Site Tools


decking_with_daiquiri

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
decking_with_daiquiri [2021/08/08 11:19] – [V. Hosts] daiquiridecking_with_daiquiri [2023/01/30 19:07] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== 0. Special Thanks ======+====== Decking with Daiquiri ======
  
  
 +==== 0. Special Thanks ====
  
 A big, big thank you to **Sunny**. I never met you, but you were my mentor. I learned everything I know from the files you left for us to find. Thank you so much. A big, big thank you to **Sunny**. I never met you, but you were my mentor. I learned everything I know from the files you left for us to find. Thank you so much.
Line 7: Line 8:
  
  
-====== I. Introduction ======+==== I. Introduction ====
  
  
Line 18: Line 19:
  
  
-====== II. What IS all this stuff? ======+====II. What IS all this stuff?====
  
  
Line 42: Line 43:
  
  
-====== III. Let's get rich! ======+====III. Let's get rich!====
  
  
Line 68: Line 69:
  
  
-====== IV. Profit ======+====IV. Profit====
  
  
 It's important that you don't delay this part. Once you've got all of the paydata that you plan on selling (or even cut it into a couple trips, if you want), call a cab and don't stop for drinks on the way. Data keeps on moving and the value of your paydata drops the longer you hold onto it. It's important that you don't delay this part. Once you've got all of the paydata that you plan on selling (or even cut it into a couple trips, if you want), call a cab and don't stop for drinks on the way. Data keeps on moving and the value of your paydata drops the longer you hold onto it.
  
-To find your vendor, take a cab to Tacoma. You'll need to walk a couple blocks east, turn right, and then you'll find Krackerjack's place on the left. Slide on in, UNINSTALL all of your PAYDATA from the CYBERDECK. Go to Krackerjack and SELL all of the PAYDATA for a nice stack of yen. Krackerjack better pay me for the endorsement here.+To find your vendor, take a cab to Tacoma. You'll need to walk a couple blocks east, turn right, and then you'll find Krackerjack's place on the left. Slide on in, UNINSTALL all of your PAYDATA from the CYBERDECK. Go to Krackerjack and SELL all of the PAYDATA for a nice stack of yen. K.J., you better give me good rates for the endorsement here.
  
 Your knowledge of data brokerage and how much Krackerjack likes you is going to determine how much you're getting paid, but either way it's pretty easy to saturate the market with tons and tons of data. The more data that's been sold lately, the less it's worth, but it's only a little while before the prices rise again so take a break, so socialize, and get back at it later on. Your knowledge of data brokerage and how much Krackerjack likes you is going to determine how much you're getting paid, but either way it's pretty easy to saturate the market with tons and tons of data. The more data that's been sold lately, the less it's worth, but it's only a little while before the prices rise again so take a break, so socialize, and get back at it later on.
Line 79: Line 80:
  
  
-====== V. Hosts ======+====V. Hosts====
  
  
 That's the short of it, at least. When you aren't in the library, you're probably going to need to locate your host. To do that, think about where you're going, look around where you're at in the Matrix for some clues of keywords you can search for. Then LOCATE HOST and whatever KEYWORD you think might lead you to where you want to go. For instance, if I'm trying to get into the Junkyard, I would LOCATE the HOST for the JUNKYARD. Or the MALL, or DANTE's. You'll end up getting a phone number or a keyword that you can log onto. So just LOGON XXXX-XXXX once you've got that number or keyword. That's the short of it, at least. When you aren't in the library, you're probably going to need to locate your host. To do that, think about where you're going, look around where you're at in the Matrix for some clues of keywords you can search for. Then LOCATE HOST and whatever KEYWORD you think might lead you to where you want to go. For instance, if I'm trying to get into the Junkyard, I would LOCATE the HOST for the JUNKYARD. Or the MALL, or DANTE's. You'll end up getting a phone number or a keyword that you can log onto. So just LOGON XXXX-XXXX once you've got that number or keyword.
  
-It's also good to know how to ANALYZE HOSTS. Do this right and you'll get a five number code of info. This is known as the host's ACIFS. In order, the numbers represent Access, Control, Index, Files and Slave. The code you get for each of these values gives a savvy Decker a good idea of how tough that host is going to be to act in.+It's also good to know how to ANALYZE HOSTS. Do this right and you'll get a five number code of info. This is known as the host's ACIFS. In order, the numbers represent Access, Control, Index, Files and Slave. The code you get for each of these values gives a savvy Decker a good idea of how tough that host is going to be to act upon.
  
-Access resists access to the host. +  * **Access** resists access to the host. 
-Control resists any admin commands you try to perform. +  * **Control** resists any admin commands you try to perform. 
-Index resists all of your searches. +  * **Index** resists all of your searches. 
-Files resists any download/upload. +  * **Files** resists any download/upload. 
-Slave resists attempts to control devices remotely.+  * **Slave** resists attempts to control devices remotely.
  
-Paying attention to these values and keeping +The color code is important too. From better to worst: blue, green, orange, red, and anything worse than that I haven't seen. Blue is an easy milk run; IC can't even be installed on those. Above that, it gets a little scarier.
  
  
- +==== VI. How to deal with the IC you meet a.k.a tactical logging off ====
-====== VI. How to deal with the IC you meet a.k.a tactical logging off ======+
  
  
 Every single thing you do in the Matrix is going to bring you closer and closer to getting caught by IC. There's no way around it: if there's IC to catch you, they eventually will. Your skill as a Decker and the quality of your cyberdeck determine how long that takes. Every single thing you do in the Matrix is going to bring you closer and closer to getting caught by IC. There's no way around it: if there's IC to catch you, they eventually will. Your skill as a Decker and the quality of your cyberdeck determine how long that takes.
  
-Think of everything you do as adding a tally mark, and once you get to a certain number of marks, IC will know where you are. Everything you do will add a tally, but how much is dependant on whether you're real decker or just a script kitty. More tallies means more IC, and eventually the host will shut down, too.+Think of everything you do as adding a tally mark, and once you get to a certain number of marks, IC will know where you are. Everything you do will add a tally, but how much is dependent on how smooth or clumsy you are as Decker. As you rack up tallies, eventually the host is going to start putting out alerts. You'll see these, so keep an eye and an ear out. Passive alerts aren't an immediate threat to your icon, but they make all the IC on the host extra observant. Active alerts are when the IC will come after you. More tallies means more IC, and eventually the host will attempt to shut down entirely.
  
 I'm not going to go into the ins and outs of cybercombat. That's another lesson for another day for another Runner. However, let's talk about what to do about the IC that you bump into while grabbin' up all the data you can get your digital mitts on. I'm not going to go into the ins and outs of cybercombat. That's another lesson for another day for another Runner. However, let's talk about what to do about the IC that you bump into while grabbin' up all the data you can get your digital mitts on.
Line 107: Line 107:
 Short and sweet of it, don't bother with 'em. They'll come in, smack your icon, bump you out of the Matrix, and then they'll go frag off somewhere else. It's not a cozy experience, but it's not gonna kill you, either. Just log back in and keep doing what you're doing. Short and sweet of it, don't bother with 'em. They'll come in, smack your icon, bump you out of the Matrix, and then they'll go frag off somewhere else. It's not a cozy experience, but it's not gonna kill you, either. Just log back in and keep doing what you're doing.
  
-If you want to be smart about it, get a feel for about how much you can do before IC is going to find you and log off just before they do. Then reconnect, log back in, and keep downloading. This'll keep you from suffering dumpshock, getting tired out, and then subsequently getting caught sooner when you log back in.+If you want to be smart about it, get a feel for about how much you can do before IC is going to find you and log off just before they do. Then reconnect, log back in, and keep downloading. This'll keep you from suffering dumpshock, getting tired out, and then subsequently being clumsy and getting caught sooner when you log back in
 + 
 +Between ACIFS and IC, paying attention to your "security tally" and to the host's security code makes a big difference in whether you're a drek-hot cyberlegend or a milk-drinking script kitty. 
 + 
 +**WARNING:** This is only for these easy paydata runs. If you find yourself hacking into a Mega's digital vault, you better believe the IC is going to be more of a threat than whatever they'll throw at you down at Nybbles n' Bits.
  
-Between ACIFS and IC, paying attention to your "security tally" and to the host's security code makes big difference in becoming a drek-hot cyberlegend.+There's a bunch of types of IC, but I won't get into that here. All I'll say is to watch out for the three levels of IC: White, Grey and Black. White IC is just gonna mess with you. They'll block you from coming and going some. Grey IC is going to hit your icon and try to dump you out, track your location in meatspace, delete your programs, whatever it is they're coded to do. Black IC, though? They'll kill you. Not your icon; not your digital self. They'll lock you in the Matrix so you can't log out and frag your deck with so much malicious code that your brains turn to scrambled mush. Not good way to go, omae. Be careful.
  
  
  
-====== VII. Why is custom better? ======+====VII. Why is custom better?====
  
  
-Get a custom deck. Either build your own or find a Runner that knows what they're doing. Make sure you get a hot ASIST in it, cause that'll make a huge difference. No store-bought deck is going to have one. As Sunny said, "Hot ASIST's very illegal, so you know that it must be good."+Get a custom deck. Either build your own or find a Runner that knows what they're doing. Make sure you get a hot ASIST in it, cause that'll make a huge difference in the quality of your connection to the Matrix. No store-bought deck is going to have one. Do keep in mind, though: having a stronger connection goes both ways, and if you get fragged up with a hot-ASIST, it's going to leave much more of a lasting impression than on cold. But, as Sunny said, "Hot ASIST's very illegal, so you know that it must be good."
  
 (OOC: Hot ASIST can be toggled by using ASIST. If Hot ASIST is active, you can use your Hacker Pool by setting your MAX. HELP ASSIST, HELP HACKER POOL, and HELP MAX will explain more.) (OOC: Hot ASIST can be toggled by using ASIST. If Hot ASIST is active, you can use your Hacker Pool by setting your MAX. HELP ASSIST, HELP HACKER POOL, and HELP MAX will explain more.)
decking_with_daiquiri.1628446784.txt.gz · Last modified: 2023/01/30 19:07 (external edit)