Back to the main page

Mailing List Logs for ShadowRN

From: Master Hawk <fannicm%WKUVX1.bitnet@******.LOUISVILLE.EDU>
Subject: D-L'ing IC...
Date: Sun, 17 Oct 1993 16:45:36 CDT
Doctor Doom <JCH8169@*****.TAMU.EDU> writes:
>
>From Herr Masterhawk...(with the ornate signature file)

Is that a hint? :-)

> Down-loading IC...
>
> There are at least a few problems with this proposal, most of the
>initial ones stem from memory issues.

That was a facet that I had considered, but it did not stop him since
all that was neccesary was 150 Mp or so (Access 3 in one case, I
believe). And that could be achieved by un-loading a goodly portion of
his programs.
I don't remember how he got the Probe. It may not have been very
strong since he mostly hit small business systems.

>Following the above example, Access Rating 6 would require approximately 300
>Mps of Active Memory, which would take quite some time to acquire, unless he is
>using a Cyberdeck on the magnitude of a Fairlight Excaliber. Furthermore, what
>rationale is he enlisting in his justification of Access IC serving as extra
>Armor?

In some piece of literature (I'm inclined to cite the story in the
latter portion of Virtual Realities) there is mention of how hardening
works in a deck. In essence, it was a maze that an attacking program
had to navigate through. The properties of this maze caused program
integrety to break down, thus generating the protective dice. It was
his intention to scatter the Access throughout this maze and allow it to
slow intruding programs.

> If the technomancer in question requires supplementary Matrix
>protection, have him write/purchase a Shield Program, or upgrade his cyberdeck
>such that it may support more Hardening. Do not permit him to utilize the IC
>in such a bizarre manner.

I didn't, but it didn't stop him from trying to tell me how it would
be possible outside the game. As I mentioned in my previous posting, I
was loath to even think about Shadowrun for a time for fear that he
might hear and begin to badger me again.

>1) Most of the firms who are capable of paying large sums for copies of IC
> generally are already in possession of their own systems and Intrusion
> Countermeasure software. Why would they bother with another companies
> programming?
>

Very good idea. A perfect example of why Word Im-Perfect is the
industry standard word processing utility for the IBM PC today.

>2) You could make the argument that IC, due to the intricate nature of such
> programming, can and is manufactured in a system-specific manner, to the
> point that it is merely an extension of the Mainframe's base code.
> Consequently, to isolate it from its "parent" system causes it to become
> useless without the essential central coding.

Unless it could be de-assembled and re-installed. Imagine the
possible profit. Purchase a business lisence, download some basic IC,
modify the coding, and advertise your services to new businesses for a
fraction of the cost of the larger competitors. It would also be
prudent at this point to never allow yourself to be caught by the
aforementioned larger competitors. :-)

>My reaction to this character? Excessive/continual badgering by players with
>an only tenable grasp of Game Balance, coupled with Munchkinous proposals would
>probably compel me to invoke the threat the Zippo treatment upon his character
>sheet.

I have never used that measure, not even on characters that it has
been my displeasure to kill. The destruction of another's character
(sheet) is final and, IMHO, out of line. I have had to use the famous
"Not in my campaign you won't." a couple of times. I guess I am simply
too lenient.

>This is not, admittedly, a perfect solution. Nevertheless, it may serve as a
>springboard for different, more comprehensive ideas.

Many thanks, Herr Doom, for responding. May I mark you down as
having a negative reaction? :-)
-=-=-=-=-
_ _ _ _ ,
' ) ) ) _/_ ' ) / /
/ / / __. _ / _ __ /--/ __. , , , /_
/ ' (_(_/|_/_)_<__</_/ ( / (_(_/|_(_(_/_/ <_

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.