Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: Gurth <gurth@******.NL>
Subject: Security tallies (was Re: Weird Campaigns)
Date: Fri, 22 May 1998 11:36:28 +0100
Karl Low said on 4:32/21 May 98...

> >However, I think there'd be some protection built into the system, for
> >example that only supervisor-level users can alter security tallies. Any
> >thoughts?
>
> I'm probably way out of date here. (Only having the SR1BBB can do that
> to ya) but I thought that's what happened when you entered the CPU..
> once there the whole system (including security stuff) is yours to
> monkey with.

I'm not sure, but I don't believe you can try and set yourself up as a
legitmate user in SR1/VR1.0/SRII matrix rules.

> However, I wouldn't doubt this has undergone massive changes with the
> VR books and all..

VR1 didn't change much, it just expanded the rules for the Matrix. VR 2.0
is a completely new system that does away with all the nodes and things in
favor of a much easier to use system where you log onto a host (a
collection of nodes) and get to mess with it as a whole. The host rolls
against you, and when it reaches certain numbers of successes it launches
IC against you and/or goes on alert. What we're discussing is a way to
reduce the successes the system rolled.

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html - UIN5044116
"You haven't given me a headache. I like you."
-> NERPS Project Leader * ShadowRN GridSec * Unofficial Shadowrun Guru <-
-> The Plastic Warriors Page: http://www.xs4all.nl/~gurth/plastic.html <-
-> The New Character Mortuary: http://www.electricferret.com/mortuary/ <-

-----BEGIN GEEK CODE BLOCK-----
Version 3.1:
GAT/! d-(dpu) s:- !a>? C+(++)@ U P L E? W(++) N o? K- w+ O V? PS+ PE
Y PGP- t(+) 5++ X++ R+++>$ tv+(++) b++@ DI? D+ G(++) e h! !r(---) y?
------END GEEK CODE BLOCK------
Message no. 2
From: Ereskanti <Ereskanti@***.COM>
Subject: Re: Security tallies (was Re: Weird Campaigns)
Date: Sun, 24 May 1998 11:11:02 EDT
In a message dated 5/23/98 7:39:43 PM US Eastern Standard Time,
gurth@******.NL writes:

> > I'm probably way out of date here. (Only having the SR1BBB can do that
> > to ya) but I thought that's what happened when you entered the CPU..
> > once there the whole system (including security stuff) is yours to
> > monkey with.
>
> I'm not sure, but I don't believe you can try and set yourself up as a
> legitmate user in SR1/VR1.0/SRII matrix rules.
>
Actually, what Karl was suggesting (did I get the name right?) is correct.
Once you are in the CPU for a system under the first ed rules, you can spends
actions to have the system perform certain actions. That includes locking out
nodes, rearranging files and file substructures (making it harder to find
things for instance), as well as giving/removing accessabilities to various
user(s).

-K

Further Reading

If you enjoyed reading about Security tallies (was Re: Weird Campaigns), you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.