QUOTE
*snip*... basic Matrix perception is usually limited to a very narrow subset of things, such as the nodes and icons of users with which you are interacting, menus, AROs, and any display features you call up.
If you wish to specifically examine an ARO, users, programs, IC, nodes, files, etc., take a Simple Action to Analyze Icon/Node (p. 229). Make a Matrix Perception test using your Computer + Analyze program (rather than Perception + Intuition). *snip*
If your target is running a Stealth program, the Matrix Perception test becomes an Opposed Test, with the target rolling Hacking + Stealth (or Firewall + Stealth for programs or nodes) as the opposing dice pool. The hits from this test reduce your hits and consequently the amount of information you get. If you garner no net hits, the target is not invisible as such, but its icon has melded into the background of data traffic, escaping your notice.
If you wish to specifically examine an ARO, users, programs, IC, nodes, files, etc., take a Simple Action to Analyze Icon/Node (p. 229). Make a Matrix Perception test using your Computer + Analyze program (rather than Perception + Intuition). *snip*
If your target is running a Stealth program, the Matrix Perception test becomes an Opposed Test, with the target rolling Hacking + Stealth (or Firewall + Stealth for programs or nodes) as the opposing dice pool. The hits from this test reduce your hits and consequently the amount of information you get. If you garner no net hits, the target is not invisible as such, but its icon has melded into the background of data traffic, escaping your notice.
Here's the Data Bomb program:
QUOTE
"Data Bomb programs create a specialized form of reactive executable in a file or node, called a data bomb (note the difference in capitalization: Data Bomb is the program, whereas a data bomb is the executable set by the program). A data bomb is attached to a specific file or node and set to activate if someone accesses the file or node without authorization. When triggered, a data bomb “explodes� and attempts to crash the icon that accessed the file or node. Data bombs may also be instructed to erase the file or crash the node, if the owner chooses. Data bombs are set with the Set Data Bomb action (p. 231). Only one data bomb may be attached to a particular file or device. You can detect a data bomb with a successful Matrix Perception Test. You can defuse a data bomb simply by entering the correct passcode. Without the passcode, you can only disable a detected data bomb with a successful Disarm Data Bomb action (p. 231). When it “detonates,� a data bomb inflicts a number of boxes of Matrix damage equal to (rating x 1D6), then the data bomb is deleted."
Here's the Stealth program:
QUOTE
"Stealth is a clever hacker program that attempts to hide the hacker from other system processes. While it cannot make an icon completely undetectable, it makes the hacker seem innocuous by obfuscating his activities, erasing system tracks, and mimicking authorized traffic. While it is not used for any action, Stealth hides the hacker from detection by the Firewall as he breaks into a system (p. 227), as well as from Matrix Perception tests (p. 228) and Trace User attempts (p. 232)."
Here's the definition of "Icon;"
QUOTE
"The virtual representation of a program, file or other virtual object in the Matrix."
Here's my thought: I have some paydata that I want to protect. I put a data bomb on it. A data bomb is a file (it's referred to as an executable, and executables are files), so I want to put a data bomb on my data bomb. This does not violate the one-bomb-per-file rule, because two files have bombs attached to them; the paydata, and the paydata's data bomb. Any good hacker looking to steal my data will examine it for a data bomb, but will they examine my data bomb for a data bomb? Maybe, maybe not. If they miss the second bomb and try to disarm the first one without disarming the second one, great; I'll blow them up. However, is it possible to give the second data bomb its own Stealth program? At some points the Stealth program says it hides "the hacker," but it also says "it cannot make an icon completely undetectable, etc. etc" implying that it will work on icons, and data bombs are icons.
Now, this is in no way an "easy" defensive set-up, because having three defensive programs constantly running (two data bombs and a dedicated Stealth) will eat up a commlink's resources, but does it follow all the rules? Because if so... hackers beware.