This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
decking_with_daiquiri [2021/08/08 11:16] – [V. Hosts] daiquiri | decking_with_daiquiri [2024/05/21 15:57] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Decking with Daiquiri ====== | ||
+ | |||
+ | ==== 0. Special Thanks ==== | ||
+ | |||
+ | A big, big thank you to **Sunny**. I never met you, but you were my mentor. I learned everything I know from the files you left for us to find. Thank you so much. | ||
+ | |||
+ | |||
+ | |||
+ | ==== I. Introduction ==== | ||
+ | |||
+ | |||
+ | Hello, Seattle! Specifically, | ||
+ | |||
+ | If you ever have questions, please feel free to give me a call: **7206-2371** | ||
+ | |||
+ | Let's go! | ||
+ | |||
+ | |||
+ | |||
+ | ====II. What IS all this stuff?==== | ||
+ | |||
+ | |||
+ | Let's cover some of the parts of the deck right quick: | ||
+ | |||
+ | MPCP (Master Persona Control Program) - This is the most important part of the deck! Every aspect of anything you're trying to do in the Matrix is going to indirectly be limited or determined by your MPCP. The higher this is, the better! | ||
+ | |||
+ | Persona Programs - Bod, Evasion, Sensors, and Masking. Think of these as covering how strong your deck is, how fast and smart it is. The total of the four of them can be no higher than triple your MPCP. Therefore, an MPCP of 7 can get you 3 of one and 6's in the others, for example. My personal preference is to drop Bod a bit in favor of the others, at least while you're just in the library or the mall. | ||
+ | |||
+ | Utility Programs - These are any of the other programs you may have for your deck. Their rating cannot be higher than the MPCP of your deck, hence why MPCP affects everything you do! They help with various things, but I'll list the ones that are the most important for gathering paydata: | ||
+ | |||
+ | * Analyze - Checks the paydata for traps | ||
+ | * Browse - Locates hosts and files | ||
+ | * Deception - Logs you on and off of hosts | ||
+ | * Defuse - Defuses databombs | ||
+ | * Decrypt - Accesses encrypted paydata | ||
+ | * Evaluate - Finds the juiciest paydata | ||
+ | * Read/Write - Downloads your paydata | ||
+ | * Sleaze - Makes it take longer before you're busted by IC, omae | ||
+ | |||
+ | Missing any one of these (except Browse in a lot of scenarios) is going to make gathering paydata way more annoying than it needs to be, but not impossible, so don't think you can't get an early start if you're missing something. I started off without a Read/Write, Evaluate or Deception program and look at me now! Slightly better, baby. Slightly better. | ||
+ | |||
+ | |||
+ | |||
+ | ====III. Let's get rich!==== | ||
+ | |||
+ | |||
+ | There' | ||
+ | |||
+ | **1.** CONNECT to the Matrix. | ||
+ | |||
+ | **2.** LOCATE PAYDATA | ||
+ | You may need to attempt this several times before you find anything. Even once you find some juicy paydata, there might be more out there that you haven' | ||
+ | |||
+ | **3.** ANALYZE PAYDATA | ||
+ | Keep trying it until you find what's protecting it, or find that it's clean. Don't go in blind; that's how they getcha. | ||
+ | |||
+ | **If your data is clean, move on to Step 5. Otherwise...** | ||
+ | |||
+ | **4a.** If you find a bomb or a Pavlov program in the paydata, DISARM the PAYDATA, and keep trying until you're sure it's disarmed! | ||
+ | |||
+ | **4b.** If you find it encrypted, or covered by Scramble-IC, | ||
+ | |||
+ | **5.** DOWNLOAD PAYDATA | ||
+ | The higher the file size, the longer it'll take (your I/O determines how fast your input/ | ||
+ | |||
+ | You'll be notified when your paydata is downloaded, which leaves it installed on your Deck. This will take up file size, and eventually you won't be able to download anymore. To ensure that doesn' | ||
+ | |||
+ | |||
+ | |||
+ | ====IV. Profit==== | ||
+ | |||
+ | |||
+ | It's important that you don't delay this part. Once you've got all of the paydata that you plan on selling (or even cut it into a couple trips, if you want), call a cab and don't stop for drinks on the way. Data keeps on moving and the value of your paydata drops the longer you hold onto it. | ||
+ | |||
+ | To find your vendor, take a cab to Tacoma. You'll need to walk a couple blocks east, turn right, and then you'll find Krackerjack' | ||
+ | |||
+ | Your knowledge of data brokerage and how much Krackerjack likes you is going to determine how much you're getting paid, but either way it's pretty easy to saturate the market with tons and tons of data. The more data that's been sold lately, the less it's worth, but it's only a little while before the prices rise again so take a break, so socialize, and get back at it later on. | ||
+ | |||
+ | |||
+ | |||
+ | ====V. Hosts==== | ||
+ | |||
+ | |||
+ | That's the short of it, at least. When you aren't in the library, you're probably going to need to locate your host. To do that, think about where you're going, look around where you're at in the Matrix for some clues of keywords you can search for. Then LOCATE HOST and whatever KEYWORD you think might lead you to where you want to go. For instance, if I'm trying to get into the Junkyard, I would LOCATE the HOST for the JUNKYARD. Or the MALL, or DANTE' | ||
+ | |||
+ | It's also good to know how to ANALYZE HOSTS. Do this right and you'll get a five number code of info. This is known as the host's ACIFS. In order, the numbers represent Access, Control, Index, Files and Slave. The code you get for each of these values gives a savvy Decker a good idea of how tough that host is going to be to act upon. | ||
+ | |||
+ | * **Access** resists access to the host. | ||
+ | * **Control** resists any admin commands you try to perform. | ||
+ | * **Index** resists all of your searches. | ||
+ | * **Files** resists any download/ | ||
+ | * **Slave** resists attempts to control devices remotely. | ||
+ | |||
+ | The color code is important too. From better to worst: blue, green, orange, red, and anything worse than that I haven' | ||
+ | |||
+ | |||
+ | ==== VI. How to deal with the IC you meet a.k.a tactical logging off ==== | ||
+ | |||
+ | |||
+ | Every single thing you do in the Matrix is going to bring you closer and closer to getting caught by IC. There' | ||
+ | |||
+ | Think of everything you do as adding a tally mark, and once you get to a certain number of marks, IC will know where you are. Everything you do will add a tally, but how much is dependent on how smooth or clumsy you are as a Decker. As you rack up tallies, eventually the host is going to start putting out alerts. You'll see these, so keep an eye and an ear out. Passive alerts aren't an immediate threat to your icon, but they make all the IC on the host extra observant. Active alerts are when the IC will come after you. More tallies means more IC, and eventually the host will attempt to shut down entirely. | ||
+ | |||
+ | I'm not going to go into the ins and outs of cybercombat. That's another lesson for another day for another Runner. However, let's talk about what to do about the IC that you bump into while grabbin' | ||
+ | |||
+ | Short and sweet of it, don't bother with 'em. They' | ||
+ | |||
+ | If you want to be smart about it, get a feel for about how much you can do before IC is going to find you and log off just before they do. Then reconnect, log back in, and keep downloading. This' | ||
+ | |||
+ | Between ACIFS and IC, paying attention to your " | ||
+ | |||
+ | **WARNING: | ||
+ | |||
+ | There' | ||
+ | |||
+ | |||
+ | |||
+ | ====VII. Why is custom better?==== | ||
+ | |||
+ | |||
+ | Get a custom deck. Either build your own or find a Runner that knows what they' | ||
+ | |||
+ | (OOC: Hot ASIST can be toggled by using ASIST. If Hot ASIST is active, you can use your Hacker Pool by setting your MAX. HELP ASSIST, HELP HACKER POOL, and HELP MAX will explain more.) |