View previous topic :: View next topic |
Author |
Message |
lurker Commander
Joined: 24 Oct 2012 Posts: 423 Location: Oklahoma
|
Posted: Fri Feb 14, 2014 3:04 pm Post subject: |
|
|
shootingwomprats wrote: |
Currently his Search defaults to his PER 3D+2. So not much a slow down. I started implementing time per action. Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic.
I really need some help coming up with logical rules for hacking computer/systems to include situational modifiers and such. |
Rgr, but there are only soooooo many CPs to spend. plus, if he spends a cp just to hack in, then 1 to boost his search, then another to counter hack. He will run out quickly. That will slow him down and als keep him from having CPs to spend to up the ancillary skills he needs (con, search, etc etc etc) so he will keep needing to spend CPs to keep getting the heroic rolls.
Also, having him roll (well anyone so this isn't taken as a focus on one character) for multiple facets of hacking. 1 to get in, 1 to see that he is being tracked, 1 to hide his tracks, (that is 3 MEP's so now the 6 + D is down to 3 to 4). Now time to start digging around in the computer, and again counter hacking the security, so more rolls at less than the 6D, now a search roll & more counter hacking with MEPs.
Plus, you can put a time element in at those critical junctures. Yeah it is easy to hack when setting in a hotel room without having security on top of you. However, it is difficult when you have a 5 min window between security guards checking on the spot where the hacker is. Can he do it all in 5 min, or does he have to hack, then in mid stream hide (and then give the counter hackers a chance of noticing he is in the system digging around & him not being able to counter it) then come back out of hiding and finish the job. There is a lot of rolls there that will need to be passed ...
Even my character with his high first aid wouldn't risk doing first aid to save a character on top of all the other things going on so I can avoid the MEP drain. However, with a hacker having that high of skill even he will feel the pressure of being required to do multiple rolls at once just to do his 1 task.
Also, like DougRed pointed out:
Quote: |
I think an important thing to remember is to let this 'ultimate hacker' type be a god of slicing under most circumstances. When it's not relevant to the plot or major plans of the bad guys, let him get away with hacking into whatever he needs to. He'll end up getting plenty of enemies on his trail soon enough that way anyway. But then when a pivotal moment in the campaign happens, despite his capabilities to get 31+ on his rolls, there's still a 1 chance in 6 that something bad will happen.
|
Plus
Quote: |
But then when a pivotal moment in the campaign happens, despite his capabilities to get 31+ on his rolls, there's still a 1 chance in 6 that something bad will happen. If you do what has been suggested, and make him have to succeed on a roll to get back out of the system (and hide his tracks), the odds are now that 1 in 3 that he could be spotted!
|
Someone hacks a system and gets the info they need, but also gets some info they don't even realize is important to someone else (criminal cartel, bounty hunter, politician etc) and bingo, there is another person hunting the hacker (& he won't know why). Or, yeah he hacks the system and gets what he wants, but .... the counter hackers put a flag in his system so he is now being tracked every time he is on a system. Or, his computer hiccups and reboots right after he sees the data. Can he remember the map of the ship or does he need to let the computer reboot and try and down load it a second time.
Wait, I'm making it harder for my team to succeeded,
... nothing to see here move along, move along .... These aren't the droids you are looking for ... _________________ "And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain
Forgive all spelling errors. |
|
Back to top |
|
|
lurker Commander
Joined: 24 Oct 2012 Posts: 423 Location: Oklahoma
|
Posted: Fri Feb 14, 2014 3:09 pm Post subject: Re: How to Deal With a Hacker? |
|
|
garhkal wrote: |
Quote: | Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time. |
Rather than using search, have him roll investigations to correlate the data he is getting.
|
Ohhhhhh, I like that! It makes more sense than search, & I know it is a skill that few take ... _________________ "And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain
Forgive all spelling errors. |
|
Back to top |
|
|
atgxtg Rear Admiral
Joined: 22 Mar 2009 Posts: 2460
|
Posted: Fri Feb 14, 2014 3:44 pm Post subject: |
|
|
Try information overload.
One thing I've done when running investigation type adventures is to hide important information by swamping the PCs with lots of unimportant information.
Most computer systems don't know that the plans for the new battlestation are more important than the lunch menu, lighting schedule, cargo manifests, or list of available in-flight holovids.
If you throw a bunch of info at the PC hacker at once, he might find it harder to focus on exactly what he needs to to. Especially if you put some other interesting bits of data in there to grab his attention. Accidentally running across the Moff's slush fund might distract the hacker. |
|
Back to top |
|
|
Corise Lucerne Lieutenant
Joined: 02 Jan 2014 Posts: 78 Location: USA
|
Posted: Fri Feb 14, 2014 7:08 pm Post subject: |
|
|
I really like Lurker's ideas, or rather the vein he's going towards.
Hacking isn't necessarily a one way firing range.
The target information system (and its operators) can fight back. They might employ their own hacker (a so-called White Hat) who is specifically looking for any security breaches, who may in turn try to hack his own system. They may even (try to) plant spyware or tracking on your slicer's system, or may even attempt to seize complete control of it. _________________ A Game of Galactic Conquest: http://rebelfaction.org/ |
|
Back to top |
|
|
garhkal Sovereign Protector
Joined: 17 Jul 2005 Posts: 14215 Location: Reynoldsburg, Columbus, Ohio.
|
Posted: Sat Feb 15, 2014 1:25 am Post subject: |
|
|
lurker wrote: |
Someone hacks a system and gets the info they need, but also gets some info they don't even realize is important to someone else (criminal cartel, bounty hunter, politician etc) and bingo, there is another person hunting the hacker (& he won't know why). Or, yeah he hacks the system and gets what he wants, but .... the counter hackers put a flag in his system so he is now being tracked every time he is on a system. Or, his computer hiccups and reboots right after he sees the data. Can he remember the map of the ship or does he need to let the computer reboot and try and down load it a second time. |
To add onto that idea. Perhaps when they are in the system they are hacking, they come across someone else FROM one of those criminal orgs (or imp intelligence/compnor/corp sector) that is also hacking in, either to plant files (intelligence might do it to try and frame someone) or to steal info, and 'get the digital footprint of the pc group. Now they could be foils for them, OR partners...
lurker wrote: | Ohhhhhh, I like that! It makes more sense than search, & I know it is a skill that few take ... |
Thanks. Players hate me when i make them use it, rather than search, to coorelate the data they are getting. _________________ Confucious sayeth, don't wash cat while drunk! |
|
Back to top |
|
|
cheshire Arbiter-General (Moderator)
Joined: 04 Jan 2004 Posts: 4853
|
Posted: Sat Feb 15, 2014 9:34 am Post subject: |
|
|
You might also bring in a story-based complication. If the guy is hacking into EVERYTHING, then he's going to show up on sombody's radar. Why not have a long-term NPC that works for Imperial intelligence (or whatever correlating agency) be assigned to finding him. Since his actions are in the "computer world," then keep the interplay between the NPC and PC happen there. The NPC can stay in the background for a while, doing things like performing a vs. die roll and locking the PC out, shutting down his terminal, and hacking a dispatch to send troops to his area.
As things develop, the NPC could pop up a chat window and say something villainous and mustache-twirl worthy as he hacks a nearby generator and puts it on an overload cycle.
If he wants to have the hacker life, he should probably have some story dynamics that come with it. _________________ __________________________________
Before we take any of this too seriously, just remember that in the middle episode a little rubber puppet moves a spaceship with his mind. |
|
Back to top |
|
|
lurker Commander
Joined: 24 Oct 2012 Posts: 423 Location: Oklahoma
|
Posted: Sat Feb 15, 2014 10:17 am Post subject: |
|
|
lurker wrote: |
...
Wait, I'm making it harder for my team to succeeded,
... nothing to see here move along, move along .... These aren't the droids you are looking for ...
|
You are all forgetting this point, sooooooo all these ideas are horrid 8)
Quote: |
You might also bring in a story-based complication. If the guy is hacking into EVERYTHING, then he's going to show up on sombody's radar. Why not have a long-term NPC that works for Imperial intelligence (or whatever correlating agency) be assigned to finding him. Since his actions are in the "computer world," then keep the interplay between the NPC and PC happen there. The NPC can stay in the background for a while, doing things like performing a vs. die roll and locking the PC out, shutting down his terminal, and hacking a dispatch to send troops to his area.
As things develop, the NPC could pop up a chat window and say something villainous and mustache-twirl worthy as he hacks a nearby generator and puts it on an overload cycle.
If he wants to have the hacker life, he should probably have some story dynamics that come with it.
|
That would fit, we already have 2 high end bounty hunters after us, 2 inquisitors, and those are only the ones we know about ... oh yeah, a group of pirates too. So out of all of them there could easily be a hacker or 3 looking for us... _________________ "And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain
Forgive all spelling errors. |
|
Back to top |
|
|
garhkal Sovereign Protector
Joined: 17 Jul 2005 Posts: 14215 Location: Reynoldsburg, Columbus, Ohio.
|
Posted: Sat Feb 15, 2014 4:11 pm Post subject: |
|
|
Which might really complicate things for your group.
Those imp hackers, now mark your ship as wanted or stolen, so any normal LE gets on your case.
Any bank accounts or other property gets repossessed.
Someone shows up as 'wanted for crimes'. Or even gets listed as an escaped criminal. _________________ Confucious sayeth, don't wash cat while drunk! |
|
Back to top |
|
|
Tinman Lieutenant Commander
Joined: 26 Dec 2013 Posts: 110
|
Posted: Sun Feb 16, 2014 1:36 am Post subject: |
|
|
griff wrote: | A word on difficulty, R2-D2 able to interpret the entire imperial networt in episode 4 just by plugging into a terminal onboard the Death Star. Was that because of physical contact with the system, was it because R2 is a droid, or was it because he's R2? But we only see him find the location of the terminal to deactivate the tractor beam, learn that Leia was on board and was scheduled to be exicuted, and shut down the garbage smashers. None of this seems to be top secret or critical. |
R2-D2 being able to do this was an unusual circumstance. The reason he was able to slice about the Death Star's computer network so easily was very likely because he had a 10D Datafile of Scholar:Death Star stuffed into his little droid brain.. meaning there was practically nothing about the Death Star he didn't know at the time. (He was PROBABLY limited to using only 5D of that, since droid databases are limited to 5D due to technological limits, but that would have been more than sufficient.) |
|
Back to top |
|
|
jmanski Arbiter-General (Moderator)
Joined: 06 Mar 2005 Posts: 2065 Location: Kansas
|
Posted: Sun Feb 16, 2014 8:44 am Post subject: |
|
|
A hacker should use more than Computer programming; make him use Forgery to replace any information, Bureaucracy to figure out how the company works, and communications to be able to hack in remotely.
There's a lot of skills required. _________________ Blasted rules. Why can't they just be perfect? |
|
Back to top |
|
|
|