![]() ![]() |
Oct 7 2004, 04:01 PM
Post
#76
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Probe IC could affect my logoff too right? That would make my TN really high. Is there a chance I didn't see it but it's affecting? If so, I might have to try to find it and destroy.
Before I do that, I'll try another Graceful Logoff: 1, 1, 1, 2, 3, 3, 4, 4, 10, 10, 11, 11 |
|
|
|
Oct 7 2004, 04:15 PM
Post
#77
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You catch sight of a gray blob rushing towards you as you sever connection with the system. The room snaps into focus around you.
[ Spoiler ]
|
|
|
|
Oct 7 2004, 04:17 PM
Post
#78
|
|||
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
There’s certainly a chance for you not to notice, that’s what makes Probe so scary. IIRC it adds dice to the system’s security test rather than raising your TN, but that does indirectly make it more difficult to perform operations. ~J |
||
|
|
|||
Oct 7 2004, 04:18 PM
Post
#79
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Ok, I read the spoiler on this one just because I wanted to see why I was able to get out. Can I go back and read the others?
So I was up to about 12 on the security tally. Why didn't I notice any IC before? Is it because my Sensor test didn't detect anything? What can I do to be more aware when things happen? |
|
|
|
Oct 7 2004, 05:18 PM
Post
#80
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You didn’t perform a Locate IC operation, and the IC, while proactive, didn’t start proacting yet. I suppose you can read the other spoilers, but if you do I’ll be rerandomizing the security sheaf. The security rating and soforth will remain the same, though.
~J |
|
|
|
Oct 7 2004, 05:38 PM
Post
#81
|
|||
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Nah, I won't read them. No biggie. Ok, so how do I edit the file offline? How big of a file is it anyway? What is the general scope of the contents? What did my client embezzel?, How much?, How did his boss find out, etc? |
||
|
|
|||
Oct 7 2004, 05:53 PM
Post
#82
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You can edit it however you’d like; it’ll be a Computers test against a low TN (again, negligible protection). The contents are a bunch of receipts, statements, and some system logs, as well as a security photo. From what you can tell, it seems to span the course of several years, amounting to a total take of about sixty-five thousand nuyen, a decent chunk of it in a car that was signed over to your friend under suspicious circumstances. No mention is made of how the evidence was discovered.
~J |
|
|
|
Oct 7 2004, 06:19 PM
Post
#83
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Ok, cool. Can do I a global find and replace with my client's name and his boss? Then I want to delete the security photo as well.
My Computer is 6 and I have a TP of 3: 2, 3, 3, 5, 5, 5, 11, 11, 14 |
|
|
|
Oct 7 2004, 06:43 PM
Post
#84
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You do so with ease. Anything else you want to do?
~J |
|
|
|
Oct 7 2004, 07:02 PM
Post
#85
|
|||
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Uhh, is there anything else I should be doing? After I do that, I'll probably wait about an hour and then head back in. The first thing I'll do when I get back in is erase the original file and replace it with the one I just modified. Then I'll have to find a "public" place the file as well. Maybe I'll look for a public company message board or something. I could even hack the company's home page. We'll see. I'll then have to find the employee database and see if it has promotion info. Do you want to go through the Logons again? |
||
|
|
|||
Oct 7 2004, 07:17 PM
Post
#86
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You can do whatever to the file, just checking what you wanted. You do have to perform the Logon operations again, though.
~J |
|
|
|
Oct 7 2004, 07:43 PM
Post
#87
|
|||
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Which ones do I actually need? Do I have to Logon to the LTG, then the RTG, then another LTG, the the PTG? Let's say I'm in the Redmond LTG. Where do I go from there? What LTG is the corp located? |
||
|
|
|||
Oct 7 2004, 08:15 PM
Post
#88
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
The corp itself is on the same RTG as you are, but a different PLTG. I suppose we skipped a LTG logon earlier: you’ll be going LTG > RTG > LTG > PLTG.
~J |
|
|
|
Oct 7 2004, 08:50 PM
Post
#89
|
|
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Yikes. I can really see how your security tally can rise fast. I never really realized the benefits of jacking in from the inside. Of course, you have to get inside.
Anyway, here are my Logon attempts, all with Deception 6. LTG: 1, 2, 2, 2, 2, 4, 5, 5, 8, 8, 8, 9 RTG: 1, 1, 1, 3, 3, 4, 4, 4, 4, 9, 10, 17 LTG: 1, 2, 2, 3, 3, 3, 4, 4, 4, 9, 10, 17 Host (PTG): 1, 1, 1, 2, 3, 3, 4, 5, 5, 7, 10, 10 PHEW!! |
|
|
|
Oct 7 2004, 09:26 PM
Post
#90
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You reach the PLTG with little incident, bumping into the errant bit here and there.
[ Spoiler ]
|
|
|
|
Oct 7 2004, 09:42 PM
Post
#91
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
about that null op. what you do is to basicly tally the time the icon of the decker sits idle and then use that to set the targetnumber for the null op. basicly the longer you sit around the easyer it will become for the host to detect that something funny is going on.
i like the use of spoiler tags in this thread ;) and swapping in a app can be done in the background and you can have more then one operation running at the same time (you just have to multiplex the bandwidth available, just like opening multiple webpages or downloading more then one file at a time in real life). its just the initiation of the swap mem operation that takes a simple action (either when you yourself is in combat or when the rest of the team is on combat. take a look at the non-combat actions section on page 209 in sr3. i defines a nice system for use both to time how long stuff takes and for when a decker is in the system while his team mates are in combat). |
|
|
|
Oct 7 2004, 10:20 PM
Post
#92
|
|||
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Ok, I'm going to head right back to where I found the original file. Do I need to do another Locate File? If not, I'm going to do an Edit File and delete the original and then do an Upload Data to replace it with the one I editted. My R/W is 6 and IIRC, the system's File rating is 13. Edit File (erase original): 1, 2, 3, 3, 3, 4, 4, 5, 5, 5, 10, 10 (my guess is 2 successes) Upload Data (with editted version): 1, 1, 1, 1, 1, 2, 4, 4, 5, 5, 9, 9 (yikes, I'm hoping 2 successes again) Assuming these succeed, I might do an Analyze Security to see where I'm at. |
||
|
|
|||
Oct 7 2004, 10:58 PM
Post
#93
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
You find the file without difficulty, it's right where you left it. In a matter of seconds the old file is gone and the new is in place, with only a brief stutter.
[ Spoiler ]
|
|
|
|
Oct 7 2004, 11:32 PM
Post
#94
|
|||
|
Moving Target ![]() ![]() Group: Dumpshocked Posts: 202 Joined: 15-September 04 From: East Providence, RI Member No.: 6,664 |
Hmm, so far, so good...and that's the problem. I'm going to do an Analyze Security. Analyze 6: 1, 1, 1, 2, 2, 3, 4, 4, 5, 7, 8, 9
I don't!! I have to make Will checks everytime I see them!! :P |
||
|
|
|||
Oct 7 2004, 11:44 PM
Post
#95
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
Security Rating: Green 8
Alert Status: No Alert System Alert Level: 0x0eb4 (two points of security tally) [ Spoiler ]
|
|
|
|
Oct 7 2004, 11:46 PM
Post
#96
|
|
|
Manus Celer Dei ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 17,013 Joined: 30-December 02 From: Boston Member No.: 3,802 |
That's a question. If you use Analyze Security, does it return the security tally before or after the use of the program? For instance, Joe Bob the decker has Tally 5, and rolls a hundred billion successes on Analyze Security. The host rolls two successes against Joe's DF. Does he find out Tally 5 or Tally 7?
~J |
|
|
|
Oct 8 2004, 12:15 AM
Post
#97
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
i think thats upto gm. atleast its never defined in the books...
|
|
|
|
Oct 8 2004, 12:28 AM
Post
#98
|
|||
|
Moving Target ![]() ![]() Group: Members Posts: 156 Joined: 3-July 02 Member No.: 2,929 |
Joe Bob better have lots of large friends or he won't hang onto that deck for long. ;) |
||
|
|
|||
Oct 8 2004, 01:02 AM
Post
#99
|
|
|
Immoral Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 15,247 Joined: 29-March 02 From: Grimy Pete's Bar & Laundromat Member No.: 2,486 |
I'd rule that Analyze Security program returns totally up-to-date data, so it would give the tally after the host's successes were added.
If that isn't logical enough, here's another way of looking at it. Wouldn't the host's detection test take place immediately upon activation of the decker's Analyze Security program, therefore the host accrues its successes before the results of the AS program are processed. |
|
|
|
Oct 8 2004, 02:02 AM
Post
#100
|
|
|
UMS O.G. ![]() ![]() Group: Dumpshocked Posts: 444 Joined: 18-May 04 Member No.: 6,335 |
Just a quick break in. If you want to put the file where his supervisor can't delete it you have a couple options.
1.) Edit the file and raise the required user access from supervisor to superuser (if said exec doesn't have it). 2.) Rename and move the file to another host and hope he doesn't have the computer savy to find the thing. 3.) Edit the file so that all search querries for the file from his station find something else (a self deleting trojan program that disappears when the file you want found is properly accessed). 4.) Perform edit slave on the supervisors work station to filter all incoming data to have a similar affect as #3 above. Just a few thoughts. |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 23rd November 2025 - 01:31 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.