QUOTE (Yerameyahu @ Jul 2 2012, 09:56 AM)
Disclaimer: I'm not dismissing this thread, just posting what I bet are (a tiny set of) the good resources people have already given before:
http://forums.dumpshock.com/index.php?showtopic=34348http://forums.dumpshock.com/index.php?showtopic=29584Thanks, though I noticed that the first link quickly changed from "defensive" to how to hack as a non-hacker which is a bit beyond what I'm looking for. I also notice that a lot of the information may be there but it's certainly not cataloged. I think a lot of my confusion with the rules is knowing what I need and how much of what I need can be dumped on the Agent's shoulders. Certainly, part of it is making sure I understand WHY I need various things rather than taking it for granted and just picking up software bundles or whatever that may not necessarily be useful. Generic packages have their place, but if your character has access to a hacker, there's no reason why he would be able to get advice and trim the fat.
--
QUOTE (Neraph @ Jul 2 2012, 12:14 PM)
Those two links may be more appropriate, but I also wrote a guide:
Vehicles, Drones, and Agents.
That definitely helps a bit with the drone part of my question.
--
I'm mostly assuming that as a non-hacker and probably lacking the skills, unwilling or undesirable to invest in a skillwire (I personally will not since I've almost entirely eschewed cyberware).
So you're a non-hacker who wants to control a few non-combat drones and attempt to use them without being readily compromised. You're going to need a couple of things. A commlink, Agent, programs, and drones are all necessary to flesh out what you need.
ProgramsAll programs are Program Name (Linked Skill) (Program Type). Common Use programs are Rating x 50 for rating 1-3 and Rating x 100 for rating 4-6. Hacking programs are rating x 500 for rating 1-3 and Rating x 1000 for rating 4-6. Programs are grouped by similarity for those to be ran by the User, those to be ran by an Agent, those which are useful to an agent for cybercombat, and those which are not useful to the goal mostly because they engage in aggressive hacking.
Programs - Useful (Player)Browse (Data Search) (Common Use) : Recommended in order to find pirated software.
Command (Varies) (Common Use) : Will be required to operate the drones of this scenario.
Programs - Useful (Agent)Analyze (Computer) (Common Use) : Needed in order to detect threats to you. Should be ran by an Agent for the non-hacker.
Decrypt (Electronic Warfare) (Hacking) : Questionable use in combination with Sniffer
ECCM (None) (Hacking) : Necessary to help you reach your drones and other teammates in a jamming field.
Encrypt (Electronic Warfare) (Common Use) : Useful for making it harder for someone to intercept or alter the commands to your remote drones.
Sniffer (Electronic Warfare/Hacking) (Hacking) : Questionable use in combination with Decrypt.
Stealth (Hacking) (Hacking) : Questionable. The only use is for your agent to run this on your commlink to hide itself from intruders.
Track (Computer) (Hacking) : Possibly useful since it is operated on your node and can point out a problem node to a hacker.
Programs - Useful (Agent [Cybercombat])Armor (None) (Hacking) : Possibly needed by the Agent.
Attack (Cybercombat / Hacking) (Hacking) : Possibly needed by the Agent as a counter attack to intruders.
Blackhammer/Blackout (Cybercombat) (Hacking) : Possibly needed by the Agent as a counter attack to living body intruders.
Medic (Computer) (Hacking) : Helpful to the Agent if it engages in defensive cybercombat.
Programs - UselessBiofeedback Filter (None) (Hacking) : Not needed by an Agent and not needed for you since you won't be doing any hacking.
Data Bomb (None) (Hacking) : Most likely unnecessary.
Defuse (Hacking) (Hacking) : Most likely unnecessary.
Edit (Computer) (Common Use) : Not necessary to the non-hacker of this scenario.
Exploit (Hacking) (Hacking) : Unnecessary since you won't be going after other nodes.
Reality Filter (Response) (Common Use) : Unnecessary since you don't go into other nodes.
Scan (Electronic Warfare) (Common Use) : Not useful since you don't need to find other nodes and your drones should already be connected.
Spoof (Hacking) (Hacking) : You're not likely to be trying to access other nodes so this isn't useful.