I'm kind of new to playing a character that hacks and I have a question about Agents.
I'm playing a Combat Hacker and I'm wondering what I should be looking at?
I have two commlinks. A generic one for public and a loaded one that I use on runs. I know that the public one can be slaved to the private one and either can run an agent keeping an eye open, so to speak, on anyone trying to gain access to your commlink/PAN. What commlink should the Agent run on? Would I just have it run Analyze or other programs so it can attempt to take care of the problem or trace it back.
I would be purchasing the agent after character creation to the rating would not be limited to 4.
There's quite a bit to hacking and I'm still trying to get a firm grasp on things. Any and all help would be appreciated.
Your agent is also a program and counts against your system load. If you have an agent (rating 3 let's say) running Analyze 3 and Blackout 3, then it counts as three programs loaded, not one. Therefor, if you want to have an active agent always running to boost your Analyze or what have you it would be better to keep it on a slaved node (a second commlink) so that it doesn't interfere with your programs and hacking. If it's working from another node then it's taking up a subscription slot, but not active program slots.
That said, I think IC is a better solution for passive defense. IC are basically just Agents that have been scripted to do something when an alert is triggered on a node (either the one they reside in or one slaved to it). You could buy a Firewall software upgrade and a good Analyze program and just leave it running in the background of your commlink. If it detects an intrusion by some punk hacker, your IC would then be loaded and run its script (trace and report, attack, etc.). The IC is not taking up slots for running programs that way since it only loads if an alert is triggered. If you are actively hacking and watching your own commlink's status, then you also have the option to trigger the IC manually whenever you wanted. Sic it on a rival hacker's node. Maybe download it into a node you've hacked and use that's node's resources to run it.
Personally, I am a little confused as to why the book makes a distinction between IC and Agents. One is running a script and the other is being actively commanded, but they are both basically the same thing and can perform similar tasks.