QUOTE (almost normal @ May 2 2012, 10:47 AM)

Tracing. Against a reasonable stealth program, it seems to take forever. Is this intentional? Will a trace program narrow down the Access ID/location of the program in ever decreasing circles? What's the main point of tracing if a hacker can quickly and easily change his Access ID number?
I STRONGLY suggest waiving the 'successive extended test -1' rule that Anniversary edition introduced, but only in regards to Tracing. It basically broke Tracewars, in that the track test is extended but defending against it is NOT. A tracewar (trace user vs redirect trace) should be a hack-off, but it shouldn't be one-sided.
If someone is just changing their access ID repeatedly, it does make it harder to find them, but if they're doing it in the middle of combat they're basically shooting themselves in the foot.
For one, see passive traces in Unwired. For second, spoofing your access ID to a new one just happens to disconnect you from all nodes, and resubscribing takes either a simple or complex per(i forget which). It will basically wreck your PAN configuration, unless its smartly networked.
QUOTE (almost normal @ May 2 2012, 10:47 AM)

Black Ice/Hammer/Out. It prevents the hacker from jacking out unless they make a test, and even if they do succeed in such a test, they suffer dumpshock. If a hacker is literally 'jacked in', will a second player unplugging the hacker make the willpower test an auto success, or will some further damage result? Secondly, if attacking an AI with Black ICe, it's nearly guaranteed to succeed, as the AI would lack biofeedback filters, however, neither of the 3 black programs seem to be able to affect the AI's damage tracks. Is this intentional, or are we doing it wrong?
Doing it Wrong. Black IC only works against users in VR, and very specifically doesn't work against Agents/Sprites, etc. (231, no effect on X...). An AI is basically a better, self-aware agent, and also a Program, so it claims immunity. Do keep in mind that if someone is in AR mode, it doesn't work either.
Otherwise, you're doing it right in terms of tests.
You basically want Attack to damage any wierd programs like sprites or agents or stuff black ic doesn't affect.
QUOTE (almost normal @ May 2 2012, 10:47 AM)

Terminate Connection, possibly a subset of the last question, do you need the Access ID of the intruder to terminate their connection?
Slightly fuzzier territory. This is expanded upon in Unwired, where users/spiders/ic can take actions to boot specific users from the system. Yes, it took unwired to introduce Kicks. I think you need the Account, but I'm not sure. Also relevant is the Alert section from the same book - if an Alert is successfully triggered against a user, they lose all access rights AND everyone can see you. From the faq:
QUOTE
Q:When you trigger an alert, will security automatically spot you, or do IC and security hackers still need to succeed in an Opposed Matrix Perception Test?
A:IC or security hackers will need to spot the intruder as normal, unless a Restricted Alert was issued. If a Restricted Alert has been issued against the Hacker, IC and Spiders (users with a legitimate account) do not need to make a Matrix Perception Test in order to know of the presence of the intruding Hacker because the Node has already identified them. These icons may attack the hacker or take other actions that target the intruder. They do not, however, know any further information about the intruder beyond the fact of their presence. If defending icons want to know more information (access ID, what programs are running) they must succeed in a standard Matrix Perception Test.
QUOTE ( @ May 2 2012, 10:47 AM)

Deleting information off a commlink. How does that work? 230 seems to indicate the edit software, but that seems odd. For one, it means that deltree *.* is harder to pull off then actively changing a face on a video feed. Two, it also seems to indicate that it's something that has to be actively done over several passes. Lastly, can this information, outside of GM/CSI fiat, be brought back?
Edit is indeed the program for altering files, but there is a distinction between levels of Access Rights that is rather relevant here. If you have good user rights, you will just succeed automatically without a test. If you don't, you will have to roll against system+firewall to attempt it.
The corrupt program and action from unwired is also extremely relevant, and there is also a virus which can delete everything on a system in the same book, but takes a few minutes to work.
In fact, I'm just going to pretty much recommend that you read the first 90 pages of unwired. Everything about things like matrix topography, how systems are set up, data transfers, expanded rules on alerts and subscriptions, the security example setups.... basically goes a huge long ways towards making it easier to wrap your brain around the matrix without making it more complicated. There's information there that's basically missing from the core book (my favorite obscure text is the one that lets you go above your subscription limit in exchange for program lag, which actually makes pans kind of feasable), and I'm not even talking about crap like echoes or new gear. Just clarifications.