QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-Are there any ways to notice that you are being tracked/traced?
Matrix Perception Test. p. 217 - "something" has to actually do the tracking, either IC or a persona, and that can be scanned and analyzed, which in turn will let you know if you are being tracked.
QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-Does a stealth program have to be active in order for you to benefit from it or does it just need to be on your commlink?
The program must be loaded and active on your commlink. If it's on your commlink but not an active program it doesn't help.
QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-Whats the accuracy of Computer + Scan as far as a nodes location? Track only narrows a nodes location down to within 50 meteres. Is Scan any better?
See Detecting Wireless Nodes p. 225, it's EW + Scan
QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-Agent Payloads.....If you send an agent off to another node do you lose the programs you loaded it up with?
Yes, the program goes off with the agent. (Of course you can always crack copies and thus have enough to send with your agent and run one on your commlink)
QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-When an R4 agent gets trashed are you out 10k nuyen or was it only a copy of your agent program(not a cracked copy, just a soft copy like when you copy programs onto an agent)?
Reboot, reload, all fixed.
QUOTE (Abbandon @ Feb 15 2008, 04:35 PM)
![*](http://forums.dumpshock.com/style_images/greenmotiv/post_snapback.gif)
-When an agent gets trashed, when and how does a hacker load it back up?
Whenever they want.
It helps generally with the Matrix if you think of programs as distributed network software. For example these forum boards. To use DS, you need a computer, a browser, and your login. The actual software for these boards is actually somewhere else. You can use DS from anywhere you can log in from. If you can't log in, then you can't use DS as well, you can read the forums, but can't post questions for example. the login, or authentication is what allows you to run the full capabilities of the software. Or if you've played a MMORPG, that software can be installed on several PC, but you might have only one account and login that no matter how many "copies" of the software you have, only one "copy" with the correct account and login can actually be playing the game.