Help - Search - Members - Calendar
Full Version: Basic matrix questions
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
hobgoblin
QUOTE (etherial @ Nov 11 2010, 12:41 AM) *
3C. Brute force. Roll Hacking + Exploit (target's Firewall [+3 for Security Access, +6 for Admin.], Complex Action). Success logs you onto the Node.The Node gets a free roll on an Extended Analyze + Firewall (your Stealth) each time you roll. If the Node succeeds, it triggers an Alert.

Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy.

And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio).
Halinn
QUOTE (hobgoblin @ Nov 12 2010, 07:59 AM) *
Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy.

And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio).


A good hacker (18 dice exploit is not hard, if that's your specialty), hacking admin on a rating 4 commlink with rating 6 stealth wins in less than two rounds, where it takes him two and a half to get noticed. Using edge can get you to win even against a rating 6
etherial
QUOTE (yesferatu @ Nov 11 2010, 11:25 AM) *
Now, if I could just tell the difference between:
Computer and...Data Search...Electronic Warfare...Cybercombat...Hacking...
Scan...Analyze...Browse... Track...

I suppose I'll need to reread the Wireless section until it sinks in.


So, the reason I say to manually Cross-Reference upthread is that when you draw lines from the Actions to the Programs and back, you learn which Matrix Actions anybody can do at any time, and which require specific Programs. You also learn which programs do only one thing:

Armor, Attack, Biofeedback Filter, Black Hammer, Blackout, Browse, Data Bomb, Decrypt, Defuse, Disarm*, ECCM, Edit, Encrypt, Medic, Nuke*, Purge*, Reality Filter, Stealth, Track

Which programs do two subtly different things:

Analyze, Command, Corrupt*, Scan, Sniffer

and which do several different things:

Exploit

*Programs from Unwired.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012