Steve Jackson Games - Site Navigation
Home General Info Follow Us Search Illuminator Store Forums What's New Other Games Ogre GURPS Munchkin Our Games: Home

Go Back   Steve Jackson Games Forums > Roleplaying > GURPS

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
Old 06-07-2012, 08:28 AM   #1
vicky_molokh
GURPS FAQ Keeper
 
vicky_molokh's Avatar
 
Join Date: Mar 2006
Location: Kyïv, Ukraine
Default Pyramid #3/21. Console Cowboys / Netrunning / Semi-Cinematic Hacking

Greetings, all!

Reading over the Console Cowboys article, I'm considering using it (without the silly VR stuff, hence only referencing the first half of the title) in my campaign (at least when I can afford a special spotlight). But I never really used these rules in previous editions (Cyberpunk etc.), and I'd like to hear from people who have some experience with them. Please note that I do understand that those rules are cinematic(ish), gamist, and simplified.

Secondly, there are several things that are unclear to me. I'll post them as I encounter/recall them. Starting with:

Control seems confusing. It says that it allows one to use the standard functions of a computer (e.g. shutting down), and is Complexity 4, and only works after getting past ICE. However, if I log onto a computer using a legit password, unless I have severely restricted privileges, I should be able to shut it down. And Spoofing a Listen program seems like the game-mechanical description of sending the packets that are treated as a legit authentication. So . . . what is Control supposed to represent that is opposed to logging onto a computer (whether remotely or locally)?

Most of the important programs are Complexity 3-4, and the lowest ones are 2. But that seems to prevent hacking in retro settings (such as Æthereal Sun, where laptops/notebooks basically top out at C2 with a nasty price tag, Mainframes are C5 and Macroframes are C7). Does making C2 versions of some programs (primarily Control, Stealth, Alter, ICE) that have a built-in -2 per each Complexity removed break the system*?

The abstract rounds are wonderful for Action chases and other speedy scenes, but what about doing stuff slowly, when there is plenty of time (but details of the hack are still important)? I'm considering declaring that in routine conditions, a single round last an hour and grants +5 to active uses of programs (i.e. ones performed by a hacker or admin who is currently in charge, not automated Continuous programs). Thoughts?

Related to the above: the article seems to expect high-Complexity computers and high-Skill characters. Both of those are lower in my campaign: dedicating a constant Complexity 5 slot is mostly a luxury for an individual with a personal computer, while renting a C5 slot on a local friendly university megaframe is more affordable, but is problematic for hacking; skills are mostly floating around the 12-15 range, and the PCs are treated as reasonably competent professionals for having those levels. I'm afraid of keeping the system as-is with those numbers (especially due to the minC issue above); are my concerns justified, or does it work just fine if everything is lower than in the classical example?

On Control: if I get access to computers A, B and C, use Control to make A run Control on B to make it run Control on C to do an Analyse of some Computer D, does that count as a single program execution, or as four simultaneous programs (at -3)?

Thanks in advance!

* == the game system, that is. In a munchkinish way. Not the computer system.
__________________
Vicky 'Molokh', GURPS FAQ and uFAQ Keeper

Last edited by vicky_molokh; 06-07-2012 at 09:16 AM.
vicky_molokh is offline   Reply With Quote
 

Tags
console cowboys, cyberpunk, hacking, netrunning, pyramid, pyramid 3/21


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Fnords are Off
[IMG] code is Off
HTML code is Off

Forum Jump


All times are GMT -6. The time now is 06:06 AM.


Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2024, vBulletin Solutions, Inc.