QUOTE (kzt @ Jan 18 2011, 11:42 PM)
No, if you run stealth it's a LOT harder. It's a data file. Or more accurately an icon of a data folder. There are thousands of them. You can see that there are thousands of them. Which has the data you want? You run a data search and it sends you a list of thousands of icons. You want to know more? "take a Simple Action to Analyze Icon/Node (p. 229)". I'm not saying this makes a lot of sense, I'm saying that is what the rules say.
Do you just not get processor limit? A system cannot have 'thousands of data files' covered by a decoy, because they would need a stealth program for each.
A Corporations laws usually don't limit what a corp node can run. So no, it's not illegal. It's illegal for YOU to run a stealth program. But their stealth program or their 40 agents with Black Hammer are not illegal.
QUOTE (kzt @ Jan 18 2011, 11:42 PM)
Actually what that does is "It will report the
presence of any new icons to you. It will maintain that task for as
long as you are on that node, until you use it for another purpose,
or until you deactivate it."
Cool, so it will tell you about the new icons that show up. This is helpful in this situation how?
It is supposed to be hard to find details on a node, particularly when you are an uninvited hacker. This is RAI. See Unwired.
You're cherrypicking quotes, instead of using the full text. It also
automatically scans other users/icons on that node.(4a 288) It ALSO reports new icons, but that is not all it does. The two rules are not incompatable. You pointed it out yourself: Files are icons, therefore they also get automatically scanned.
Look at the rule again. Once the automatic mode is turned on, it scans icons on the node.
Are you going to argue now that the icons/files aren't on the node?
If someone logs in to investigate the activity,then.... they get scanned automatically as well.
I don't see how these two functions are mutually exclusive.
(I mean automatic in the sense that it doesn't take an action; a Matrix perception test must still be rolled for each icon.)
QUOTE (kzt @ Jan 18 2011, 11:42 PM)
Unwired p57:
All icons carry an identifying tag, giving the VR user instant knowledge about the kind of icon he is looking at; AR users get a small descriptive tag next to the icon. The kind of information provided depends on the access rights of the Matrix user. In some cases wrong tags may be supplied. While a spider with security access might be informed that the knight's armor in front of him is a trace IC, the hacker with only user privileges might be told that it is only a piece of data. In this case the hacker must use Analyze software to get the complete information.
Gee. We -are- using analyze.
And it IS making Computer+analyze rolls for us.
Are you -trying- to win my arguement for me?
there's a big difference between the information programs and icons provide about themselves without a test, and the information you get from a successful matrix perception test.