Help - Search - Members - Calendar
Full Version: Matrix Basics
Dumpshock Forums > Discussion > Shadowrun
ZeroSpace
So I got my copy of Shadowrun 4 in the mail last tuesday, and I've gotten a decent amount of reading done. The only thing is, while I get the basics of how the matrix is supposed to run as a concept, I'm not quite getting how to actually run matrix stuff. Could someone give me a brief overview of how to run the matrix?
FuelDrop
QUOTE (ZeroSpace @ Jan 15 2013, 09:27 AM) *
So I got my copy of Shadowrun 4 in the mail last tuesday, and I've gotten a decent amount of reading done. The only thing is, while I get the basics of how the matrix is supposed to run as a concept, I'm not quite getting how to actually run matrix stuff. Could someone give me a brief overview of how to run the matrix?

You ask the impossible nyahnyah.gif
moogoogaipan
I think you just have to jump in and give it a try. As the previous poster seems to articulate, a lot of people (including me) are still afraid of matrix rules even though we all admit that the sr4 rules are more elegant and game centrically thoughtful than ever before. I think its not a prob with the rules though, more just a function of jumping in and getting the feet wet.

I wrote a shorthand outline of the matrix rules that u might find helpful:

MATRIX
Device Attributes
Firewall
System
Signal
Response
Condition Monitor = 8 + (system/2)
Use programs + skills instead of attributes + skills
Actions
Free (all run simply on SYSTEM OS "program" unless otherwise noted)
Alter icon
Change mode of slave
Detect active/passive (not hidden) nodes
Jackout
Switch to AR/VR
Terminate data transfer
Transmit phrase
Simple
Analyze icon (ANALYZE PROGRAM)
Computer + analyze v. ?
Deactivate Program
Decrypt (with key)
Encrypt (ENCRYPT PROGRAM)
Command Slave
Inhabit drone/slave
Log off
Observe in Detail
Transfer Data
Lasts only a combat turn
Complex
Capture wireless signal (SNIFFER PROGRAM)
Control Slave (COMMAND PROGRAM)
Tactile skill + Command program
Crash node (EXPLOIT PROGRAM)
Hacking + Exploit (System + Firewall, Complex Action) extended test
After 1st attack, node gets +4 to Firewall
Crash Program (EXPLOIT PROGRAM)
Hacking + Exploint v. Firewall + System opposed test
Data search
Data search + browse (variable threshold, variable interval)extended test
In lieu of browse, use:
Scan to find associated wireless or wired devices
Analyze to find agents or other elements in a node
Sniffer to distill data from intercepted wireless traffic
Detect Hidden Node
Electronic Warfare + Scan (4) [if you know about where the wireless node is]
Electronic Warfare + Scan (15, combat turn) extended test if location of node is unknown
Disarm Data Bomb (DISARM PROGRAM)
Hacking + Disarm (rating x 2)
Edit (EDIT PROGRAM)
Computer + Edit (difficulty level)
Hack on the fly (EXPLOIT PROGRAM)
Hacking + exploit (firewall, complex action) extended
+3 to threshold for security account
+6 to threshold for admin
Each hack action grants node a free analyze + firewall (hacker's STEALTH) extended test which, upon success triggers an alert
OR ONE CAN DO PROBE HACKING WHICH IS MUCH SAFER
Hacking + Exploit (system+firewall + 3 or +6 [depending on account level], 1 hour) extended test
Then log on action
Then target gets a single analyze + firewall (hacker's STEALTH) test at log on
Cryptanalysis (DECRYPT PROGRAM)
Electronic Warfare + Decrypt (encryption rating x 2, combat turn) extended [runs autonomosly after initiation and does not require further active analysis]
Intercept Traffic (SNIFFER PROGRAM) [must have access to a bottleneck node]
Hacking + SNIFFER
Hits=threshold for others to detect the snooping
TO INSERT FAKE TRAFFIC: Hacking + Sniffer v. Firewall + System
Jam Signals (NO PROGRAM)
Automatically jams signals less than its signal [taking into account target's ECCM]
Log On
No test
Attack
Reboot [must have admin account]
System + Response (10, combat turn) extended
Redirect Trace (SPOOF PROGRAM)
Hacking + Spoof v. Computer + Track
Repair Icon (MEDIC PROGRAM)
Computer + Medic (damage taken x2, complex action ) extended
Run Program [Loads onto ram]
Set Data Bomb
Does rating x 1d6 damage
Spoof (SPOOF PROGRAM) [this is just the illicit version of the command action]
Must be aware of a valid access ID
Hacking + spoof v. system/pilot + firewall
-3 modifier if the command needs a security account
-6 modifier if the command needs an admin account
Trace user (TRACK PROGRAM)
Computer + Track (10, complex action) extended test
Target Stealth is a negative modifier
Redirect increases threshold
Terminate [hacker's] connection [used by IC or defense deckers]
Firewall + System (exploit, combat turn) extended test
Combat
Initiative
Cold Sim -- Initiative = response + intuition and extra initiative pass
Hot Sim -- Initiative = response + intuition +1 and 2 extra initiative passes
Cybercombat + attack program rating v. response + firewall
If black hammer or blackout programs score hit, then target connection is jammed open
May jack out on willpower + biofeedback filter v. IC rating + response
Success still incurs dumpshock
Inflicts rating + net hits damage upon appropriate condition monitor per IC/program type
Resisted with System + Armor test (PERSONA) or willpower + biofeedback filter program (PHYSICAL OR STUN)
Dumpshock [occurs whenever you are forced off]
5S/P for cold/hot sim respectively resisted by willpower + biofeedback filter program



moogoogaipan
I think you just have to jump in and give it a try. As the previous poster seems to articulate, a lot of people (including me) are still afraid of matrix rules even though we all admit that the sr4 rules are more elegant and game centrically thoughtful than ever before. I think its not a prob with the rules though, more just a function of jumping in and getting the feet wet.

I wrote a shorthand outline of the matrix rules that u might find helpful:

MATRIX
Device Attributes
Firewall
System
Signal
Response
Condition Monitor = 8 + (system/2)
Use programs + skills instead of attributes + skills
Actions
Free (all run simply on SYSTEM OS "program" unless otherwise noted)
Alter icon
Change mode of slave
Detect active/passive (not hidden) nodes
Jackout
Switch to AR/VR
Terminate data transfer
Transmit phrase
Simple
Analyze icon (ANALYZE PROGRAM)
Computer + analyze v. ?
Deactivate Program
Decrypt (with key)
Encrypt (ENCRYPT PROGRAM)
Command Slave
Inhabit drone/slave
Log off
Observe in Detail
Transfer Data
Lasts only a combat turn
Complex
Capture wireless signal (SNIFFER PROGRAM)
Control Slave (COMMAND PROGRAM)
Tactile skill + Command program
Crash node (EXPLOIT PROGRAM)
Hacking + Exploit (System + Firewall, Complex Action) extended test
After 1st attack, node gets +4 to Firewall
Crash Program (EXPLOIT PROGRAM)
Hacking + Exploint v. Firewall + System opposed test
Data search
Data search + browse (variable threshold, variable interval)extended test
In lieu of browse, use:
Scan to find associated wireless or wired devices
Analyze to find agents or other elements in a node
Sniffer to distill data from intercepted wireless traffic
Detect Hidden Node
Electronic Warfare + Scan (4) [if you know about where the wireless node is]
Electronic Warfare + Scan (15, combat turn) extended test if location of node is unknown
Disarm Data Bomb (DISARM PROGRAM)
Hacking + Disarm (rating x 2)
Edit (EDIT PROGRAM)
Computer + Edit (difficulty level)
Hack on the fly (EXPLOIT PROGRAM)
Hacking + exploit (firewall, complex action) extended
+3 to threshold for security account
+6 to threshold for admin
Each hack action grants node a free analyze + firewall (hacker's STEALTH) extended test which, upon success triggers an alert
OR ONE CAN DO PROBE HACKING WHICH IS MUCH SAFER
Hacking + Exploit (system+firewall + 3 or +6 [depending on account level], 1 hour) extended test
Then log on action
Then target gets a single analyze + firewall (hacker's STEALTH) test at log on
Cryptanalysis (DECRYPT PROGRAM)
Electronic Warfare + Decrypt (encryption rating x 2, combat turn) extended [runs autonomosly after initiation and does not require further active analysis]
Intercept Traffic (SNIFFER PROGRAM) [must have access to a bottleneck node]
Hacking + SNIFFER
Hits=threshold for others to detect the snooping
TO INSERT FAKE TRAFFIC: Hacking + Sniffer v. Firewall + System
Jam Signals (NO PROGRAM)
Automatically jams signals less than its signal [taking into account target's ECCM]
Log On
No test
Attack
Reboot [must have admin account]
System + Response (10, combat turn) extended
Redirect Trace (SPOOF PROGRAM)
Hacking + Spoof v. Computer + Track
Repair Icon (MEDIC PROGRAM)
Computer + Medic (damage taken x2, complex action ) extended
Run Program [Loads onto ram]
Set Data Bomb
Does rating x 1d6 damage
Spoof (SPOOF PROGRAM) [this is just the illicit version of the command action]
Must be aware of a valid access ID
Hacking + spoof v. system/pilot + firewall
-3 modifier if the command needs a security account
-6 modifier if the command needs an admin account
Trace user (TRACK PROGRAM)
Computer + Track (10, complex action) extended test
Target Stealth is a negative modifier
Redirect increases threshold
Terminate [hacker's] connection [used by IC or defense deckers]
Firewall + System (exploit, combat turn) extended test
Combat
Initiative
Cold Sim -- Initiative = response + intuition and extra initiative pass
Hot Sim -- Initiative = response + intuition +1 and 2 extra initiative passes
Cybercombat + attack program rating v. response + firewall
If black hammer or blackout programs score hit, then target connection is jammed open
May jack out on willpower + biofeedback filter v. IC rating + response
Success still incurs dumpshock
Inflicts rating + net hits damage upon appropriate condition monitor per IC/program type
Resisted with System + Armor test (PERSONA) or willpower + biofeedback filter program (PHYSICAL OR STUN)
Dumpshock [occurs whenever you are forced off]
5S/P for cold/hot sim respectively resisted by willpower + biofeedback filter program



Epicedion
My biggest suggestion would be, like above, sorting out all the separate rules beforehand, by common usage. Make yourself a little data sheet (or 3) on it. Doing this is going to help you out a ton, for information purposes as well as getting a feel for what the hacker's options are. Once it "clicks" with you it'll just seem like a slightly more abstracted version of meatspace gameplay (since concepts of "where" and "how far" and "tactical positioning" don't mean anything on a node).

There are a few general categories of Matrix activity, and you should arrange your thoughts along those lines.

1) Breaking In -- finding the node and getting on the system, analyzing the host and getting your bearings

2) Finding the Target -- you broke in to look for something like a file or a camera or door controls, so now you need to find where that resides on the system

3) Dealing with Threats -- IC, data bombs, encryption, security personnel, all will get in your way

4) Manipulating the Target -- changing the video feed, tapping the comm lines, downloading that file, or whatever else you came in to do

5) Getting Out -- graceful logoff or dumpshock, clean get away or traces


Generally you'll do a little bit of 1 first, followed by a mix of 2, 3, and 4 depending on circumstances. This is where data sheets are important, because to keep things moving you'll want to have the basic rules for each part all together (with page number references for stuff that's rarer / won't fit on your sheet).

A "most basic" sort of matrix incursion will be: break in, find target, disable primary security, manipulate target, deal with security response, get out.
Sengir
DDH #2 has a nice flowchart for hacking a node.
Lionhearted
Wait, SR4 or the Anniversary edition? (SR4A)
If the first, curl up in a ball and cry.
If the second just read the entire chapter and you should have a decent grip.
I
Ryu
Itīs a few years old by now, but the thread in my sig was written for those with SR4-non-A. In both cases, look at Aarons Cheat Sheets.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012