Site Tools


trix_traps

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
trix_traps [2022/04/13 10:58] jacktrix_traps [2024/03/20 18:24] (current) – Crosslinking as suggested in Discord. bloodninja
Line 1: Line 1:
-This will be a dump of various bits and pieces of undocumented decking knowledge.+This will be a dump of various bits and pieces of miscellaneous decking knowledge.
  
-1. Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with, *any* intrusion into the Matrix is considered a hostile one. This means as soon as you step foot into it the tally (alert) level begins to climb.+Alternative representation and additional information is also available at the [[houserules#decking|houserules]] article.
  
-2Analyze host is not the only analyze action you can perform. As it turns out there are subsystems and built-in IC to hosts. You have to analyze the sybsystems to get it. Analyze files analyzes the files subsystem, and analyze slave detects for slaved programs and hosts. Hosts can have their own File subsytems and Slave subsystemswhich can not only protect and encrypt host databut also dump you into different locations if triggered. Decrypt file(s?)/decrypt slave is how you untangle that messIt also shows trapdoors this way and you can find them/take them manually, and there are possibly hidden nodes around that require this.+1Canonically the Matrix requires a subscription to use. Because you're a fly-by-night shadowrunner who refuses to pay the corps their nuyen, not that you have a SIN to pay with*any* intrusion into the Matrix is considered a hostile oneThis means as soon as you step foot into it the tally (security/alert) level begins to climb.
  
-3. Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented.+2. Exits themselves (SANs) can be encrypted and there are several bugs on how it is documented.
   * locate host blah   * locate host blah
   * -> Your search returns the address blah.   * -> Your search returns the address blah.
trix_traps.1649872699.txt.gz · Last modified: 2023/01/30 19:07 (external edit)