QUOTE (Aerospider @ Feb 2 2010, 04:29 AM)

It really is – thanks for all the great suggestions and illustrations guys, I'm now buzzing with ideas.
If there's any more out there then keep 'em coming.
You asked. Here's an asshole trick, and a way to make singularity encore hilariously useful. I have dibs on this one, by the way. I call it the Self-Loading Jack In The Box. Its a tactic for protecting an encrypted node, and for changing encryption from a roadblock to an annoying, reoccuring slap in the face. With an e-peen.
You need two IC. The Encryption Perscription out of unwired. All it does is encrypt things. And Singularity Encore. All it does is reload crashed programs. These IC are very affordable. Now that you have these IC, you change their settings a bit. They still operate within their limits, just differently. You'll also need a decently high rated Stealth program, and an analyzer is good too, and cheap.
Alright. Step back. Check out Encryption. You can encrypt commlinks and nodes so people have to break the encryption before accessing it. Pretty standard. You can password protect files, or even multiple files. In this case, we're taking that a step further, and encrypting EVERYTHING in one file. When you encrypt a file(a simple action) you may also put some sort of security on it. Everyone's heard of the databomb. We're being meaner. Check out unwired 66 and 111. You may load an IC(the jack) in the file archive(the box), but only one, or a corrupt program that acts like a databomb. Corrupt gets the file backups, but we're using the IC. In goes the Encryption Perscription.
The Setup: (this would work a lot better if you could put two ic in one node. I'm going to use abbreviations for length)
The EP ic idles in the file archive until its opened, where it pops out. It takes a Free Action to announce its presence, and promptly re-encrypts everythign and itself, resealing all the files back up.
The node's security settings note the EC ice activate, and loads an SE ice running a high-rated stealth and analyze, and hoping the hacker won't spot it. This happens while the encroaching hacker is re-decrypting everything. The SE IC is set to idle, so as not to trigger automated-setting-analyzers, to reload the EP IC, and look for icons that don't belong, trigger an alert, and start trying to boot people off the system.
Lets look at alerts. There are a few alert types and responses. A restricted alert gives the defending node +4 firewall. Thats useful. Calling for help and letting the admin know there's a problem is pretty standard. The real gem is Terminate Connection. It takes an Opposed Test. Firewall + System against the intruder's Hacking + Exploit. Terminator gets +1 for each IC running, hacker gets +2 for security access, +4 for admin, and if they're using a legit account they're automatically booted. Check Unwired 67 - any spider or user with an admin account may Terminate Connection as a complex action. Doesn't need an alert to do, but you don't get the bonus either. More importantly, it doesn't need a program to do. Which means anyone with the right access can do it. Like the our dear little, mostly-harmless Encore Singularity - which just put an upper time limit on the amount of time the intruding hacker can spend in the node, while they're on a time deadline to decrypt files and steal data.
Dealing with the Box:
Fortunately, dealing with the box is relatively simple.
First, Initiate Cryptanalysis takes an entire Combat Turn. Thats important. Its normally a speedbump. Each time the box self-loads, it takes another Turn(at the very minimum) to unpack. As an extended test, it CAN be rush jobbed down to half time - depending on your GM, thats a pass or two - and with Edge the chance of clitching isn't too bad.
The hacker has to decrypt the node itself to get in. Thats pretty standard, though, especially on drones. No biggie.
The hacker may win initiative, and try to deal with the EP ice. Unload it, or frag it. It has no way to heal damage, so it'll get worse until it crashes and burns - at with point it pops back into existance at full hp thanks to the SE. Heh.
The hacker may get lucky on their analyze check, see the SE, and deal with it right then and there, taking the reloading out of the picture - but its a singularity encore? why bother.
If the hacker don't spot the SE until after it reloads the EP, they will most definitely be looking for it. Its pretty easy to deal with once spotted. Win initiative, cyber frag it, or if they have the right access just unload it.
Once both IC are dealt with, the hacker can plunder the nodes riches to their heart's desire.
Making It Meaner(Salt and Pepper to taste)
A hacker comes in, decrypts everything(wastes a combat turn), out pops two ic, one of which he can't see, and everything seals up again.(argh!). So he decrypts everything again(another combat turn). Meanwhile, the Singularity Encore is trying to spot the hacker - and probably at a disadvantage doing so, because an IC will only ever roll 12 dice or so, and a metahuman hacker can go above that pretty easily with hotsim and specialties. Still, its an opposed test, so he'll lose eventually. At which point it starts repeatedly trying to kick the hacker off the node, until its found and neutralized. This is while the hacker's dealing with the encryption.
When the decryption finishes, the Encrpytion Perscription comes out, and Terminate Connection attempts get another dice. It could also join in, and try to boot users with an Alert, or even reboot the Singularity Encore.
Raising the ratings - IC com in flavors from 1 to 6. So do programs. Adjusting that to suit the opposition is fairly easy, from a gm perspective.
So, there you have it. Self-loading Encryption Jack in the Box. A way to own people with the most worthless IC in the book.