Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: Stefan Struck <struck@******.informatik.uni-bonn.de>
Subject: Hacker House Access?
Date: Thu, 11 Jan 1996 10:27:20 +0100 (MET)
Hello and a good morning to everybody,

After reading the lots of tables in the back of VR2.0 I found the
"Hacker House Access Table". Would someone please explain it's use
to me? It goes something like
Base Band Wide Cost Availability (or something like that)

What is it good for?
Thank you, thank you, thank you in advance
bye,
Stefan
--------------------------------------------------------------------------
e-mail: struck@****.informatik.uni-bonn.de
--------------------------------------------------------------------------
...but there's nothing like having your friends show up with lots of guns.
-Frank Miller, The Big Fat Kill
--------------------------------------------------------------------------
Message no. 2
From: "Gurth" <gurth@******.nl>
Subject: Re: Hacker House Access?
Date: Thu, 11 Jan 1996 11:23:03 +0100
Stefan Struck said on 11 Jan 96...

> After reading the lots of tables in the back of VR2.0 I found the
> "Hacker House Access Table". Would someone please explain it's use
> to me? It goes something like
> Base Band Wide Cost Availability (or something like that)
>
> What is it good for?

I think it's for seeing whether you can locate Hacker House (from one of
the source material sections) or not. The more bandwidth you want for your
connection, the more you pay and the longer it takes to locate their
current host.

Or something :)

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html
They will call us fools in days to come. What's changed?
-> NERPS Project Leader & Unofficial Shadowrun Guru <-
-> The Character Mortuary: http://huizen.dds.nl/~mortuary/mortuary.html <-

-----BEGIN GEEK CODE BLOCK-----
Version 3.1:
GAT/! d-(dpu) s:- !a>? C+(++)@ U P L E? W(++) N o? K- w+ O V? PS+ PE
Y PGP- t(+) 5+ X++ R+++>$ tv+(++) b+@ DI? D+ G(++) e h! !r(----) y?
------END GEEK CODE BLOCK------

Further Reading

If you enjoyed reading about Hacker House Access?, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.