QUOTE (hermit @ Jan 21 2011, 03:55 PM)

It was a known problem. Other known problems were adressed. This one was not. So, given that it wasn't adressed ...
I dunno, it's still fundamentally a "because it's not forbidden it's RAW" argument. And while I think the designers are quite competent, expecting them to fix every issue in a game is difficult, especially since it's hard to make solutions that won't cause other problems.
QUOTE (hermit @ Jan 21 2011, 03:55 PM)

No, he just can insta-thread himself skillsoft CF that allow the use, since that's legal to do with skillsoft.
Fair enough, shoulda thought of that.
QUOTE (hermit @ Jan 21 2011, 03:55 PM)

As I said, it's a bad idea to build TMs with the BP system, try Karmagen to get the powerful results (a bit less now thanks to SR4A, but still pretty powerful).
Karmagen makes (almost) everything more powerful and if you need to use Karmagen to make something overpowered when BP is the standard that's not a strong argument for something being dominant/overpowered. Nosferatu are incredibly overpowered if you use Karmagen as written in Runner's Companion.
QUOTE (hermit @ Jan 21 2011, 03:55 PM)

And he has sprites, which are like a passepartout for just about any situation and can teamwork and add mad dice anytime for anything, and are uaffected by Response load. Also, the mancer gets boni from Paragon and Stream and is totally unhackable. And that's not even considering that he has an optional rule that is a flat out I-Win Card against any non-TM Matrix user.
Codezombies beat sprites in cybercombat, plain and simple. It's not even a competition. And while sprites are useful for boosting Stealth and other abilities, that's not going to beat a truly devious security system. You simply do not mess with a paranoid runner on his home ground, whether that's the Matrix or in real life.
Technos being unhackable isn't that impressive. Most hackers will have essentially unhackable systems (example provided at bottom). And Technos pay for this by not having a Matrix condition monitor.
It's weird to see you strictly arguing RAW on one side and then quoting optional rules on the other. Still, I would be interested to know what this I-Win card is.
Example of an "unhackable" system. This is pretty basic but with a personal twist:
Node 1 is you standard hacking node, all the typical goodies. Node 1 is slaved to Node 2.
Node 2 is an R6 node that houses a bunch of agents. This is useful because you're going to want a bunch of agents to both protect your hacking node and do all the little hacking tricks, like lifestlye spoofing and data searches, that you want but don't really have the time to do. Node 2 houses the Log for Node 3. It is also slaved to node 3. All agents are programmed to assume a pre-programmed defensive strategy if the connection with node 3 is lost for any reason and one of the agents is programmed to automatically read node 3's Log, alert the hacker, and then start a trace on the intruder. It's dirt cheap to set one of these up because you can build the hardware in a weekend for half price and duplicate most of the software you use on your hacking node. There's no real reason to give it any Signal.
Node 3 is the crappiest R1 System 1 node you can build with loose change while hungover and it runs one program: an ergonomic Analyze program (the rating doesn't matter). However, every piece of software, including the System and Firewall, are infected with the crash virus. Any attempt to hack in triggers both the Analyze and Firewall automatically, forcing two crash tests, each test rolling 12 dice to crash the system, easily achievable. As soon as the node inevitably crashes, all the defenses on Node 2 will activate and a Trace will be started before you even attempt to hack the node. Node 3 is slaved to node 4. It should not be wireless under any circumstances.
Node 4 is your average "public" commlink that every hacker uses.
It's not a truly unhackable system but it's simple, dirt cheap, and no amount of stealth is going to beat it. You basically have to come up with a sneaky way through. That's one of the things I've been pressing. High level hacking isn't a matter of dice pools. At a certain point you can design systems and tools where someone will win or lose regardless of their dicepool. At this point the question becomes what kind of dirty tricks you can pull and how much you can find out about the opponents dirty tricks before you fight/hack each other.
Technos still have an advantage because there are certain things they can do which hackers just can't, but just boosting CFs or summoning Tank Sprites isn't going to cut it.