Back to the main page

Mailing List Logs for ShadowRN

From: Gurth <gurth@******.NL>
Subject: Altering security tallies (was Re: Weird Campaigns)
Date: Fri, 22 May 1998 11:36:28 +0100
Ereskanti said on 8:18/21 May 98...

> Dump Log action reduces things, but it takes time. I know we've got a
> program/form that reduces a given security tally, but the program is Net
> Success based and the decker has to have an idea how intensive the Tally is
> currently (such as after performing an Analyze Host).

Analyze Security tells you your security tally :) Yes, I agree you'd have
to find out your current ST before you can search for it. If you don't,
you should probably be able to find the file (or whatever) that holds the
tallies, but all you can do is change all of them at once, or pick one at
random and change that.

> > However, I think there'd be some protection built into the system, for
> > example that only supervisor-level users can alter security tallies. Any
> > thoughts?
>
> Agree here, you'd probably have larger than normal target numbers for
> performing such, and it would NOT be possible at without the Masking
> Attribute (so no using a legit deck/terminal for this stunt).

Why? Legitimate users don't build up security tallies, and how are you
going to check if the decker attempting to modify the ST has Masking in
the deck? Plus it would mean the real sysadmin needs a deck with Masking
in it to do something that looks to me like normal system maintenance...

--
Gurth@******.nl - http://www.xs4all.nl/~gurth/index.html - UIN5044116
"You haven't given me a headache. I like you."
-> NERPS Project Leader * ShadowRN GridSec * Unofficial Shadowrun Guru <-
-> The Plastic Warriors Page: http://www.xs4all.nl/~gurth/plastic.html <-
-> The New Character Mortuary: http://www.electricferret.com/mortuary/ <-

-----BEGIN GEEK CODE BLOCK-----
Version 3.1:
GAT/! d-(dpu) s:- !a>? C+(++)@ U P L E? W(++) N o? K- w+ O V? PS+ PE
Y PGP- t(+) 5++ X++ R+++>$ tv+(++) b++@ DI? D+ G(++) e h! !r(---) y?
------END GEEK CODE BLOCK------

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.