![]() All combat TNs are 4, plus/minus modifiers.Each success equals -1 TN to hit or +1 to Power.Each success equals 1 combat turn that you can escape.Opposed by: Sensors or Security Value (Use Lock-On to reduce your TN).Evader's Dice: Evasion Rating (Use Cloak to reduce your TN).3) Locate IC, then Cybercombat (Trace IC will always attempt to evade in this situation)Ĭombat (or the OTHER thing you should really avoid).Can be "paused" indefinitely if suppressed) 2) Relocate (will "pause" the Trace IC for one turn.1) Graceful Logoff (ends the trace immediately, but ends the run).Trace IC will find you in 10 - successes turns.If the Trace EVER succeeds in a Hunt Phase test, then you go into the Location Phase. (Not using optional "Bandwidth rule" at this time).Trace Rating: Evasion - Trace IC Rating + # of bounce points + Camo Rating.Like typical cybercombat, except that Trace IC rolls against a TN equal to your Trace Rating.Traces (or the thing you should really avoid) This is not much of a problem when you are on-site decking, but when you are in the comfort of your own livingroom, that's a problem. NOTE: When you jackout, any remaining traces have a chance of catching up with you.Dumpshock: Power equal to Security Value, Level equal to Host (Blue = L, Green = Moderate, etc.).Result: Each success repairs one "box".TN: Light - 4, Moderate - 5, Serious - 6.(Note: If it ever gets to the point where you need to heal, you're probably already screwed).Result: Repairs 1 damage per 2 successes.This removes the Superuser (Smartgun link) status of security deckers.Note: You can only destroy worms that you have found with an Analyze Subsystem test.If you do not Graceful Logoff or eventually defeat the IC, you risk getting traced.If you don't suppress the IC, then it picks up its trail next turn. This "pauses" the Location cycle of a Trace.AKA Going BSOD, Microsoft, the Bomb icon.Essential to maintain radio contact with the rest of the team.If below Decoy successes, then they attack the Decoy instead. Result: Any time an attacker tries to affect you, roll 1d6.Lasts until: Active Alert is triggered or or 1d6 x successes in days.Bonus: -2 to ALL system tests that are not specifically restricted.Also allows you to Crash Host, Disinfect, Dump Log, Tap Datastream/Commcall, Validate/Invalidate Account.Great for gathering intel about a system. ![]() Bonus: Free access to all basic (non-restricted) Access, Index, and Slave operations.Some passkeys give you access to Files or Slave nodes.Allows you to Analyze, Graceful Logoff, Locate Icons, Send Data, Upload Data for free.While mostly worthless, this can give on-site friends a valid access key.Lasts until: Active Alert is triggered or 1d6 x successes in days.Things that you can do to help the "things you can do" When you really need to find a phone number.Either the PLOT data or just money data.Detecting if you are in a Virtual Machine.Test Reality (Is this really real? Really?) Find out one piece of information about something, or find a runaway Trace IC.Analyze X (IC, Icon, Security, Locate IC).Look around at the scenery (Perception test) Protects you from Traces, at potential cost of increased Security tally prior to run. Redirect your datatrail (making a "bounce" point) Evaluate for a file (if PLOT information or paydata).Look for snooping deckers, frames, or SKs.Check to see if you are in a virtual machine.Find appropriate Jackpoint (Trace modifiers are based on this step)Ģ) Look around (Analyze the host) (most deckers skimp on this step, but it may bite you in the ass later).10 Tricks to boost your detection factorġ) Setup (mostly setting up barriers to being traced).9 Combat (or the OTHER thing you should really avoid).8 Traces (or the thing you should really avoid).6 Things you can do to protect yourself.4 Things that you can do to help the "things you can do".You can download this cheat sheet as a Markdown file for use in your Markdown application. I need to highlight these =very important words=. Not all Markdown applications support these elements. These elements extend the basic syntax by adding additional features. All Markdown applications support these elements. These are the elements outlined in John Gruber’s original design document. It can’t cover every edge case, so if you need more information about any of these elements, refer to the reference guides for basic syntax and extended syntax. This Markdown cheat sheet provides a quick overview of all the Markdown syntax elements.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |