QUOTE (Moomin @ Feb 27 2009, 12:01 PM)

I've got a technomancer in my game and he's basically been able to hack just about everything so far without being touched. It's rather annoying for me since I like to be able to get the PCs in danger sometimes and I don't know about him but I'd personally not be enjoying being so untouchable without risk.
There are a few things that I'd like to check we're playing correctly:
1) Hacking
He rolls (Hacking+Exploit) extended test until he has (System+Firewall) hits (normally 10-12 as they're fairly secure systems), with Hacking 4 and Exploit 7 (5+2 for the Codeslinger quality) = 11 Dice Pool so this normally takes 2-3 rolls and doesn't result in a glitch that I could use to get him.
When he enters the system or each time he attempts to hack while hacking on the fly it rolls (System+Firewall)(normally 10-12) on a target of his Stealth. With Stealth 4, normally threaded up to 8-10 this will almost never happen so he gets in undetected.
First, let me say, my GM faces the same problems with my TM. Paladin sprites, can I tell you how much I love those? Anyway. He's come up with a variety of ways to stymie my TM...
Probing the target (System+Firewall, 1 hr (VR)/24 hrs (AR)) is pretty much guarenteed that
any hacker can get in. So, spice things up. Make systems where he needs to be on-site to hack, and in those places, a lot of times, they get pretty suspicious if there's an 'unconcious' person laying in the corp hallway/office/broomcloset for 3 - 4 hrs... Or throw things at him that need to be hacked RIGHT NOW.
Also, remember that if he's threading Stealth past his Resonance, it's Physical damage from fading. Can he really soak the fading for 4 - 6 hits? And he'll have a -2 to all actions while sustaining the threaded Stealth... including physical actions, like, oh, dodging that bullet.
QUOTE
2) Detection
Once he's in, patrolling IC can check him out periodically and have a better chance of detecting him than the system did since it's an opposed test then but they still fail most of the time. Are there any guidelines on how often an IC would check an icon out? I don't like to do it too often since the IC would be checking every icon in the node and wouldn't come around to his stealthed persona all the time.
I haven't thought that a security hacker would be patrolling the node checking out randon icons incase they are stealthed hackers but would he notice that devices were being accessed and orders issued by an innocuous looking icon that he could then go and inspect?
Access logs are your friend. Every action is logged. Security personel can just review the logs for suspicious activity. Security spiders will know if another Admin user logs on. IC can be programmed to analyse every persona on the system, and to analyze
every new persona that logs on... That's 3 per combat turn, or 1 per second. Why
not have them analyze everyone, all the time? That's their job; if they are scripted to analyze users, that's all they do (until they hit the next step on the script, like if a user isn't legitimate). If there are 60 users active on the system, then each user gets Analyzed once per minute. See the sample script in Unwired...
QUOTE
2) Access Levels
If the technomancer has hacked himself Security or even Admin access (as he usually does since it's only an extra turn rolling dice) does he still need to make tests to lock maglocks, turn off cameras, alter the radio frequencies of a security squad so they can't communicate etc.... or can he just issue the orders as the system believes he is legitimate?
An Admin should be able to execute most functions on a system without further tests. Mind you, if he's using Probing the Target to get in, this is likely an additional hour - 2 hours work (see above for ways around that). Well designed systems are likely to have some safety measures in place; ie, no disconnecting admin users (or the security spider), rebooting requires pushing a physical button or pulling a physical plug in the security office, etc.
But, yes, a TM should be going for Admin all the time. They can do it with little effort.
QUOTE
3) Complex Forms
A node can't run a program with a rating higher than it's System. Are the ratings of a technomancer's complex forms limited by the system of the node he is in or by his own System (which equals his Logic) or by neither? Can he exceed the rating he may be limited to by threading (up to resonance x 2 of course)?
Complex forms run independent of a node. The TMs complex forms are not limited by his own system. The only limit is the Resonancex2.
QUOTE
Can a complex form be threaded and then further threaded to increase the rating again or if you wanted a better complex form would you have to discard the one you had already throeaded and then thread it again hoping for a better result?
You can only thread a form once. You can choose to discard all the hits and re-thread it, over and over and over again. Note that out-of-game, this tends to get the player heavily bruised by the other players who lose patience with the TM player's constant dice rolling. As a GM, it is totally your right to tell the player,
1 roll, that's it, to save his own popularity.
QUOTE
4) Static
A couple of times he has hacked the security node of a building and then trasmitted a loud burst of static through the ear pieces of the security team. How big a distraction do you think this would be? I've been having my security guards roll Willpower against the number of hits he gets on an Edit roll and giving them a penalty for a turn if they fail. I think I might stop this though since they would probably have some kind of audio flare comp installed.
p. 208, SR4, AR Modifiers sidebar. Gamemaster can apply appropriate modifiers (-1 to -3).
Of course, in my game, my GM rules that Security personel are intelligent. They get the static, take a simple action to pull out the ear pieces, yell a '411' or other code out, and everyone shuts down their 'links. It's the "we've been hacked, go to plan Alpha-Charlie" theory. Which also includes fun things like a security officer switching off the system via physical switch, and dumping my VR tush out to enjoy the fun effects of Dumpshock...
And hey, why have the security node of a building vulnerable to off-site hacks? Make it an internal system, with wi-fi inhibiting materials, and separated from the other nodes in the building. Hacker must be onsite, and that opens it up to much more evil-GM tricks...