QUOTE (Fortinbras @ Aug 31 2011, 07:23 AM)

In order for an Agent to change it's Access ID, it needs to make the longer extended test from Unwired. The Spoof test is just for personas. Were Agents able to change their Access IDs so easily, they would be able to replicate an infinite number of themselves on the same node, which is the problem Zarek was having with his troublesome hacker in the first place.
Since agents running independantly have their own set of matrix attributes (derived off the node they are running on just as a persona's are by the commlink employed by the user), and have their own icons, I don't see them as any different than "personas" in any identifiable way. Their pilot acts as the controlling instance (the skills), and everything else is matrix attributes, derived off hardware and software, the same as any matrix user.
Of course, they are still programs, running on certain processing power (the response rating of the node they are running on). Before they can run independantly, they have to be started up on some sort of computer, which I would say can also be the commlink of the matrix user himself, they are just not integrated into his persona, they are running on his node (his commlink has to be its own node, too, or else you could never hack one). They can then be transferred to other nodes, or move on their own. They then use the response of the other node.
On P99 of Unwired, it says this bit:
QUOTE
Spoofing a Datatrail Online
Since nodes require an access
ID before they will allow a connection,
it is important to spoof your
datatrail (if you are so inclined)
before you actually access other
nodes. Once you have logged onto
other nodes, a change in access ID
will automatically close your connection
to other nodes—after all,
you are no longer who you said you
were. Under some circumstances,
this may be an expedient way of
closing multiple connections. For
example, if you are under attack by
Black IC in another node, you can
try to spoof your datatrail in order to change your access ID and log
off that node. If the Black IC is jamming your connection, however,
this will require an Opposed Test pitting your Hacking + Spoofing
versus the Black IC rating + Response.
You can also use this trick to try and avert a direct trace. If
someone is using Track to trace you, you can spoof your datatrail
and change your access ID as normal. While this will sever all of
your connections, it means that the Track will only be able to
trace you to the nearest node that your connection happened to
have been routed through. The tracking hacker can still acquire
your old access ID, but will not be able to pinpoint your exact
physical location—though he will know that you are close to
that nearest node.
Now to me this means that there is still the possibility of using Hacking+Spoof to change an access ID, or else you would never be able to do that opposed test. And Agents are allowed to use their Pilot rating in place of the hacking skill. Now the question is what will happen to an agent that tries this? Will its process be killed, or will it just be logged off the node, and have to reconnect? I could argue that I can program my commlink to not kill the process when the agent that is running on my node (but not my persona) changes its access ID, and then let it reconnect to the node, in which case I now have an agent running on my node with a new access ID.
Of course, if you argue that its process is automatically killed, well, that's that then. However, I have another option, and that is multiple commlinks:
Each commlink is a new Persona, because the commlink determines my matrix attributes. So now I get a bunch of additional commlinks, and load up my identical copied agents (which are more expensive than the commlinks) into each commlink's persona. Then I spoof each commlink's access ID with a very quick test, and end up having several agents which are no longer identical, because each is running in a seperate persona with a new access ID. These I can then use as I wish.
QUOTE
In terms of worms and Teamwork tests, unless I'm very much mistaken, Agents needn't be in the same node to assist each other with things like data searching or trying to access the same node for a DDoS if they are loaded onto different nodes, they just need to be able to communicate with one another.
They can't assist each other with hacking or cybercombat, because that would require them to be on the same node, which can't be done because they share an Access ID. They can, while on different nodes, all call the same number at the same time, creating a DDoS. More than one won't be allowed on the node, but the access requests are what clogs the system. No contradiction that I can see.
Nor can I really see a problem with worms having the same access ID. As long as they all infect different nodes, how is that a problem?
Ok, I'm with you there.
QUOTE
It's easy to say that Agents should be able to duplicate themselves ad infinitum to represent computes as we know them, but that creates the Agent Smith scenario and makes the Matrix unplayable.
And don't forget that computers as we know them were crashed for being too slow and archaic. To complain about the difference between the Matrix and modern computing is like complaining that the Internet could never work because no one could keep track of all the punch cards. It's a vastly complex system explained as best it can in gaming terms.
Wibbly Wobby, Timey Wimey. This is my Matrix machine. It goes ding when there's stuff. Just go with it.
The trouble is that the writers didn't just replace computers as we know them with a new magical computer matrix. They tried to extrapolate from what there is, and hence, people think things should still work as we know them. It's really a "it doesn't say I can't" problem, because people can create possibilities both from rule loopholes, as well as demanding that things work they way they think they should, because the options aren't clearly defined.