Digest Archives Vol 1 Issue 85

From: owner-champ-l-digest@sysabend.org 
Sent: Thursday, December 10, 1998 3:40 AM 
To: champ-l-digest@sysabend.org 
Subject: champ-l-digest V1 #85 
 
 
champ-l-digest       Thursday, December 10 1998       Volume 01 : Number 085 
 
 
 
In this issue: 
 
    Re: Looking For Printable Hex Maps 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: combat drones 
    Question on END... enhancements and limitations 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: combat drones 
    RE: Specialized Skills 
    Re: Question on END... enhancements and limitations 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: Question on END... enhancements and limitations 
    Re: Specialized Skills 
    Re: combat drones 
    Re: Question on END... enhancements and limitations 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: How do you define 'mutant' 
    Re: Limitation on power (Recovery rate) (slightly longish) 
    Off Topic but tangential 
    Re: Specialized Skills 
    Re: Specialized Skills 
    Re: Limitation on power (Recovery rate) (slightly longish) 
    Re: combat drones 
    Re: combat drones 
    Re: Jay Ward movies 
    Re: Specialized Skills 
 
---------------------------------------------------------------------- 
 
Date: Wed, 09 Dec 1998 10:06:29 -0800 
From: Christopher Taylor <ctaylor@viser.net> 
Subject: Re: Looking For Printable Hex Maps 
 
At 11:07 AM 12/9/98 -0500, you wrote: 
>I've tried downloading the .pdf hexmaps from the Hero site but all the 
>zip files are corrupted (or at least I can't get the latest version of 
>WinZip to open them).  Can anyone tell me where I can find some 
>printable hexes suitable for tabletop use? 
 
In all honesty, I find using a dry erase board with markers and rulers for 
distance works best, that way people stop counting non existant hexes for 
range and area.  Its a take from miniature wargames but it seems to work 
really well, especially for Fantasy Hero.  You can use some of the slick 
wallboard or that foam board for a table top and clean it off easy enough 
from markers. 
 
- ---------------------------------------------------------- 
Sola Gracia		Sola Scriptura		Sola Fide 
Soli Gloria Deo		Solus Christus		Corum Deo 
- ----------------------------------------------------------- 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 10:12:30 -0800 
From: Eric Chaves <rambler@sowest.net> 
Subject: Re: Specialized Skills 
 
>     I have a character that wants to be a computer Hacker. He is really 
>good at cracking into Computer, but he is unable to program computers 
>otherwise. 
> 
>    How do I do this? Do I give him Computer Programing with the 
>limitation only to Hack into computers? 
 
 
Or you can develop a house rule with two different skills, Computer 
Operations and Computer Programing.  Operations give you the ability to use 
computers and Programing gives you the ability to write programs for them. 
Also make it a requirement that you need Operations to get Programming. 
This is basically what the Paladiaum System uses. 
 
Oh and Rat, the term for breaking into the NSA computer network IS called 
hacking.  BTW, breaking into the NSA computer network and stealing stuff or 
committing crimes is cracking. 
 
 
 
Geek Code 
**************************************************************************** 
GCS d++ H s:+ !g !p au+ a- w++ v++ C++++ UL+ P? L+ 3- E? N+++ K- W--- M++ !V 
po--- Y+ t++ 5 j R++ G'' tv++ b++ D++ B--- e- u** h+ f+ r n+ y** 
**************************************************************************** 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:05:05 -0600 
From: Donald Tsang <tsang@sedl.org> 
Subject: Re: Specialized Skills 
 
>Breaking into the NSA's computers *is* what most people call hacking. 
>The general definition (or,at least, the one in common usage) for hacking 
>is breaking into computers, networks and programs. 
 
Except that's "cracking", not "hacking", according to the people who know 
best.  The crackers would *like* to be thought of as hackers... 
 
Read "The New Hacker's Dictionary" / the Jargon File for more 
(a good web address: http://www.tuxedo.org/~esr/jargon/) 
 
  Donald 
 
------------------------------ 
 
Date: Tue, 08 Dec 98 19:45:47  
From: "qts" <qts@nildram.co.uk> 
Subject: Re: combat drones 
 
On Mon, 7 Dec 1998 15:24:59 -0500, Brian Wawrow wrote: 
 
>I've been toying lately with some different ways of building combat 
>drones. These could take just about any shape. In a FH game they might 
>be animated bladed metal balls or animated statues, in a hi-tech game 
>they could be hovering lasers that shoot at targets defined by a set of 
>criteria given by their owner.  
 
Aren't these just Automata? 
 
qts 
 
Home: qts@nildram.co.uk. 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:40:36 -0500  
From: "Johnson, Adam" <AJohnson@clariion.com> 
Subject: Question on END... enhancements and limitations 
 
I have this character concept of a super who gets his powers from the sun, 
or at least they're solar-based.  
The powers cost normal END in overcast or indoor conditions, less END in 
pure sunlight, and more END when, say, underground. (Night would be normal.) 
 
How do I model this?  
 
 
Thanks for the help. 
 
 
 
- ---------------------------------------------------------- 
Adam Johnson 
Product Support -- Head Lab Resident Area Tech (RAT) 
ajohnson@clariion.com 
	Life's a long song... but the tune ends too soon for us all 
Jethro Tull, "Life's a Long Song," Living in the Past 
- ---------------------------------------------------------- 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 12:57:05 -0800 (PST) 
From: Michael Hayden <mhayden@tsoft.com> 
Subject: Re: Specialized Skills 
 
On Wed, 9 Dec 1998, Michael Surbrook wrote: 
 
> AFAIK: Using a wire coat hanger to keep the muffler attached would be 
> 'jury-rigging'.  Breaking into the NSA's computers *is* what most people 
> call hacking.  The general definition (or,at least, the one in common 
> usage) for hacking is breaking into computers, networks and programs.  
 
Actually, I've heard it both ways, especially in modern science fiction 
literature. Most recently (for me, at least) in Melissa Scott's 'Dreaming 
Metal' -- "hardhacking" for hardware / machinery / electronics, and 
"softhacking" for data and software. 
 
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~ 
    Michael "Doc" Hayden -- mhayden@tsoft.com -- http://tsoft.com/~mhayden/ 
         Hey, I use Procmail (with Spam Bouncer), so spam away!  (^_^) 
 "What you are about to see is real. These are not actors; they're directors." 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 15:13:03 -0500 
From: Mike Christodoulou <Cypriot@concentric.net> 
Subject: Re: Specialized Skills 
 
At 01:08 PM 12/9/98 -0500, Michael Surbrook wrote: 
>On 9 Dec 1998, Stainless Steel Rat wrote: 
>  
>> And stop calling it 'hacking'.  Using a wire coat hanger to keep your 
>> car's muffler from falling off is hacking.  Breaking into the NSA's 
>> computer network is not. 
> 
>This must be some new definitions for slang... 
> 
>AFAIK: Using a wire coat hanger to keep the muffler attached would be 
>'jury-rigging'.  Breaking into the NSA's computers *is* what most people 
>call hacking.  The general definition (or,at least, the one in common 
>usage) for hacking is breaking into computers, networks and programs.  
> 
 
Ok ... I know we're straying off-topic here, but it has to be said. 
 
HACKING is a noble pusuit.  It's the process of finding elegant ways 
to use something (computers, etc) in ways nobody thought possible. 
 
JURY RIGGING may be one tool used by hackers, but only as a temporary 
method.  It's too sloppy for any self-respecting hacker. 
 
CRACKING is the malicious activity that the computer unsavvy call  
"hacking".  That's where you break into computers and start mucking 
with things. 
 
However, as per the discussion about science vs. comix, a PS:Hacking 
should be a sufficient monikker for most purposes. 
 
 
 
 
 
 
======================  ================================================= 
Mike Christodoulou      "Never doubt that a small group of committed  
Cypriot@Concentric.Net   citizens can change the world.  In fact, it is  
(770) 662-5605           the only thing that ever has."  -- Margaret Mead 
======================  ================================================= 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 12:47:50 -0800 
From: Bob Greenwade <bob.greenwade@klock.com> 
Subject: Re: combat drones 
 
At 11:32 AM 12/9/98 -0500, Stainless Steel Rat wrote: 
>-----BEGIN PGP SIGNED MESSAGE----- 
>Hash: SHA1 
> 
>"BG" == Bob Greenwade <bob.greenwade@klock.com> writes: 
> 
>BG>    Why does it make a difference in this case? 
> 
>A Computer does exactly what the PC tells it to do, to the best of its 
>abilities.  A Follower does what the PC tells it to do, modulo the GM's 
>interpretation of those instructions. 
 
   In both cases it's still the GM doing the interpreting; the only 
difference in practice is what criteria he uses for the interpretation. 
- --- 
Bob's Original Hero Stuff Page!  [Circle of HEROS member] 
   http://www.klock.com/public/users/bob.greenwade/original.htm 
Merry-Go-Round Webring -- wanna join? 
   http://www.klock.com/public/users/bob.greenwade/merrhome.htm 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 16:31:44 -0500  
From: "Johnson, Adam" <AJohnson@clariion.com> 
Subject: RE: Specialized Skills 
 
The way that I did this for a campaign was that the character had Computer 
Programming, and used KS: Computer Hacking as a complimentary skill. Worked 
out well, the couple of times it was performed. 
 
This way, the Programming skill can be low, like at the initial level (or 
even a Familiarity). The KS would then give the "bonus" to hacking depending 
on how well the roll was made. 
 
 
- ---------------------------------------------------------- 
Adam Johnson 
Product Support -- Head Lab Resident Area Tech (RAT) 
ajohnson@clariion.com 
	Life's a long song... but the tune ends too soon for us all 
Jethro Tull, "Life's a Long Song," Living in the Past 
- ---------------------------------------------------------- 
 
> -----Original Message----- 
> From:	Eric Chaves [SMTP:rambler@sowest.net] 
> Sent:	Wednesday, 09 December, 1998 13:13 
> To:	champ-l@sysabend.org 
> Subject:	Re: Specialized Skills 
>  
> >     I have a character that wants to be a computer Hacker. He is really 
> >good at cracking into Computer, but he is unable to program computers 
> >otherwise. 
> > 
> >    How do I do this? Do I give him Computer Programing with the 
> >limitation only to Hack into computers? 
>  
>  
> Or you can develop a house rule with two different skills, Computer 
> Operations and Computer Programing.  Operations give you the ability to 
> use 
> computers and Programing gives you the ability to write programs for them. 
> Also make it a requirement that you need Operations to get Programming. 
> This is basically what the Paladiaum System uses. 
>  
> Oh and Rat, the term for breaking into the NSA computer network IS called 
> hacking.  BTW, breaking into the NSA computer network and stealing stuff 
> or 
> committing crimes is cracking. 
>  
>  
>  
> Geek Code 
> ************************************************************************** 
> ** 
> GCS d++ H s:+ !g !p au+ a- w++ v++ C++++ UL+ P? L+ 3- E? N+++ K- W--- M++ 
> !V 
> po--- Y+ t++ 5 j R++ G'' tv++ b++ D++ B--- e- u** h+ f+ r n+ y** 
> ************************************************************************** 
> ** 
>  
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 16:26:19 -0600 (CST) 
From: "Dr. Nuncheon" <jeffj@io.com> 
Subject: Re: Question on END... enhancements and limitations 
 
On Wed, 9 Dec 1998, Johnson, Adam wrote: 
 
> I have this character concept of a super who gets his powers from the sun, 
> or at least they're solar-based.  
> The powers cost normal END in overcast or indoor conditions, less END in 
> pure sunlight, and more END when, say, underground. (Night would be normal.) 
>  
> How do I model this?  
 
With ugly math, I think.  Sounds to me like: 
 
<power> 1/2 END, only in direct sunlight (+1/4 with a -1 limit on it, 
essentailly becoming a +1/8), x2 End (-1/2, is it?) only underground (-1 
limit on the -1/2, effectively making it a -1/4). 
 
Alternately, and for an easier (and to my mind, more comic-book-esque) way 
to handle things, have all of the powers operate off of an END Reserve, 
and give the REC limitations.  Maybe all of it has 'not underground' and 
half of it has 'only in direct sunlight'.  Thus, he'll run out of power if 
he uses it too much at night or underground, and he recharges faster in 
the sun. 
 
J 
 
Hostes aliengeni me abduxerent.              Jeff Johnston - jeffj@io.com 
Qui annus est?                                   http://www.io.com/~jeffj 
 
------------------------------ 
 
Date: 09 Dec 1998 16:40:01 -0500 
From: Stainless Steel Rat <ratinox@peorth.gweep.net> 
Subject: Re: Specialized Skills 
 
- -----BEGIN PGP SIGNED MESSAGE----- 
Hash: SHA1 
 
"MS" == Michael Surbrook <susano@otd.com> writes: 
 
MS> This must be some new definitions for slang... 
 
The term 'hacker' was coined sometime in the 1960s, probably by the group 
at MIT surrounding the PDP-1 and the Tech Model Railroad Club.  The term 
'cracker' was coined in 1985 by hackers as an attempt to get the media to 
distinguish the creative and imaginative hacker from the malicious and 
destructive cracker.  From _The New Hacker's Dictionary_ (third edition): 
 
  hacker: n. [orig. someone who makes furniture with an axe] 1. A person who 
  enjoys exploring the details of programmable systems and how to stretch 
  those capabilities, as opposed to most users, who prefer to learn only the 
  minimum necessary.  2. One who programs enthusiastically (even obsessively) 
  or who enjoys programming rather than just theorizing about programming. 
  3. A person capable of appreciating hack value.  4. A person who is good at 
  programming quickly.  5. An expert at a particular program, or one who 
  frequently does work using it or on it; as in 'a Unix hacker'.  6. An 
  enthusiast of any kind.  One might be an astronomy hacker, for example. 
  7. One who enjoys the intellectual challenge of creatively overcoming or 
  circumventing limitations. 
 
And finally: 
 
  8. [deprecated] A malicious meddler who tries to discover sensitive 
  information by poking around.  Hence password hacker, network hacker. 
  The correct term for this sense is cracker. 
 
  See also: cracker, samurai, and warez d00dz. 
 
MS> AFAIK: Using a wire coat hanger to keep the muffler attached would be 
MS> 'jury-rigging'. 
 
  1. Originally, a quick job that produces what is needed, but not well. 
 
I see little difference between the two. 
 
MS> Breaking into the NSA's computers *is* what most people call hacking. 
 
Because the media calls it that.  The media is wrong about many things, 
which is why I will take any opportunity I can in an attempt to explain the 
difference. 
 
- -----BEGIN PGP SIGNATURE----- 
Version: PGPfreeware 5.0i for non-commercial use 
Charset: noconv 
 
iQA/AwUBNm7uMIJfryJUlUjZEQIL2wCfTEU7HyIiTWK/j1rbte0/W2PtQmkAn0Im 
XCxpbo1Ajw+q0aToEFa+l4CJ 
=mOf7 
- -----END PGP SIGNATURE----- 
 
- --  
Rat <ratinox@peorth.gweep.net>    \ Happy Fun Ball may stick to certain types 
PGP Key: at a key server near you! \ of skin. 
                                    \  
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 13:55:03 -0800 
From: jayphailey@juno.com (Jay P Hailey) 
Subject: Re: Specialized Skills 
 
>If I remember correctly, it's just Survival.  You have to  
>specify the environment when you buy the skill. 
 
I thought that Survival was a generic use skill, but that you could 
leverage it with "K/S: Mountain Evironments" for a complementary skill 
roll... 
 
 
Jay P. Hailey <Meow!> 
 
"A B C D E-F-G.  Eric the half a bee......" 
 
___________________________________________________________________ 
You don't need to buy Internet access to use free Internet e-mail. 
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html 
or call Juno at (800) 654-JUNO [654-5866] 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 16:00:36 -0800 (PST) 
From: Michael Hayden <mhayden@tsoft.com> 
Subject: Re: Question on END... enhancements and limitations 
 
On Wed, 9 Dec 1998, Johnson, Adam wrote: 
 
> I have this character concept of a super who gets his powers from the sun, 
> or at least they're solar-based.  
> The powers cost normal END in overcast or indoor conditions, less END in 
> pure sunlight, and more END when, say, underground. (Night would be normal.) 
 
Since the Advantage and Limitation would seem to balance each other out 
(depending on where the character spends most of his time), there really 
is no reason to count the points. Just write it up as part of the special 
effects. 
 
But, if you really have your heart set on counting points, do it like 
Sunspot from the New Mutants: END Reserve, recharges only in direct 
sunlight, with a -1/2 Limitation (more or less) on the REC cost of the 
Reserve. 
 
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~ 
    Michael "Doc" Hayden -- mhayden@tsoft.com -- http://tsoft.com/~mhayden/ 
         Hey, I use Procmail (with Spam Bouncer), so spam away!  (^_^) 
 "What you are about to see is real. These are not actors; they're directors." 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:04:54 -0800 (PST) 
From: Ell Egyptoid <egyptoid@yahoo.com> 
Subject: Re: Specialized Skills 
 
round here, a "hacker" breaks into people's computers. 
a "cracker" is them what lives up at the peach orchard. 
== 
Laissez le bon pim roulez!            Elliott  aka  Egyptoid 
_________________________________________________________ 
DO YOU YAHOO!? 
Get your free @yahoo.com address at http://mail.yahoo.com 
 
------------------------------ 
 
Date: 09 Dec 1998 19:31:43 -0500 
From: Stainless Steel Rat <ratinox@peorth.gweep.net> 
Subject: Re: combat drones 
 
- -----BEGIN PGP SIGNED MESSAGE----- 
Hash: SHA1 
 
"BG" == Bob Greenwade <bob.greenwade@klock.com> writes: 
 
BG>    In both cases it's still the GM doing the interpreting; the only 
BG> difference in practice is what criteria he uses for the interpretation. 
 
And you have the answer to your own question. 
 
- -----BEGIN PGP SIGNATURE----- 
Version: PGPfreeware 5.0i for non-commercial use 
Charset: noconv 
 
iQA/AwUBNm8WboJfryJUlUjZEQIVjwCeL/5ZBeQq73dLoSOh+aTk97Prlk4AoNnd 
qQ1YPewTPjphiHAB69Og1qbA 
=bBGO 
- -----END PGP SIGNATURE----- 
 
- --  
Rat <ratinox@peorth.gweep.net>    \ When not in use, Happy Fun Ball should be 
PGP Key: at a key server near you! \ returned to its special container and 
                                    \ kept under refrigeration. 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 16:25:35 -0800 
From: Bob Greenwade <bob.greenwade@klock.com> 
Subject: Re: Question on END... enhancements and limitations 
 
At 03:40 PM 12/9/98 -0500, Johnson, Adam wrote: 
> 
>I have this character concept of a super who gets his powers from the sun, 
>or at least they're solar-based.  
>The powers cost normal END in overcast or indoor conditions, less END in 
>pure sunlight, and more END when, say, underground. (Night would be normal.) 
> 
>How do I model this? 
 
   Just offhand, I'd give the Powers the Advantage "Reduced END Cost (1/2 
END)" with a -1 Limitation "Only in Direct Sunlight," and possibly the 
whole Power with a -1/4 Limitation "Double END When Underground, in Deep 
Space, or in Similar Conditions." 
   Of course, this depends on how often "pure sunlight" and "underground" 
conditions come up.  It's not unlikely that it would serve just fine as a 
Zero Modifier (what most folks refer to as a -0 Limitation). 
- --- 
Bob's Original Hero Stuff Page!  [Circle of HEROS member] 
   http://www.klock.com/public/users/bob.greenwade/original.htm 
Merry-Go-Round Webring -- wanna join? 
   http://www.klock.com/public/users/bob.greenwade/merrhome.htm 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 19:52:15 -0500 
From: Mike Christodoulou <Cypriot@concentric.net> 
Subject: Re: Specialized Skills 
 
At 01:55 PM 12/9/98 -0800, Jay P Hailey wrote: 
>>If I remember correctly, it's just Survival.  You have to  
>>specify the environment when you buy the skill. 
> 
>I thought that Survival was a generic use skill, but that you could 
>leverage it with "K/S: Mountain Evironments" for a complementary skill 
>roll... 
 
I stand corrected (now that I am within arm's length of my book). 
 
 
======================  ================================================= 
Mike Christodoulou      "Never doubt that a small group of committed  
Cypriot@Concentric.Net   citizens can change the world.  In fact, it is  
(770) 662-5605           the only thing that ever has."  -- Margaret Mead 
======================  ================================================= 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 19:44:35 -0600 
From: "Michael (Damon) & Peni Griffin" <griffin@txdirect.net> 
Subject: Re: Specialized Skills 
 
At 03:04 PM 12/9/1998 -0800, Ell Egyptoid wrote: 
 
>a "cracker" is them what lives up at the peach orchard. 
 
Them's fightin' words, bubba.   ;) 
 
Damon 
born in Georgia, now living in Texas 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 19:47:50 -0600 
From: "Michael (Damon) & Peni Griffin" <griffin@txdirect.net> 
Subject: Re: Specialized Skills 
 
At 09:31 AM 12/9/1998 -0600, you wrote: 
>3. The only other method I see is to buy  PS: Mountain Survival. Is this 
>right? Are there any other ways of doing this? 
 
There are always alternatives.  Some of these would very clearly require 
adoption of a house rule redefining an existing rule; others *might* 
require that, as a matter of interpretation.  After re-reading the 
description of Survival, I think there's room for interpretation as to 
whether it was meant to be general or environment-specific.  In the absence 
of an official ruling: 
 
1. Decide that Survival should be a general skill, applicable to all 
environments, then buy PS:Mountaineer or some applicable KS and use that as 
a complementary roll when he's in the mountains.  Pretty much what Mssrs. 
Gilberg and Hailey said. 
 
2. Decide that Survival should be environment-specific, and buy it several 
times to cover the various environments you want him to be comfortable in. 
Buy as many +1's to the Survival:Mountains roll as you see fit and leave 
the others at the base level.  (This is my usual interpretation, though if 
I were feeling generous I might follow Brian Wawrow's suggestion and let 
them have a reduced roll against similar environments.  It'd depend on why 
the current roll was being made, of course.)  
 
3. Decide that Survival can be bought either as a general skill *or* an 
environment-specific skill.  Then buy it twice:  Survival and 
Survival:Mountains.  Use one as a complementary roll to the other when he's 
in the mountains. 
 
4. Redefine Survival so that it's not a single skill, but a set of them 
like Weapon Familiarity or Transport Familiarity, and have the character 
buy 1-, 2- or even 3-point EF's (Environment Familiarities) as needed to 
cover his expertise.  EF:Andes (or any one specific mountain range), 1 
point.  EF:Mountains, 2 points.  EF:Amazon Jungle, 1 point.  EF:Jungles, 2 
points.  EF:The Tropics, 3 points.  This is too extreme a solution for a 
single character, but you might want to consider it if this sort of thing 
is likely to come up in your campaign again. 
 
Damon 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 22:25:38 -0500 
From: "Dave Mattingly" <dave@haymaker.win.net> 
Subject: Re: How do you define 'mutant' 
 
Glen Sprigg wrote: 
>an organization called Humanity.  These guys aren't prejudiced 
>against mutants; they're prejudiced against any and all paranormals, 
>including those who use technology or even super-skills a la Batman. 
 
Bryant Berggren wrote: 
>If anything, a paranoid 
>group bigoted against "paranormals" should be /favorably/ disposed towards 
>essentially unaltered humans (like Batman or Tony Stark) who prove 
>themselves competitive with the "freaks" -- they prove the superior nature 
>of the "normal folks". 
 
And that's the line that HOHO (the Honorable Order of Humans Only) plays in 
my campaigns. They exalt the Batmen and Iron Men and other training/tech 
humans of the world, and seek to keep the human race pure, but advanced. 
 
 
Dave Mattingly 
http://haymaker.org 
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 21:33:24 -0600 
From: "Michael (Damon) & Peni Griffin" <griffin@txdirect.net> 
Subject: Re: Limitation on power (Recovery rate) (slightly longish) 
 
At 09:00 AM 12/9/1998 -0500, David Asman wrote: 
>I'm looking for some ideas on how to create a particular limitation on 
>powers in a far future setting where psionics are relatively common. . . 
>Essentially I want to have the END recovery rate for character using Psi 
>powers to be limited to about once per hour, instead of the usual 
>post-segment 12 recovery: 
>There are a few ways I've thought of doing this: 
> 
>1:	Have any character who uses mental powers buy a separate END reserve 
>that only recovers once per hour -- however since I want the END use to 
>physically tax the character's personal END for an extended period of 
>time, I don't think this is an option for the effect I want to achieve. 
 
Buy a separate END Reserve that operates the mental powers. 
 
Draw on the END Reserve to operate the mental powers, but also require the 
character to spend his personal END to power the END Reserve.  This psychic 
battery will sit there, fully charged and doing nothing, costing no END 
while it isn't turned on.  During every Phase where the Reserve is used to 
power the mental abilities, the character's personal END would normally be 
burned at the usual rate of 1 END per 10 Active Points in the Power (the 
END Reserve, not the mental power).  The character would also spend 1 
personal END/10 AP in the Reserve while the Reserve is recharging at the 
rate of [its own REC per hour], but since most of this will take place 
during non-combat time there should be little bookkeeping involved there. 
 
Since you want the use of mental powers to be physically taxing, apply 
Increased END Cost to the use of the END Reserve, so that the character 
will have to spend 2 or even 3 points of personal END per Phase per 10 
Active Points in the Reserve.  Since he'll keep spending that personal END 
during the Reserves's lengthy REC period, this may give you the effect you 
want. 
 
Example: 
Psi Battery (END Reserve, 100 END/20 REC (15 Active Points),  
Recovers once per hour -1 1/2, Costs END to use -1/2,  
Increased END Cost x3 -1).  Real Cost: 4 points. 
 
A character with a SPD of 4 using a 50 AP mental power (say 10d6 Telepathy) 
can use the Power for 20 Phases (a full minute) before exhausting the END 
Reserve.  He/she will also burn 4 personal END per Turn while the Telepathy 
is in use, and for the next five hours afterward, during the Reserve's 
recharge period. 
 
How does that work for you? 
 
Damon 
  
 
------------------------------ 
 
Date: Wed, 09 Dec 1998 22:09:31 -0500 
From: geoff heald <gheald@worldnet.att.net> 
Subject: Off Topic but tangential 
 
>Date: Mon, 07 Dec 1998 23:01:14 -0500 
>To: Hero List,Cyberpunk List,Fuzion List,Mekton List 
>From: geoff heald <gheald@worldnet.att.net> 
>Subject: Off Topic but tangential 
> 
>I have a multi-part question relating to the real world, physics, and sci fi. 
 
 
And now I have some answers. 
>1) My brother says he saw something on TV about a recent Space Shuttle 
mission with an interesting experiment aboard.  If anybody can confirm 
this, please do.  And cite sources, because I'd rather say "it was in 
Popular Science" or "it was on the Discovery Channel" than "My brother says 
he saw it on TV."  It was like this: 
>If you move a copper wire through a magnetic field, it makes electricity. 
The earth has a magnetic field.  A satelite or space station could, 
therefore, generate some electricity by using a long copper wire.  The 
experiment, says my brother, had a copper wire strung out from the shuttle 
with a buoy-thing on the end to see how much current it would produce.  It 
produced much more current that they thought possable; enough that an arc 
from the buoy severed the cable and the buoy was lost. 
> 
 
Of course the part about the wire and the magnetic field is true.  If you 
didn't know that, you weren't paying attention in 6th grade science.   
 
The whole thing is apparently true.: 
"Here's the answer direct from someone in the Shuttle program:  
 
The flight was STS-075, it was some time last year, I think. It was a 
tethered satellite, extended out from the Shuttle. And it did generate 
a lot of electricity, more than they expected. You can probably find 
out all you need to know from the mission number. NASA's Web Site is 
at www.nasa.gov. 
 
The first attempt failed when the tether came in contact with a part 
of the Shuttle. An arc burned through the cable, and the satellite was 
lost. There was a spare, though, and they completed the experiment 
with it. It was a complete success, and in fact they're going to try 
to use such a generator on the Space Station, not as an experiment, 
but as an actual power source, in addition to the solar arrays." 
 
 
  They were expecting a few tens of watts and got more like 200. I haven't 
actually checked, but several folks pointed to NASA's site for more data. 
 
 
>2) If the above is true, would this work for beanstalks?  By "beanstalk" I 
mean an "orbital elevator"; a structure that runs from the planet's surface 
up to a satelite in a geo-stationary orbit so that a person could travel to 
orbit just like riding an elevator.  It seems that such a structure, if 
properly conductive, could generate a whole lot of electricity. 
> 
>If this won't work, could you explain why? 
> 
 
 
Several people suggested that a "beanstalk" is impossable.  I prefer to say 
it is not presently possable. 
 
The short answer is that the Earth's magnetic field is spinning with the 
planet, so a geo-stationary object, like the Eiffel Tower or a beanstalk, 
is not moving through it.  A beanstalk would, however, probably build up a 
static charge of unpredictable and irregular size and frequency and would 
be a very attractive target for lightning. 
 
Thankyou much for the help. 
 
------------------------------ 
 
Date: Thu, 10 Dec 1998 00:23:07 -0500 (EST) 
From: Michael Surbrook <susano@otd.com> 
Subject: Re: Specialized Skills 
 
On 9 Dec 1998, Stainless Steel Rat wrote: 
 
> MS> Breaking into the NSA's computers *is* what most people call hacking. 
>  
> Because the media calls it that.  The media is wrong about many things, 
> which is why I will take any opportunity I can in an attempt to explain the 
> difference. 
 
One can argue that language is determined by what is common useage, 
regardless of what purists think or want.  Witness the changing 'emaning' 
of the word 'gay'.  I have seen hacking used to describe forcing one's way 
into a computer system in books, the paper, magazines, stories and game. 
It's more than a problem with the media. 
 
I'm willing to bet that if 9 out of 10 people define hacking as breaking 
into a computer, eventually the dictonary (*any* dictonary) will change 
it's definition, not the other way around.   
 
Michael Surbrook / susano@otd.com  
http://www.otd.com/~susano/index.html 
"'Cause I'm the god of destruction, that's why!" - Susano Orbatos,Orion   
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 22:12:33 -0800 (PST) 
From: "Steven J. Owens" <puff@netcom.com> 
Subject: Re: Specialized Skills 
 
     First I was gonna post because I have feelings on this. 
     Then I decided not to, because several people posted for me. 
     Now we've entered the good ol' descriptive vs. proscriptive debate! 
	 
Michael Surbrook writes: 
> One can argue that language is determined by what is common useage, 
> regardless of what purists think or want.  
 
     The "technical" term for this is descriptive vs. proscriptive. 
The belief that the dictionary defines what language "ought" to be, or 
that you can control and manage your language from a central committee 
(the way the French gov't tries to) is proscriptive.  The belief that 
"language" is defined by common usage (I think webster's takes this 
stance) is descriptive. 
 
     I believe language is descriptive.  This is even more true today, 
with computers and information technology decentralizing mass 
communication channels.  The French gov't found out how impossible it was 
to regulate language when the Minitel channels started evolving their own 
dialects and terms. 
 
> I have seen hacking used to describe forcing one's way 
> into a computer system in books, the paper, magazines, stories and game. 
> It's more than a problem with the media. 
>  
> I'm willing to bet that if 9 out of 10 people define hacking as breaking 
> into a computer, eventually the dictonary (*any* dictonary) will change 
> it's definition, not the other way around.   
 
     On the other hand, since language is descriptive, I and anybody else 
has every right to push for, argue for, and promulgate the usage we think 
is appropriate.  This is, after all, how words come into common usage to 
begin with; we're just going to be a little more deliberate about the 
political process of it :-).  So I say a hacker is a computer programmer 
with a high level of expertise.  I just don't claim to do so from some 
dictionary authority. 
 
     My favorite summation of it is the Jargon File (published on dead 
trees as The New Hacker's Dictionary, from MIT press) definition of "hack 
mode": 
 
     2. More specifically, a Zen-like(*) state of total focus on The Problem 
        that may be acheived when one is hacking (this is why every good 
        hacker is part mystic).  Ability to enter such concentration at 
        will correlates strongly with wizardliness; it is one of the most 
        important skills learned during "larval stage".  Sometimes amplified 
        as "deep hack mode". 
 
(* The martial artist in me has to interrupt here to point out that 
   "zen-like state of total focus", also described as concentration, 
   is  an oxymoron; Zen is the opposite of concentration, or perhaps  
   concentrating on everything; it's responding intuitively to the  
   world.  The word "zen" may or may not be applicable to true hacking; 
   if you watch somebody do something, then ask them what they did, and 
   they have to stop and mentally retrace their steps before they can  
   say, then they were probably in a fairly zen-like state of mind). 
 
        Being yanked out of hack mode (see "priority interrupt") may be 
        experienced as physical shock, and the sensation of being in 
        hack mode is more than a little habituating.  The intensity of 
        this experience is probably by itself sufficient explanation 
        for the existence of hackers, and explains why many resist being 
        promoted out of positions where they can code.  See also  
        "cyberspace" (sense 2). 
 
(* Another interruption;  this is what I feel like when I'm writing, as 
   well as programming.  It may go a long way to explain why writers 
   write as well as why hackers hack.  I sum this up in brief discussions 
   with "normal people" by describing it as a sort of "runner's high", 
   albeit more intellectual than physical.) 
 
        Some aspects of hackish etiquette will appear quite odd to an 
        observer unaware of the high value placed on hack mode. 
        For example, if someone appears at your door, it is perfectly 
        okay to hold up a hand (without turning one's eyes away from 
        the screen) to avoid being interrupted.  One may read, type, 
        and interact with the computer for uite some time before 
        further acknowledging the other's presence (of course, he or 
        she is reciprocally free to leave without a word).  The 
        understanding is that you might be in "hack" mode with a lot of 
        delicate "state" (sense 2 ) in your head  and you dare not "swap" 
        that context out until you have reached a good point to pause. 
        See also "juggling eggs". 
 
 
 
 
     By the way, the original term was fairly derisive, applied to people 
who didn't "engineer" solutions but rather "hacked at it until it 
worked."  I suspect it was derived from, or had a common origin with, 
"hack writer".  The meaning evolved because the guys who sat there and 
hacked at it until it worked ended up learning a *lot* more than the 
people who applied the label and were ultimately a lot more capable with 
computers. 
 
Steven J. Owens 
puff@netcom.com 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:29:44 -0800 (PST) 
From: shaw@caprica.com (Wayne Shaw) 
Subject: Re: Limitation on power (Recovery rate) (slightly longish) 
 
>I'm looking for some ideas on how to create a particular limitation on 
>powers in a far future setting where psionics are relatively common. . . 
>Essentially I want to have the END recovery rate for character using Psi 
>powers to be limited to about once per hour, instead of the usual 
>post-segment 12 recovery: 
>There are a few ways I've thought of doing this: 
 
I think you're going out of your way to make this harder than it needs to 
be: just charge a limitation that says 'Burns Quasi-Long Term Endurance' 
(feels like a -3/4 to me) on the powers and move on. 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:40:23 -0800 (PST) 
From: shaw@caprica.com (Wayne Shaw) 
Subject: Re: combat drones 
 
>-----BEGIN PGP SIGNED MESSAGE----- 
>Hash: SHA1 
> 
>"WS" == Wayne Shaw <shaw@caprica.com> writes: 
> 
>WS> That's true if the follower is hired or otherwise acquired.  I think 
>WS> it's pretty much senseless to have the GM write-up the robot the 
>WS> player-character has built, however, any more than he would the vehicle 
>WS> he built or the armor her built. 
> 
>Think that if you want, but the rulebook is quite specific: the GM writes 
>up *ALL* Followers, regardless of origin, just as he does DNPCs. 
 
Which is why I refered to this as senseless legalism.  I believe in 
following the rules as much as the next person...more than most in 
fact...but one _does_ have to look at why the rule exists in that form.  In 
this case it simply makes no sense for the GM to write up the Follower, and 
there's little harm in letting the player do it. 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 15:34:27 -0800 (PST) 
From: shaw@caprica.com (Wayne Shaw) 
Subject: Re: combat drones 
 
>At 08:37 AM 12/8/98 -0800, Wayne Shaw wrote: 
>> 
>>>My only question is this:  Who pays for the Automaton's computer brain?   
>>>The PC or the Automaton?  Meaning, does the PC buy two separate  
>>>followers (a computer and a robot body to carry it around) or does he  
>> 
>>This has always been my interpetation, since otherwise the nested cost 
>>savings can get very ugly.  This comes up every so often when building 
>>vehicles or bases with AIs, too. 
> 
>   My general angle (whether book-legal under 4th Ed or not) has been to 
>simply apply INT (and EGO, if necessary) to the entity in question 
>(Automaton, Base, or Vehicle).  Thus, if a Vehicle is self-aware, it just 
>has all the regular Vehicle characteristics, plus INT and EGO (and, 
>optionally, PRE).  Then the Vehicle buys all Programs, Skills, and such 
>that it needs to function. 
>   At any rate, this is the approach I recommend in TUV. 
 
In practice, this is pretty much the same thing as sticking an AI into it. 
If it didn't have Ego, you'd need to do something with the programs anyway. 
Only question is whether it needs to buy SPD and DEX twice.  I can see 
arguments either way. 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 08:08:26 -0600 
From: "Guy Hoyle" <ghoyle1@airmail.net> 
Subject: Re: Jay Ward movies 
 
> From: Jay P Hailey <jayphailey@juno.com> 
 
> Roger Ramjet.  Now *there* was a true super hero. 
 
When Roger takes his Proton Pill, the crooks began to worry; 
They can't escape the Proton Pill's mighty magic fury... 
 
Or some such. 
 
------------------------------ 
 
Date: Wed, 9 Dec 1998 16:13:55 -0800 (PST) 
From: shaw@caprica.com (Wayne Shaw) 
Subject: Re: Specialized Skills 
 
>On 9 Dec 1998, Stainless Steel Rat wrote: 
> 
>> MS> Breaking into the NSA's computers *is* what most people call hacking. 
>>  
>> Because the media calls it that.  The media is wrong about many things, 
>> which is why I will take any opportunity I can in an attempt to explain the 
>> difference. 
> 
>One can argue that language is determined by what is common useage, 
>regardless of what purists think or want.  Witness the changing 'emaning' 
>of the word 'gay'.  I have seen hacking used to describe forcing one's way 
>into a computer system in books, the paper, magazines, stories and game. 
>It's more than a problem with the media. 
 
It's an old, old arguement...to the point that there is a term for the 
distinction: 'prescriptive grammar' versus 'descriptive grammar'. 
Personally, I think trying to prevent linguistic drift is a fool's errand, 
but some people like tilting at windmills, who am I to tell them not to? 
 
------------------------------ 
 
End of champ-l-digest V1 #85 
**************************** 


Web Page created by Text2Web v1.3.6 by Dev Virdi
http://www.virdi.demon.co.uk/
Date: Monday, January 18, 1999 01:52 PM