QUOTE (Notsoevildm @ Jan 13 2013, 08:17 PM)
I'll get a post up for Copperhead attempting to sneak away without bringing the building down on her head.
Post up for Gossamer. She is still too close to 'event horizon' for any real info to be out there. She can hang about the post node for a while and try again later or Argent can bring some muscle/technical experts home to put her body back in the charger alllowing her to return to it if she so wishes.
After a couple of hours, there is some information out there, although mostly people trying to find out how to get rid of it. It seems to have infected a lot of nodes. Most replies/suggestions are bogus. There are a few sites/posters claiming they know how to get rid of it that she could investigate. One is Citadel Security Systems (CSS).
Afraid the reference passed me by, sorry :P I think legitimate (non-mega corp) sources are going to be behind the shadow info (and that clearly is struggling at the moment). So she could either consider hacking a corp or just wait. She’s probably a little concerned about Argent (she hasn’t had a reply to her message yet!) and her children so I will go and see what’s happening there before I consider trying to delve back into her body.
I’m hoping you have some cunning GM way of getting her to do more than just investigate the phenomenon (your initial starter post was sooo intriguing I want to start getting at that info!) but I’ll muddle on for now :)
Spending some karma (plus what I’d saved) to upgrade my inherent stealth program to 6 please
So, hack-on-the-fly to get into the school server and look for camera controls…security account should do for now…
• Hack-on-the-fly: Hacking + Exploit vs Firewall +Sec access (+3 security, +6 admin) [complex] each roll grants analyse + firewall vs hacker's stealth
• 17D Exploit [Exploit+Hacking+Spec+VR+Sapper] = 17d6.hits(5) →[3,6,3,2,3,2,2,1,2,5,6,6,3,5,2,1,1] = (5), [5,1,6,4,1,1,5,2,1,6,5,5,5,2,3,3,5] = (8), [4,3,5,1,6,3,6,3,3,6,4,4,1,3,1,5,2] = (5), [2,1,6,3,1,1,3,2,5,2,1,4,5,3,2,6,1] = (4), [2,3,4,5,3,4,1,6,6,2,6,3,3,4,1,2,6] = (5)
• So that’s firewall 2 in one round or firewall 10 in the second (the rest will hopefully be redundant!)
• 14D Matrix Stealth [Stealth+Hacking+VR] Note: -6D to perceive AI (don’t think that applies to the initial insertion but even if they detect her they will have a damn hard time finding her once she’s in their system!)
Can I reverse engineer Aria’s firewall patch to upgrade Argent’s link and her childrens’? A software check perhaps? 11D [Software or computer + Edit + VR] = 11d6.hits(5) → [2,4,6,6,3,5,5,2,6,6,2] = (6), [3,3,3,3,2,2,2,1,6,5,1] = (2), [5,5,1,3,6,1,3,4,3,6,2] = (4), [4,5,5,6,3,5,3,2,6,5,5] = (7), [2,1,4,1,5,4,6,5,5,6,3] = (5) (this one’s for later though…)