Eyeless Blond
Oct 8 2004, 02:09 AM
Or you could just mail it anonymously to Media Technologies's HR department. Since you sent in the evidence first, any subsequent evidence he brings up will look like him trying to pin it on someone else. Kinda like you're doing now.
GlassJaw
Oct 8 2004, 02:37 AM
QUOTE |
Just a few thoughts. |
Wow, cool stuff. I don't think I would have thought of any of those.
QUOTE |
Or you could just mail it anonymously to Media Technologies's HR department |
This is a good idea but I thought of something else.
Could I mass email it to everyone in the company anonymously?
QUOTE |
Alert Status: No Alert
System Alert Level: 0x0eb4 (two points of security tally)
|
Looks like I'm in decent shape. Before I do any mass emailing, I want to finish all the internal stuff. So I need to do some more searching for the promotion list.
First I'm going to swap out Deception and load Browse (let me know if I need some kind of test). I'll then do a Locate File on "promotion". My Browse is 6:
1, 2, 3, 3, 3, 3, 4, 4, 7, 8, 14, 17
I'm guessing 3-4 successes. I'll try the Locate again:
1, 1, 2, 3, 4, 4, 4, 4, 5, 5, 9, 11
That should give 2 more which should add up to 5 total.
Kagetenshi
Oct 8 2004, 02:48 AM
If you ever swap or download something larger than your I/O speed, we'll start talking null ops tests. Until then, it's water under the bridge.
~J
Kagetenshi
Oct 8 2004, 03:11 AM
You have yet to find the file.
[ Spoiler ]
First try host got no successes, so antihero racked up four out of five needed. The second test, though, the host got a brace of successes, bringing the Tally to 4 and cancelling his two successes, keeping the file unfound.
GlassJaw
Oct 8 2004, 03:19 AM
QUOTE |
You have yet to find the file.
|
Ouch, now what's going on? Did I trigger a Probe? I don't think I did before did I? Does the sheaf change?
Does it seem like there isn't anything related to promotions where I'm looking?
Kagetenshi
Oct 8 2004, 03:46 AM
Possible reasons for failure: your TNs are higher than you think they are (pointing to Probe IC), the system got enough successes to cancel yours below 5, or the file is not within your area of search.
~J
GlassJaw
Oct 8 2004, 02:53 PM
Hmm, I don't think I triggered a Probe before. I'll give my Locate one more try...
1, 2, 2, 2, 3, 4, 5, 5, 7, 7, 11, 11
Kagetenshi
Oct 8 2004, 03:11 PM
You find a memo.
QUOTE (George Keegan) |
Due to recent security concerns, the Promotion Computer has been moved to its own separate host. Under no circumstances are employees to enter said host. You will not be warned again. |
The memo is dated a little over a year ago.
[ Spoiler ]
Four successes by Glassjaw and none by the host bring him over the required five, allowing him to find the file. Of course, you can't find things that aren't there…
His security tally is still 4.
GlassJaw
Oct 8 2004, 03:37 PM
QUOTE |
has been moved to its own separate host |
Does this mean its own PTG or just a different area within this one?
Kagetenshi
Oct 8 2004, 03:44 PM
Presumably another host within the PLTG. Having it that separate from this host seems overly paranoid for an otherwise not terribly secure company.
~J
GlassJaw
Oct 8 2004, 04:27 PM
QUOTE |
Presumably another host within the PLTG |
So how do I go about finding it?
Kagetenshi
Oct 8 2004, 04:31 PM
Locate Access Node. Another search-style operation.
Either that or finding info that'll point you right to it.
~J
GlassJaw
Oct 9 2004, 03:51 AM
Whoa, lots going on today: Red Sox, debate. Back now.
QUOTE |
Locate Access Node. Another search-style operation.
|
Gotcha. I'm looking for anything referring to promotions. My Browse is 6:
1, 1, 3, 3, 4, 4, 4, 5, 8, 9, 10, 16
Kagetenshi
Oct 10 2004, 08:09 AM
You do not immediately find the host.
[ Spoiler ]
Three net successes, as one was cancelled by a Host success. Tally is up to five, and IC is right around the corner.
GlassJaw
Oct 10 2004, 02:19 PM
QUOTE |
You do not immediately find the host.
|
Hmm, this seems to be a common theme here.
Locate Access Node is an interrogation so I need 5 successes. If at first you don't succeed....
1, 3, 3, 5, 5, 5, 5, 5, 5, 8, 13, 16
Kagetenshi
Oct 10 2004, 08:07 PM
You find a stock UMS SAN tucked away in the back of the system and covered in warnings. "DO NOT ENTER" and "SAN ENCRYPTED: AUTHORIZED CONNECTIONS ONLY".
[ Spoiler ]
No successes for the Host, not even a six. Tally remains the same, and the net of six successes is more than enough to find the SAN.
Kagetenshi
Oct 10 2004, 08:09 PM
Incidentally, under normal circumstances his TN or required number of successes would probably be higher, as his search terms were fairly general. On the other hand, coming up with a good search string is perhaps a bit beyond the scope of this initial demonstration.
~J
GlassJaw
Oct 10 2004, 10:35 PM
QUOTE |
You find a stock UMS SAN |
n00b alert: Can you give me a brief definition of what this is?
Kagetenshi
Oct 10 2004, 10:46 PM
SAN=System Access Node, a point at which to access a host. UMS I forget the exact expansion of, something like Universal Matrix Symbology. A set of stock icons, whereby triangular prisms are SANs, cubes are datastores, spheres are slave nodes, dodecahedrons are SPUs or CPUs, etc. etc. etc. They're what you get if you don't spend the money or effort on a sculpted system.
It's usually a sign that the host is not meant to be human-inhabited or the attentions of those running it are turned to things other than human interfaces. Consider it similar to having an open directory over http with files instead of a web page.
~J
GlassJaw
Oct 11 2004, 12:45 PM
QUOTE |
UMS I forget the exact expansion of, something like Universal Matrix Symbology |
Ok, gotcha. I read a little about UMS in Target: Matrix last night. So basically this system connects to another SAN that looks more "generic" than the rest of the host does. Does this SAN have it's own LTG#? Is it directly connected to the LTG or is it just another layer of the corp host? (I'm just wondering a bit about Matrix topography in general)
Can do an Analyze Host or Analyze Subsystem on it to get any additional info? What do I have to do to gain access into this SAN?
Kagetenshi
Oct 12 2004, 12:48 AM
It's a second-tier host. Refer to the host arrangement diagrams in SR3 for example drawings of Tiered Host layouts. You can log directly on, but it requires a Logon to Host operation and you can't Analyze Host until you're on, as usual.
~J
Sepherim
Oct 12 2004, 02:33 AM
If you want information exposed, you have another two options, though they rely on your contacts.
-If you really want the information to be found and it's juicy, you might earn some extra cred by sending it to a Media Corp so it publishes on the Afternoon Bulletin. This way, the corp will have to react and probably fire the "problematic" man, thus leaving your Johnson free and with a possible new job.
-Second, you can send it to Shadowland. Information is usually found here, even for corps, and you might earn some favors this way (at least, you pay your upkeep with this contact). Reactions to it will probably be less open, but probably useful too.
Both of this options are only usefull if the information incriminates the worker but doesn't really damage the corp. If not, your employer might not pay you, since you made his job danger.
Anyway, I must say this thread is being quite helpfull, but it'd win a lot if you both added the background descriptions of actions and places. If not, the Matrix becomes a bit "cold" and looses much of what makes it so appealing.
Well, that's just my 0.2 €. Keep up the good work!
Kagetenshi
Oct 12 2004, 02:50 AM
I've been considering it, but I've been going light on that since the prime focus of the thread is the rules. I'll try to spice it up a little more here and there, though.
~J
GlassJaw
Oct 12 2004, 03:21 PM
Hey guys, sorry it's taken me so long. I need to read over the past couple of posts and figure out what I want to do. Stay tuned!
GlassJaw
Oct 12 2004, 04:53 PM
QUOTE |
if you both added the background descriptions of actions and places. If not, the Matrix becomes a bit "cold" and looses much of what makes it so appealing.
|
QUOTE |
It's a second-tier host. Refer to the host arrangement diagrams in SR3 for example drawings of Tiered Host layouts |
Ok, cool. That helps. That's one of the reasons why I was asking so many questions. I was having trouble "visualizing" what was actually happening.
First off, I want to find that promotion database. Is there anyway to get info about the host before entering (aside from Analyze Host)? Is there any general description of it in the top host?
Either way, I'll try to Logon. With his gloves tied by his side and white robe hanging loosely over his shoulders, GlassJaw will do a light jog up to the door and try to puch them open...
Deception 6: 1, 2, 2, 2, 3, 3, 4, 5, 7, 9, 10, 16
Kagetenshi
Oct 12 2004, 05:04 PM
Sometimes there are descriptive materials about a given host outside of it. The "Do not enter" signs are examples of such. For anything more informing, you're going to have to search.
Oh, it also mentions that the SAN is encrypted. Should I take that last roll as a Decrypt SAN test instead of Logon?
~J
GlassJaw
Oct 12 2004, 05:48 PM
QUOTE |
Should I take that last roll as a Decrypt SAN test instead of Logon?
|
Sounds good! My Decryt is 6.
Kagetenshi
Oct 12 2004, 06:01 PM
The IC shimmers as the bits fall into place. Eventually the inner portion of the SAN resolves to a wall of zeroes. A small green light shines at one end.
[ Spoiler ]
To be added once I double-check something in the rules
GlassJaw
Oct 15 2004, 12:40 PM
Ok, I'm back. Sorry for the delay.
QUOTE |
The IC shimmers as the bits fall into place. Eventually the inner portion of the SAN resolves to a wall of zeroes. A small green light shines at one end.
|
Ok, does this mean I got into the host? So it doesn't really have a sculpted architecture right? First thing is I'll do an Analyze Host.
Analyze 6 - 1, 1, 2, 2, 3, 3, 4, 5, 5, 8, 8, 10
Kagetenshi
Oct 15 2004, 04:45 PM
Sorry if I've been unclear. The SAN was protected by Scramble IC, which meant you had to either crash the IC or decrypt it before you could try to access it (unless you had the proper passwords, etc. beforehand, but you didn't).
~J
Kagetenshi
Oct 19 2004, 12:43 AM
Are you changing that to a Logon to Host operation?
~J
GlassJaw
Oct 19 2004, 12:15 PM
QUOTE |
Are you changing that to a Logon to Host operation?
|
Oh yeah, I just decrypted it right? Now I have to logon. Rock on.
Kagetenshi
Oct 22 2004, 04:21 PM
The inside of the triangle slides backwards slightly, then splits out of the way. You have been granted access to the system.
[ Spoiler ]
Three successes on the test, and the host rolled badly. Our hero brings his tally onto the next host, but since the host has a different security sheaf some IC wakes up immediately, reactive IC at that. Hopefully he'll find it soon.
Incidentally, I apologize but I forgot what I was looking up last spoiler. His security tally is still 5.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please
click here.