QUOTE (grahariel @ Aug 13 2010, 05:41 PM)

Okay, I'm probably doing this wrong, but here goes. Let's say the hacker is trying to gain access to a mainframe through a node. In order to get into the system they first need to hack-on-the-fly against the OS's Firewall + System. Once they're in, I usually counter with a hacking + scan to try get the spider's to find him, but the hacker needs to counter with a higher roll of hacking+stealth. Basically, the hacking turns into several oppose rolls between the hacker and the spider's in the mainframe, when needed of course. What I'm asking, is the hacker's seem to be getting passed the first stage (i.e. the firewall + system roll) too easily. One player commented during one hacking incident saying, wow, their system is shit. And it was a corporate mainframe that was being hacked into. I may have been doing it wrong, if so, please clarify what I'm doing wrong. The group hasn't been complaining, but then again, they may be accepting it cause it gets the game to flow better. I hope this wipes away some of the initial confusion.
OOoookay! Got it.
Hack vs Firewall ONLY. See Hack on the Fly and Probing, main book. Look at Unwired's Sample Systems, on 76.
Yes. Its easy. However, you're forgetting a few steps. Namely, the account type you hack into is *important*. Very important. And easy to forget about.
Once IN the system, the node resists unauthorized changes with Opposed tests of Firewall+system vs Hacking+Blank(depending on what the hacker wants to do). This has to do with Access Levels, and Account types. Look at Unwired's definition of Public, Private, Security and Admin accounts. If the account is authorized for an action, the node just does it. If not, opposed test.
If a hacker triggers an Alert, they lose all access rights while the alert is in effect ,and thus anything they do to the node is opposed.(this is a detail in unwired. )
Once a hacker's in, its Computer+analyze, not hacking+ scan. Scan is used for detecting wifi nodes. Trace is used to home in on an icon's location in the real world. Analyze is for internet/matrix perception tests.
That being said, defending a node:
Roaming IC.
A well-defined ARC.
Notecards on hand with a handful of Spider stats you can whip out on the fly.
Use the Magic Number system - pick a number for your system depending on how important it is, and use that # for all ratings within that system. Start at 3 (device rating 3).
Enforce opposed Hacking+Black vs System + firewall tests to do stuff if the hacker doesn't have a high enough level of access rights. Remember that tripping an Alert strips all rights.
Also remember to enforce 4a's '-1 per extended test' rule.
Remember that IC call for backup from other nearby nodes.
ALL nodes are encrypted, even if its only rating 3. (seriously, its cheap).
Breaking encryption is a Combat Turn test. Its a speedbump. It takes a while.
Databombs are nasty. Use them.
Matrix perception tests are -critical- for finding out stuff, which nodes are linked, what programs are running. Reward your players for spending simple actions to be nosy bastards.
You may want to look at the
Shadowrun Cheat Sheets. It has some matrix related stuff.