06-08-2012, 07:57 AM | #21 | ||
Join Date: May 2008
Location: CA
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
Quote:
|
||
06-08-2012, 08:17 AM | #22 | |
GURPS FAQ Keeper
Join Date: Mar 2006
Location: Kyïv, Ukraine
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
|
|
06-08-2012, 12:49 PM | #23 |
Join Date: May 2008
Location: CA
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
The 12+C bit was just off the top of my head. 10+C would probably be better. And remember that the sys admin would need to set it up to begin with.
|
06-08-2012, 02:11 PM | #24 |
GURPS FAQ Keeper
Join Date: Mar 2006
Location: Kyïv, Ukraine
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Another thing that's bothering me: Trigger Complexity. Not only is Trigger of suspiciously high C (it is basically a glorified alarm clock combined with the ability to output commands and pass parameters received from an Analyse/Search program), but raising C makes no sense: since C is logarithmic, it is always more beneficial to have 2 instances of Trigger if you need to launch more than one program. I suppose I should interpret Trigger as being able to do some minor decision-making instead if I want it to look reasonable.
Also, here's my attempt at a assistant-sheet for netrunning. Okay, for assigning programs to computers, but you get the idea. |
06-09-2012, 04:14 PM | #25 |
GURPS FAQ Keeper
Join Date: Mar 2006
Location: Kyïv, Ukraine
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Another ambiguous issue:
which of the roll results are known, and which are not? Does an admin know a Breach/Spoof is being attempted on the ICE+Listen, before it succeeds? Does a hacker know whether a program succeeded in a given round? Does a character know that his computer is being Analysed, or was found in a Search? Does a hacker/admin know when a program has failed by 6+, or does he have to keep trying indefinitely? |
06-09-2012, 04:39 PM | #26 | |
Join Date: May 2008
Location: CA
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
A hacker has to know whether a program succeeds in order to actually utilize his skills, so that's a yes. Hackers can detect Analysis or Searches through the use of Search. Hackers and admins probably know when they've failed by 6+ simply to speed up play; more realistically, they shouldn't know. All intrusion attempts can be detected on a critical failure (or failure by 5+) on the intrusion roll, even if the target isn't actively Searching or Analyzing for them. |
|
06-10-2012, 01:46 AM | #27 | ||
GURPS FAQ Keeper
Join Date: Mar 2006
Location: Kyïv, Ukraine
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
Quote:
Through Search? That sounds strange. |
||
06-10-2012, 05:23 AM | #28 | |||
Join Date: May 2008
Location: CA
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
Quote:
Quote:
|
|||
06-10-2012, 02:52 PM | #29 | |
Join Date: Oct 2008
Location: Shangri-La
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
Some of the ambiguities are no doubt oversights on my part, but a lot of them are deliberate -- interpret them in the way that (a) makes sense to you in the context of your campaign, and (b) provides the most fun for you and your players. Also, bear in mind that this was meant to model Neuromancer-style Netrunning ... they can do TL8 keyboard jockeying, but that's an afterthought, and as you're seeing, will require some tweaking to fit. Anyway, I know that's not much help if you were looking for definitive clarifications, but I'm afraid that the system isn't meant to be definitive .. more narrative. |
|
06-11-2012, 06:26 AM | #30 | |
GURPS FAQ Keeper
Join Date: Mar 2006
Location: Kyïv, Ukraine
|
Re: Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking
Quote:
I'm actually running a TL6+3^ console cowboy-ing. Speaking of which, tried it out For Realz on Saturday. Seems workable to me. The net run was short and paranoidly impersonal (the PC wrote a Trigger script and conned an unwitting pawn into running it from a university's mainframe, targeting a different mainframe), but the player seemed to like it a lot. Surprisingly, the act also achieved one of the party's objectives in a very convoluted, almost serendipitous way. Also, any comments on the Program Loadout (or whatever you want to call it) Sheet (which is currently loaded with a PC's hard drive collection and a generic C5 mainframe)? |
|
Tags |
console cowboys, cyberpunk, hacking, netrunning, pyramid, pyramid 3/21 |
|
|