Help - Search - Members - Calendar
Full Version: Idiot's Guide to the Matrix 2.0
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5, 6
James McMurray
QUOTE
Of course, I think any system worth the plastic it's chassis is made from is going to go on alert status when or if it's attributes are decreased. To me, this represents a significant drop in performance for the system, as a result of which it will at least inform human security types of the problem and they'll log on to figure out what's going on (resulting in more perception tests and a better chance that the hacker will be found).


Hear hear!
hobgoblin
QUOTE (Dashifen @ Apr 5 2006, 11:06 PM)
(why do I always see hobogoblin when I glance at that screen name!!)

here, have a pumpkin pumpkin.gif
watch out, its hot grinbig.gif
Magus
QUOTE (hobgoblin)
QUOTE (Dashifen @ Apr 5 2006, 11:06 PM)
(why do I always see hobogoblin when I glance at that screen name!!)

here, have a pumpkin pumpkin.gif
watch out, its hot grinbig.gif

hobgoblin, at least he is not thinking gnobgoblin. eh?
Aku
QUOTE (Dashifen)
Yeah, basically. Anyway, I'll get back to the action of the tutorial tomorrow which'll give others a chance to chime in on the discussion between myself and hobgoblin (why do I always see hobogoblin when I glance at that screen name!!) are having.

actually, i generally see hobooblin when i look at it, befaist the g and the unlerline blend together.
Dashifen
Well since it seems like there's been little action for the last few hours and most seem to think, either by their above stated support or silence, that my interpretation is at least valid (though not necessarily correct biggrin.gif) I'm going to stick to my guns.....


As stated in the last few paragraphs, Aku wants to offload an agent from his persona onto the chokepoint's node. In order to do this, it has been ruled that Aku needs to make a Hacking + Edit test vs. the System's Firewall + System. Aku, if you would please provide me with that roll?
Aku
very sleepy stil (dang pshycotic bird chirping to itself) so heres the roll

hacking(5)+edit(6)=11 dice, -1 for load, -1 for botched reality filter, again tossing 9 dice

1, 2, 2, 4, 5,5, 6, 6, 6, for 5 hits



Dang, thats going to be hard to beat smile.gif
since i'm fairly confidant the serverwon't beat that i'll toss in a bit of ic for the ensueing interaction.

As Battlecat finishes uploading ,and despite looking like a mech announces, "I AM Joe Wageslave."
Magus
bump
Aku
ok, my turn to retro quote...

"Dash?"
damaleon
these are my general thoughts on the SR4 rules, and so not to break up the flow with a long post, I am enclosing it all in a spoiler tag.
[ Spoiler ]
Dashifen
<<< Sickness. I'll be back as soon as I can. Sorry for the delay. Oh, and weekends suck for me anyway but I should have posted this yesterday. Just couldn't work up the motivation to do much beyond watch movies and blow my nose. Damned, spring colds.
Dashifen
Okay, again sorry about the delay. After three days of cold medicine and movies on DVD, I'm feeling better so on with the tutorial:

By my reasoning above, if Aku -- who only hacked a user level account -- wants to offload an Agent from his commlink onto the node's hardware, he has to make a Hacking + Edit vs. System + Firewall test. He rolled above and got 5 hits, so I'll roll the Node's dice pool of 12 to combat:

1, 2, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6

And with only 4 hits to his 5, the Agent has been successfully offloaded on the Node. This reduces Aku's program count by 1, but if I remember correctly, this doesn't increase his matrix attributes because he's still running 9 or 10 other programs.

However, this new program running on the node does cause problems for it. The Node's system and response are both 6, and it was running six programs but with this offloading, the node is now running 7 programs which will reduce the node's Response attribute by 1 from 6 to 5. This reduction in system resources could trigger an alert. Above, I argue that it would definatly cause an alert, but in this case we'll give Aku a chance to get away with things for the purposes of the tutorial.

With a quick GM decision, I'll roll a System + Analyze (Response) test for the node. Thus, if the node's System can recognize that the Response has been reduced, it'll trigger an alert. Also, since the Response is what gets lowered in this process, if Aku wanted to continue to offload Agents to reduce the node's ratings further, then eventually the node will probably succeed. They system has been reduced to 5, which also caps the program rating at 5 so I'll roll 10 dice with a threshold of 5:

1, 2, 2, 3, 4, 4, 5, 5, 6, 6

With only 4 hits, the system doesn't quite detect the drop in resources and Aku is good to go with BattleCat running within the choke point. Since BattleCat's stealth roll was good enough to not be seen last time and hit hasn't actually made an action, yet, I won't have the agents roll to see the new icon since it's really just the same icon.


Traffic seems light through the node as Aku takes a moment to observe his surroundings. As you watch, rats and insects seem to scuttle their way out of the darkness moving in one direction or the other along the tunnel. They pay no attention to you. You also notice that the root system that stretches down from above seems to be swaying slightly in an unknown and sourceless virtual breeze.



Voran
That strikes me as a little odd though. If I understand correctly, by following that line of reasoning, the best way to defend a node is to load it up to the point it nearly degrades system performance, so if any new load comes in it pretty much triggers an alert?

In this case, Aku not only successfully snuck into the node, but successfully dropped an agent that wasn't noticed by the node, yet still could trigger an alert?

Granted in this case, he succeeds because the system didn't make enough successes on noticing that its system resources dropped.
Dashifen
Not the best way to defend a node, but certainly one way. The best way, is still probably a combination of IC and resource triggers. Or, just buy a hojillion registered fault sprites from your local, poor Technomancer and drop them into the node as they don't bother system resources.

This is a stopgap, temporary solution to oppose a hacker tactic of unloading X copies of an Agent on to a node's hardware with impunity, reducing the node's system and response to effectively one, thus limiting all programs run on the node (including IC) to a rating of one and, therefore, owning the system. Something like a sixth world DOS attack. However, if there's a chance that either (a) the system may not allow a low-account hacker to offload programs (as was the case in this scenario) or if (b) the resources are effected the system can detect that change, it may reduce (though, as evidenced, not eliminate) the chance that a hacker will perform this attack.
Aku
ok, im honestly, sort of lost? would i make another peeption check to examine this nebuleous root system, or am mi besting doen the wrong path?
Dashifen
Right now you're in the chokepoint node, which is represented in the metaphor of a endless, underground, spooky tunnel. To let you in on the iconography, the water plinking is a representation of the system's analyze program running, the root system is the icon of the attacking IC software, and the smaller, scuttling creatures moving along the floor are information passing through the chokepoint either into it from the rest of the matrix or from the node you have yet to discover on the other side of the chokepoint.

Due to a number of well rolled stealth actions and some lucky dice on your part, the chokepoint has not yet been alerted to your presence. As a result, you're now free to try and find the node that's on the other side of the chokepoint.

On p. 217 under Matrix Perception Tests, it indicates that you can discover nodes using such a test. However, if the target is running the stealth program, this becomes an opposed test. I have yet to disclose information about the node-within-a-node so you have no idea whether or not it's running stealth. One thing you do know, out of character, is that the chokepoint is protecting the other node with a Data Bomb.

So, back to your question, roll me a Matrix Perception Test to try and find the other node. If this fails, you'll have to perform more actions within this node, the chokepoint, to determine the location of that other node, but we'll cross that river when we come to it. Remember, for every net hit on the perception test, you get one piece of information. Thus, if you get more than one hit, you could end up detecting the node and its associated data bomb all in one action. In a "real" game, I wouldn't indicate anything about the Data Bomb unless the player specifically asked about it, but in this tutorial, it's better to explain my reasoning that leave things in the background, I feel.
Aku
sorry, been busy trying to keep my new job heh.

Dash, what would i need to do if i wanted to try and figure out where things were going to/coming from before actually trying to determine where the wired host is connected at?
Dashifen
Intercept Traffic is probably your best bet. At that point, while the data is not that important to you, you will be able to determine where it's coming from and where it's going.

Hacking + Sniffer. The hits are my threshold to detect your interception if anyone rolls a matrix perception test.
Dashifen
Bump? Aku, you want to tag someone else in if you're busy for the moment? I'm going to be going to be on vacation shortly and would like to see if we could finish this scenario before then.
Aku
I was actually just digging for this biggrin.gif not getting enough sleep sucks frown.gif but lets get on it!

Hoping to find where packets go before i try to pinpoint find the actual node, i make my hacking(5) +sniffer(6) test for 11 dice, minus 1 for the botched filter and 1 for load still, so 9 dice, again.

1, 2, 2, 2, 3,
3, 4, 4, 6


ouch,. only 1 success
Dashifen
Other than being a nasty GM, I can't at this time determine a reason that the host would re-attempt to perceive Aku's actions. He hasn't edited or deleted any of the information, only tapped it to see what it's all about, thus no actions have been made on the host which would make it suspicious ... yet. Aku's intercept action goes unchallenged at the moment.

On other hosts, especially hosts that provide almost no account privileges to Users, which is the level at which Aku hacked, an Intercept Traffic action could definitely result in a perception test to notice the intruder. Or, I could decide that since Intercept Traffic is a complex action, the host may run an Analyze test on itself every turn, which could follow this action. In either of these cases the Intercept Traffic test would be opposed by the system's Firewall + System test. But, in the interests of moving along, I'll forgo that at this time.


Running your sniffer program seems to attract the rats, mice, spiders, and other vermin traveling through the tunnel to your shoes. As then run over them you can immediately tell that the information which the critters represent is encrypted. Thus, you can't tell that much about it specifically. However, what you can read from the traffic is a public key code representing it's point of origin and destination. Taking a moment to analyze the information, you notice that the point of origin is the same for all of the rodents while the destination for the insects match the origin for the rats.

So what the hell does all of that mean? Basically it's fluff to fill in some details about the host and it's inner workings. All of the rodent icons are information leaving the secured node and heading into the matrix representing messages sent by the advertising company that Aku is assaulting. The insect icons are replies or other information coming in from the matrix at large, through the chokepoint, and then on into the secured, hidden node. That's why the insects' destination matches the rodents' origin.

Remember that Aku's instructions were to get into the system and find as much paydata as he could. The information about who this advertising company is working with, i.e. who's sending data to them and who are they sending data to, could be worth some extra cash from Aku's employers. If, of course, Aku can decode the matrix addresses into real business names, of course.

What's your next move, Aku? A Matrix Perception test will tell you more about the host and how to get into the node-within-a-node at this point.
Aku
Realizing, that, in all likelyhood, the insect packets will be on the other side of the node as well (as i would suspect that beyond this node is more of a router node)

Since a perception test is a computer test, my pool is actually slightly different, using computer (from the electronics group) 4+ analyze(6) for 10 dice, minus 1 for load, and 1 for the botched filter, leaving me 8 dice to roll.

2,3,3,5,5,5,6,6
for 5 total hits


Fortunately, with that roll, i should learn all i need too, and then some, about this node.
Aaron
QUOTE (Dashifen @ Apr 27 2006, 10:02 AM)
Or, I could decide that since Intercept Traffic is a complex action, the host may run an Analyze test on itself every turn, which could follow this action.

[Disclaimer: I teach computer science (specifically programming, networking, and security). However, your mileage may vary when applying modern "real world" concepts to your role-playing games.]

A smart system would run Analyze on itself, I agree. I don't believe that doing it every turn would be useful, though; it would tie up the system. If I was GM, I'd make it maybe every minute or thirty seconds, given data transmission speeds in 2070.
Dashifen
I tend to agree. Plus, every turn would probably end up being too draconian and no one would be able to get through. While that would be the intended purpose of such a system, it's also less fun for the game. I tend to choose fun over realism.

The five hits generated on Aku's perception test are more than enough to get him information about this node. More of what he learns can be found in the yellow text below. However, one of the things he was focused on was the location of the other node at the other end of this chokepoint. One thing he didn't know is that the other node is actually running a stealth program. Thus, his perception test is opposed for the purposes of discovering that node.

That node has a Firewall of 6 and a Stealth Program rating of 5, so after that roll:

2, 2, 3, 3, 4, 4, 4, 4, 5, 5, 5

With only three hits on the stealth test, Aku not only gets good details about the chokepoint, he also gets to find that other node.


The results of Aku's analysis of the node comes back a few moments after he runs the program. The node he's in is running 7 programs at the moment, one of which is a data bomb. Concentrating his efforts there to determine what the bomb is protecting, Aku successfully discovers the hidden node! As he find it, a door appears in the tunnel wall, wooden with a brass handle. There's a window in the door with vertical iron bars like a medieval prison.

Now I'll let you in on the last dirty security trick that the host has. If that data bomb goes off it not only deals damage to the intruder, it'll also trigger an alert. Hope you have a good diffuse program, Aku vegm.gif
Aku
and indeed i do.

Recognizing the door, and the databomb attached to it i focus in on them, carefully inspecting the node to see how it is trapped, and atempting to seperate the trap from the entryway.

rolling hacking(5)+defuse(6) gives me 11 dice, minus my 2 dice, again gives me 9 dice to roll:

1, 1, 2, 2, 3,
4, 4, 6, 6

for two successes


edited for color
Dashifen
To oppose Aku's attempt at diffusing I'd roll the Data Bomb's rating x2. It's rating is 4. If I wanted to be really nasty this would be a moment to cash in 4 dice for 1 hit meaning that Aku would have zero net successes, the test would fail, the bomb would go off, and an alert would be triggered. However, let's not do that and I'll roll things fair and square to see what happens:

1, 1, 1, 1, 1, 1, 5, 5

Now that's really strange. Well, the Data Bomb got two hits, canceling Aku's, so the diffusing test fails. This means that, as per the the rules for Data Bombs on p. 226-7 of SR4, Aku takes 4 boxes of damage on his matrix condition monitor.

However, because the data bomb glitched, no alert was triggered. 'Course, Aku technically doesn't know that unless he rolls another Perception test or if the IC start going nuts.


Running his diffuse program on the trapped door, Aku reaches out to grip the brass handle of the door. Upon doing so the brass handle extends hidden spikes driving like thorns into the "flesh" of Aku's icon. Release a viral code into Aku's system, there is some static for a moment before the virtual world re-coalesces before our protagonist. The handle has returned to normal. Looks like the diffusing went a little south.
Jaid
defusing. you defuse a bomb to make it not go off.

diffusing is where something is spread out through something else, like when you take food color and drip some into water it starts to diffuse biggrin.gif
Monnock
Earlier in the thread there was a question about technomancers and being able to be hacked. I skimmed over the other post but saw no resolution so I figured that I would chime in:

QUOTE
Technomancers have no form of organic storage memory whatsoever, so if they want to download a file, they need to mentally transfer it to a physical storage device (Page 233 SR4)


You can't hack something that you can't get into I wouldn't think. Kind of like how you can't send IC or an Agent into a file, they have to access/manipulate it within the system as it has no 'space' to fit inside of.

As for if they function as a node or not, I believe the simple answer to that would be no. Technomancers work on a deeper level in the matrix than programs. For example, their ability to use threading/complex forms to directly manipulate data in a way that a programmer must do manually. Another interesting quote on this is:

QUOTE
These new technomancers had a sixth sense about them that surpassed the abilities of the previous otaku. In accordance with their affinity for the technological world, technomancers have an instinctive awareness of the fluxuations of data around them. (. . .) technomancers can "feel" the wireless data traffic flowing through the airwaves around them (Page 232 SR4)


This tends to make the techomancer similar to how the astral plane is with magi, where the Matrix that non-otaku use is like the material world that we live on, while the otaku accessing the Matrix exist only on the 'astral plane of the Matrix' until they manifest themselves. Unlike the astral plane, however, a technomancer in the astral Matrix can not percieve anything in the normal Matrix other than getting a general idea of the flow of information.

Considering how the Deep Resonance is pervasive in all parts of the Matrix, and it is through communication/attunement to this resonance (hence the attribute and the submersion) that technomancers are able to manipulate it, I believe that it would be safe to say that when a technomancer re-boots, they simply appear in the Matrix where they 'are.' Because of the wirelessness of the matrix, they simply pop into existence in the Matrix right where they are standing on the world.

Obviously from my previous statement, this doesn't boot them into whatever node they happen to be standing near, but rather... well, it is rather abstract. They exist in a 'higher state' of being within that area of the Matrix, and they must 'lower' themselves to enter into the node that they may be standing inside of.

I hope this wasn't redundant. I find the enigma that is the technomancer very intriguing myself and have much longer theories on them than I'm sure most would care to have to read nyahnyah.gif

Ah ha, and I just solved the infinate loop thing with a quote!

QUOTE
A system run on a device with a lower Responce rating functions at the Responce rating (Page 213 SR 4)


Note that the rating of a device is a fixed number. The only way to change the actual rating of the device is to make a physical change to the device itself. When it says:

QUOTE
(. . .) your Responce is reduced by (. . .) (Page 212 SR 4)


It never says that the rating is reduced, just the raw Responce number itself.
Ranneko
QUOTE (Monnock)

QUOTE
Technomancers have no form of organic storage memory whatsoever, so if they want to download a file, they need to mentally transfer it to a physical storage device (Page 233 SR4)


You can't hack something that you can't get into I wouldn't think. Kind of like how you can't send IC or an Agent into a file, they have to access/manipulate it within the system as it has no 'space' to fit inside of.

Ah but you have your permanent storage (like say a hard drive, or a data chip) and your temporary storage.

When you hack into a system, you are hardly uploading yourself or that program to them. (Except when you are uploading an Agent to them). Your persona is being run from your commlink, your agents typically are being run from your commlink. Not running on the system you are hacking into.

Besides, I think that disallowing hacking into techno's seems a bit silly, as it makes their PANs completely secure, without the drawbacks that others need to cope with for similar security (ie no wireless access)
Dashifen
QUOTE (Jaid @ Apr 28 2006, 05:01 PM)
defusing. you defuse a bomb to make it not go off.

diffusing is where something is spread out through something else, like when you take food color and drip some into water it starts to diffuse biggrin.gif

Meh. I'm American ... English isn't my strong suit biggrin.gif biggrin.gif

Edit: Sad but true ....... eek.gif
Monnock
QUOTE
Your persona is being run from your commlink (. . .)


I seem to recall reading somewhere that technomancers many times don't even carry commlinks. I can't find the page or the quote, so I copped out and just looked at the sample technomancer. Note that she doesn't have a commlink.

Your persona is being run from yourself. The only time that any sort of hardware is associated with you is when you subscribe to it, which in that case would allow a hacker to attack any hardware you are subscribing to. Because there is no reason for a technomancer to subscribe to something for a long period of time, however, this is mostly useless.

QUOTE
Besides, I think that disallowing hacking into techno's seems a bit silly


What are you going to do, hack into their brain? That's what Black IC is for. I was a bit unclear before about what I meant by hacking into them. There is nothing stopping you from accessing their PAN, however most of the time they wont be connected to any hardware except yours. If they have agents they can just subscribe to a data-storage center, upload them, then un-subscribe.
Dashifen
You may be correct on the commlink, but a TM does need offline storage as their brain isn't capable of recording digital information, only reading it. Granted, they could have memory built into their clothing if they want to.
Monnock
Dashifen: I just said they don't have permenant storage in the post that Ranneko was refutting! That has nothing to do with my point that most of the time you can't hack a technomancer. I was just pointing out that their living persona is not run through a commlink as he suggested.
Dashifen
Gotcha. Either way, I'd disagree. You can hack a technomancer whenever you are within signal range. Granted, once you do so, there may not be anything to find when you do so if they don't have some form of personal storage and/or devices subscribed to their node.

I don't see there being a matrix astral plane, as you described above, into which TMs manifest. Instead, I see them as a permanent fixture of the matrix. They cannot disconnect, nor would the want to. For all intents and purposes, they are a commlink that lives and breathes. 'Course YMMV.
Dissonance
Y'know how Lucille Ball claimed that she got secret Russian transmissions through her fillings?

I figure that Techies kind of work like that, to some degree. In that they manage to tap into already existing thingers through bizarre happenstance.
Aku
am i looking at the same -2 dice for "trying again" the the defuse as normal?
Voran
QUOTE (Aku)
am i looking at the same -2 dice for "trying again" the the defuse as normal?

In this case since it glitched, would it be correct to say that it did it's damage but failed to send up an alert. Then since its been triggered, the databomb program itself crashes/poofs?

I'm wondering too, would the crashing of a databomb program itself be an action that would cause the system to take notice? I'm all for fun, so I'm inclined to say that the glitch was a combination of the bomb didn't squeal, and the system didn't notice.

I'm trying to think of a real world equivalent to my comp, since I've only got a layperson's experience with it I'm going to say something like when one of my progs on XP goes 'not responding' but I don't notice that unless I actually try to access that particular program (my wordfile whatever) or I open up my task manager. The only other time I'd notice something going 'not responding' is if its like one of my media players that was currently playing then suddenly cut out, or started repeating...
Aku
Hmm, thats not something i thought of, that the bomb isnt there anymore to hurt me biggrin.gif. Typically, if the bomb was on a file, it would generally be set to destroy that copy of the info as well, but since this was guarding a node, i dont think it would've been prudent...


And on that thought, i'm gonna /facepalm myself. Hindsight tells me that, since packets are going in, they much have the correct encryption for the bomb, i could've intecerepted one of them and attempted to get the key that way, correct?
Dashifen
QUOTE ("SR4. p 227 under Data Bomb")
Once triggered, the Data Bomb program crashes.


No, you don't need to defuse again as the bomb has now crashed. As for getting the key from the traffic, I hadn't thought of that. I would have allowed it probably just for the creativity of the concept and then subsequently changed all data bombs into Agents running Analyze and Data Bomb so that I could combat that technique in the future vegm.gif

Aku
My next action would be to obviously hack into the new node. unLike last time, i'm going to probe the target to be safe (giving the node only 1 chance to detect me, as opposed to 1 for every attempt), I'm also going to go for admin level access adding 6(!) to the threshold i'm using hacking+exploit with a threshold of firewall+system+6.


However, i'm not sure what modifiers would apply. I would assume that my load out -1 does, however, since i'm working onto a new node, i dont think my botched reality filter would, Dash, what are your thoughts?
Dashifen
I would feel that your botched reality filter does count because you're still in the node in which you botched the test. Don't forget the matrix damage modifiers from the 4 damage you took as a result of the bomb. 'Course, if you have the Medic program you could try to fix that up.
Aku
ofcourse i forgot about the damage, and ofcourse i have the medic program!

so thats a computer(5)+meidc(6) minus the usual 2 dice, for a usual total of 9 dice.
1, 1, 3, 3, 3,
3, 5, 5, 5

For 3 hits, healing 3 boxes, taking me down to 1 total point of damage, and thus no modifier.

since i dont know if this node is using the same stats as the node i'm on, i'm going to make some rolls and assume that it is, meaning that my threshold is 16(!)

1,2,2,2,3,3,4,4,5
2,3,3,4,5,5,6,6,6
1,2,2,3,3,4,6,6,6
2,3,4,4,5,6,6,6,6
1,1,2,4,4,5,5,6,6
SUCCESS!
18 hits in 5 intervals.


That means that i've probably just put my team in a SERIOUS amount of danger, as the interval time on this is 1 hour(!) but for my safety i think it was worth it.
Hasimir
As my first presence in the DumpForums I'm jumping into this VERY interesting discussion...adding my 2 nuyens wink.gif
Obviously what I express is just my personal interpretation of the rules ^_^

____________________________________________________________

1) Noob question...
What is the "RAW" manual you often quote?
Is it the pdf version of the SR4 book, or something else?
And speaking of it...how can I know if my version the pdf-book is up to date?

____________________________________________________________

2) About the overload "degeneration spiral"...
The SR4 book is very thorough in repeating (endlessy and quite annoingly) every thing that has to be considered or not considered in terms of rules and effects.
As previously noted the book describes the Response and System featurs talking about their ratings...but when it comes to the overload effect it only refers to a reduction of "Response".

This leads me to read it as follows:
- Programs are capped by the System _rating_
- System _rating_ is capped by the Response _rating_
- overloading will decrease the Response, not its _rating_

Reading it backwars we notice that the Response we use is deacreased, making us slower, but its _rating_ is safe and sound ...
If the Response _rating_ is ok then the System is ok too and the Program's quality is also safe.

Tagline: the effect of overload is a modifier to triX initiative and "agility", much like carrying too many objects around will generate an "encumberance" modifier to meatbox initiative.
Period.

____________________________________________________________

3) About the current run...
I'll do a general recap of the run, adding some personal thoughts and comments on the info we got so far:

- Aku managed to get INSIDE the corp building to do the hacking
- as soon as he jacked-in he found himself in front of an high-security node...the only access to the network


This is odd...wage slaves that work from legal terminals into the building should be already INTO the network, past the harsh defenses layed down to prevent EXTERNAL intrusion...so that you just need to get user-status into the terminal.
This is almost the only good reason to physically break into the building!

But this company runs valuable affairs and therefoe is paranoid, requiring ANY matrix operation to be verified through the choking node before it is granted access to the more internal work-areas.
Fine with this smile.gif

So Aku gets to the job and exploits himself a nice user-level access.
-> Aku (Hacking+Exploit) vs Node (Firewall)
-> Node (Analyze+Firewall) vs Aku (Stealth)


At that point he IS safe to operate...the problem is that the 3 agents are not in a passive mode, awaiting suspicious activity to wake them; they are constantly ACTIVE and scanning ALL traffic.
So even if Aku seems a legitimate user he is scanned by them...
-> Agents (Pilot+Analyze) vs Aku (Hacking+Stealth)

The Agents are fooled by Aku and will let him go.
Now he tryes to get more comfortable by reshaping the sculpted system of the node...but fails, making it all even more awkward.
-> Aku (Response+Reality Filter) vs Node (System+Response)

In-game you tryed to use the Filter first, then the Agents scanned you.
I inverted the order because it's more plausible that the already active (and ever watchfull) programs will look at you as soon as you access the node, rather then letting you do "something" before they can asses your identity.

Feeling lonely, Aku launces one of his own agents and frees it in the node with a nice subscription.
"Running a program into my company system" looks quite legit and harmless, so this action should be in the range of his user-level account; but this node is NOT a work-zone...it is just a high-security access point to the real system and probably the ONLY action allowed to a normal user is "passing through" and maybe "looking around".

Just launching one of my programs does NOT require any test, and surely not an Edit action...starting an agent and subscribing it should definitely be an automatic action.

Instead, IF this action is not in the range of a user-level access privileges the system should get a chance to notice the anomaly, expecially since the offloading of the agent causes the node to overload!
For this I would go as far as decreasing Aku's Stealth by 1 point, due to such a messy and noisy action...or let the node check the situation even if it would have normally ignored it.
THEN the 3 agents will scan the new Icon, as per their normal routine.
-> Node (Analyze+Firewall) vs Aku (Stealth) or (Stealth-1)
-> Battlecat (Pilot+Stealth) vs Agents (Pilot+Analyze)


So now Aku is in good company and the node looks to be fine with that...good.
He starts looking around to find out what to do and his idea is to detect & follow any traffic in the node.
-> Aku (Hacking+Sniffer) [no opposition here nyahnyah.gif]

This reveals that the node has only one entrance and one exit...wich is not in sight.
That's odd...
We established that all the corp terminals MUST get past this node before entering the company network; it strikes me as strange that the only links available are to the open matrix and to a hidden door o_O''
This would mean that the terminals installed into the building are connected ONLY to the open matrix...the one and only entrance-point to this node.
And even the hidden/trapped link is strange, unless even the low-level wage slave users have a pass-code to automatically detect and open the passage to the hidden node.

Anyway...we are in a room with just the exit door and a flow of vermins disappearing somewhere near a wall; this calls for a deeper look around...that leads to a secret door with a nice boobytrap on it.
-> Aku (Computer+Analyze) vs Node (Firewall+Stealth)

Our hacker tryes to get rid of the trap but his stiky fingers trip an explosion...that luckily fails to rise an allarm.
-> Aku (Hacking+Defuse) vs Bombx2

Despite all the noise and commotion the system looks very quiet, so Aku spends some time to repair his Persona...and then invests a whole hour in probing the new mysteious door.
-> Aku (Computer+Medicine)
-> Aku (Hacking+Exploit)
-> Node (Firewall+Analyze) but just onece.


____________________________________________________________

4) About the Hacking of a Technomancer...
Reading the book leads me to belive that a you CAN hack into the brain of a TM.
But I'm too tierd now...my mind has collapsed about five minutes ago o_O''
Dashifen
Welcome aboard Hasimir.

1) RAW stands for Rules As Written. So, in this context, yes it's the SR4 rulebook. As for knowing if your PDF is up to date, if you purchased it from BattleCorps online, I know they email me when there's a new version available. Not sure about others; YMMV (your mileage may vary).

2) I would disagree with some of the way you're using terms, but in essence, I think you're correct.

3) A note on your recap: Aku was hacking his access to the system and, thus, he is faced with the chokepoint. Normal, legitimate users of the system would have an access key that would allow them to either bypass the chokepoint, or be analyzed by it and recognized as legitimate. Either way, they'd not have to face the security. It's not Aku's physical location that determined his need to face the chokepoint, but rather the method by which he's hacking his way into the system.

Thanks, I guess, for the recap, but in the future I'd prefer to do any recapping myself. It reduces clutter and it makes sure that the recap doesn't happen before we're done with the run. I'd prefer to have the tutorial work as a play-by-post until we're done with each scenario, then we can have a recap, then we'll start a new scenario.
Dashifen
QUOTE (Aku)
of course i forgot about the damage, and of course i have the medic program!

so thats a computer(5)+medic(6) minus the usual 2 dice, for a usual total of 9 dice.
1, 1, 3, 3, 3,
3, 5, 5, 5

For 3 hits, healing 3 boxes, taking me down to 1 total point of damage, and thus no modifier.


I don't see anything in the book that says a repair icon test isn't effected by wound modifiers. Since it's an action based on skills, I'd think it could be, but since it's a "healing" type test, tradition states that it wouldn't be effected. Any thoughts from the peanut gallery on this one?

Also, if you have 1 total point of damage, you're still at -1 to all rolls. Until you're fully healed, you still have a wound modifier.


QUOTE
That means that I've probably just put my team in a SERIOUS amount of danger, as the interval time on this is 1 hour(!) but for my safety i think it was worth it.


There is no rest of the team, in this example, it's just you hacking on your lonesome. Thus, probing the target was, in this case, extremely appropriate.

I'm going to hold off on respoding to the probing test you made to see if we can have some discussion on the medic test and wound modifiers; I'm interested to see what others think on the matter. Plus, if the concensus is that they apply, then you might be doing more medic tests before the probing. In the mean time, when I return to my computer after shopping a little this evening, or tomorrow morning at the latest, I'll post information about the node-within-a-node that you're probing as well.
Moon-Hawk
Resisting damage typically does not apply wound modifiers, but that's not what this is.
Casting a heal spell while wounded or using first aid while wounded both apply injury penalties. I'd say this does, too.
Voran
As for levels of access, even if logging in from an inside building location, I think that's still covered by the access level you've spoofed. Due to HIPAA stuff, there are varying levels of access in our offices to client-sensitive information. User access here would probably be the clinician computers that can access our common server, agency forms, etc. My level of access would be somewhere around 'security' level, I work in the clinical QA section so I need access to the client data, and our IT guy has admin access. I can login to any comp in our network (any workstation, even the ones off island) and have my same level of access. Likewise, anyone can login to my computer, but unless they're using my account, they won't see any of my files.
Voran
Sidenote, I'm thinking it might be a good idea to bring back something akin to the security count tree from SR3. Be nice to see what they come up with.
Aku
voran i disagree on the access, i think its new node=new access, or, atleast the chance to change it, perhaps, if i was running the scenario, i would lower the threshold for someone changing nodes that was keeping the same access, but i dont feel user level is going to be enough for me on the second node.
Voran
Woops. Sorry I was referring to Hasimir's post. I agree that user level access probably won't be enough. Our network (as far as I know) can't be accessed from a terminal outside the network, so it'd be akin to having to physically be onsite at least at one of our satellite offices, to get even basic server access.
Hasimir
Thanks Dashifen for the answers smile.gif
My recap was actually made more to my own benefit that any other's...I needed to clear exactly WHAT had been done over this 8 pages of discussion, so that I can comment in the right way ^_^

QUOTE
Aku was hacking his access to the system and, thus, he is faced with the chokepoint. Normal, legitimate users of the system would have an access key that would allow them to either bypass the chokepoint, or be analyzed by it and recognized as legitimate. Either way, they'd not have to face the security. It's not Aku's physical location that determined his need to face the chokepoint, but rather the method by which he's hacking his way into the system.


I understand that this is just a theoretical exercise to show the workings of the 'triX, but I would like to uderstand the network structure you designed because I'm a bit confused...let me try to explain how I see it...

So I sit into the building and use the computer terminal of some Wage Slave that works here...right?
I "turn the computer on" and am confronted with an identification request to access it...this calls for my Hacking+Exploit test.
This way I manage to somehow get User-Access.

Now I am into the computer terminal (that is a node) of Mr WageSlave with what seems a legitimate User account and are free to search it for his real user ID and Password...getting myself a REAL User account.
There should be no chokepoint node, I am already into a "place" INSIDE the network!

After that I will have the same privileges and access options that this employee has when working at his own desk...being free to roam in the network as a legitimate user.

This way I can access other nodes in the network (or not) depending on what are the options open to the Wage Slave I am impersonating.
For example my "home node" (the terminal I hacked into) may lead to 2 other nodes:
- one is accessible to me because the node is just a shared printer.
- the other one denies me access becuase it leads deeper into the network, where there are the administration terminals and the sensible databanks.
HERE a security node may be used to filter unautorized access from low level employees and external traffic.

But this also means that if I go to the Company CEO office and hack into HIS terminal I will already be past the security node!
And searching into his terminal I should find HIS access data, granting me the privileges of the CEO account!

In your run all of this doesn't happen; as soon as I try to get into the WageSlave terminal I am confronted with a high security chokepoint with just two doors...one leading to the open matrix and one hidden, trapped and guarded by 3 agents o_O''
This means that the work terminals in the building are THE SAME as my house terminal or a street phone-boot...they are EXTERNAL to the corp-network and the chokepoint is the ONLY access point.

That structure is not impossible...but surely it's quite odd because I think there is a problem nyahnyah.gif

To get into the node in the first place I had to hack my way in...this means that the access entry from the matrix is NOT open to the occasional surfer, it needs User-Level access codes.
So...if I got inside the node I HAVE User-Level access...and I SHOULD see the same stuff that any WageSlave would see: doors, links, etc.
Adding to this, both the System and the Agents already analyzed and aknowledged my presence too!

Network structure is NOT an abstract concept...physically breaking into a building (risking your life) HAS a distinct advantage over a remote connection.
The termial of a CEO may be harder to crack into, but once inside you are already past most of the network security checkpoints.

Or is this all uotdated stuff from old SR versions? spin.gif
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012