|
Author |
Topic: First attempt decking guide |
Title: Neophyte
Posts: 1
Joined: 24 Jul 2005
|
Date Posted: Sun Oct 04, 2009 8:28 pm
Subject: First attempt decking guide
|
Decking guide
A lot is copy/pasted from many others helpfiles, i just pulled them into one document so it was all available for me to read. - Credit goes to those people who did the initial work, if i have missed anything/gotten anything wrong/offended anyone let me know and i will delete/remove/edit/add as required.
Ok, first off you need a deck, a cmt avatar is the best available in char creation and is probably the only one worth getting to start with.
you will also probably want a datajack of some kind and the Computers skill (i suggest you train as high as you can afford) if you wish to create your own programs you will probably want some programming skills, although all you would need for basic decking skills can be done with just the computer, computer b/r, data brokerage, and electronics b/r
then you need some persona programs - there are four you need these are: bod masking evasion and sensors.
Bod is the decker's resistance to damage and is used primarily
in combat to prevent damage to the deckers icon from White and
Grey IC. Bod does not prevent against damage to the Decker.
Sensors are used to detect icon movement within a host. It is the
decker's eyes and ears when he is logged on. High sensors can help
detect IC before they attack, giving you the opportunity to manoeuvre
yourself to a better position.
Masking helps a persona camouflage itself to its surroundings. It is
one of the most useful programs in a deckers arsenal. Coupled with
the Sleaze program it determines your detection factor. The higher your
detection factor is, the more difficulty the host has detecting your presence.
Your detection factor is the average of both your masking and sleaze
programs.
Evasion : Sometimes even the best decker gets caught out. When this time comes
they need the evasion persona program. It helps not only in combat
manoeuvres but to help avoid Trace IC from locking onto you.
the total for Your personas can not exceed the mpcp*3 for all 4 personas combined.
Only Bod and Sensors are needed to start up a cyberdeck. But trying to run
on the matrix without Evasion and Masking is very difficult.
once you have your persona programs you will want some Utility programs.
Utilities are the programs the Decker uses to strut their stuff around
the Matrix. Without passcodes or programs to get them through Security,
a Decker would have to sit and twiddle their thumbs in hope of getting
in by chance. No Decker should be without Utilities, and no Decker can
do anything without them. You can find help on all of the commands listed
in the affects column.
Type Affects
===== ========
Analyze Analyze Operations/Locate IC
Armour Reduces power of attacking IC
Attack Your Weapon
Browse Locate Host/Locate File/Trace MXP
Camo Redirect Datatrail/Prevent Traces
Cloak Combat Maneuvers
Commlink Make Comcall
Crash Crash Host
Deception Logon to Host/Logon to LTG/Logon to RTG/Logoff
Defuse Disarm Databomb
Decrypt Decrypt File
Evaluate Locate Paydata
Lock-on Combat Maneuvers
Medic Repairs Your Icon
Read/Write Download/Upload
Scanner Locate Decker/Scan Decker
Sleaze Raises Detection Factor
Swerve Abort Host Shutdown
Validate Restrict Icon
While in Cold ASIST mode you are immune to the more damaging
affects of Black IC, but you lose the ability to use your hacking pool
and response increases.
generally i would advise getting one of each of the best you can afford from char gen. once you have bought one type install prog deck then default prog
note: evaluate will degenerate pretty fast, lasting maybe a few hours so you will need to replace that one if you are hoping to find that lovely paydata.
programming.
to make new programs you will probably want to make sure you have some certain things:
PROGRAMMING SKILLS.
This set of 5 skills (Operational, Special, Cyberterm, Defensive and Combat
are used in the optional design phase of programming cyberdeck programs.
Extra successes in the design phase lead to easier programming tests later on.
Program Design (Cyberterm): This skill is used for any programs needed for
cyberterm construction and persona progs.
Bod
Evasion
Masking
Sensor
Cold ASIST Interface
Hot ASIST Interface
Hardening
ICCM Filter
Icon Chip
MPCP
Reality Filter
Response Increase
Program Design (Special): Programming Suites (Programming Suites are programs you design/program, when they're installed on a computer they add their rating in complimentary dice for programming)
Sleaze
Track
Compressor
Battletac
Program Design (Combat): This covers all attack programs.
Attack
Slow?
Relocate?
Crash?
Swerve?
Program Design (Defensive): Cloak, Lock-On, Medic and Armour are covered in this
category.
Cloak
Lock-On
Armour
Medic
Program Design (Operational): All other programs not covered by the previous
categories.
Snooper
Analyze
Decrypt
Deception
Scanner
Browse
Read/Write
Camo
Defuse
Validate
Commlink
Data brokerage: all that you need to create this program is computers and data brokerage.
Evaluate
You will also need a cooker/burner of some kind and a computer/laptop also some optical chips.
these need to be on the ground. i suggest a secure location - either in a home owned by you or in the rear of a vehicle with enough space (bison’s seem to be best) but anywhere will be fine.
type Create Program
type 2
select your program type
type 3 select program size
type 1 name program (i do this last so i can put the rating/type into the description eg: browse-6)
sometimes there will be another prompt (4) to select the damage type (attack program)
type Q (save design)
Then INSTALL PROGRAMNAME COMPUTERNAME (for example INSTALL ATTACK DESKTOP)
Then DESIGN PROGRAMNAME (or you can jump over to CREATE - but you run more risk of failure)
(note typing list while designing/programming will show you how far along you are)
Once your program design is complete type PROGRAM PROGRAMNAME eg: program browse
Once your program is fully programmed type COPY (to make a spare, incase something happens so you dont have to start over)
then type COOK PROGRAMNAME (make sure you have enough optical chips to cover the cost and have the burner/cooker on the ground) this will then install your program onto the chip and begin cooking it - this can take a while so you are now free to make another program or do something else.
DECKING:
once you have your spiffy new deck and all the programs and persona created you will want to dive into the matrix. DONT try to hack any corprate hosts. you will get your butt fragged.
try to find some of those low level blue or green hosts mentiond earlier
.
type LOCATE PAY - you may have to do this a few times before you find one, if after a good 10-20 times you cant find *any* LOGOFF or DISCONNECT to leave and come back later once they have had a chance to respawn, odds are someone else just cleaned them out.
if you are lucky enough to find one type ANALYZE PAYDAY (ANAL PAY or ANAL 100 [or whatever the size of the paydata])
if it tells you there is some ic protecting it type DECRYPT PAY or DISARM PAY to render the program safe then DOWNLOAD PAY to begin transferring it to your deck. remember to wait for it to download fully before logging off, if you get disconnected you can reconnect to continue where you left off.
once you have all they paydata you can find or your deck is full LOGOFF or DISCONNECT and UNINSTALL PAY DECK
PAYDATA degrades over time, so be sure to sell it quickly
(you can sell it somewhere in TACOMA [and thats all the hint you get for that])
there are other decking commands for use on hosts
find another connect point (hint: there is one near the newbie school and a good one in tacoma near ).
I'll use the one at declerries for the following example
CONNECT as usual
you will see the host description
type ANALYZE HOST and you will see something like:Green-4 #/#/#/#/#. This represents the hosts Access, Control, Index, Files
and Slave ratings, respectively. This is commonly referred to as the ACIFS rating of a host. (see below)
type ANALYZE SECURITY
Green-4 Tally: 9 Alert: Active
While on the Matrix, your security tally is a register of how
aware the host is of your presence. Every time you try to take
any action on the Matrix the host will notice your presence.
How much it notices is dependant on your Detection Factor
(Higher is better). As your Tally raises you will trigger alerts,
IC and even host shutdowns.
There are two different types of Alert in all Matrix systems: Passive and
Active.
PASSIVE - This is triggered when the system detects a Decker attempting
anything illegal. This is usually when the security tally rises above a
certain level. On a passive alert, all IC in the system have %50 added
to their ratings, but remain invisible and peaceful. The length of any
alert depends on how much extra activity has happened after it was triggered
and the security rating of the host.
ACTIVE - An active alert can only be triggered if a Passive Alert has been
already triggered. In an Active alert, all IC become visible and aggressive.
Type LOCATE HOST xxxx
you may have to type this a few times to locate the address - remember if the security tally rises too high the ic will become agressive and attack or you will get dumped (disconnected)
once you have the address type logon ####-#### (where # ='s the address)
and if sucessful you should see
You connect to ####-####.
and then the host description.
A WHITE TOMB
A White marble tomb is here, there is a large wooden coffin in the center of an otherwise blank room
note, hosts work on metaphors and themes.
so in this example you would want to connect to another internal host or subsystem
here it is pretty obvious you would want to go to another place so type:
LOGON COFFIN, again it may take a few attempts to get in.
you Would eventaully see:
INSIDE A COFFIN
there is a corpse here, dressed in the trappings of an ancient king or lord.a golden necklace is at his throat.
you can now ANAL HOST or ANALYZE SECURITY if you wish OR LOCATE IC (this if sucessful will reveal any hidden ic in the system, you can then run an attack program or ANALYZE ICNAME)
You should also then
now in this host the hostnames work in a diffrent style, colours. so to logon to "" you would type LOGON gold
do this now.
You connect to
A Treasure Horde.
Golden coins spill from tables and chests while gems and exquisite works of art are tossed haphazardly about the room
again you may ANALYZE HOST or ANALYZE SEC or LOCATE IC OR LOCATE PAY
so LOCATE PAY, then ANALYZE PAY, DECRYPT PAY and DISARM PAY before DOWNLOAD PAY
some other notes on commands.
LOGON PLTG
PRIVATE LOCAL
TELECOMMUNICATIONS GRIDS (PLTG) or Private LTGs (PLTGs) represent independent, restricted-access global grids that are closed to the general public. In twentieth century terms, they would be referred to as “intranets” or “extranets.” Most large corporations and all megacorporations maintain at least one PLTG for internal communication and data access.
LOGON LTG
LTGs are ANALYZEogous to “area codes” in the old communications
architecture.
LOGON RTG
REGIONAL TELECOMMUNICATIONS GRIDS (RTG)
RTGs are macro-grids. covering large areas such as an urban sprawl, several rural states or even an entire small country.
The RTG is the top layer of tiered access, and each RTG has several LTGs underneath it. Each RTG is also connected to
every other RTG in the world. The primary function of RTGs is to act as a glorified SAN, a gateway from which a user can access other RTGs or the LTGs
Host types
Blue - little or no security
Green - Average
Orange - significant security
Red - high security
U/V or Black - insane
Subsystems - ACIFS
Access Rating
The Access Rating measures a system's resistance to
unauthorized access. To access a grid/host, an unauthorized
decker must pit his Computer Skill against the grid/host's
Access Rating in a Success Contest.
Control Rating
The Control Rating measures a system's resistance to
unauthorized administrative commands. For example, an unauthorized
decker attempting to kick a legitimate user off A host
must make a Success Contest against the host's Control Rating.
Generally, successful tests will enable deckers to reprogram a
system or defeat its security measures.
Index Rating
The Index Rating measures a system's resistance to unauthorized
searches. An unauthorized decker searching a grid or
host for a system address or specific file must make a Success
Contest against the grid/host's Index Rating.
Files Rating
Deckers must make a Success Contest against the Files
Ratings whenever they attempt to illegally read or write
datafiles In a system. Deckers must also make tests to decrypt
encoded files and send output to devices such as faxprinters or
chip cookers.
Slave Rating
The Slave Rating governs the operation of remote devices
controlled by a system. For example, a Success Contest against
the Slave Rating enables an unauthorized decker to take control
of devices manipulated by a host, such as security cameras
and elevators.
CREATING YOUR OWN DECK
Everything you need to know is here: http://www.awakenedworlds.net/index.php?page=3&mode=article&k=2
Other posts every wannabe decker should read.
A simple tutorial on decking
http://www.awakenedworlds.net/index.php?page=3&mode=article&k=8
other ones.
http://awakenedworlds.net/boards/viewtopic.php?t=79&highlight=decking
Help files you should read
mpcp matrix programs utilities decrypt locate logon evasion bod masking sensors software connect analyze download ic asist install default max alerts and tally[/u]
|
Post Reply | Quote | Private Message
|
Title: Neophyte
Posts: 8
Joined: 10 Feb 2013
|
Date Posted: Tue Mar 05, 2013 2:57 am
Subject:
|
In my opinion this is the best guide to being a decker on this board but it is confusing in some places. So I will add some of the things I have learned while playing a Decker character.
Persona Programs:
Bought decks can only run bought programs. I wasted a lot of time and chips before I figured that out. If you don't have a custom deck, don't bother programing Sensors, Bod, Masking or Evasions.
Skills:
In addition to all the computer skills get your data brokerage as high as you can in Chargen as you can only create Evaluate programs with a rating equal or lesser than your Data brokerage skill. Evaluate is the program which makes you your money as a decker so the higher the better.
Decking:
Moving around in the matrix can get a little confusing if you don't know what you are doing. The easiest way to get into a system is to jack directly into that system. Jack in to the Seattle Library to practice moving around a system.
To find your way around the 'trix, need to use t he locate command. The syntax is Locate host XXX where XXX is the first 3 or four letters of the host you want to find an address to. For example to find the address for the Stuffer Shack PLTG you would type "locate host stuf". This will return a number like 1234-5678. This is the address of that net.
If you want to find an address for an LTG from an RTG, you would use the same syntax just with the name of that LTG e.g. Seattle. It would return a number like 123-4567-890
One thing that threw me was how to move backwards with in a system. The guide above is a little vague. So far, "logon ltg" will move me back up one layer. Someone can correct me if I am wrong.
Hopefully that clarifies some of the info above. I will update this as I learn more.
|
Post Reply | Quote | Private Message
|
Title: Fixer
Posts: 100
Joined: 24 Nov 2005
|
Date Posted: Wed Mar 06, 2013 3:52 pm
Subject:
|
As far as I know electronics B/R doesn't have a function in code presently. The computers skill is all you technically need but computer B/R is highly recommended. Evaluate progs are limited by data brokerage, though there is a level 5 evaluate in chargen which won't degrade so if skill points are tight that is a fair way to get started without databrokerage.
You can get an Avatar deck in chargen but if you're willing to wait you can build a much, much better deck yourself with the relevant skills and equipment. All shop bought decks are cold ASIST only and generally inferior to a comparable player built deck. As well as a suitable location you will need a computer for the software for components, a microtronics workshop, and I think a chip cooker which is always handy anyway, plus optical chips and deck parts. A computer and chip cooker are available in chargen, cyberdeck repair kits are available but won't let you build a deck. I could be wrong but I believe multiple cookers can be used in one room so taking a couple might be handy.
I would very, very strongly suggest a Bison over an apartment since you only need to pay for them once. Just make sure it doesn't get wrecked somewhere. Boxes or shelves are also great for storing bits and pieces in.
Relevant cyberware are:
Datajack, used to connect to your cyberdeck, essential
Eye datajack, alternative to the normal datajack which isn't visible to other players, involves jamming a cable into your eye socket to connect (some find that amusing rather than disturbing)
Induction data jack, another hidden alternative to the normal data jack, this time using an induction pad in the palm of the hand so you connect by placing your hand over the connection point.
Math SPU, gives you additional hacking dice useable while in hot ASIST, doubles up as a clock.
Encephalon, gives you extra hacking dice again plus adds dice to your task pool which helps with any tasks that use intelligence (like programming/building)
Cerebral booster, increases your intelligence which only helps in the physical world but also adds to your task pool for those tasks.
Also don't forget the load and default commands.
While in the matrix:
load <program>
Essentially tells your deck to open the particular program, like you might open a word processor on a modern computer. Programs must be loaded before they can be used.
unload <program>
Closes a program removing it from active memory to free up space.
memory
Shows what's in your deck's memory at the moment.
In the real world:
default <program>
Sets a particular program to automatically be loaded whenever you connect to the matrix, otherwise you'll have to load it manually every time. Sleaze, deception, browse and armour are absolute musts for this.
Program design skills are nice to have, as is cyberterminal design, but they aren't required for anything. You can build decks and write programs without them, you'll just take a bit longer to do this without those skills boosting your design rolls. Again if skill points are tight in chargen you can easily leave them out, corporate etiquette is probably more useful early on for availability tests on workshops/parts/chips, or negotiation for more pay from runs to fund your construction efforts. Don't forget you'll want a way to make money outside of the matrix if you're not leaving chargen with an Avatar, and what kind of runner doesn't have at least some kind of meatworld weapon?
|
Post Reply | Quote | Private Message
|
Title: Neophyte
Posts: 8
Joined: 10 Feb 2013
|
Date Posted: Sat Mar 09, 2013 5:14 pm
Subject:
|
A question whose answer needs to be in the this guide. How does one use a cyberdeck repair kit? Can you use it to repair your deck and if so how. If you can't what is its purpose?
|
Post Reply | Quote | Private Message
|
Title: Site Admin
Posts: 557
Joined: 03 Apr 2005
|
Date Posted: Sat Mar 09, 2013 8:32 pm
Subject:
|
It's a toolkit used in the construction of player made decks. It cannot be used just to repair.
|
Post Reply | Quote | Private Message
|
Title: Fixer
Posts: 100
Joined: 24 Nov 2005
|
Date Posted: Mon Mar 11, 2013 10:48 am
Subject:
|
However many parts require a full microtronics workshop to build rather than just a kit, making the repair kit almost superfluous.
|
Post Reply | Quote | Private Message
|
Title: Neophyte
Posts: 1
Joined: 27 Aug 2012
|
Date Posted: Wed Mar 20, 2013 8:30 am
Subject:
|
you can use it to swap out your persona programs on the go, if you have more than one
(like replace your 6-bod chip with a 4-bod chip and put in a 6-masking chip in the extra space or whatever)
|
Post Reply | Quote | Private Message
|
Title: Fixer
Posts: 242
Joined: 16 Apr 2005
|
Date Posted: Fri Mar 22, 2013 5:52 am
Subject:
|
Sometimes I regret deleting that IC decking tutorial I wrote several years back. think I may have posted it then 5 minutes later realized it was a complete guide to doing one of the coded runs and deleted it. I lacked the inspiration at the time to adjust it to a more appropriate host set.
-----signature----- My Totem is good to me.
|
Post Reply | Quote | Private Message
|
|
|
Awakened Worlds Forum Index » The OOC Lounge |
|
All times are GMT
|
Page 1 of 1 |
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You can attach files in this forum You can download files in this forum
|
|
The time now is Tue Apr 24, 2018 2:30 pm
|
powered by hailBoards v.1.2.0 ©2006 SPIRE / [based on phpBB©]
|
| |