Back to the main page

Mailing List Logs for ShadowRN

From: "Gurth" <gurth@******.nl>
Subject: Re: Security Systems Additions
Date: Thu, 6 Jun 1996 11:26:13 +0100
dhinkley@***.org said on 0:12/ 6 Jun 96...

> How do wee designate type faces, special characters, and the like that
> is not available in the ASCII character set? Or would you like a finished
> version (with all changes) sent to you as a file?

I intend to use the Francis.ttf font (available from Paolo's page) for
the main text, and a font called Avantgarde BK for the decker comments.
Apart from that, if you want special fonts used, I think you should
indicate so in the text by adding a note (which I will delete -- it's a
bit silly to have an article in which it says "The next paragraph should
be in a bold 12 pt Arial font." :)
Special characters are a bit harder. Use Y for nuyen (I'll replace it by
the yen symbol), but for any other special characters you'll have to make
clear to me what you mean.

If you've got a finished version in some or another word processor format
(except for WP 6), you can email it to me so I can load it into Word
directly. Remember to post a text version on the list here as well, so
everbody can see your submission, and don't send anything to me directly
until you've finished the article completely.

> All That is Old is Not Obsolete
[snip]
> Electronic locking systems come in two major types, those that use a
> electronically controlled solenoid to operate a mechanical bolt and those that
> use electromagnetic force to secure a door. Either type can be controlled either
> from a remote location or at the door's location. Keypads, Mag-Locks and Pass
> Cards are commonly used to provide local control.
>
> >>>>>[Electromagnetic force...how effective can that be, especially
when the
> power goes off]<<<<<
> -- Boomer
>
> >>>>>[Very effective, I have seen a door that was blown open with
explosives and
> the electromagnetic lock was still functioning, the battery back up worked that
> well]<<<<<
> -- Shadowrider

Maybe you could add that there's another way for electromagnetic locks to
work: let a spring automatically close the lock as soon as the magnet
stops working, or have gravity-operated pins fall into the both top of the
door and into the floor. Cut off the power, and the lock slams shut.

> Possibly the most secure and flexible access control system for small to
> medium sized companies is the Card Access System. Systems use a credit card
> sized plastic card encoded with a discrete identification code. This code
> consists of two parts an installation or facility code common to all cards for
> that particular plant or facility and a individual number unique to that
> particular card. Normally this coding is magnetic in nature but in some cases
> bar-code technology is also used.

Or it culd be a chip embedded in the card. Phone cards use that today, so
access cards (no, not the credit card of that name :) could just as
easily.

> ================
> GAMEMASTER INFORMATION
> ================

Add that all these skills are Special Skills. It's quite obvious, but
maybe not obvious enough.

> [This skill is located on the Skill Web off the main Quickness stem separated by
> 2 circles from the main stem.]

Maybe you could better say that "A character may substitute his Quickness
for this skill, but must add a +4 modifier to all target numbers."

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html
We want to see you lead a normal life.
-> NERPS Project Leader & Unofficial Shadowrun Guru <-
-> The Character Mortuary: http://huizen.dds.nl/~mortuary/mortuary.html <-

-----BEGIN GEEK CODE BLOCK-----
Version 3.1:
GAT/! d-(dpu) s:- !a>? C+(++)@ U P L E? W(++) N o? K- w+ O V? PS+ PE
Y PGP- t(+) 5+ X++ R+++>$ tv+(++) b++@ DI? D+ G(++) e h! !r(---) y?
------END GEEK CODE BLOCK------

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.