NEWS

[OOC] Missions 2 - Through a Rose colored display link

  • 1104 Replies
  • 260809 Views

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #495 on: <09-02-11/1041:27> »
Hacking + Spoof vs System + Firewall + 4 (active alert)

It's not in the raw, but you'll get a +3 since you got an access_id of Diamond who has a security priviledges on the commlink.
The admin you used on logon is compromised and cannot be used.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #496 on: <09-02-11/1043:58> »
IMO another "explicit" rule :p

OK So forget about Attack, Im loading Spoof instead, IMO Omar knows better than me ;)

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #497 on: <09-02-11/1046:36> »
:) The spoof comand is by raw. It's the bonus that isn't.

Spoof Command (Spoof)
You send a command to a device or agent, pretending it is from an
authorized source. You must have an access ID from which the target
accepts commands (usually by making a Matrix Perception test on the
authorized source or by tracing its icon). To spoof a target, choose
a command (per the Issue Command action, p. 229) and make an
Opposed Test between your Hacking + Spoof and the target’s Pilot
+ Firewall (System + Firewall for peripheral devices); if you succeed,
the target accepts the command as legitimate. Each Spoof Command
action applies only to a single command; multiple commands require
multiple Spoof Command attempts.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #498 on: <09-02-11/1055:54> »
:) The spoof comand is by raw. It's the bonus that isn't.

Spoof Command (Spoof)
You send a command to a device or agent, pretending it is from an
authorized source. You must have an access ID from which the target
accepts commands (usually by making a Matrix Perception test on the
authorized source or by tracing its icon). To spoof a target, choose
a command (per the Issue Command action, p. 229) and make an
Opposed Test between your Hacking + Spoof and the target’s Pilot
+ Firewall (System + Firewall for peripheral devices); if you succeed,
the target accepts the command as legitimate. Each Spoof Command
action applies only to a single command; multiple commands require
multiple Spoof Command attempts.

Oh I know Spoof. It is used mainly when outside the node, commanding target without the need to Hack your way throught Firewall.
What I was talking about was this part of  article:
...Additionally, all privileges involving
the node itself (such as deactivating programs or agents, rebooting,
editing files, etc.) are no longer automatically allowed to the
trespasser, who must either use the Hacking skill to perform such
actions or Spoof a command from a legitimate user that still has
her permissions intact.

IDN what using Hacking skills means?
Spoof is something I understand...Ill spoof node to turn off IC...IMO
Well, since looks like you are the one with the books right now...how one decreases Alert level of the node?

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #499 on: <09-02-11/1102:46> »
The same. It's just different command. Only that IC will start it again next turn. So turning off IC should give you more time, but then a hacker should scramble in next pass. At least that is something you expect.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #500 on: <09-02-11/1111:15> »
Or thinking about it further. No ic wouldnt start it again.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #501 on: <09-02-11/1119:15> »
I was also thinking about Hacking + Sniffer so I can alter outgoing signal to annonce hacker that intruder left the node and everything is OK, but that would be also very complicated. So on my Init phase Ill try to Spoof IC to shutdown, which is Complex action, and that would be all...

Hacking(4)+Spoof(5)+FullVR(2) (11d6.hits(5)=4)

Kouryuu

  • *
  • Prime Runner
  • *****
  • Posts: 2717
  • The idea is to die young as late as possible -A.M.
« Reply #502 on: <09-02-11/1127:01> »
so that would be intimidation and Leadership, a bit of con in the IC
decide what rolls do you want?
Prepare for the worst, hope for the best and expect nothing!
Matrix;speaking;thinking;ExternalSourcesLink
RainDragonBar

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #503 on: <09-02-11/1200:13> »
I was typing fast. I mean that if you had a node and someone hacked his way into. The IC raises alert that you as owner turn off. IC had done its job no need to launch an alert again.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #504 on: <09-02-11/1206:38> »
Kour. Pick any roll you want preferably intimidation.

Snake.  make a roll on logic plus willpower minus 2 plus any number of hits Kour will get.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Kouryuu

  • *
  • Prime Runner
  • *****
  • Posts: 2717
  • The idea is to die young as late as possible -A.M.
« Reply #505 on: <09-02-11/1222:59> »
Intimidation(2)
could have been a better roll, but i hope it will do.
Prepare for the worst, hope for the best and expect nothing!
Matrix;speaking;thinking;ExternalSourcesLink
RainDragonBar

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #506 on: <09-02-11/1243:10> »
I was also thinking about Hacking + Sniffer so I can alter outgoing signal to annonce hacker that intruder left the node and everything is OK, but that would be also very complicated. So on my Init phase Ill try to Spoof IC to shutdown, which is Complex action, and that would be all...

Hacking(4)+Spoof(5)+FullVR(2) (11d6.hits(5)=4)
You forgot the 3 bonus dices 3d6.hits(5)=2 total 6 hits.
System(5) + Firewall(5) + Restricted Alert(4) -> 14d6.hits(5)=5
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #507 on: <09-02-11/1317:54> »
10d6.hits(5)=3, 10d6.hits(5)=4
Tarantula #1 initiative 10 + 3 -> 13
Tarantula #2 initiative 10 + 4 -> 14
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #508 on: <09-02-11/1648:05> »
Ok.
Logic(5)+Willpower(5)-2BTL+2Sam's Intimidate-->10d6.hits(5)=3

Since 3 hits wasn't enough last time I'm guessing I'm still stuck...

Sent: did I read your post right? the junkies are knights with swords in chains or are they knights wearing chain mail armor with swords.

I'll wait for DM to confirm results before I post on the IC thread.

BTW: Mouse had downloaded the full suite for everybody (I just sent it to Omar right away as he really needed it then and there.) I had a question of how many applications he got as the phase "downloaded lots of apps" was a little vague. Mouse also downloaded a pirated hacker's suite rating 4 as well that he sent immediately to Omar due to need. Other than those...it determines how much and what all was available as to what else Mouse would have downloaded.

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #509 on: <09-03-11/0406:40> »
may i suggest edge?


this are chainmails not chains

after that 'downloaded lots of apps' I asked once or twice that you name them :)
hacker suit was specificaly named downloaded and sent to Omar.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry