QUOTE (The Monk @ Oct 12 2009, 12:06 AM)
If this is a flat out national secret then this cannot be used.
If it's a national secret (i.e. not public knowledge or purposefully hidden knowledge), then I'm guessing I'd have to (going along with the scenario) break into a local AZT office, hack myself an account on their local node (or just stand outside the building or be in signal range, but I doubt an office's nexus wouldn't reach outside), then do some data mining on that office's node and hope there's a record of the node I want? This is, of course, assuming the R&D node isn't a disavowed company secret only the higher ups are privvy to.
QUOTE
I ask my player what programs he has loaded, and its an Extended Hacking+Exploit. The threshold depends on what sort of access he wants (public, security, admin).
Doesn't public access require no account and thus needs no Hack on the Fly test? Public access is like wandering into the lobby of a big building w/o an appointment. User access is either being a low level employee or being someone with an appointment: you either already have a key to your desk or are ushered to where you need to be. You can't be arrested for standing in the lobby, but would a secret facility even HAVE a lobby? I'm assuming public access doesn't even exist on nexi like these...?
QUOTE
If you break in without triggering an alert, any IC or spiders are going have to run a matrix perception on you to detect your presence.
So if an spider (or IC) doesn't win the test, does he simply assume you're legit and go about his business? What is to keep him from running Analyze on you over and over again? Also, if you log in with a legitimate account (i.e. you DON'T Spoof or Hack on the Fly), will a spider or IC still Analyze you? If you're using legit credentials (as opposed to credentials you just manufactured), what would possibly mark you as a threat? I mean, do spiders periodically run Analyze on every single legit user in the system, or just on the suspicious-looking ones?
QUOTE
Every time you do an action that your access level does not grant the system gets another matrix perception test (that's another opposed test).
I'd think if you did an action that your access level doesn't grant, the system would just say "ACCESS DENIED" and go on its merry way, and the action doesn't work, no dice roll necessary. This is how things work in the real world, anyway. For example: In a Linux system, if I'm logged into something as a standard user and I try to do something that requires admin/root access, if I don't have the admin password (or my account isn't on the list of users that have admin privileges), then the command I used does absolutely nothing.