Vegas (also
MisterJuan &
BlueRondo actually)
Iīd be interested in what com-link model each of you is using - this shouldnīt be hard for
Conall &
Carla, as I allready saw them use theirs. For
Etain it depends on where sheīs carrying herīs.
AdamuI guess
Vegas made the perception-roll, because thatīs the resistance roll against someone using Etiquette to improve oneīs disposition to that character. So if she was an NPC and we where going by the standard rules,
Etainīs 2 hits would have canceld
Johnīs 2 hits and her disposition would have been unaltered.
Any chance I can identify what drug (or at least what category -stim, narc, ...)
Etain is on? I did a defaulted Street-Drugs Knowledge roll and scored 1 hit.
Now the hacking-roll-O-rama.
Iīll assume the searches are done by ~0930 or 1000, which leaves me something like 9-10 hours to do the job.
1st Fan-Comlink-probing but in a hurry (Exploit+Hacking (12, 30 minutes, 1s AND 2s count for Glitches!)) I got 6, 4 and 3 hits, no Glitches, so it takes 90 minutes.
-When I enter the Node, Iīll have the Agent and ALL my programs loaded into my persona (thatīs 11, temporarily reducing my Response (but not System, as per FAQ) to 5). The Agent will be preprogrammed to do the following tasks and I (Ini 10, 2 IPs) will only change instructions if circumstances demand it, so we are moving on Bullet-Time (Ini 11, 3 IPs); I just rolled once for each, because Iīm lazy and hope there will be no fight (which Iīd like to play through at least round by round anyway)
Unless otherwise noted, all Actions are the Agentīs, not
Johnīs (heīs delaying his actions). If you need any more rolls, just ask or do them yourself.
1st Round
1st IP, Complex Action: (p. 221) Use Exploit to enter node (no roll needed; Node gets
::EDIT:: Analyze+Firewall(Stealth 3)
::END-EDIT:: to detect me, Present users must beat my Hacking+Stealth (I made one roll and scored 5 hits) with their Computer+Analyze (p.217).
2nd IP, Simple Action: (p. 217) Analyze Node (buying 3 hits to save space
), I want to know
Alert-Status, of course, for the other 2 hits, Iīd like to know if there are any hidden trap-door access nodes and what programs are running on the node (or if I may only ask for one, if a Trace-Program is running). If an Alert has been triggered, the cooky will be activated as planned, before initiating the following actions.
2nd IP, Simple Action: (p. 217) Set Analyze to continuously scan for other users/icons (I made one roll and scored 3 hits), anything running Stealth can resist with Stealth+Hacking, otherwise the TH is set by the GM
3rd IP: (p. 219) Initiate Search for Ticket on the Com; Browse+DataSearch (TH??, 1 IP), I got 4, 2, 1 and 3 hits (so 1 IP if itīs easy or average, 3 if its Hard, I guess itīs not extream, even if itīs encrypted and/or misslabled)
2nd Round
1st or 3rd IP, Simple Action: Analyze Node again (p. 217), buying 3 hits, looking up alert status and wether a trace is running, as well as looking at the subscription-list
Hard to Further extrapolate what turn/pass the actions are in by now, so I wonīt lit it anymore
-(p. 219) If the ticket is not on the com, Iīll initiate a search for it on the PAN (TH??, 1 Round), I got 1, 4 2 and 3 hits (so 2 Rounds if easy or average, 4 rounds if hard)
-Once I found the ticket, Iīll initiate decryption if necessary (p. 225), Decrypt+Response (Encryption*2, 1 Round), I got 2, 2 and 2 hits, thatīs 3 Turns at most, unless the guy somehow used another com to encrypt the file.
-Simple Action: (p.217) Analyze Ticket-File (buying 3 hits out of lazyness and to save space). If it somehow looks fishy, I might not go on as planned. If it is mined with a DataBomb, I wonīt care since I lack the program to do anything about it.
-Simple Action: (p. 219) Transfer Data (should be nearly instantaneous, since itīs not extreamly large). I guess no test is needed, however, in case Computer+Edit is needed, the 3 hits I could buy should suffice.
-Complex Action: (p. 218) Leave as good a useless fake-Ticket behind as I can put up in one action or at least make the system 'think' the file is still there. Edit+Computer, buying 3 hits.
-Initiating Search for Security-Logs: (p. 219) Browse+Datasearch (TH??, 1 IP), got 6 and 2 hits, so 1 IP if easy or average, 2 if hard.
-Simple Action: Analyze Node again (p. 217), buying 3 hits, looking up alert status and wether a trace is running, I donīt quiet know, what to do with the 3rd hit (The Matrix Book is badly needed!!!)
-Complex Action: (p. 225) Eraze all logs of my presence and activeties. got 2 hits
-Complex Action: (p. 225) retry the action above. Got 5 hits
-Complex Action: Log Off
After that, Iīll go to another coffin-hotel, if I triggered an alert during my intrusion. In any case Iīll log off the matrix maybe even re-boot, if I suffered some kind of damage to my matrix-attributes or something and log on again (so my com creates a new access-ID).
Next, Iīll start probing the other 3/3 target using the same pattern, but Iīll put that into another post, so itīs a bit more easy to work through it (and because I have to go to bed, soon adn need to do the dishes still).
[ Spoiler ]
Intuition (5) + Street Drugs (-1) = 4 dice
[5] 4 4 2 Hits:1
Probing 1st Fan:
Agent (6) + Exploit (3) + Cooky-Modifire (1) = 10 dice
2 [5] 1 [5] [5] [5] 1 3 [6] [5] Hits:6
3 [6] [6] 1 [6] 3 4 [5] 1 4 Hits:4
3 2 4 4 2 2 [5] [5] 4 [6] Hits:3
Ini (John): Intuition (5) + Response (5) = 10 dice
[6] 3 2 1 1 4 3 3 [5] 2 Hits:2
Agent (6) + Response (5) = 11 dice
1 4 1 1 [5] 2 1 2 3 2 [6] Hits:2
Evade Matrix-Perception: Agent (6) + Stealth (3) = 9 dice
[6] 2 [5] [6] 2 4 1 [6] [5] Hits:5
Scan for Users/Icons: Agent (6) + Analyze (6) = 12 dice
4 2 2 4 1 3 [6] 2 [5] 3 2 [6] Hits:3
Ticket-Search on Com: Agent (6) + Browse (5) = 11 dice
4 4 3 1 4 [5] [6] [6] 1 4 [6] Hits:4
3 [5] 4 4 3 3 3 2 1 2 [6] Hits:2
1 3 3 3 1 3 2 4 4 1 [6] Hits:1
4 4 3 1 [5] 3 [5] 4 [5] 1 2 Hits:3
Ticket-Search on Network: Agent (6) + Browse (5) = 11 dice
1 1 2 1 1 4 4 4 [5] 1 2 Hits:1
[5] 3 3 1 [5] [6] 4 1 [5] 3 3 Hits:4
3 2 2 1 4 2 [6] 1 3 2 [6] Hits:2
[5] 2 [5] 2 1 1 2 [5] 2 2 3 Hits:3
Decryption (3) + Response (5) = 8 dice
2 3 1 3 2 [6] 4 [5] Hits:2
[6] 2 4 1 4 3 [6] 1 Hits:2
[6] 4 3 1 3 2 [6] 1 Hits:2
Log-Search: Agent (6) + Browse (5) = 11 dice
1 3 4 [6] 4 3 [6] [5] [5] [5] [6] Hits:6
3 3 3 [5] 2 3 4 [5] 4 3 4 Hits:2
Security Logs: Agent (6) + Edit (6) = 12 dice
2 4 3 [5] [6] 3 2 2 1 4 2 4 Hits:2
Agent (6) + Edit (6) + retry (-2) = 10 dice
3 [6] 3 2 [5] [5] 4 [5] 1 [5] Hits:5