20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

track programs are not able to determine the location of somebody<br />

using a direct satellite uplink. Unfortunately, the geostationary<br />

orbit is quite far away from earth (36,000 km), so data requests<br />

can be delayed by as much as a second. This second heavily affects<br />

and delays all Matrix interactions. The Response of a hacker using<br />

a geostationary satellite is thus halved (to a minimum of 1).<br />

As an alternative, various low-earth orbit satellites are available.<br />

They require a tracker dish to follow the satellite and pick up<br />

another satellite when the original one comes close to the horizon.<br />

A typical LOE satellite is visible for about thirty minutes. They<br />

are fast moving, and the difference in signal travel time can be<br />

used to determine position much more accurately (using standard<br />

rules for track programs, p 219, SR4). As they are much closer to<br />

Earth (less than 1,000 km), these connections are not affected by<br />

satellite lag.<br />

Beam Links<br />

Beam links are connections between a sender and a receiver<br />

using a laser or microwave beam to transport the traffic. A direct<br />

line of sight is needed to maintain the connection, and neither<br />

sender nor receiver may move. Beam links have the simple advantage<br />

of not being intercepted easily, but they require complex<br />

machinery. Laser links, however, are affected by environmental<br />

conditions like rain, fog, or clouds, which might lower the<br />

Response of a user by up to 3. Microwave links are not affected by<br />

environmental conditions.<br />

Software and data<br />

Though nodes provide the stage of the Matrix, content is<br />

needed to bring it to life. Something has to happen on the stage<br />

and somebody has to do it. Software and data are the content of<br />

the Matrix, filling it with buzzing life.<br />

data Almost everything Matrix users do revolves about manipulating,<br />

sending, processing, or creating data. Data is stored in various<br />

places, ranging from optical disks and chips to the hard drives of<br />

devices and servers. In 2070, everybody is able to record everything<br />

they do all of the time. This includes all their communications, email,<br />

phone calls, trid-calls, blogs, websites, as well as an enormous<br />

load of sensory information coming from houses, cars, workplaces,<br />

clothes, and much more.<br />

However, data in 2070 is not only data. It carries extensive<br />

meta-information of various kinds. The complete history of editors,<br />

generators, programs, dates, and versions of programs used,<br />

connections to other pieces of data like their location, search terms<br />

used to find the data, and much more is stored. Most of the time,<br />

the meta-information is larger than the data itself. This information<br />

is especially important for data mining purposes, searches,<br />

and bookkeeping. The amount of data available in 2070 is so vast<br />

that finding a particular piece of data and getting its context is<br />

often as important as the information content itself.<br />

operating SYSteMS<br />

Operating systems are the programs that control the functioning<br />

of nodes. The OS manages resources and tasks, processes<br />

data and input, handles accounts and authentication, allocates<br />

memory, prioritizes requests, and serves as a platform for other<br />

Unwired<br />

software. It also provides a user interface in the form of the persona<br />

for each user.<br />

Operating systems also provide controls for the physical<br />

device they are loaded on. Most OS’s are customized according<br />

to the nature of the device, with various applications controlling<br />

different functions. An OS designed for a toaster, for example,<br />

knows nothing about doing laundry or making a washing machine<br />

work—but the OS for a washing machine can tell you<br />

details of its recent washing cycles, warn you about mixing whites<br />

and colors, <strong>alert</strong> you when you’re out of bleach, and provide various<br />

setting controls.<br />

Operating systems can follow their programming and any<br />

command inputs, but they are not capable of making complex<br />

decisions. If you want a node’s OS to do anything that doesn’t fall<br />

within its normal programmed routines, or you want it to follow<br />

a complex procedure, you need to write a simple set of commands<br />

called a node script. The OS will process the node script and<br />

execute the instructions as ordered. Node scripts are perfect for<br />

customizing a node’s security response. For example, the OS can<br />

be instructed to launch IC, trigger an alarm, or send a message<br />

when certain conditions are met. Depending on the access rights<br />

needed to perform the action in question, any user can write and<br />

store scripts on a node. Hackers can abuse this to trigger certain<br />

actions at a later time or when a special condition is met. Writing<br />

node scripts requires a Software + Logic Test, with the threshold<br />

determined by the intricacy of the commands.<br />

constructs<br />

Construct is a catch-all term for the entities in the Matrix that<br />

are able to make complex decisions, carry programs, and operate<br />

autonomously. The list includes, but is not limited to, personas,<br />

agents, IC, AI, e-ghosts, and sprites.<br />

Due to their complexity, constructs need a constant stream<br />

of information to and from the nodes they are accessing (see<br />

Subscriptions, p. 55). Constructs can be attacked in cybercombat,<br />

and the programs carried by constructs can be crashed. (For more<br />

info, see Autonomous Programs, p. 110.)<br />

personas<br />

Though personas are sometimes confused with operating<br />

systems, in fact they are the basic user interface an operating system<br />

provides by which you access the device and the Matrix—a<br />

so-called user shell. A persona is a combination control panel, web<br />

browser, email client, and more. It is an integral part of the OS, in<br />

that every operating system features a way for a physical user to<br />

access the device and get online. The persona’s ratings are based<br />

on the OS, but they are separate things.<br />

The operating systems of nexi (but not peripheral or standard<br />

nodes) can run more than one persona interface at a time, meaning<br />

that multiple users can use the same device to get online.<br />

Access ID: Every persona is given a unique access ID. This is<br />

based on the hardwired access ID of the node, with an added signifier<br />

indicating the account. This access ID serves as the persona’s<br />

Matrix address and is recorded by all nodes the persona interacts<br />

with, leaving a datatrail (p. 55).<br />

Subscription Limit: The maximum number of subscriptions<br />

a persona may maintain at once is equal to System x 2 (see Linking<br />

and Subscribing, p. 212, SR4, and Subscriptions, p. 55).<br />

Simon Wentworth (order #1132857) 9<br />

51<br />

Matrix topoloGy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!