QUOTE (Rad @ Dec 6 2008, 03:27 AM)
Look, either you don't know how the matrix rules work, or you just want to argue. We are not talking about hacking someone's brain, we're talking about hacking a device that is hardwired into their senses and capable of overriding them--just like hacking cybereyes to make a target blind.
First off, hacking into a node in SR does not require cybercombat.
I never said that it did. Controlling someone's Avatar within a node, however, is something else entirely. Remember, you're not overriding his eyeballs directly, his vision is basically overtaken by VR, and you're trying to control his VR experience.
QUOTE
The agent used exploit to hack in, and got full administrative access without being detected. No combat needed. (It's a very good agent, with some special tweaks from Unwired. I don't know all it's stats because the hacker using it is another player.)
Second, as I and other people have mentioned, there are no special rules for switching between AR/VR/Hotsim. VR is not some technomancer-esque mental feat--you tell the program to turn it on and the sim module overrides your senses (and motor control). Any icon with admin access can give that command just as easily.
AR and VR are separate modes, and the user is the one with control over how he's interacting with the node. You are in control of the node, not the user. This really isn't that hard to understand. It's like this: you can take control of my computer and 'force' the computer to play Miley Cyrus songs, but I can still turn down my speakers or mute them entirely. I can turn my monitor off. Your hacker/agent was in control of the commlink, not the guy using it. I think you guys were getting things confused because this was an internal commlink.
QUOTE
Third: If the agent and Joe Wageslave got in a loop starting and stopping the sim, that still would accomplish the primary goal of incapacitating him.
No doubt, but you wouldn't be raping him, you'd basically just be spamming him with pop-ups. So you've got nothing to feel guilty about
Apparently your mark likes Dermal Deposit Dan, because there's no way you were forcing it on him.
QUOTE
Finally: The owner of an implanted comlink does not nessecarily have root access. In fact, it makes sense that the casual user wouldn't as A) Giving root access to people who don't know what they're doing is a bad idea and B) The corps want to limit your control/access over their products--witness Windows Vista where the only user account on the system may not have admin privileges and C) I haven't seen any rules for "root" access in SR4, maybe it doesn't exist.
I was using 'root' as an example, but the 'owner' of the device is certain to have an account that is the equivalent of 'root'. Otherwise he wouldn't be able to do any of the 'cool' stuff that corps would want you to be able to do, like install a billion spyware programs and useless widgets. The kind of user experience you're talking about is common to Unix-like OSes run by competent sysadmins; commercial OSes give you more than enough rope to hang yourself, that's why viruses are so easy to spread; people are dumb, and have the privileges within their OS to let programs do all sorts of things, even if you build in ways to keep the program out. All the hacker has to do is convince the person that it's a good idea to run the program.
QUOTE
As for locking the security spiders out of their own nodes during a job, yes, you can do that if you get admin access. Modifying user accounts uses the Edit program. You'd have to sneak past the spiders to do it, might need to crash their icon to terminate their connection first, and they can just reset the system manually. That's a lot harder to do if the link is implanted in your brain and is currently overriding your senses and locking down your body movements.
I fail to see how locking down his body movements will have any effect here; he can easily give a mental shutdown command. Hell, he could just reboot...Agents don't initiate themselves, so as soon as the node goes down all you've done is give some schmoe a copy of a very nice Agent program.
QUOTE
As for Joe Wageslave, we kidnapped him and knocked him out before we hacked his link. When he came to we were in control.
If you already had him kidnapped, this seems like an awfully time-intensive way of keeping him at bay. Ever heard of duct tape? Even if you wanted some 'remote' control so you could release him to do something for you, a simple bomb would have been more effective, since you'd be in total control of that. All you did was fuck up a commlink that he could, at any time, simply turn off. It's a cell phone in your brain, not a control center.