Help - Search - Members - Calendar
Full Version: SR4 GM Boggles o.O
Dumpshock Forums > Discussion > Shadowrun
Jagger
It looks as though my posting privileges have been approved; this makes me happy. I've been GM'ing an SR4 game on AIM private rooms (because they have the capability to roll dice, but don't be shy about speaking up if you know a better method), but after reading the BBB cover to cover a few times over, and certain sections of the other books, I am a bit puzzled on few subjects.

MAGIC
Street Magic | Adept Ability | Elemental Strike | Cost 0.5.
This adds an elemental effect to the adepts unarmed strikes.

Is it just me or is this power ridiculously powerful? The abilities listed have the power to reduce armor by half if not remove it completely, not to mention the elemental effects can catch people on fire, blind them, paralyze them, and various other things. I don't understand how this costs the same as a single point of mystical armor.

BBB | Weapon Foci
Can adepts use/create Foci?

COMBAT
There seems to be a -3 melee attack penalty of you are being fired at via ranged combat while in melee combat, but there's no penalty to the gunman for firing at a target who is engaged with a friendly target in melee combat. Um... what?

MATRIX | RIGGER
If a technomancer or other hacker wants to take control of a drone that is controlled by a rigger, how is this handled? I have read that the hacker can lift the matrix ID of the rigger and use it to spoof commands to the drone, but can the hacker actually hack the drone "node", and "jump" into it himself or is the drone somehow hardwired to the drone modification blackbox and the original rigger?

If a hacker wants to hack into a car and use it to run someone over, how would this be handled? I was a bit at a loss when my group rigger wanted to do this, so I told him he'd have to get a drone close enough to the car to compensate for a low signal, bounce his matrix link off of that drone to the car's pilot computer, make a successful hacking test, and then use his command program + vehicle skill to run the fellow over. It felt a little off, but I'm having trouble finding a better method to do this. Should the hacker only be able to issue commands to the vehicle and then use the vehicle's pilot rating for the attack test? There seem to be painfully few examples in the BBB on how Rigging and manipulating vehicles works.

SETTING
What happened to the Matchstick?
What happened to the colorful terms such as Drek, Slot-Off, Chummer, etc? frown.gif
kzt
Adepts have always been able to use weapon foci. I can't remember if adepts could create them in SR3, but they can in SR4. It's a bit easier to makes them now then in SR3 iirc - and you can use mundane base items (like ceramic knives), but still a pain.
Aaron
QUOTE (Jagger)
MAGIC
Street Magic | Adept Ability | Elemental Strike | Cost 0.5.
This adds an elemental effect to the adepts unarmed strikes.

Is it just me or is this power ridiculously powerful? The abilities listed have the power to reduce armor by half if not remove it completely, not to mention the elemental effects can catch people on fire, blind them, paralyze them, and various other things.  I don't understand how this costs the same as a single point of mystical armor.

There are some drawbacks. It's hard to be subtle, or even not messy. Also, it's automatically a signature for the adept in question, making it easier to recognize the adept in the future.

QUOTE (Jagger)
BBB | Weapon Foci
Can adepts use/create Foci?

Yep. Also yep.

QUOTE (Jagger)
COMBAT
There seems to be a -3 melee attack penalty of you are being fired at via ranged combat while in melee combat, but there's no penalty to the gunman for firing at a target who is engaged with a friendly target in melee combat.  Um... what?

It's true. I usually use the cover rules.

QUOTE (Jagger)
MATRIX | RIGGER
If a technomancer or other hacker wants to take control of a drone that is controlled by a rigger, how is this handled? I have read that the hacker can lift the matrix ID of the rigger and use it to spoof commands to the drone, but can the hacker actually hack the drone "node", and "jump" into it himself or is the drone somehow hardwired to the drone modification blackbox and the original rigger?

There are basically two options, both take a while. The first is to find the rigger's Matrix ID and spoof the drone. The second is to actually hack the drone directly.

QUOTE (Jagger)
If a hacker wants to hack into a car and use it to run someone over, how would this be handled? I was a bit at a loss when my group rigger wanted to do this, so I told him he'd have to get a drone close enough to the car to compensate for a low signal, bounce his matrix link off of that drone to the car's pilot computer, make a successful hacking test, and then use his command program + vehicle skill to run the fellow over.  It felt a little off, but I'm having trouble finding a better method to do this.  Should the hacker only be able to issue commands to the vehicle and then use the vehicle's pilot rating for the attack test? There seem to be painfully few examples in the BBB on how Rigging and manipulating vehicles works.

I'm pretty sure that in order to use Command on a device, one must first be logged into it (using the Log In action), and that means hacking in first. But then, yeah, it'd be Command + Skill to control the device remotely, or Pilot + autosoft if the hacker just sends instructions to the device's Pilot.

There's an audio demo that describes a hacker breaking into an office node and taking over its functions, which is the same procedure as I would have a hacker perform for taking over a vehicle.

QUOTE (Jagger)
SETTING
What happened to the Matchstick?

Beats me.

QUOTE (Jagger)
What happened to the colorful terms such as Drek, Slot-Off, Chummer, etc? frown.gif

Fragged if I know, omae.
Jagger
Any chance on getting an example for the Rigger problems? smile.gif
Aaron
I just edited my post above to include the audio demo I did with a couple of my players. Start there, and if you still have questions, let me know.
Jack Kain
Mystic Armor is always on.

Elemental strike lasts only for a number of combat turns equal to your magic before it must be activated again.
Many of the powers can be rendered mute for example.

Smoke for example can be rendered mute by an internal air tank for 750 nuyen.gif Inhalation vector toxins don't work if you don't breathe.

Sound has various defenses. Hell a selective sound filter should do wonders.
The elemental strike must be taken for each element individually.

When you look at the damage and reach advantages of many melee weapons unarmed needs some advantages.


My own character has more armor to resist fire, cold and electricity then he does a regular fist.
Rating 6 armor modifications are nice.
Jagger
QUOTE (Aaron)
I just edited my post above to include the audio demo I did with a couple of my players. Start there, and if you still have questions, let me know.

(insert laugh here) Listening to that was like Christmas morning. I wish I could explain how long it's been since I got to play an in person PnP game, and how much I miss it, but we'll skip to the questions.

FINDING THE NODE
I'm a little confused by this when considering the wireless matrix. If a hacker is standing in mutual coverage signal range of a vehicle, for example, does he need to roll in order to find that vehicle node in the matrix?

What kind of firewall and system would a normal passenger vehicle have?

Would such a vehicle have a factory installed IC protecting it?

Assuming the hacker finds it, and hacks it to obtain user or maintenance level access, what skills would that hacker use to control it via AR? VR?

RIGGERS FIGHTING OVER A DRONE
How might you handle that one?

appreciate the input!
Jagger
Degausser
QUOTE (Aaron)
Fragged if I know, omae.

Just FYI, for all of you not in the know, either the Shadowrunn writers did a GREAT job at Translating Japanese, or a HORRIBLE job.

omae (oh-ma-eh)is an informal way to say "You" in Japanese. Very informal. So, you CAN say it to your close friends if you are that comfortable with them, but you can also say it to someone you want to piss off by being very rude and informal to someone who should deserve better.

Call Mr. J (from Shaiwaise) Omae and he'd take it very offensivly, probably shoot you on site.

so ka (technically, it should be "sou ka") is actually a question in Japanese (denoted by the 'ka' at the end, which ends all question sentances in Japanese) DOES NOT mean "I understand" If you want to say that In Japanese, say "Wakata" or (slightly more politely) "Wakarimashita"
Sou Ka more closely translates to "is that so?"

Example:
A)"Didja hear? Tryxx managed to hack Aztech last night!"
B)"Sou Ka?"
A)"Yeah man, that chummer's in deep drek now!"

Yeah, so either the writers were doing a great spoof on how words get seriously messed up across language borders, OOOOR they got their wires crossed when writing this.
Jagger
QUOTE (Degausser @ May 21 2007, 01:12 AM)
QUOTE (Aaron @ May 21 2007, 12:39 AM)
Fragged if I know, omae.

Just FYI, for all of you not in the know, either the Shadowrunn writers did a GREAT job at Translating Japanese, or a HORRIBLE job.

omae (oh-ma-eh)is an informal way to say "You" in Japanese. Very informal. So, you CAN say it to your close friends if you are that comfortable with them, but you can also say it to someone you want to piss off by being very rude and informal to someone who should deserve better.

Call Mr. J (from Shaiwaise) Omae and he'd take it very offensivly, probably shoot you on site.

so ka (technically, it should be "sou ka") is actually a question in Japanese (denoted by the 'ka' at the end, which ends all question sentances in Japanese) DOES NOT mean "I understand" If you want to say that In Japanese, say "Wakata" or (slightly more politely) "Wakarimashita"
Sou Ka more closely translates to "is that so?"

Example:
A)"Didja hear? Tryxx managed to hack Aztech last night!"
B)"Sou Ka?"
A)"Yeah man, that chummer's in deep drek now!"

Yeah, so either the writers were doing a great spoof on how words get seriously messed up across language borders, OOOOR they got their wires crossed when writing this.

The omae kind of made sense to me. I just wrote it off as saying "bitch" or maybe "buddy..." in a sarcastic fashion, which functions the same way on the east coast USA, but the "so ka" caught me eye as being a little weird. I would have probably changed that to "sou ne?" which would be a little more like saying "I know, right?"

Just my take on that one.
Degausser
Maybe we should start a new thread with a bunch of slang that people can submit. We could post SR3 slang, useful slang from Japanese, and whatever other slag from other languages that people know. (Kinda similar to how we use chica from spanish to say "girl" (I'm being polite here) in modern day times.)

Anyone up for that?
Synner
QUOTE (Jack Kain)
Elemental strike lasts only for a number of combat turns equal to your magic before it must be activated again.

Also note that Elemental Strike has Killing Hands as a pre-req, meaning its slightly less cheap considering you have to buy at least a level in that power first.
Rotbart van Dainig
No levels for Killing Hands in SR4, though - additional damage comes only from Critical Strike.
Aaron
QUOTE (Jagger)
FINDING THE NODE
I'm a little confused by this when considering the wireless matrix.  If a hacker is standing in mutual coverage signal range of a vehicle, for example, does he need to roll in order to find that vehicle node in the matrix?

Not automatically. Devices can run in four modes when it comes to wireless networking: Active, Passive, Hidden, and Off. Active allows any other device to connect; vending machines and mall infobooths would be Active nodes. Passive means the node is visible in AR or the Matrix, but refuses connections unless the connection is from a permitted user that is on the device's permit list. In Hidden mode, the device is not immediately visible on the Matrix or in AR, and also refuses connections; it's kinda like a WAP that doesn't advertise. Off is, well, off: undetectable and unable to take connections.

A Matrix user can find a Hidden node that she knows is there (as in the audio example, where the hacker could see the office and knew it had a node, but couldn't see it) with a Scan + Electronic Warfare (4) Test. Alternatively, she can make a survey of all Hidden nodes in an area using a Scan + Electronic Warfare (15+, 1 Combat Turn) Test. Normally you see the one-shot test in combat as the first step for a hacker to make a quick run against a street sam's cyberware or a drone or vehicle.

QUOTE (Jagger)
What kind of firewall and system would a normal passenger vehicle have?

I just use the Pilot rating listed with the vehicle as a Device Rating, which covers all of its Matrix Attributes. The table on p. 214 of your hymnal states that your average vehicle or drone is going to have a Device Rating of 3.

QUOTE (Jagger)
Would such a vehicle have a factory installed IC protecting it?

Some might. Kinda like how some modern vehicles come with a security system. But I wouldn't expect it; all of the IC-type programs are restricted and require a permit to own. So the default answer is "no," although I can see a rigger loading his devices with it. The balancing factor is that the Pilot and autosofts also count as running programs, and as such might reduce the device's effective Response.

QUOTE (Jagger)
Assuming the hacker finds it, and hacks it to obtain user or maintenance level access, what skills would that hacker use to control it via AR? VR?

The triumphant hacker has a few options:

  1. Give instructions to the Pilot.
  2. Use Command + Skill to control the device remotely.
  3. Jump into the device in VR.

Of course, many single-use devices only have Admin access (p. 216), and for my money, vehicles and drones fall into this category.

QUOTE (Jagger)
RIGGERS FIGHTING OVER A DRONE
How might you handle that one?

I'm going to use the term "hacker" for the attacker and "rigger" for the owner of the drone, even though the two probably have similar skill sets and equipment.

Once the hacker gains control over the drone, the rigger is not automatically blocked out. If the hacker gains control by spoofing the rigger's commands, the rigger still has access to the drone and can still send it commands. In this case, the drone would probably start doing all sorts of weird things as it attempts to reconcile and follow this new and bizarre stream of commands. If the commands are mutually exclusive, the winner would probably be the one that sent the most recent command.

If the hacker actually hacked the drone, then after a few Edit actions by said hacker (altering the drone's list of legitimate users), the rigger may find that he is locked out of his own drone and now must hack back in. Of course, a rigger may log into his drone's node to engage the hacker in cybercombat, in which case they'll literally fight over the drone.

Red Fox
I'd rule as a game master that if a car was say, on the side of the street parked for the night, that it would be un-hackable as it's system node is switched to the 'off' position. if you had a firefight in an intersection, however, then sure, the hacker could conceivably hack into the system of a vehicle at the stoplight and wing it at a badguy.
hobgoblin
QUOTE
Not automatically. Devices can run in four modes when it comes to wireless networking: Active, Passive, Hidden, and Off. Active allows any other device to connect; vending machines and mall infobooths would be Active nodes. Passive means the node is visible in AR or the Matrix, but refuses connections unless the connection is from a permitted user that is on the device's permit list. In Hidden mode, the device is not immediately visible on the Matrix or in AR, and also refuses connections; it's kinda like a WAP that doesn't advertise. Off is, well, off: undetectable and unable to take connections.


not quite, imo...

active: shouting out that one is there. may still require some kind of password or similar to get access. and the functions one have available is dependant on said access. so maybe the vending machine would have a guest/user access without a password, and would allow only the purchase of whatever products its designed to vend. superuser/security/admin may give access to stuff like test routines that would eject a item from a selected bin (or maybe ones from every bin) and so on. those may require the person logging in to have a hardware dongle (passkey) connected to his comlink (page 215) or similar.

passive: does not shout that its there, but will respond if anyone tries to connect to it. other then that, see active.

hidden: as passive, but will only respond to connections matching a list.
StealthBanana
QUOTE
Yeah, so either the writers were doing a great spoof on how words get seriously messed up across language borders, OOOOR they got their wires crossed when writing this.


Actually, in romaji it would be 'soo ka' or 'so ka', because generally when Japanese is transcribed to roman letters they take out double consonants. Which is why you should spend as much time as possible learning kana, so you don't miss out on important linguistic stuff that doesn't make it through the transcribing process.

And the easiest and least troublesome way to say that you understand something is just 'hai', which is a general Japanese positive term that can mean anything from 'yes' to 'I got it."

ã??れをæŒ?ã?£ã?¦ã?„ã?¾ã?™ã?‹ï¼Ÿ

Okay I'm done. Foreign language major ><.

*stops waving member around*
Aaron
QUOTE (hobgoblin @ May 21 2007, 07:46 AM)
not quite, imo...

active: shouting out that one is there. may still require some kind of password or similar to get access. and the functions one have available is dependant on said access. so maybe the vending machine would have a guest/user access without a password, and would allow only the purchase of whatever products its designed to vend. superuser/security/admin may give access to stuff like test routines that would eject a item from a selected bin (or maybe ones from every bin) and so on. those may require the person logging in to have a hardware dongle (passkey) connected to his comlink (page 215) or similar.

passive: does not shout that its there, but will respond if anyone tries to connect to it. other then that, see active.

hidden: as passive, but will only respond to connections matching a list.

I disagree. I'm in a bit of a rush, so rather than make an argument here, I'm just going to ask that you read p. 211 and then kindly comment. Please accept my apologies.
Jagger
Excellent information. That's going along the lines of what I was beginning to suspect, but now I feel pretty confident about it. smile.gif
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012