NEWS

[OOC] Messy Biz - Chapter 2.

  • 777 Replies
  • 191360 Views

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #405 on: <11-26-11/0837:33> »
Make the essay about 2070 society and technology?

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #406 on: <11-26-11/0956:13> »
Nope 20th century only

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #407 on: <12-02-11/1848:13> »
Sorry, kind of late here, was just checking in.
"begins telling his female companion not to worry, his 'link has a security contract from the ISP."
That female companion being Silk or someone still sitting at the table?

Kouryuu

  • *
  • Prime Runner
  • *****
  • Posts: 2717
  • The idea is to die young as late as possible -A.M.
« Reply #408 on: <12-02-11/1926:52> »
Sorry, kind of late here, was just checking in.
"begins telling his female companion not to worry, his 'link has a security contract from the ISP."
That female companion being Silk or someone still sitting at the table?
i understood other table the one with those too perfect features.  ;D
Prepare for the worst, hope for the best and expect nothing!
Matrix;speaking;thinking;ExternalSourcesLink
RainDragonBar

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #409 on: <12-03-11/0352:35> »
Ah, yeah, sorry. Had some sleep, I get it now. Not even our table.

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #410 on: <12-03-11/0800:13> »
Silk just continues chatting with the man. Don't think all that much time has passed since she got at his table...
Can I try rolling later for an interrogation check or something? The Con-check was to keep my cover... or also the only roll to get info from him?

Larzarus

  • *
  • Omae
  • ***
  • Posts: 801
« Reply #411 on: <12-03-11/1303:13> »
The porgrams and their options, Space is running right now:

5 slots, each with ergonomics
Stealth 6 with Optimized3 and Crashguard
Armor 5
Biofeedbackfilter 5
Analys 6 with Optimized3
and Exploit 6 with Optimized3 and Mute

5 slots without ergonomics
Scan 5
Attack 6 with Optimized3, Area and Targeting
Edit 5
Browse 6 with Optimized 3)
1 open slot


Chrona: Can Space use Area and Targeting with the same matrix attack? I don't think so, since Targeting exploits an icon specific weakness to increas the damage.

Kontact

  • *
  • Prime Runner
  • *****
  • Posts: 3147
  • You called?
« Reply #412 on: <12-03-11/1532:38> »
Confused as to why Kitten would be following a child's aura when she's looking for the aura of a young dwarf woman.  She doesn't even know that LJ is awakened, much less that LJ is capable of masking.

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #413 on: <12-04-11/1709:47> »
Confused as to why Kitten would be following a child's aura when she's looking for the aura of a young dwarf woman.  She doesn't even know that LJ is awakened, much less that LJ is capable of masking.

That was with normal vision, just fluff

Also can the stealth program be used for defence?

You can use area or target as you thought.

Silk can try interrogating with negotiate if you have a specific goal (bog info etc)
« Last Edit: <12-04-11/1721:00> by Chrona »

Larzarus

  • *
  • Omae
  • ***
  • Posts: 801
« Reply #414 on: <12-04-11/1811:21> »
Also can the stealth program be used for defence?

Quote from: MATRIX COMBAT SUMMARY (from the Corerule Book, page 232)
Attack:
    Persona: Cybercombat + attack program
    Agent, IC, sprite: Rating + attack program
Defense: Response + Stealth
    Full Defense: + Hacking (persona) or rating (agents, IC, sprites)
Damage boxes inflited: Attack program + net hits
Damage Resistance: 
 Attack: System + Armor, hits reduce damage
 Blackout/Black Hammer: Willpower + Biofeedback Filter, hits reduce damage
Based on the Unwired, the three Musketeer IC only hace tracker and 2xattack loaded into them and no other programs like Stealth or Armor

Quote from: Tracking (from Corerule Book, page 219f.
Make an Extended Computer + Track Test (10, 1 Initiative
Pass), applying modifiers from the Track Modifiers Table (p.
220). If the target performs a Redirect action (p. 224), add the
hits from this action to the threshold. If the target is running a
Stealth program, apply it as a dice pool modifier.

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #415 on: <12-05-11/0337:11> »
No I mean the fact you're rolling stealth for defence

Larzarus

  • *
  • Omae
  • ***
  • Posts: 801
« Reply #416 on: <12-05-11/1131:36> »
For defence, you roll Response and Stealth.

Rollplay-Argumentation: Stealth is a program to hide someones icon from other matrix units. Hence, it is harder to see and therefore hit him. For example by changing the port adress, making copies from oneself as decoys, appear as data files, etc. Response indicates how fast someone can find new hiddeouts/change the appearance. The other icon constantly looks for and finds the hacker, therefore the hacker then has to find a new hiddeout or change his appearance.

farothel

  • *
  • Prime Runner
  • *****
  • Posts: 3859
« Reply #417 on: <12-05-11/1245:57> »
Confused as to why Kitten would be following a child's aura when she's looking for the aura of a young dwarf woman.  She doesn't even know that LJ is awakened, much less that LJ is capable of masking.

That was with normal vision, just fluff

Anything on my assensing of those Japanese?
"Magic can turn a frog into a prince. Science can turn a frog into a Ph.D. and you still have the frog you started with." Terry Pratchett
"I will not yield to evil, unless she's cute"

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #418 on: <12-05-11/1932:49> »
Will post IC ASAP.
We now reach the time of final deadlines.

Also due to the monetary and housing problems I've mentioned briefly before, I'll have no internet access between the 18th and sometime in January >.< Sorry that the gme will be on hold again... it's gonna suck.

Kontact

  • *
  • Prime Runner
  • *****
  • Posts: 3147
  • You called?
« Reply #419 on: <12-05-11/2020:15> »
For defence, you roll Response and Stealth.

Rollplay-Argumentation: Stealth is a program to hide someones icon from other matrix units. Hence, it is harder to see and therefore hit him. For example by changing the port adress, making copies from oneself as decoys, appear as data files, etc. Response indicates how fast someone can find new hiddeouts/change the appearance. The other icon constantly looks for and finds the hacker, therefore the hacker then has to find a new hiddeout or change his appearance.

You roll response + firewall for passive dodge or response + firewall + hacking if you go full dodge.

 

SMF spam blocked by CleanTalk