NEWS

hackers and cybercombat

  • 23 Replies
  • 9637 Views

grumble

  • *
  • Guest
« on: <08-24-12/1726:38> »
a question for the experienced players out there......

Is it a requirement for hackers to be better at the cybercombat skill than most?

i imagine hackers in the game who dont use cybercombat over the other computer skills. maybe have a less than 3 in that skill to start?

UmaroVI

  • *
  • Prime Runner
  • *****
  • Posts: 2655
« Reply #1 on: <08-24-12/1846:53> »
Cybercombat is definitely not required to be a hacker. Not getting caught is more important. The big problems with cybercombat are:

1) Frequently, cybercombat means you lost. If you hack into a system to do something like conceal a break in, and then cyber-punch everyone in the face, it didn't really help.

2) You can't make people fight you. Black IC sadly doesn't work very well, here, because you can always jam yourself offline. And nothing really stops people from AR hacking and thus having no real consequences for losing cybercombat.

3) There are almost always better ways of dealing with opponents, or there are better ways for them to deal with you, such as just kicking people off the system, unloading IC using admin powers, or the like.

4) Agents can do it for you, and probably better than you too because of Cascading.

Point 2 is mitigated, a bit, if you are so rad at cybercombat you can oneshot people, but that's actually very very hard as a hacker. 

Now, it's not true that cybercombat has no uses. But if I had to pick one hacking related skill to not have, it would be cybercombat, no contest.

grumble

  • *
  • Guest
« Reply #2 on: <08-24-12/1919:22> »
thanks for the reply  :)


im sort of building a logic to use skills to replace attacking as much as possible. maybe some defensive programs to say.... assist others in combat.

what is cascading?

UmaroVI

  • *
  • Prime Runner
  • *****
  • Posts: 2655
« Reply #3 on: <08-24-12/2057:23> »
It's an agent autosoft in Unwired.

Kontact

  • *
  • Prime Runner
  • *****
  • Posts: 3147
  • You called?
« Reply #4 on: <08-25-12/2005:03> »
If you've trapped the alert icons and entry ports with Pavlovian databombs to prevent infinite reinforcement syndrome, and have control of the alarms and doors, then (and basically only then,) you can use cybercombat to seal the deal on a computer system.

After all, it's a lot harder lock down a computer system with spiders still inside.  But if you can cut them off and kick them out, then you've got them trapped and trying to scream for help through blast doors.

grumble

  • *
  • Guest
« Reply #5 on: <08-25-12/2118:34> »
interesting vector..... :D

a databomb would lock your icon in the node also, i thought.  but its going to crash eventually......

and ive been looking at ways to interact with nodes without  being present in it.

Dog Boy

  • *
  • Newb
  • *
  • Posts: 53
« Reply #6 on: <08-26-12/0350:30> »
If you've trapped the alert icons and entry ports with Pavlovian databombs to prevent infinite reinforcement syndrome, and have control of the alarms and doors, then (and basically only then,) you can use cybercombat to seal the deal on a computer system.

Wouldn't a defuse program on the part of your adversaries be sufficient to get around this?

It seems like the better solution is to have admin access, and simply ban all access IDs that are not your own from the node. Then, you can either terminate connection, disarm, turn off, or cybercombat any spiders/IC remaining.

It's not clear to me if your ban on all other access IDs would stop a spider (or agent) from Hacking on the Fly to get back in.

Quote
After all, it's a lot harder lock down a computer system with spiders still inside.  But if you can cut them off and kick them out, then you've got them trapped and trying to scream for help through blast doors.

See above, but here's an interesting point: Does a non-pavlov-ed data bomb on a node result in the node crashing if you attempt to enter the node? I assumed so, but that tells you a lot about a node: If it has a non-pavloved-data bomb on it, that's evidence the node is not doing all that much, since the people who own the node don't care if it crashes.

grumble

  • *
  • Guest
« Reply #7 on: <08-26-12/0710:32> »
What is a pavlovian data bomb? i imagine a conditional situation added to a regular data bomb program.

UmaroVI

  • *
  • Prime Runner
  • *****
  • Posts: 2655
« Reply #8 on: <08-26-12/0810:06> »
Well, in fairness, it really just means that the people who own it would rather it crash than be compromised.

RiggerBob

  • *
  • Chummer
  • **
  • Posts: 205
« Reply #9 on: <08-26-12/1628:45> »
What is a pavlovian data bomb? i imagine a conditional situation added to a regular data bomb program.
It's an option for databombs to stay armed when detonating.

grumble

  • *
  • Guest
« Reply #10 on: <08-26-12/1703:08> »
Sounds like a its a self preserving quality of a program.

In the event of a crash and reboot the data the pavlovian databomb is still active?

lurkeroutthere

  • *
  • Omae
  • ***
  • Posts: 483
« Reply #11 on: <08-27-12/1953:03> »
It's not clear to me if your ban on all other access IDs would stop a spider (or agent) from Hacking on the Fly to get back in.

Siimply response is, no you can't because then a lot of things become effectively unhackable if a lot of things become effectively hackable hacking becomes less/non-viable. If hacking is no longer viable it is in a very real way to me, no longer shadowrun. Therefore outside of some very rare and singular situations you can always hack a device on the fly.
"And if the options are "talk to him like a grown up" versus "LOLOLOL murder him in his face until he doesn't come back," I know which suggestion I'm making." - Critias

No team I'm on has ever had a problem with group think.

Dog Boy

  • *
  • Newb
  • *
  • Posts: 53
« Reply #12 on: <08-27-12/2011:12> »
It's not clear to me if your ban on all other access IDs would stop a spider (or agent) from Hacking on the Fly to get back in.

Siimply response is, no you can't because then a lot of things become effectively unhackable if a lot of things become effectively hackable hacking becomes less/non-viable. If hacking is no longer viable it is in a very real way to me, no longer shadowrun. Therefore outside of some very rare and singular situations you can always hack a device on the fly.

I agree in general, but ruling this way would not have that effect -- it would just require a successful check on the relatively trivial spoof-your-access-ID to get back in with your Hack on the Fly.

grumble

  • *
  • Guest
« Reply #13 on: <08-27-12/2032:40> »
the  spoof-your-access-ID  replaces the hack on the fly attempt?
or adds to the pool when making the attempt?

lurkeroutthere

  • *
  • Omae
  • ***
  • Posts: 483
« Reply #14 on: <08-27-12/2053:36> »
Except that spoof only works if you have a valid ID to work from, if there's no way to analyze something to get a valid ID then basically it's a closed system. And closed systems are bad from a gameplay standpoint.
"And if the options are "talk to him like a grown up" versus "LOLOLOL murder him in his face until he doesn't come back," I know which suggestion I'm making." - Critias

No team I'm on has ever had a problem with group think.