Back to the main page

Mailing List Logs for ShadowRN

From: Robert Watkins <bob@**.NTU.EDU.AU>
Subject: Re: Matrix
Date: Sat, 22 Apr 1995 17:03:30 +0930
Gary Carroll wrote:

> And what do you really think that you couldn't break into a system
> that requires a
> password...
> I usually make them carry aprox. five figures of computer equip.
> (depending on the job.) (since SRII does not have misc equip "like
> in sneakers"). Then I make them use a Computer and Electronics
> skill test (electronics for hardware setup and computer for proper
> connections) (or computer at +2 and computer).
> The Idea is that you bring in your own mini terminal
> remove/disconnect the existing one and use your presetup hardware to
> bypass the OS interface. Then you set modifiers according to how
> good the eq is, modifiers if the system is not familiar, and the
> number of successes can be used for jumping past other detections or
> time etc...

Say what? Bypass the OS interface? HOW?!?

Let's assume the world becomes moderately sane, and something like the OSI
interface stack comes into play (TCP/IP has an interface stack as well,
it's just a different one, working under different rules).

Level 3 (usually something like the OS) won't listen to something from
level 1 (the wires), unless it goes by level 2 (the comms protocol). This
kind of thing happens all the way up and down the stack. Skip a step, and
you don't get anywhere.

So, you ignore the OS entirely, and try to talk directly to the hardware on
the other end of the line. No can do... this stuff works in reverse, as
well. Not to mention removing the existing terminal would probably set off
all sorts of alarms.

No, the simplest way is for the decker to jack in, break down the IC, and
then jack out and give it to the rigger. Or have a decker/rigger.

--
Robert Watkins bob@**.ntu.edu.au
Real Programmers never work 9 to 5. If any real programmers
are around at 9 am, it's because they were up all night.
*** Finger me for my geek code ***

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.