Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: elventear@***********.net.pe (Pepe Barbe)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 11:10:44 -0500
Hi,

I have the following questions about the matrix:

- Are there any rules for creating hosts? What if a player wants a host of
his own?
- Can Decks we hacked? When a decker's icon is online, can other decker
hack his deck to see whatever info he has in active/storage memory? What
would be the ACIFs for the deck?

Thanks,
Pepe
Message no. 2
From: Gurth@******.nl (Gurth)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 19:18:59 +0100
According to Pepe Barbe, on Mon, 25 Nov 2002 the word on the street was...

> - Are there any rules for creating hosts? What if a player wants a host
> of his own?

No official ones. I wrote up some that, at one point, seemed likely to end
up in Matrix, but they were dropped. They'd need to be re-written to work
with the Matrix deck construction rules, too.

> - Can Decks we hacked? When a decker's icon is online, can other decker
> hack his deck to see whatever info he has in active/storage memory? What
> would be the ACIFs for the deck?

Funny you mention that, because that formed another part of my Matrix
submission... If you want, I can dig it up and post this bit.

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html
I know all this and more
-> Probably NAGEE Editor * ShadowRN GridSec * Triangle Virtuoso <-
-> The Plastic Warriors Page: http://plastic.dumpshock.com <-

GC3.12: GAT/! d- s:- !a>? C++(---) UL+ P(+) L++ E W--(++) N o? K w(--)
O V? PS+ PE@ Y PGP- t- 5++ X(+) R+++$ tv+(++) b++@ DI- D+ G+ e h! !r y?
Incubated into the First Church of the Sqooshy Ball, 21-05-1998
Message no. 3
From: datwinkdaddy@*******.com (Da Twink Daddy)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 14:44:35 -0600
----- Original Message -----
From: "Gurth" <Gurth@******.nl>

> > - Are there any rules for creating hosts?

> No official ones. I wrote up some that, at one point, seemed likely
to end
> up in Matrix, but they were dropped. They'd need to be re-written to
work
> with the Matrix deck construction rules, too.

> > - Can Decks be hacked?

> Funny you mention that, because that formed another part of my
Matrix
> submission... If you want, I can dig it up and post this bit.

I'd love to see both of these documents.

Da Twink Daddy
datwinkdaddy@*******.com
ICQ# 514984
Message no. 4
From: Tobias.D@********.de (Burning Avatar)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 22:05:19 +0100
On Mon, 25 Nov 2002 11:10:44 -0500 Pepe Barbe wrote:

> Hi,
>
> I have the following questions about the matrix:
>
> - Are there any rules for creating hosts? What if a player wants a
> host of his own?

They go to some provider and rent some matrix-space, I would say.
Perhaps some accounts give you some free space. Security measures would
be server-side, but the player could install some scramble "IC" for
value data. I don't think that personal homepages will disappear in
2060.

> - Can Decks we hacked? When a decker's icon is online, can other
> decker hack his deck to see whatever info he has in active/storage
> memory? What would be the ACIFs for the deck?

I would say definitively, but I wasn't yet in a situation to come up
with some rules. -- Gurth, could you pass me a copy of your work?

> Thanks,
> Pepe

hope it helps
Burning Avatar

--
im minnfuin a ongalad
BA's Data Haven: http://home.t-online.de/home/tobias.d/shadowrun

GCC0.3: y80.de[B] G92 SCP/F:@@[SR] B+ f RR rm++ rr++ l? m+ w=
S+:= GM+(*):+(++):++ h+ p* LA- mf--- W- C-- CG+ OG+ F+ c- K?

-----BEGIN GEEK CODE BLOCK-----
Version: 3.2
GU d- s+: a-- C++ UL P L++ E- W+(++) N- o? K- w O- M? V? PS+ PE(-)
Y+ PGP+>++ t++ 5++ X+(++) R+(++) tv(+) b@>++ DI? D+ G e-- h! !r y?
------END OF GEEK CODE------
Message no. 5
From: loneeagle@********.co.uk (Lone Eagle)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 22:34:32 +0000
At 10:05 PM 25/11/2002 +0100, Burning Avatar wrote:
> > - Are there any rules for creating hosts? What if a player wants a
> > host of his own?
>
>They go to some provider and rent some matrix-space, I would say.
>Perhaps some accounts give you some free space. Security measures would
>be server-side, but the player could install some scramble "IC" for
>value data. I don't think that personal homepages will disappear in
>2060.

There are also some rules around for mainframe computers, Gurth assembled
the collected house rules of no end of list members a long while ago. He
has them in RTF on Plastic Warriors IIRC. but be warned, Mainframe systems
aren't cheap in the slightest and you're better off going to your MSP and
paying them a little each year to use their servers.


--
Lone Eagle
"Hold up lads, I got an idea."

www.wyrmtalk.co.uk - Please be patient, this site is under construction

-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GE d++(---) s++: a->? C++(+) US++ P! L E? W++ N o? K? w+ O! M- V? PS+ PE-()
Y PGP? t+@ 5++ X- R+>+++$>* tv b+++ DI++++ D+ G++ e+ h r* y+>+++++
-----END GEEK CODE BLOCK-----

GCC0.2: y75>?.uk[NN] G87 S@:@@[SR] B+++ f+ RM(RR) rm++ rr++ l++(--) m- w
s+(+++) GM+++(-) A GS+(-) h++ LA+++ CG--- F c+

"Yes Kate, I want you to become a prostitute."
Blackadder II (Bells)
Message no. 6
From: loneeagle@********.co.uk (Lone Eagle)
Subject: Hosts, decks, the Matrix
Date: Tue, 26 Nov 2002 00:09:39 +0000
At 07:18 PM 25/11/2002 +0100, Gurth wrote:
> > - Can Decks we hacked? When a decker's icon is online, can other decker
> > hack his deck to see whatever info he has in active/storage memory? What
> > would be the ACIFs for the deck?
>
>Funny you mention that, because that formed another part of my Matrix
>submission... If you want, I can dig it up and post this bit.

I'd definitely like to see those, whatsisnames children (babies?) might
make good use of that, as might the stronger of Deus's Whites.


--
Lone Eagle
Evil? I'm working on it...

www.wyrmtalk.co.uk - Please be patient, this site is under construction

-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GE d++(---) s++: a->? C++(+) US++ P! L E? W++ N o? K? w+ O! M- V? PS+ PE-()
Y PGP? t+@ 5++ X- R+>+++$>* tv b+++ DI++++ D+ G++ e+ h r* y+>+++++
-----END GEEK CODE BLOCK-----

GCC0.2: y75>?.uk[NN] G87 S@:@@[SR] B+++ f+ RM(RR) rm++ rr++ l++(--) m- w
s+(+++) GM+++(-) A GS+(-) h++ LA+++ CG--- F c+

"And in Genua 'tis now the fashion to pin a live frog to the shoulder
braid, stand on a bucket and go bibble at passers-by."
Blackadder II (Head)
Message no. 7
From: elventear@***********.net.pe (Pepe Barbe)
Subject: Hosts, decks, the Matrix
Date: Mon, 25 Nov 2002 22:18:39 -0500
At 01:18 p.m. 25/11/2002, Gurth you wrote:
<snip>
>Funny you mention that, because that formed another part of my Matrix
>submission... If you want, I can dig it up and post this bit.

Well, this question arose because one of my players asked me if decks could
be configured to work as hosts and, therefore, be hacked. I think they can,
and created some rules about it, but haven't tested them yet.

I would love to see whatever you have about this two issues.

Thanks,
Pepe
Message no. 8
From: Gurth@******.nl (Gurth)
Subject: Hosts, decks, the Matrix
Date: Tue, 26 Nov 2002 11:34:30 +0100
According to Pepe Barbe, on Tue, 26 Nov 2002 the word on the street was...

> I would love to see whatever you have about this two issues.

Here's what I have, after a small amount of re-assembly and minor editing.
Keep in mind that all of this is basically written for VR 2.0, so to make
sense of much of the host construction rules you'll have to refer to that
book rather than Matrix.


CYBERDECKS AS HOSTS

Although not often done, it is possible to enter another decker's cyberdeck
as if it were a host. This is in part because deckers who regularly invade
other deckers' cyberdecks tend to get a bad reputation on the street.
System Ratings
Like normal hosts, cyberdecks have system ratings. However, they are a bit
simpler than those of other hosts. The formulas below show how to calculate
the system ratings.

Security Code: The decker can decide whether the deck is Blue, Green,
Orange, or Red security; UV decks do not exist as far as is known. The
choice is limited by the MPCP of the deck, however: MPCP-1 or -2 decks can
only be Blue; MPCP-3 or -4 decks can be Blue or Green; MPCP-4 or -5 decks
can be Blue, Green, or Orange; and MPCP-7 or higher decks can be any color
except ultra-violet.
Security Rating: MPCP / 2 (round up)
Access: MPCP + Evasion + Masking
Control: MPCP + Bod
Index: MPCP
Files: MPCP
Slave: MPCP

A deck with an MPCP of 7, a security code set to Orange, Bod-5, Evasion-5
and Masking-4 has the following ratings: Orange-4/16/12/7/7/7.

Changes to the MPCP or persona program ratings (for example, through damage
by Blaster IC or by running the deck in a particular mode, as per Virtual
Realities 2.0 p. 77) are instantly reflected in the deck's system ratings.
If the sample deck were to have its MPCP reduced to 5, it would immediately
become an Orange-3/14/10/5/5/5 "host," for example, while running the deck
(at its normal MPCP of 7) in Bod-mode makes it an Orange-5/12/15/7/7/7
host. If the MPCP drops to a value that doesn't allow the current security
code, the code drops to the highest allowed value. For example, a Red-7
deck that has its MCPP reduced to 3 would become a Green-3 deck.
Note that legal cyberdecks do not usually have Evasion, and hardly ever
come equipped with Masking, which makes them much simpler to invade than
decks used by security, shadowrunner, or criminal deckers.
System Operations
Not all system operations can be performed on a cyberdeck. Following is a
list of the operations that are either impossible or work differently on a
cyberdeck than on a host.
Control Slave, Decrypt Slave, Edit Slave, Locate Slave, Monitor Slave: Only
if the cyberdeck is hooked up to some external device can these operations
be performed. A vidscreen counts as a Slave subsystem, but the decker's
ASIST interface or a hitcher jack does not-intruders can show things on the
deck's vidscreen for example, but cannot send messages straight to the
decker.
Crash Application: Any program loaded into the deck's active memory, except
for IC (see below), can be crashed with this operation, but the decker him-
or herself cannot be affected.
Crash Host: This crashes the cyberdeck, and follows the normal rules for
this operation. However, in addition to IC, all the decker's active utility
programs also have their ratings reduced by 2 while the deck is shutting
down.
Invalidate Passcode: The decker owning the cyberdeck cannot have his or her
passcode invalidated, effectively making this operation meaningless unless
the decker has set up passcodes for his or her friends.
Locate Access Node: Impossible on a cyberdeck itself, but if someone wants
to find the deck (in order to then deck into it, for example), this system
operation must be used in the LTG or host to which the deck is connected.
This test has a penalty equal to the deck's Masking rating applied to it,
because illegal cyberdecks are difficult to find. For example, finding a
deck with Masking 6 on an LTG with Index 8 requires a test with target
number of 8 + 6 = 14. Also, this operation must be repeated every time a
decker wants to find someone else's cyberdeck, even if it is plugged into
the exact same jackpoint as last time it was located.
Validate Passcode: This allows the intruder to set up a passcode by which
entry into the cyberdeck will be easier in future. The gamemaster should
allow the deck's user an Intelligence test against a target number of 3 to
detect the passcode any time he or she takes a look at the passcode list
for the deck. If the decker is the only one normally using the deck, the
passcode would almost certainly be spotted automatically at that time,
without the need for a test.

Appearance
Nearly all cyberdecks appear according to the Universal Matrix
Specification standard, because most deckers do not spend much time
creating a nice environment inside their own decks-largely, this is due to
the fact that many don't know others can invade their decks.
It is possible for deckers to create a sculpted system in their decks by
programming the MPCP as if it were 2 rating points higher than it actually
is. If the deck also has a reality filter (see Virtual Realities 2.0 page
84), their modifiers are cumulative, giving a +4. This modifier applies
even if the reality filter and the sculpting consist of the same imagery.
The actual MPCP rating is not affected by sculpting the deck, however, and
neither is anyone's initiative modified, unlike when using a reality filter.

Ice On A Cyberdeck
It is possible for deckers to install intrusion countermeasures on a
cyberdeck, to protect the deck against intruders. For memory requirements,
see IC Programming, page xx. As can be seen there, a deck needs quite a lot
of memory to be loaded up with IC and still have room to spare for the
programs the decker needs on a Matrix run.
IC cannot be "installed" in offline storage. It can be kept there,
certainly, but cannot be launched by the deck against intruders.

Security Sheaves
A cyberdeck with IC installed on it also needs a security sheaf to decide
when to activate which piece of IC. This is entirely up to the decker-he or
she can decide where the trigger points are, and what IC is launched at
each step. Programming a security sheaf is done with the Edit Security
Sheaf system operation; as a decker is automatically a supervisor on his or
her own deck, no tests are needed to perform this operation.
Options that can be included are passive alerts, active alerts, and
shutdown. These have special effects when used on a cyberdeck, though:
Passive Alerts increase the deck's subsystem ratings by 2 (note that the
actual deck ratings, as far as the decker are concerned, are not
adjusted-an MPCP-8 deck stays an MPCP-8 deck even if its System Ratings are
increased due to a passive alert) and subtract 2 from the decker's
initiative because the deck needs to divide its processor time between the
decker's actions and stopping the intruder. The decker is not warned
directly; the only indicator that something is up is the fact that things
might seem to be going a bit more slowly than usual. (In other words, the
gamemaster should adjust the decker's initiative without informing the
decker's player.)
Active Alerts make the deck actually inform the decker that something is
up, through a warning sent via the ASIST interface. This usually takes the
form of the decker "knowing" the deck is being invaded; for tortoises, it
consists of a message displayed on-screen and/or played over the deck's
speakers. Otherwise it is the same as a passive alert.
Shutdown is a last measure not often employed on cyberdecks, because
shutting down the deck, in addition to kicking out the intruder, dumps the
decker from the Matrix and thereby causes dump shock for both of them. In
all respects it's similar to shutting down a normal host, as described on
page 53 of Virtual Realities 2.0.

The security sheaf will launch IC that is not present in active memory, as
long as it is in the deck's storage memory; it will automatically perform a
Swap Memory operation if there is enough free active memory in the deck to
load the IC; thus, the IC's launch will be delayed by one Combat Phase in
such a situation. As soon as the Swap Memory operation is complete, the IC
will be launched as normal.
IC kept in offline storage can never be launched by the cyberdeck.
Should the security sheaf want to launch IC for which there is no room in
active memory, the IC will not be launched. However, as soon as sufficient
active memory is available, the IC will be automatically loaded (as above)
and launched unless the decker spends a Free Action to stop it. Deckers may
want to keep an eye on what their security sheaf is doing, so as not to run
out of memory unexpectedly because it is all taken up by IC attacking an
intruder.

A decker can learn the current security tally of his or her own deck by
spending a Free Action, and can adjust the tally with an Edit Security
Tally operation.

Manually Launching IC
A decker can manually launch IC installed on his or her cyberdeck. Doing so
requires that it is loaded into active memory (requiring a Swap Memory
operation if the IC is only present in storage memory), and then "set
loose" by spending a Simple Action per IC program to be activated. The
decker need not roll any test to activate IC, as the operation takes place
on his or her own cyberdeck.

Limits
IC can only be launched once for every time it's loaded into active memory,
whether the launch happens manually or because it's triggered by the
security sheaf. If you want multiple copies running at once, you'll need to
spend precious memory space loading the IC multiple times.
IC that is crashed by an intruding decker is automatically removed from
active memory by the deck's MPCP. The security sheaf will re-load it into
active memory when needed.


HOST CONSTRUCTION

Some characters, especially deckers, will want to create their own hosts.
These are constructed in much the same way a cyberdeck is, although they
are commonly bought off the shelf, or even rented, rather than built from
scratch. Refer to pages 82 through 84 of Virtual Realities 2.0 for
information on how to use the game statistics presented below. All the
rules there apply to hosts equally as they do to cyberdecks. Components are
interchangeable between hosts and cyberdecks, where applicable.

Physical Size
The physical size of a host varies: simple hosts that aren't very powerful
are the size of large desktop computers, while the most powerful hosts fill
small rooms. (Although to be fair, that's in a large part due to the
cooling system they need in order to prevent the host's waste heat from
setting the building on fire...)
Breadboarded hosts exist, but these are very big, taking up whole rooms
even for simple systems. Constructing a breadboarded host gives a -2
modifier to all target numbers for the cook and installation tasks, and
halves nuyen costs.
It is not possible to build "cranial hosts" because they are too big to be
miniaturized far enough to fit into a person's head.

Security Rating
This consists of the Security Code (the color) and Security Value (the
number). Any combination of the two is allowed.
Software Task
Rating: Security Value
Multiplier: 8 (Blue host)
10 (Green host)
12 (Orange host)
15 (Red host)
20 (Ultra-Violet host)
Cook Task
Time: Security Value x 5 days (Blue host)
Security Value x 6 days (Green host)
Security Value x 7 days (Orange host)
Security Value x 8 days (Red host)
Security Value x 11 days (Ultra-Violet host)
Test: Computer B/R (Security Value) Test
Parts: OCC @ program size
Tools: Personal Computer (Memory: Security Value program size)
Microtronics Shop
Optical-Chip Encoder
Installation
Time: Security Value x 3 days
Test: Computer B/R (Security Value) Test (+2 for Ultra-Violet host)
Parts: PLC @ Security Value
DTC @ Security Value
Tools: Microtronics Shop
Off The Shelf Cost Formula
Blue: Security Value^2 x [(PF x 8) + 195]
Green: Security Value^2 x [(PF x 10) + 235]
Orange: Security Value^2 x [(PF x 12) + 275]
Red: Security Value^2 x [(PF x 15) + 335]
Ultra-Violet: Security Value^2 x [(PF x 20) + 455]
PF Basis: Security Value

Subsystem Ratings
Each of the host's five subsystem ratings (Access, Control, Index, File,
and Slave) must be written and installed in the host separately. Each is
considered a program in its own right.
Software Task
Rating: Program Rating
Multiplier: 5 (Access and Control)
2 (Index and File)
4 (Slave)
Cook Task
Time: Program Rating x 5 days
Test: Computer B/R (Program Rating) Test
Parts: OCC @ Program Size
Tools: Personal Computer (Memory: subsystem rating program size)
Microtronics Shop
Optical-Chip Encoder
Installation
Time: Program Rating x 3 days
Test: Computer B/R (Program Rating) Test
Parts: PLC @ Program Rating^2
DTC @ Program Rating^2
Tools: Microtronics Shop
Off The Shelf Cost Formula
Access and Control: Rating^2 x [(5 x PF) + 135]
Index and File: Rating^2 x [(2 x PF) + 75]
Slave: Rating^2 x [(4 x PF) + 115]
PF Base: Subsystem Rating

Memory
Just like a cyberdeck, a host needs to have memory to store data, activate
intrusion countermeasures programs, and do all the other things that a host
needs to do. Unlike a cyberdeck, however, hosts do not differentiate
between active and storage memory.
All the IC a host has access to, must be stored in its memory. It does not
need additional memory to activate the IC (except if the IC is equipped
with options that increase its size upon activation, like Squeeze). Since
IC is very large, hosts will need a lot of memory; it is best to first
design the IC you want to put onto the host, so the host's memory can be
adjusted to fit it all. Another thing to keep in mind is that a host
usually does not contain nothing but IC; there will be data stored there,
too, which also needs memory.
Software Task: None
Cook Task: None
Installation
Time: Memory Size / 250 days (round up)
Test: Computer B/R (Memory Size / 250, round up) Test
Parts: OMC @ Memory Size
PLC @ Memory Size / 25, round up
Tools: Microtronics Shop
Off The Shelf Cost Formula
Mp x 6¥

Matrix Interface
A host's Matrix interface connect it to the outside world, either to the
Matrix or to another host. The complexity of the interface is based on the
number of connections the host can have; every link to the Matrix counts as
one connection, and so does every link to another host. A trapdoor to
another hosts counts as two connections, however, because it is more
difficult to program.
The physical distance between two hosts does not matter-whether there's one
meter of cable between them or ten thousand kilometers, the same circuitry
will function just as effectively.
A host that is connected to the Matrix must have an LTG number, which can
be registered to a person or company for 50¥ a year.
Software Task
Rating: Number of Connections
Multiplier: 1
Cook Task
Time: Number of Connections x 2 days
Test: Computer B/R (Number of Connections) Test
Parts: OCC @ (Number of Connections x 10)
Tools: Personal Computer (Memory: Security Value program size)
Microtronics Shop
Optical-Chip Encoder
Installation
Time: Number of Connections x 1 day
Test: Computer B/R (Number of Connections) Test
Parts: PLC @ (Number of Connections x 100)
DTC @ (Number of Connections x 500)
Tools: Microtronics Shop
Off The Shelf Cost Formula
(Number of Connections)^2 x (PF + 7,700)
PF Base: Number of Connections

I/O Speed
Like cyberdecks, hosts have limited I/O speeds with which to communicate
with the outside world. However, their ratings are so much higher than a
cyberdeck's that deckers will hardly ever notice this limitation. When
multiple deckers or outside hosts try to up- or download data to or from
the host at once, though, the host's I/O speed is divided by the number of
users, which may cause delays for everyone.
For example, a host with I/O 1,500 MePS. If one decker is trying to
download some paydata, while at the same time another host wants to upload
last quarter's financial records, and a second host is trying to download
the latest verion of the company's product list, each would "only" get an
I/O speed of 500 MePS (1,500 / 3 = 500).
Keep in mind that the limit is the lower of the two I/O speeds-if a
decker's cyberdeck has I/O 200 MePS while the host's is 1,000 MePS, the
fastest speed at which the decker can up- or download is 200 MePS.
Software Task: None
Cook Task: None
Installation
Time: I/O Speed / 100 days (round up)
Test: Computer B/R (I/O Speed / 500, round up) Test
Parts: PLC @ I/O Speed / 20 (round up)
DTC @ I/O Speed / 10 (round up)
Tools: Microtronics Shop
Off The Shelf Cost Formula
Speed in MePS x 30

Access Console
The access console is the way by which users interact with the host. It's
usually either a keyboard and a vidscreen, a "goggles and gloves" setup, or
a full ASIST interface, but for convenience these are all called consoles
in these rules. Hosts can have any number of consoles, and come with one
keyboard and one vidscreen as standard. Extra ones can be added using the
rules below.
In order to be able to jack straight into a host, it must be equipped with
an ASIST interface. Each ASIST interface allows one decker to jack into the
host directly, without the need for a cyberdeck. However, the decker will
have no Persona programs (because anyone jacking into a host like this is
considered a legitimate user); utilities are only available if they are
stored in the host's memory.
Options such as ICCM filters, response increase, etc. that may be added to
a cyberdeck's ASIST interface can also be added to a host's, using the same
costs and target numbers as for a cyberdeck (substitute the host's Security
Value for the MPCP rating).
Whether a host has an ASIST interface or not, a decker can jack straight
into it with a cyberdeck.
Software Task
The software task is needed for ASIST interfaces only.
Rating: Security Value
Multiplier: 2 (hot)
1 (cool)
Cook Task
The cook task is needed for ASIST interfaces only.
Time: Security Value x 1 day
Test: Computer B/R (Security Value) Test
Parts: OCC @ Program Size
Tools: Personal Computer (Memory: Security Value program size)
Microtronics Shop
Optical-Chip Encoder
Installation
This task applies to all interfaces.
Time: Security Value x 1 day (ASIST interface)
12 hours (others)
Test: Computer B/R (Security Value) Test (ASIST interface)
Computer B/R (2) Test (others)
Parts: PLC @ Security Value (hot ASIST interface)
PLC @ Security Value / 2, round up (cool ASIST interface)
ASIST Processor Unit @ 1,250¥ (all ASIST interfaces only)
Keyboard, Vidscreen, Goggles, etc. @ 150¥ (others)
Tools: Microtronics Kit
Off The Shelf Cost Formula
ASIST, Hot: (Security Value^2 x [(PF x 2) + 40]) + (Security Value x 50)
ASIST, Cool: (Security Value^2 x [PF + 20]) + (Security Value x 25)
Others: 150¥
PF Basis: Security Value

Splitting Hosts
It is possible to "split" a host into multiple, less powerful ones. This is
often used by large Matrix service providers (MSPs) to set up hosts for
their clients-for example, if a small business wants a Blue-4 host to
advertise its products on the Matrix, the MSP "splits off" a rating 4 host
from its Blue-damn-near-infinity host to create the illusion of an
independent host.
This is a software task that takes some time to accomplish, and can only be
done by those with superuser passcodes (see Virtual Realities 2.0 page 36).
Furthermore, this operation must be performed on the host itself while it
is disconnected from everything else-the Matrix, other hosts, and so on.

To split a host, the superuser must first decide into how many hosts it
will be split. The limit on this is determined by the host's Security
Value: every "new" host must have a Security Value of at least 1. Its
Security Code (color) remains the same as that of the original host. For
example, an Orange-4 host could be split into four Orange-1 hosts, two
Orange-2 hosts, one Orange-1 and one Orange-3 host, or any other
combination whose Security Values add up to 4.
The actual split takes a base time of 8 hours, divided by the number of
successes on a Computer skill test (using the Software specialization if
desired), with a target number equal to twice the number of hosts that will
exist after the split. Failure to roll any successes means something went
wrong and the superuser has to spend another 8 hours to try again. If the
Rule of One comes up, something has gone horribly wrong and all the data on
the host(s) has been deleted-better make a back-up copy before splitting a
host, huh?

To split an Orange-4 host into one Orange-2 host and two Orange-1 hosts (a
total of 3 hosts) has a target number of 3 x 2 = 6. If the Orange-4 host
were to be split into two-say, an Orange-1 and an Orange-3 host- the target
number would be 2 x 2 = 4.

Together with the Security Value being split, the superuser must also split
the host's memory, number of Matrix interfaces, I/O speed, and access
terminals between the newly-created hosts. This can be done at any ratio
desired; for example, it is easily possible not to give Matrix access and
I/O speed to a host that's intended to stand alone in an office.
Also, a security sheaf must be set up for each of the new hosts (see
Creating Security Sheaves, below), and the IC activated by the sheaf must
be stored on the host. A security sheaf cannot call IC from another host.

Recombining Hosts
After a host has been split, it can also be put back together again to form
one host. (Or parts of it can be combined into larger parts.) This also
requires 8 hours and a Computer (Software specialization) skill test with a
target number equal to two times the number of hosts to be combined. The
base time is again divided by the number of successes, and failures have
the same effects as for splitting hosts.

To recombine the Orange-2 host and one of the Orange-1 hosts, so that the
original Orange-4 host will be split into an Orange-1 and an Orange-3 host,
has a target number of 2 x 2 = 4.

It is not possible to combine hosts that do not run on the same machine.
Only hosts that have been split off from each other can be recombined.

Navigating Through Split-Off Hosts
Each split-off host is always connected to all the others that have been
split off from the original host. This makes it relatively easy for deckers
to move through the system, although they have to log onto the hosts
individually as always. In fact, for a decker it is impossible to detect
whether a host has been split off from a larger one, or if it is running on
its own machine.

Wireless Decking Hardware
In order to be able to use the wireless jackpoints on page xx, some
modifications need to be made to a decker's cyberdeck. Both use the same
game statistics, which appear below, but the two are not interchangeable-if
you want a deck with both cellular and radio capabilities, you must write
the code, cook the chips, and modify the deck for each of the two.
As an option, a signal amplifier may be installed with a radio to increase
the deck's range. This doesn't affect the software or cook tasks, but does
increase the target number for the installation, and of course requires
some additional parts.
Software Task
Rating: MPCP Rating
Multiplier: 2
Cook Task
Time: MPCP Rating x 1 day
Test: Computer B/R (MPCP Rating) Test
Parts: OCC @ program size
Tools: Personal Computer (Memory: MPCP program size)
Microtronics Shop
Optical Chip Encoder
Installation
Time: MPCP Rating x 1 day
Test: Computer B/R (MPCP) Test [+1 target number if a signal amplifier is
also installed]
Parts: PLC @ MPCP
DTC @ MPCP
cellular phone or radio
[optional: signal amplifier]
Tools: Microtronics Shop
Off The Shelf Cost Formula
(MPCP Rating^2 x [(PF x 2) + 20]) + (MPCP Rating x 35)

PF Basis: MPCP Rating


SYSTEM OPERATIONS

Edit Security Sheaf
Test: Security
Utility: Validate
Action: Complex
With this operation, the system's security sheaf can be adjusted: steps can
be added or deleted, or trigger steps can be changed.
For every net success on the Security test, the decker can edit one trigger
step. The following alterations may be made:

A trigger step can be deleted: simply what it says. IC or alerts activated
by a step that is deleted remain, however.
A trigger step's number can be changed: it can be moved to any new number,
but if this is less than the current security tally, the edited trigger
step will activate immediately.
A trigger step's action can be changed: the step can be made to launch a
different type of IC (which must be available on the host), an alert may be
set, and so on.
A trigger step can be added: a new trigger step is inserted, at any point
in the sheaf the decker wants it to. If a step is inserted with a value
less than the current security tally, it will activate immediately.

Edit Security Tally
Test: Security
Utility: Validate
Action: Simple
The current security tally of the host can be changed with the Edit
Security tally operation.
On a successful Security test, the decker can in- or decrease the security
tally by the number of net successes he rolled. Smaller adjustments are, of
course, also possible, but it should be noted that the system's successes
against the decker on this Security test are added to the security tally-so
your net gain may be nothing at all, and you may even make it worse for
yourself than if you hadn't tried to tamper with the security sheaf.
If the tally is decreased, any IC and alerts that have been activated
already remain that way. Naturally, if the tally is increased, the host
will activate IC, set alerts, and so on as appropriate for the new tally.


CREATING SECURITY SHEAVES

When IC is installed on a host, it needs to be set up in a security sheaf.
This is a simple enough task, because all you really need to do is set up a
table of which IC will be launched at which time. The Edit Security Sheaf
system operation (page xx) is used to create security sheaves, though this
is only really important when changing the sheaf during a Combat Turn; when
time is not critical, anyone logged in with a supervisor passcode can change
the security sheaf at their leisure.

Steps
There are minimum step intervals for the security sheaf, based on the
Security Code of the host. This is because a low-security host generally
has less processing power, and so cannot handle as much IC at once as a
high-security host can. (See Virtual Realities 2.0 for inspiration for
security sheaves, especially page 62 for the typical time between trigger
steps.)
Similarly, there is a limit to the number of IC programs that may be
launched at a given trigger step, as also shown on the Security Sheaf Table
Passive and active alerts, as well as shutdowns, can be programmed into the
security sheaf as well. These do not count against the limit of IC per
trigger step, however.

Security Sheaf Table
Host Minimum Interval Amount of IC per
Between Steps Trigger Step
Blue 5 1
Green 4 2
Orange 3 3
Red 2 4

There is no maximum interval, though-if you want 20 steps between IC
activations, go right ahead and program it that way.

Limits on IC Launches
Each piece of IC can be launched only once for every time it is installed
on the host, unless it has the Multiple option (below) as well. For
example, if two copies of Blaster-4 are in the host's memory, Blaster-4 can
be launched twice. Before it can be launched a third time, one of the
copies must be deactivated first, either by the host, by the system
administrator, or because a decker kills it in cybercombat.

Multiple
Rating Modifier: +1 per level
Normally, IC can only be launched once by a host for every time it is
installed on that host, as explained under Limits on IC Launches. However,
IC equipped with the Multiple option can be launched once per level taken
in this option. The different copies of the IC are treated as different IC
programs for all intents and purposes-they can move, attack, and so on
individually from each other.
The price to pay here is that, for every copy that is active beyond the
first, the IC's initiative is reduced by -2 because the IC has to divide
its attention between all of them. All copies of the IC use the same
initiative result.

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html
I know all this and more
-> Probably NAGEE Editor * ShadowRN GridSec * Triangle Virtuoso <-
-> The Plastic Warriors Page: http://plastic.dumpshock.com <-

GC3.12: GAT/! d- s:- !a>? C++(---) UL+ P(+) L++ E W--(++) N o? K w(--)
O V? PS+ PE@ Y PGP- t- 5++ X(+) R+++$ tv+(++) b++@ DI- D+ G+ e h! !r y?
Incubated into the First Church of the Sqooshy Ball, 21-05-1998

Further Reading

If you enjoyed reading about Hosts, decks, the Matrix, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.