On sim-modules: IIRC the version without is supposed to be official.
If you want a price structure that makes sense, the cybercommlink will come with a sim-module. As has been said. I personally envision the cyberware as a port for modular cybercommlinks, but that is not supported by the rules.
At the very least, external sim-modules are available on chips (ie direct-input BTL chips, main book), and therefore should physically fit into a datajack (balancing aspect: can be taken away).
HentaiZonga
Jul 3 2008, 10:20 AM
QUOTE (Ryu @ Jul 2 2008, 04:00 AM)
What happens if Nuke reduces your subscription limit below the number of active subscriptions? Last in first out? First in first out? User selected? User selected between FIFO and LIFO?
Well, if you want to sim it properly, each of your subscriptions rolls your commlink's Rating vs. a number of hits based on how many you're over; anything that doesn't make it gets disconnected. If you still have too many, keep rolling. Yes, this means you might lose more connections than you should - when things crash, you kinda lose control over what happens next.
crizh
Jul 3 2008, 04:06 PM
QUOTE (HentaiZonga @ Jul 3 2008, 11:20 AM)
Well, if you want to sim it properly, each of your subscriptions rolls your commlink's Rating vs. a number of hits based on how many you're over; anything that doesn't make it gets disconnected. If you still have too many, keep rolling. Yes, this means you might lose more connections than you should - when things crash, you kinda lose control over what happens next.
?
When a Persona's subscriptions exceed it's System x 2 each subsequent subscription counts as an additional program for the purposes of figuring response degradation.
Unwired p55, Subscriptions.
QUOTE (crizh @ Jul 3 2008, 06:06 PM)
?
When a Persona's subscriptions exceed it's System x 2 each subsequent subscription counts as an additional program for the purposes of figuring response degradation.
Unwired p55, Subscriptions.
Thanks crizh! Thats useful to know, not only for Nuke.
kigmatzomat
Jul 3 2008, 07:22 PM
QUOTE (JoelHalpern @ Jun 29 2008, 10:49 PM)
Okay, so a Node by itself can't run Attack, and a conventional Agent can't run attack.
So how would a nomral person's commlink (and a shadowrunners commlink) be set up to respond to detecting being hacked.
I am trying to understand what the normal set for different types of people would be.
Your midrange person? A corporate exec? A Johnson? A normal runner?
Option 4:
Use databombs. You can put them on your Comm, according to my 1st printing BBB. Once the Firewall (or an Agent running Scan or other detection software) declares the connection to be illegal, the bomb goes off. I suppose it would give you one chance to enter a password before detonating, but it's still a nice way to drive off hackers. And while you can only have one databomb per device, you can have one databomb on each file, meaning that accessing Paydata becomes painful, or at least time consuming, as you have to Defuse each bomb.
Sure, they're more or less illegal but that doesn't really apply for the execs, Johnsons, and runners.
crizh
Jul 3 2008, 08:41 PM
OK, here's one.
Agent's can't using Hacking and may, optionally, not be allowed to run Attack.
IC on the other hand can run any form of Combat Program and does not appear to be limited to not Hacking. In fact a number of the IC packages include Hacking Programs or are explicitly described as Hacking. Juhseung Saja I'm looking at you...
So why would anyone buy an Agent?
When one could buy, for example, a Singularity Encore and get all the unlocked glory of an Unrestricted Agent at a 10% discount?
You mean IC at a discount instead of an unrestricted agent for 120% base price? Good thinking.
PlatonicPimp
Jul 3 2008, 09:27 PM
Because IC is limited in other ways: it can only operate on your commlink's node.
crizh
Jul 3 2008, 09:28 PM
Yeah, to some extent I can see why Frank thought it was a bad idea for the individual Freelancers not to be able see and comment on each others work before Unwired went to print.
But, then again, the real world is full of similar examples of products that make no sense compared to other methods of achieving the same ends that people buy in droves because it just never occurs to them to approach the problem from a different direction.
crizh
Jul 3 2008, 09:29 PM
QUOTE (PlatonicPimp @ Jul 3 2008, 10:27 PM)
Because IC is limited in other ways: it can only operate on your commlink's node.
Said who? When? Where?
You do know that IC tands for Intrusion Countermeasure.
Adam
Jul 3 2008, 10:08 PM
QUOTE (hobgoblin @ Jul 2 2008, 09:50 AM)
iirc, that 5th is acutally a reprint of 4th without any errata inbetween. it was basically done to give catalyst something to sell after they took over from fanpro, or something like that...
Incorrect; there is plenty of errata integrated with the 5th printing.
Rotbart van Dainig
Jul 3 2008, 11:00 PM
QUOTE (PlatonicPimp @ Jul 3 2008, 11:27 PM)
Because IC is limited in other ways: it can only operate on your commlink's node.
That is very wrong.
Cheops
Jul 4 2008, 12:59 AM
QUOTE (PlatonicPimp @ Jul 3 2008, 10:27 PM)
Because IC is limited in other ways: it can only operate on your commlink's node.
IC is limited. However they can leave the node.
However, IC are designed to do specific things. Stray too far out of that parameter and their usefulness falls way below that of even restricted agents.
For example, I don't think that the Three Musketeers would be at all useful for Data Searches.
PlatonicPimp
Jul 4 2008, 04:51 AM
SOME IC can leave the node under specific circumstances. But if one is going to make up rules about IC being unrestricted by the same legalities as mooks, Then I'm gonna slap a different restriction on them.
crizh
Jul 4 2008, 08:10 AM
QUOTE (PlatonicPimp @ Jul 4 2008, 05:51 AM)
SOME IC can leave the node under specific circumstances. But if one is going to make up rules about IC being unrestricted by the same legalities as mooks, Then I'm gonna slap a different restriction on them.
Any IC can Access another node or load itself onto another node if it is instructed to. Feel free to house-rule differently or change the availability and cost of either IC or restricted agents. I would probably recommend that you do so, in fact, that was the point of the initial post.
crizh
Jul 4 2008, 08:12 AM
QUOTE (Adam @ Jul 3 2008, 11:08 PM)
Incorrect; there is plenty of errata integrated with the 5th printing.
But why are there alterations in the 5th printing that are not in the errata?
Aaron
Jul 4 2008, 02:23 PM
QUOTE (Cheops @ Jul 3 2008, 06:59 PM)
However, IC are designed to do specific things. Stray too far out of that parameter and their usefulness falls way below that of even restricted agents.
For example, I don't think that the Three Musketeers would be at all useful for Data Searches.
I disagree somewhat. I think that the Three Musketeers would be excellent for Data Searches, but first they'd have to be reprogrammed to do something other than attack, trace, and crash. Then they'd be great.
Rotbart van Dainig
Jul 4 2008, 02:51 PM
If, by 'reprogramm' you mean 'load a Browse utility', then indeed.
Aaron
Jul 4 2008, 05:38 PM
Maybe in your game, sure.
In mine, I look at where pilot programs (such as those in IC) are "dog brains." So the Three Musketeers IC, which are a trio of "dogs" that have been "trained" to smack hackers need to be "retrained" to Browse the Matrix, similarly to how a police bomb-sniffing dog would have to be retrained to work as a sheep dog or a seeing-eye dog.
It might go something like:
PC: Porthos, find me information on Necronomicorp.
Porthos: Right. Find Necronomicorp and crash its programs. Where's the Attack program?
PC: No, Porthos, I need you to use this Browse program to find information about Necronomicorp.
Porthos: Right, use this Browse program to find programs to crash in Necronomicorp. Where's the Attack program?
PC: No, Porthos, just a Data Search, please.
Porthos: Right! I'll start looking for programs to crash now. Where's the Attack program?
PC: ARGH!!
Porthos: Your last command is confusing to me. Where's the Attack program?
PC: *shuts down Porthos program*
Kinda like asking a protocol droid to act as a member of the Rebel Alliance. Wackiness may ensue.
crizh
Jul 4 2008, 05:48 PM
QUOTE (Aaron @ Jul 4 2008, 06:38 PM)
Wackiness may ensue.
LOL.
But, house-rules aside, all IC are, RAW, just Agents in Wolf's clothing.
Aaron
Jul 4 2008, 05:51 PM
But still dog-brained ones, also according to your hymnal. After that, it's interpretation.
crizh
Jul 4 2008, 05:58 PM
QUOTE (Aaron @ Jul 4 2008, 06:51 PM)
But still dog-brained ones, also according to your hymnal. After that, it's interpretation.
I concur. No better than their scripting.
PlatonicPimp
Jul 4 2008, 08:12 PM
I just ruled that if you need IC that can do hacking or optionally use attack programs, then you have to pay the same 20% cost as unrestricted agents, and if you care about legality, you need the proper paperwork.
KCKitsune
Jul 4 2008, 09:01 PM
QUOTE (Adam @ Jul 3 2008, 06:08 PM)
Incorrect; there is plenty of errata integrated with the 5th printing.
So that means that a cyber commlink comes with a integrated Sim Module?
RunnerPaul looked at his copy of 5th printing and it states that a cyber commlink has a sim module. Please tell me what the final ruling is. Thank you
RunnerPaul
Jul 4 2008, 09:45 PM
QUOTE (KCKitsune @ Jul 4 2008, 04:01 PM)
RunnerPaul looked at his copy of 5th printing and it states that a cyber commlink has a sim module. Please tell me what the final ruling is. Thank you
Correction: I looked at a copy on a store shelf. Didn't actually buy it.
Cthulhudreams
Jul 5 2008, 10:41 AM
Incidentally, whats stopping me 'stealing' agents. As they move their .exe around, carn't I just create a honey pot, wait for agents to move into it, disconnect that node from the intertubes, and hack the agent until it follows my commands.
Also, can I not get other agents to do that?
QUOTE (Cthulhudreams @ Jul 5 2008, 12:41 PM)
Incidentally, whats stopping me 'stealing' agents. As they move their .exe around, carn't I just create a honey pot, wait for agents to move into it, disconnect that node from the intertubes, and hack the agent until it follows my commands.
Also, can I not get other agents to do that?
Thats why a hard-coded controlling ID would have been more restricting for agent smith. Plus you might actually want to have that.
Instead of setting up a honey pot, you can wait for a probe with an agent ID, analyse (to avoid accidentially assaulting GridSec), take over the agent, then extract its botnet program and encryption codes. The agent is likely running on a low-powered system, and therefore easy prey.
Muspellsheimr
Jul 5 2008, 03:41 PM
QUOTE (KCKitsune @ Jul 4 2008, 02:01 PM)
So that means that a cyber commlink comes with a integrated Sim Module?
RunnerPaul looked at his copy of 5th printing and it states that a cyber commlink has a sim module. Please tell me what the final ruling is. Thank you
QUOTE (SR4 p.330-331 Fifth Printing)
Commlink: An implanted version of the commlink (see p.210), popular with hackers and salarymen in the go.
< >
Sim Module: An implanted version of the external sime modual (see p.318), popular with sim lovers and BTL users.
They are two separate implants.
hobgoblin
Jul 5 2008, 04:52 PM
funny thing is that the implant comlink in the gear section have never stated that it came with a sim module.
that little entry only shows up in the matrix section, page 228, virtual reality, iirc...
RunnerPaul
Jul 5 2008, 04:55 PM
That's all well and good, Muspellsheimr, but the text in question doesn't come from the gear chapter, it comes from p.228 in the Virtual Reality section of the Wireless World. Since you have a 5th printing handy, would you care to confirm for everyone what the second sentence in the second paragraph under the Virtual Reality header reads?
hobgoblin
Jul 5 2008, 04:59 PM
QUOTE (Ryu @ Jul 5 2008, 01:36 PM)
Thats why a hard-coded controlling ID would have been more restricting for agent smith. Plus you might actually want to have that.
Instead of setting up a honey pot, you can wait for a probe with an agent ID, analyse (to avoid accidentially assaulting GridSec), take over the agent, then extract its botnet program and encryption codes. The agent is likely running on a low-powered system, and therefore easy prey.
and thats why you dont use agents to do a hackers job. who knows when it will show up on your (virtual) doorstep, bringing "gifts"?
QUOTE (hobgoblin @ Jul 5 2008, 06:59 PM)
and thats why you dont use agents to do a hackers job. who knows when it will show up on your (virtual) doorstep, bringing "gifts"?
Word. Botnets are for hackers. The very idea of using them for a mass probe is... unnerving.
The German first printing has an internal sim-module for the cybercommlink mentioned in the gear chapter. Thats the only justification for the price IMO.
Tycho
Jul 12 2008, 04:03 PM
Some questions that come up inn discussions about technomancer:
1. Does the Swap Echo reduce the overall Modification for sustained complex forms (e.g. you sustain 3 CF and only get -4 instead of -6) or for each sustained complex form (which means,you get no mod for sustaining any more)?
2. Can you thread a CF over and over again until you reach the max (Res*2) or can you only thread each complex form once?
3. Can you thread the emulated Skillsoft CF to get higher ratings (e.g. Skillsoft rating of 7 or more are possible)?
would like to get an official answer.
thx
Tycho
Sweaty Hippo
Jul 12 2008, 11:33 PM
QUOTE (Cthulhudreams @ Jun 22 2008, 09:01 PM)
Wait, I don;t have unwired yet, so this may be total speculation, but agents can still log into a new mode and spawn copies of themselves?
Sounds like the sixth world equivalent to 4chan's Anonymous.
Rotbart van Dainig
Jul 13 2008, 03:00 PM
QUOTE (Ryu @ Jul 5 2008, 08:29 PM)
The German first printing has an internal sim-module for the cybercommlink mentioned in the gear chapter.
The german printing is an abomination.
Dashifen
Jul 17 2008, 09:24 PM
Going through Unwired a second time and I noticed this one: The Defragment echo that allows a TM to heal matrix damage done to their persona. But, SR4 tells us that TMs don't have a matrix condition monitor because there's no hardware, only wetware. Thus, all matrix damage is converted to stun damage for TMs. Does the Defragment echo allow a TM to "heal" stun damage assume that said damage is incurred as a result of a non-black-IC matrix attack?
Aaron
Jul 17 2008, 09:37 PM
Matrix damage still causes technomancers damage. If you turn to page 233 in your hymnal, you'll find that Matrix damage is automatically treated as Stun damage for technomancers. So if you're a Defragmenting technomancer, and you get three hits, and you've taken two Stun damage from IC and four from a Stunbolt, you only heal two of those boxes: the ones incurred by Matrix damage.
That's my reading of it, anyway.
Tarantula
Jul 17 2008, 11:02 PM
QUOTE (Tycho @ Jul 12 2008, 10:03 AM)
Some questions that come up inn discussions about technomancer:
1. Does the Swap Echo reduce the overall Modification for sustained complex forms (e.g. you sustain 3 CF and only get -4 instead of -6) or for each sustained complex form (which means,you get no mod for sustaining any more)?
2. Can you thread a CF over and over again until you reach the max (Res*2) or can you only thread each complex form once?
3. Can you thread the emulated Skillsoft CF to get higher ratings (e.g. Skillsoft rating of 7 or more are possible)?
would like to get an official answer.
thx
Tycho
Seconded.
Dashifen
Jul 18 2008, 01:35 PM
QUOTE (Aaron @ Jul 17 2008, 04:37 PM)
Matrix damage still causes technomancers damage. If you turn to page 233 in your hymnal, you'll find that Matrix damage is automatically treated as Stun damage for technomancers. So if you're a Defragmenting technomancer, and you get three hits, and you've taken two Stun damage from IC and four from a Stunbolt, you only heal two of those boxes: the ones incurred by Matrix damage.
That's my reading of it, anyway.
I agree with this reading, too, it was just jarring to see it handled that way. I think I had conceived that TMs don't get matrix damage not having a matrix condition monitor.
Bira
Jul 18 2008, 01:54 PM
I sort of skipped over the entire degradation debacle, but I think I have a pretty good idea of why it's there. It's purely a game balance issue, so looking for plausible in-character reasons for why all software degrades is futile.
Shadowrun (like most RPGs) is still very much tied to the "old school" paradigm for gear: it has to cost money, or it's "unfair". In other words, monetary cost is considered the main balancing factor for the benefit a given piece of gear gives you. Software breaks this expectation, since in the real world you can get it for free even if you stay away from warez: there's everything from shareware to Free and Open Source Software.
What happened is that the developers were more worried about keeping the game balanced according to the traditional paradigm than having it make real-world sense.
Rotbart van Dainig
Jul 18 2008, 03:40 PM
QUOTE (Bira @ Jul 18 2008, 03:54 PM)
I sort of skipped over the entire degradation debacle, but I think I have a pretty good idea of why it's there. It's purely a game balance issue, so looking for plausible in-character reasons for why all software degrades is futile.
Just the collateral damage is insane, especially for illegal gear and cyber. Or Activesoft chips becoming useless after 8 in the drawer.
Jaid
Jul 18 2008, 05:35 PM
QUOTE (Dashifen @ Jul 17 2008, 04:24 PM)
Going through Unwired a second time and I noticed this one: The Defragment echo that allows a TM to heal matrix damage done to their persona. But, SR4 tells us that TMs don't have a matrix condition monitor because there's no hardware, only wetware. Thus, all matrix damage is converted to stun damage for TMs. Does the Defragment echo allow a TM to "heal" stun damage assume that said damage is incurred as a result of a non-black-IC matrix attack?
it's still matrix damage, whether or not the TM has a matrix damage track. think of it as being like a medicine that treats burns and thus would heal fire damage; there is no 'fire damage' track, nevertheless this theoretical medicine (or whatever it is) would be able to help with fire damage, but not with, say, a stab wound.
hermit
Jul 18 2008, 06:49 PM
What about a Techno with Defragmentation and Mesh Reality?
Nightwalker450
Jul 18 2008, 07:15 PM
QUOTE (Aaron @ Jul 17 2008, 04:37 PM)
Matrix damage still causes technomancers damage. If you turn to page 233 in your hymnal, you'll find that Matrix damage is automatically treated as Stun damage for technomancers. So if you're a Defragmenting technomancer, and you get three hits, and you've taken two Stun damage from IC and four from a Stunbolt, you only heal two of those boxes: the ones incurred by Matrix damage.
That's my reading of it, anyway.
It specifically states it doesn't work for Black IC programs. So the Stun damage would have to come from an Attack program, not a Blackout program. So you'll have to keep track of what stun damage was caused by attack programs, vs blackout or stunball
Dashifen
Jul 18 2008, 08:11 PM
Not really. You only have to track Attack and Not-Attack. What specifically caused the Not-Attack damage doesn't matter since it can't be defragged.
Tarantula
Jul 18 2008, 09:34 PM
Databombs too.
Aaron
Jul 19 2008, 03:45 AM
Standard ones, anyway.
Dashifen
Jul 19 2008, 03:06 PM
Good point. Still, the point remains that you don't need to keep track of every possible source of stun damage if a TM has defrag at your table. No more problematic than having to remember what damage was from drain so that it cannot be healed.
Tiger Eyes
Jul 19 2008, 09:05 PM
QUOTE (Dashifen @ Jul 19 2008, 10:06 AM)
Good point. Still, the point remains that you don't need to keep track of every possible source of stun damage if a TM has defrag at your table. No more problematic than having to remember what damage was from drain so that it cannot be healed.
Bah. Avoid damage. Befriend a Paladin Sprite.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please
click here.