2, 2, 3, 4, 4, 5, 7, 8, 9

QUOTE
i like the use of spoiler tags in this thread


I don't!! I have to make Will checks everytime I see them!! :P
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 11:44 PM
Post #95


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



Security Rating: Green 8

Alert Status: No Alert

System Alert Level: 0x0eb4 (two points of security tally)

[ Spoiler ]
Go to the top of the page
 
+Quote Post
Kagetenshi
post Oct 7 2004, 11:46 PM
Post #96


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,013
Joined: 30-December 02
From: Boston
Member No.: 3,802



That's a question. If you use Analyze Security, does it return the security tally before or after the use of the program? For instance, Joe Bob the decker has Tally 5, and rolls a hundred billion successes on Analyze Security. The host rolls two successes against Joe's DF. Does he find out Tally 5 or Tally 7?

~J
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 8 2004, 12:15 AM
Post #97


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i think thats upto gm. atleast its never defined in the books...
Go to the top of the page
 
+Quote Post
CirclMastr
post Oct 8 2004, 12:28 AM
Post #98


Moving Target
**

Group: Members
Posts: 156
Joined: 3-July 02
Member No.: 2,929



QUOTE
For instance, Joe Bob the decker has Tally 5, and rolls a hundred billion successes on Analyze Security.

Joe Bob better have lots of large friends or he won't hang onto that deck for long. ;)
Go to the top of the page
 
+Quote Post
Fortune
post Oct 8 2004, 01:02 AM
Post #99


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



I'd rule that Analyze Security program returns totally up-to-date data, so it would give the tally after the host's successes were added.

If that isn't logical enough, here's another way of looking at it. Wouldn't the host's detection test take place immediately upon activation of the decker's Analyze Security program, therefore the host accrues its successes before the results of the AS program are processed.
Go to the top of the page
 
+Quote Post
Necro Tech
post Oct 8 2004, 02:02 AM
Post #100


UMS O.G.
**

Group: Dumpshocked
Posts: 444
Joined: 18-May 04
Member No.: 6,335



Just a quick break in. If you want to put the file where his supervisor can't delete it you have a couple options.

1.) Edit the file and raise the required user access from supervisor to superuser (if said exec doesn't have it).

2.) Rename and move the file to another host and hope he doesn't have the computer savy to find the thing.

3.) Edit the file so that all search querries for the file from his station find something else (a self deleting trojan program that disappears when the file you want found is properly accessed).

4.) Perform edit slave on the supervisors work station to filter all incoming data to have a similar affect as #3 above.

Just a few thoughts.
Go to the top of the page
 
+Quote Post

6 Pages V  « < 2 3 4 5 6 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 23rd November 2025 - 01:31 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.