There is Example Confusion going on here or some kind of other confusion. If we are talking about being in direct wireless Signal range of a Node that can be used to deactivate a camera or unlock a door, then that is an Electronic Warfare + Scan Test.
But if we're talking about remotely accessing something through the Matrix, then finding it is a Data Search + Browse Extended test, right? That's how it's been written in almost everything I've read, most recently Knasser's Matrix examples.
If the run is a simple digital data steal than the latter seems more likely.
The Matrix has three topologies, and they are very different, and they interact in bizarre and frankly stupid ways. Nodes have physical presences and they interact directly with things that are in handshake distance of themselves. Access IDs also send hand packets to each other through an indeterminate number of intermediaries via the Matrix. And finally, there are actual icons who are supposed to do Tron-style cybercombat with each other. These three things
do not share one to one to one correspondence with each other.
If you were trying to do the data steal
over the Matrix, then there would be a completely different set of rules being interacted with. Most importantly, you'd be interacting with Dropout. Because in order to do
anything at all to a Matrix Access ID, you need to know its Matrix Access ID. And the only way to get that with your actual abilities is to use Analyze from inside a node it occupies. Which is topologically impossible, since you need the access ID to get into the node in the first place. So anything that isn't listed in the phone book is
by definition unhackable by that method. Which is why we were talking about hacking a node within LOS instead.
Haven't looked at any footnotes yet, but this is mostly in line with how I've been playing. However, I don't read Account Access Level as just a toggle, but rather that there are different actions which require different permissions.
It
is just a toggle, because the permissions granted to any account can be anything at all. So if you decide you wanted to make things more difficult, you could just set the normal things you could do with a security account to be permissions for admin accounts only. If you wanted it to be easier, you could give out the admin permissions for normal accounts. You can even contingently add or remove any permissions you want, such as yanking someone's file edit permissions if they set off an alert (Unwired, p. 67). Which means that
yes, you can revoke
all of someone's permissions without rolling dice if they aren't really you by using any of a number of completely arbitrary shiboleths that there are no counters to amongst the hacking programs.
Again, Hack-on-the-Fly seems more likely to follow EW + S can and Probe-The-Target seems more likely to follow DS + Browse.
Hack on the Fly and Probe the Target actions are distinct actions that you choose to take if and only if you have located a node that you wish to hack into. It is
completely unrelated to how you wen about finding the node. There really isn't some sort of "flow" where actions "make sense" - there is just an arbitrary set of reasons you can't download the file you want and
some of the available reasons have program related actions that you can take to bypass them. Seriously, that's it.
As you'll notice, I backed up a step...isn't the ENTIRE POINT of hacking (i.e. rolling Hacking + Exploit) that you do not HAVE a valid access ID and are instead hacking in?
There's the rub. Exploit is for when you don't have a valid
password, you still need a valid
access ID if the node is set up that way. Let's go to page 101 of Unwired:
Unwired, page 101 wrote:A hacker can also instruct the node to block future access connection requests from a particular node or access ID (or a range of nodes/access IDs), locking the target out.
So any node can be set to
automatically reject any arbitrarily defined range of Access IDs. Including the range of "all numbers higher and lower than 194583269085485934509305". So if you don't have a valid Access ID (or a spoofed copy of a valid Access ID), your exploits can be rejected without rolling dice. And unfortunately, to spoof a specific Access ID,
you have to analyze the icon in question!
Where is this written? In fact where is it written that an Alert is something that can happen multiple times to any meaningful effect?
I thought systems had two possible statuses, either Not On Alert or On Alert.
Alerts can and do progress. After 1 Alert, X happens, after 2 Alerts, Y happens. The "final" Alert reboots the system (SR4a, p. 238). Which means that Denial of Service Attacks
totally win since all you have to do to trigger an alert
on purpose is to
request something illegitimate while you aren't running any Stealth.
Where is this written? In fact where is it written that an Alert is something that can happen multiple times to any meaningful effect?
I thought systems had two possible statuses, either Not On Alert or On Alert.
I already gave you the page reference and indeed the
exact quote on the other thread. But here it is again:
SR4A, page 228 wrote:If you wish to specifically examine an ARO, users, programs, IC, nodes, files, etc., take a Simple Action to Analyze Icon/Node (p. 229). Make a Matrix Perception test using your Computer + Analyze program (rather than Perception + Intuition). Your hits determine how successful the examination is. For each hit scored, you can ask for one piece of information about the object—this could be type, rating, alert status, or any other pertinent information; a list of possible details you could gather from a Matrix Perception test can be found in the Matrix Perception Data sidebar.
Read that quote. Read it
nine times. It's very clear.
You choose
one icon to analyze, and then you spend a Simple Action analyzing that
one icon. And then you are given the vital information of its "type". As in, seriously whether it is Persona, or an active Armor Program, or an active Virtual Pet, or a data folder, or a simple ARO. That's what it costs (one simple action) and what it gives you (whether the
single icon you selected is a hacker or not).
Anyway if you can prove that this is RAW to my satisfaction, I have identified one "house rule" I have been using, which is that Data Search + Browse can help you find something you're looking for on a given node (which seems well supported by RAW).
Data Search + Browse will tell you where the purple elephant is. But it won't tell you whether the purple elephant is a graphical representation of a data folder or a hostile hacker. It just tells you that the node includes "Purple.Elephant2875". If your enemies weren't polite enough to actually name their world conquest plans "world-conquest.xml" or their security spider "security-spider.usr" then the list you get simply gives you a list of icons that you can
start analyzing. At the rate of one icon per simple action. And remember, a Hacker running 5 programs is
six icons just to start off with. His persona is an icon, and each of the running programs is
also an icon. If he is running between 1 and infinity unrated programs, he has that many more icons on top of that.
This is important, Frank, only because it demonstrates that you have made a factual error. If you have made this one factual error, it stands to reason you could potentially have made many others.
Get the fuck off your high horse, asshat. Yes, I made a factual error in reporting the maximum possible number being 14, when it is really 22. And no, this doesn't functionally change that analysis. There are spelling and grammatical errors all over that document to boot. And no, that doesn't change the analysis either. As a mediocre hacker, you can still spend a few hours probing Red Pagoda and log in with a vanishingly small chance of setting off any alerts. If hacking wasn't impossible for other reasons, it would be essentially too easy.
I am not infallible and don't claim to be. The fact that I have
ever made mistakes on completely inconsequential matters does not indicate that any particular pronouncement has errors in it.
Where is this supported in the rules?
Where is spoofing commands to agents supported in the rules? You... you're kidding right? That's the
normal use of Spoof.
SR4a, page 232 wrote:You send a command to a device or agent, pretending it is from an authorized source.
I genuinely don't get what you are asking for here. IC are agents. Sending them fake commands is what the "Spoof Command" action does. The command to "stand down" or "fuck off" is an available option, so taking the Spoof Command action against IC is much much more efficient than actually fighting them. It's not efficient
enough to fight a Hackastack delivered Agent Smith army of say,
forty eight Agents. But for one on one, it'll do.
-Username17