QUOTE (child of insanity @ Dec 18 2013, 12:09 AM)

Do we have any SR3 vets here? Cause I've been going over the decker rules, and I'm not sure I fully get it. For example, it keeps mentioning hosts. And how each pltg and such might have several. Now, does each host have a different sheaf? and does the security tally reset with each host? What would happen if the decker implanted a new superuser, then jacked out only to jack back in and use it? would they get a security tally as a superuser? played SR since first, but this is the first time I really needed to deal with decking. No one has really been interested.
Okay, so you have the Matrix which consists of LTGs (Local Telecommunications Grid) and RTGs (Regional etc). RTGs cover larger geographical areas, and LTGs branch off of them. Think of an RTG like your Area Code and the LTG like your prefix -- so (123) 867-5309 would look like (123) = RTG, (867) = LTG, (5309) = site number.
Connected to the Matrix might be a host, or a cluster of hosts. There are many ways to design these, but the simplest is having a Matrix-facing host, and a number of hosts branching off of that one (that may be connected to each other or simply hanging off to the side, as you like).
A PLTG (Private etc) can exist completely off-grid, so that you have to find a jackpoint physically connected to the PLTG in order to break into the rest of it. Secure/dark sites might be running these internally. A PLTG can also connect physical sites that are far away, so a corp with offices in Seattle and Denver might have a PLTG connecting them. Wide PLTGs generally receive good security at the jackpoints.
Each host has its own sheaf and security tally. The thing to remember, though, is that if you access Host B through Host A, you're still present in Host A (and running null processes) so you might still be detected.
You can't just implant a new superuser. It's generally implied that your access is always illegal. In a game sense, forging a full superuser account for yourself is too difficult/time-consuming and wouldn't last for long enough to make it worth the trouble. For the system to not quickly reject it, there would have to be verifiable biometrics, registered SIN verifiable with the corp files, multi-factor authentication, etc. Easier to just smash and grab.