@General
OK I am back in a civilized world with internet access. I hope to move back to a more active posting regime.
I'm enjoying reading the "go rescue pixel" "covering fire..." argument
I've moved the timeline to 23:00:15 to cover the talking, and to 23:00:30 to cover getting out of the hole in the ground and back into the fight. So much for my plan with you lot running away yet again! You are all tooled up and ready to rock. If I think it's inevitable death for you to continue I will tell you. But for now go out and kick butt, take prisoners and spoil my evil plans
Video of kevlar wallpaper to help understand what the inside of the cafe is looking like@JxJxA
You can have the silencer but note that applied cheese's comment is very valid:...
QUOTE
LOL! Well, to be fair to our original gang of three...it looks like the "they" are out to get Pixel this time.
Mantra: Geek the Mage. Geek the Hacker. Geek everyone else.
Personally in 2072 I'm not sure which is the bigger threat: Mage or Hacker.
Unfortunately for the bad guys, Pixel appears to no longer be in the crosshairs of a sniper: the two that were standing have fallen under a fusillade of bullets although the one that had spirit cover has been lost in the chaos.
It's clear that EMM286 has some personality problems: probably damaged by testing his own psychotropic options.
@LostProxy
I am very sorry, but I think the game I am running is full. However Aria's game is lots of fun (and also involves running from overwhelming force)
@Copperhead:
Noted your spells. Snake hisses approvingly
@AppliedCheese
QUOTE
Paranoia? Paranoia?! They're actually out to get you!
Even if you're a paranoid sometimes they are out to get you anyway
@Xarin
I disagree with you on your interpretation of hacking on the fly rules. I'm sorry but the game I am running has it so that hackers are effective, not just the PC hackers. Hence: Drones are spoofable, Hacking on the fly generally works, and is often used. Encryption works like the shadowrun fluff says it does. I'm sorry but I don't want any further hassle on this: We will move rules disputes to questions in the general forum.
I'll do my best to follow the rules, but I want to enjoy GMing this game. The shadowrun hacking rules are so complex that everyone that reads them thinks they work differently, and I have to have a simple set that I can use. Mostly I care about "how many bp / karma /cash have you spent on this topic" and "how well did you roll" vs "how much bp / karma / cash did the bad guy have, and "how well did they roll".
So lets move to the cybercombat.
IP1: Emm386 moves to attack you with his poisoned claws:
You respond by crashing his exploit program (you did it: its state is now unloaded see p 230. It will take him a complex action to reload it)
The system tried to sever emm386's connection and failed.
He strikes you with his unpleasant attack 6 program: 5 successes.
Agent 1 strikes you with a nasty attack 5 program: 2 success
Agent 2 strikes you with a nasty attack 5 program: 2 successes
I use the rule that each defense is -1 die on the previous roll (this is another topic that the main forum cannot reach a consensus on). If he hits you the unpleasant psychotropic stuff probably won't affect you.
IP2: Chortling and chuckling he moves in again
Again the claws reach for you. Only 4 successes this time
Agent 1: 3 successes
Agent 2: 4 successes
IP3: The jamming comes crashing down, and his icon and his agents vanish
Can you do an IC post for your counters and actions in IP1 and 2, then describe him vanishing in IP3?